diff --git a/hyperledger_fabric/README.md b/hyperledger_fabric/README.md index e2019e0a..49056c7a 100644 --- a/hyperledger_fabric/README.md +++ b/hyperledger_fabric/README.md @@ -2,7 +2,7 @@ This project provides several useful Docker-Compose script to help quickly bootup a Hyperledger Fabric network, and do simple testing with deploy, invoke and query transactions. -Currently we support Hyperledger Fabric all releases from v0.6 to latest v1.x. +Currently we support Hyperledger Fabric all releases from v0.6.0 to latest. If you're not familiar with Docker and Blockchain, can have a look at these books (in CN): @@ -14,6 +14,7 @@ If you're not familiar with Docker and Blockchain, can have a look at these book Fabric Release | Description --- | --- [Fabric Latest](latest/) | latest fabric code, unstable. +[Fabric v1.4.4](v1.4.4/) | stable fabric 1.4.4 release. [Fabric v1.4.3](v1.4.3/) | stable fabric 1.4.3 release. [Fabric v1.4.2](v1.4.2/) | stable fabric 1.4.2 release. [Fabric v1.4.0](v1.4.0/) | stable fabric 1.4.0 release. @@ -29,7 +30,7 @@ Fabric Release | Description ### TLDR ```bash -$ export RELEASE=v1.4.3 +$ export RELEASE=v1.4.4 ``` ```bash diff --git a/hyperledger_fabric/v1.4.4/.env b/hyperledger_fabric/v1.4.4/.env new file mode 100644 index 00000000..319cf6fd --- /dev/null +++ b/hyperledger_fabric/v1.4.4/.env @@ -0,0 +1,4 @@ +# for docker-compose usage +FABRIC_IMG_TAG=1.4.4 +EXT_IMG_TAG=0.4.18 +NETWORK=hlf_net diff --git a/hyperledger_fabric/v1.4.4/2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.4/2orgs-4peers-solo.yaml new file mode 100644 index 00000000..f3fec66a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/2orgs-4peers-solo.yaml @@ -0,0 +1,95 @@ +--- +version: '2.0' +services: + orderer.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - '7050' + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls:/var/hyperledger/orderer/tls + peer0.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com # will generated automatically + hostname: peer1.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer0.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com # will generated automatically + hostname: peer0.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com # will generated automatically + hostname: peer1.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 diff --git a/hyperledger_fabric/v1.4.4/Makefile b/hyperledger_fabric/v1.4.4/Makefile new file mode 100644 index 00000000..976a058d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/Makefile @@ -0,0 +1,300 @@ +# Makefile to bootup the network, and do testing with channel, chaincode +# Run `make test` will pass all testing cases, and delete the network +# Run `make ready` will create a network, pass testing cases, and stand there for manual test, e.g., make test_channel_list + + +# support advanced bash grammar +SHELL:=/bin/bash + +# mode of the network: solo, kafka +HLF_MODE ?= raft + +# mode of db: golevel, couchdb +DB_MODE ?= golevel + +NETWORK_INIT_WAIT ?= 2 # time to wait the fabric network finish initialization + +COMPOSE_FILE ?= "docker-compose-2orgs-4peers-solo.yaml" + +LOG_PATH ?= solo/logs + +ifeq ($(HLF_MODE),kafka) + NETWORK_INIT_WAIT=30 +else ifeq ($(HLF_MODE),raft) + NETWORK_INIT_WAIT=5 +endif + +COMPOSE_FILE="docker-compose-2orgs-4peers-$(HLF_MODE).yaml" +LOG_PATH=$(HLF_MODE)/logs + +ifeq ($(DB_MODE),couchdb) + COMPOSE_FILE="docker-compose-2orgs-4peers-couchdb.yaml" +endif + +all: test + +test: + @echo "Run test with $(COMPOSE_FILE)" + @echo "Please make sure u have setup Docker and pulled images by 'make setup download'." + make ready # Run all testing till ready + + make stop clean + +ready: # create/join channel, install/instantiate cc + make stop + @echo "Make sure the local hlf_net docker bridge exists" + docker network ls|grep hlf_net > /dev/null || docker network create hlf_net + + # make clean_config_channel # Remove existing channel artifacts + make gen_config_crypto # Will ignore if local config path exists + make gen_config_channel # Will ignore if local config path exists + + make start + + sleep ${NETWORK_INIT_WAIT} + + make channel_test + + make update_anchors + + make cc_test # test_cc_install test_cc_approve test_cc_queryapprove test_cc_commit test_cc_querycommit test_cc_invoke_query + + make test_lscc # test lscc operations + make test_qscc # test qscc operations + make test_cscc # test cscc operations + + make test_fetch_blocks # fetch block files + + make test_config_update + make test_channel_update + + make test_fetch_blocks # fetch block files again + make test_configtxlator + + make test_channel_list + make test_channel_getinfo + + make logs_save + + @echo "Now the fabric network is ready to play" + @echo "* run 'make cli' to enter into the fabric-cli container." + @echo "* run 'make stop' when done." + +# channel related operations +channel_test: test_channel_create test_channel_join test_channel_list test_channel_getinfo + +# chaincode related operations +cc_test: test_cc_install test_cc_instantiate test_cc_invoke_query + +restart: stop start + +start: # bootup the fabric network + @echo "Start a fabric network with ${COMPOSE_FILE}..." + @make clean + @docker-compose -f ${COMPOSE_FILE} up -d # Start a fabric network + +stop: # stop the fabric network + @echo "Stop the fabric network with ${COMPOSE_FILE}..." + @docker-compose -f ${COMPOSE_FILE} down >& /tmp/docker-compose.log + +chaincode_dev: restart chaincode_init test_cc_peer0 stop + +################## Channel testing operations ################ + +test_channel_list: # List the channel that peer joined + @echo "List the joined channels" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_list.sh" + +test_channel_getinfo: # Get info of a channel + @echo "Get info of the app channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_getinfo.sh" + +test_channel_create: # Init the channel + @echo "Create channel on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_create.sh" + +test_channel_join: # Init the channel + @echo "Join channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_join.sh" + +update_anchors: # Update the anchor peer + @echo "Update anchors on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_update_anchors.sh" + +test_channel_update: # send the channel update transaction + @echo "Test channel update with adding new org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_update.sh" + +################## Configtxlator testing operations ################ +test_configtxlator: # Test change config using configtxlator + @echo "Testing decoding and encoding with configtxlator" + bash scripts/test_configtxlator.sh ${HLF_MODE} + @echo "Flattening the json files of all blocks" + python3 scripts/json_flatter.py ${HLF_MODE}/channel-artifacts/ + +test_config_update: # Test change config to add new org + bash scripts/test_config_update.sh ${HLF_MODE} + +################## Chaincode testing operations ################ +test_cc: # test chaincode, deprecated + if [ "$(HLF_MODE)" = "dev" ]; then \ + make test_cc_peer0; \ + else \ + make test_cc_invoke_query; \ + fi + +test_cc_install: # Install the chaincode + @echo "Install chaincode to all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_install.sh" + +test_cc_approve: # Approve the chaincode definition + @echo "Approve the chaincode by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_approve.sh" + +test_cc_queryapprove: # Query the approval status of chaincode + @echo "Query the chaincode approval status by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_queryapprove.sh" + +test_cc_commit: # Commit the chaincode definition + @echo "Commit the chaincode by any org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_commit.sh" + +test_cc_querycommit: # Query the commit status of the chaincode definition + @echo "Query the commit status of chaincode" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_querycommit.sh" + +test_cc_instantiate: # Instantiate the chaincode + @echo "Instantiate chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_instantiate.sh" + +test_cc_upgrade: # Upgrade the chaincode + @echo "Upgrade chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_upgrade.sh" + +test_cc_list: # List the chaincode + @echo "List chaincode information (installed and instantited)" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_list.sh" + +test_cc_invoke_query: # test user chaincode on all peers + @echo "Invoke and query cc example02 on all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_invoke_query.sh" + +test_cscc: # test cscc queries + @echo "Test CSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cscc.sh" + +test_qscc: # test qscc queries + @echo "Test QSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_qscc.sh" + +test_lscc: # test lscc quries + @echo "Test LSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_lscc.sh" + +# FIXME: docker doesn't support wildcard in cp right now +test_fetch_blocks: # test fetching channel blocks fetch + @echo "Test fetching block files" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_fetch_blocks.sh" + +test_eventsclient: # test get event notification in a loop + @echo "Test fetching event notification" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/start_eventsclient.sh" + +test_sidedb: # test sideDB/private data feature + @echo "Test sideDB" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_sideDB.sh" + +temp: # test temp instructions, used for experiment + @echo "Test experimental instructions" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_temp.sh" + +################## Env setup related, no need to see usually ################ + +setup: # setup the environment + bash scripts/env_setup.sh # Installing Docker and Docker-Compose + +check: # Check shell scripts grammar + @echo "Check shell scripts grammar" + [ `which shellcheck` ] && shellcheck scripts/*.sh + +clean: # clean up containers and chaincode images + @echo "Clean all HLF containers and chaincode images" + @-docker ps -a | awk '{ print $$1,$$2 }' | grep "hyperledger/fabric" | awk '{ print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker ps -a | awk '$$2 ~ /dev-peer/ { print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker images | awk '$$1 ~ /dev-peer/ { print $$3 }' | xargs -r -I {} docker rmi -f {} + echo "May clean the config: HLF_MODE=${HLF_MODE} make clean_config_channel" + +# Clean deeply by removing all generated files: container, artifacts, credentials +purge: clean + HLF_MODE=solo make clean_config_channel + HLF_MODE=kafka make clean_config_channel + HLF_MODE=raft make clean_config_channel + make clean_config_crypto + +env_clean: # clean up Docker environment + @echo "Clean all images and containers" + bash scripts/env_clean.sh + +cli: # enter the cli container + docker exec -it fabric-cli bash + +orderer: orderer0 + +orderer0: # enter the orderer0 container + docker exec -it orderer0.example.com bash + +orderer1: # enter the orderer0 container + docker exec -it orderer1.example.com bash + +peer: peer0 + +peer0: # enter the peer container + docker exec -it peer0.org1.example.com bash + +peer1: # enter the peer container + docker exec -it peer1.org1.example.com bash + +ps: # show existing docker images + docker ps -a + +logs: # show logs + docker-compose -f ${COMPOSE_FILE} logs -f --tail 200 + +logs_check: logs_save logs_view + +logs_save: # save logs + @echo "All tests done, saving logs locally" + [ -d $(LOG_PATH) ] || mkdir -p $(LOG_PATH) + docker logs peer0.org1.example.com >& $(LOG_PATH)/dev_peer0.log + docker logs orderer0.example.com >& $(LOG_PATH)/dev_orderer.log + docker-compose -f ${COMPOSE_FILE} logs >& $(LOG_PATH)/dev_all.log + +logs_view: # view logs + less $(LOG_PATH)/dev_peer.log + +elk: # insert logs into elk + # curl -XDELETE http://localhost:9200/logstash-\* + nc localhost 5000 < $(LOG_PATH)/dev_all.log + +gen_config_crypto: # generate crypto config + bash scripts/gen_config_crypto.sh + +gen_config_channel: # generate channel artifacts + bash scripts/gen_config_channel.sh ${HLF_MODE} + +clean_config_channel: # clean channel related artifacts + rm -rf ${HLF_MODE}/channel-artifacts/* + +clean_config_crypto: # clean config artifacts + echo "Warning: Cleaning credentials will affect artifacts in solo/kafka/raft mode" + rm -rf crypto-config/* + rm -rf org3/crypto-config/* + +download: # download required images + @echo "Download Docker images" + bash scripts/download_images.sh + +################## chaincode dev mode ################ +chaincode_init: # start chaincode in dev mode and do install/instantiate + @echo "Install and instantiate cc example02 on the fabric dev network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/init_chaincode_dev.sh" diff --git a/hyperledger_fabric/v1.4.4/base-dev.yaml b/hyperledger_fabric/v1.4.4/base-dev.yaml new file mode 100644 index 00000000..7a9b09e4 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/base-dev.yaml @@ -0,0 +1,97 @@ +# This is the development compose file to config env and command +# Notice that chaincode is executed inside docker in default net mode +# https://github.com/yeasy/docker-compose-files + +# Depends on the yeasy/hyperledger-fabric image. + +version: '2' + +services: + orderer.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: orderer.example.com + hostname: orderer.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # for solo case + #- ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + #- ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + #- ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + # for kafka case + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + #command: bash -c 'orderer start' + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # solo mode configuration + #- ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + #- ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + # kafka mode configuration + - ./kafka/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./kafka/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: bash -c 'peer node start' + #command: bash -c 'peer node start --peer-chaincodedev=true' # DEV mode + + cli: + extends: + file: base.yaml + service: cli-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/opt/gopath/src/github.com/hyperledger/fabric + #- /tmp/:/tmp/ + - ./scripts:/tmp/scripts + # solo mode configuration + #- ./solo/channel-artifacts:/tmp/channel-artifacts + #- ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + #- ./solo/crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + #- ./solo/crypto-config:/etc/hyperledger/fabric/crypto-config + #- ./examples:/opt/gopath/src/github.com/hyperledger/fabric/examples + # kafka mode configuration + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./kafka/crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./kafka/crypto-config:/etc/hyperledger/fabric/crypto-config + - ./examples:/opt/gopath/src/github.com/hyperledger/fabric/examples diff --git a/hyperledger_fabric/v1.4.4/base-event.yaml b/hyperledger_fabric/v1.4.4/base-event.yaml new file mode 100644 index 00000000..ff1de801 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/base-event.yaml @@ -0,0 +1,78 @@ +# All elements in this file should depend on the base-solo.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + ca.org2.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + orderer.example.com: # orderer node for example org + extends: + file: base-solo.yaml + service: orderer.example.com + environment: + - ORDERER_GENERAL_TLS_ENABLED=false + + cli: # client node + extends: + file: base-solo.yaml + service: cli + environment: + #- GOPATH=/opt/gopath + - CORE_PEER_TLS_ENABLED=false # to enable TLS, change to false + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + event-listener: + extends: + file: base-solo.yaml + service: event-listener diff --git a/hyperledger_fabric/v1.4.4/base-kafka.yaml b/hyperledger_fabric/v1.4.4/base-kafka.yaml new file mode 100644 index 00000000..a9ca9b11 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/base-kafka.yaml @@ -0,0 +1,276 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 kafka nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/opt/gopath/src/examples + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + - 8052:7052 + - 8053:7053 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + - 9052:7052 + - 9053:7053 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + - 10052:7052 + - 10053:7053 + + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper0 + hostname: zookeeper0 + environment: + - ZOO_MY_ID=1 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper1: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper1 + hostname: zookeeper1 + environment: + - ZOO_MY_ID=2 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper2: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper2 + hostname: zookeeper2 + environment: + - ZOO_MY_ID=3 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base.yaml + service: kafka-base + container_name: kafka0 + hostname: kafka0 + environment: + - KAFKA_BROKER_ID=0 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka1: + extends: + file: base.yaml + service: kafka-base + container_name: kafka1 + hostname: kafka1 + environment: + - KAFKA_BROKER_ID=1 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka2: + extends: + file: base.yaml + service: kafka-base + container_name: kafka2 + hostname: kafka2 + environment: + - KAFKA_BROKER_ID=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka3: + extends: + file: base.yaml + service: kafka-base + container_name: kafka3 + hostname: kafka3 + environment: + - KAFKA_BROKER_ID=3 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 diff --git a/hyperledger_fabric/v1.4.4/base-raft.yaml b/hyperledger_fabric/v1.4.4/base-raft.yaml new file mode 100644 index 00000000..acc26572 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/base-raft.yaml @@ -0,0 +1,198 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 raft nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer2.example.com + hostname: orderer2.example.com + ports: + - "9050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer2.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./raft/channel-artifacts:/tmp/channel-artifacts + - ./raft/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/go/src/examples diff --git a/hyperledger_fabric/v1.4.4/base-solo.yaml b/hyperledger_fabric/v1.4.4/base-solo.yaml new file mode 100644 index 00000000..749b42d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/base-solo.yaml @@ -0,0 +1,190 @@ +# All elements in this file should depend on the base.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: # ca node for org2 + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + - "8443:8443" + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./solo/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "7051:7051" + - "7052:7052" + - "7053:7053" + - "9443:9443" + + peer1.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "8051:7051" + - "8052:7052" + - "8053:7053" + + peer0.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "9051:7051" + - "9052:7052" + - "9053:7053" + + peer1.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "10051:7051" + - "10052:7052" + - "10053:7053" + + peer0.org3.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org3.example.com + hostname: peer0.org3.example.com + environment: + - CORE_PEER_ID=peer0.org3.example.com + - CORE_PEER_ADDRESS=peer0.org3.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org3.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org3.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org3.example.com:7051 + - CORE_PEER_LOCALMSPID=Org3MSP + volumes: + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "11051:7051" + - "11052:7052" + - "11053:7053" + + cli: # client node + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./solo/channel-artifacts:/tmp/channel-artifacts + - ./examples:/opt/gopath/src/examples + + prometheus: # prometheus will pull metrics from fabric + extends: + file: base.yaml + service: prometheus + container_name: prometheus + hostname: prometheus + ports: + - "9090:9090" diff --git a/hyperledger_fabric/v1.4.4/base.yaml b/hyperledger_fabric/v1.4.4/base.yaml new file mode 100644 index 00000000..241b4a9b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/base.yaml @@ -0,0 +1,165 @@ +# Contains the base template for all Hyperledger Fabric services +# Never directly use services in this template, but inherent +# All services are abstract without any names, config or port mapping +# https://github.com/yeasy/docker-compose-files +# +# * ca-base: base for fabric-ca +# * orderer-base: base for fabric-orderer +# * peer-base: base for fabric-peer +# * cli-base: base for fabric peer client +# * event-listener-base: base for fabric eventhub listener +# * kafka-base: base for kafka +# * zookeeper-base: base for fabric-zookeeper +# * couchdb-base: base for couchdb +# * explorer-base: base for Hyperledger blockchain-explorer +# * mysql-base: base for MySQL + +version: '2' # compose v3 still doesn't support `extends`, shame! + +services: + ca-base: + image: yeasy/hyperledger-fabric-ca:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_CA_HOME=/etc/hyperledger/fabric-ca-server + - FABRIC_CA_SERVER_TLS_ENABLED=true # change to false to disable TLS + + orderer-base: + image: yeasy/hyperledger-fabric-orderer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + # Default config can be found at https://github.com/hyperledger/fabric/blob/master/orderer/common/localconfig/config.go + environment: + - FABRIC_LOGGING_SPEC=INFO # default: INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - ORDERER_GENERAL_LISTENADDRESS=0.0.0.0 # default: 127.0.0.1 + - ORDERER_GENERAL_LISTENPORT=7050 + - ORDERER_GENERAL_GENESISMETHOD=file # default: provisional + - ORDERER_GENERAL_GENESISFILE=/var/hyperledger/orderer/orderer.genesis.block + - ORDERER_GENERAL_LOCALMSPID=OrdererMSP # default: DEFAULT + - ORDERER_GENERAL_LOCALMSPDIR=/var/hyperledger/orderer/msp + - ORDERER_GENERAL_LEDGERTYPE=file + #- ORDERER_GENERAL_LEDGERTYPE=json # default: file + - ORDERER_OPERATIONS_LISTENADDRESS=0.0.0.0:8443 # operation RESTful API + - ORDERER_METRICS_PROVIDER=prometheus # prometheus will pull metrics from orderer via /metrics RESTful API + #- ORDERER_RAMLEDGER_HISTORY_SIZE=100 #only useful when use ram ledger + # enabled TLS + - ORDERER_GENERAL_TLS_ENABLED=true # default: false + - ORDERER_GENERAL_TLS_PRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_TLS_CERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_TLS_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # Only required by raft mode + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + #volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + expose: + - "7050" # gRPC + - "8443" # Operation REST + #command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + command: orderer start + + peer-base: # abstract base for fabric-peer, will be used in peer.yaml + image: yeasy/hyperledger-fabric-peer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_LOGGING_SPEC=INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - CORE_PEER_ADDRESSAUTODETECT=false + - CORE_VM_DOCKER_HOSTCONFIG_NETWORKMODE=${NETWORK} # uncomment this to use specific network + - CORE_PEER_GOSSIP_USELEADERELECTION=true + - CORE_PEER_GOSSIP_ORGLEADER=false # whether this node is the org leader, default to false + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=0.0.0.0:7051 # change to external addr for peers in other orgs + - CORE_OPERATIONS_LISTENADDRESS=0.0.0.0:9443 # operation RESTful API + - CORE_METRICS_PROVIDER=prometheus # prometheus will pull metrics from fabric via /metrics RESTful API + - CORE_PEER_PROFILE_ENABLED=false + - CORE_PEER_TLS_ENABLED=true + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/tls/ca.crt + - CORE_CHIANCODE_BUILDER=hyperledger/fabric-ccenv:${FABRIC_IMG_TAG} + - CORE_CHIANCODE_NODE_RUNTIME=hyperledger/fabric-nodeenv:${FABRIC_IMG_TAG} + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{longpkg}] %{callpath} -> %{level:.4s}%{color:reset} %{message} + volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # docker.sock is mapped as the default CORE_VM_ENDPOINT + - /var/run/docker.sock:/var/run/docker.sock + expose: + - "7051" # gRPC + - "9443" # Operation REST + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: peer node start + + cli-base: + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{module}] %{shortfunc} -> %{level:.4s}%{color:reset} %{message} + - CORE_PEER_TLS_ENABLED=true # to enable TLS, change to true + - ORDERER_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem + working_dir: /opt/gopath/src/github.com/hyperledger/fabric/peer + command: bash -c 'cd /tmp; source scripts/func.sh; while true; do sleep 20170504; done' + + prometheus: # prometheus will pull metrics from fabric + image: prom/prometheus:v2.6.0 + restart: always + network_mode: ${NETWORK} + tty: true + volumes: + - ./prometheus.yml:/etc/prometheus/prometheus.yml + + zookeeper-base: + image: hyperledger/fabric-zookeeper:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + expose: + - '2181' + - '2888' + - '3888' + + kafka-base: + # official repo doesn't have 1.1.0-alpha tag, however, kafka changes version recently + #image: yeasy/hyperledger-fabric-kafka:0.10.2.0 + image: hyperledger/fabric-kafka:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - KAFKA_MESSAGE_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_REPLICA_FETCH_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_UNCLEAN_LEADER_ELECTION_ENABLE=false + - KAFKA_LOG_RETENTION_MS=-1 + expose: + - '9092' + + couchdb-base: + image: hyperledger/fabric-couchdb:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + + explorer-base: + image: yeasy/blockchain-explorer:0.1.0-preview # Till we have official image + expose: + - "8080" # HTTP port + command: bash -c 'sleep 10; node main.js' + + mysql-base: # mysql service + image: mysql:8.0 + restart: always + network_mode: ${NETWORK} + expose: + - "3306" + +networks: + default: + external: + name: ${NETWORK} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/crypto-config.yaml b/hyperledger_fabric/v1.4.4/crypto-config.yaml new file mode 100644 index 00000000..e4da8b9a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config.yaml @@ -0,0 +1,99 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "OrdererOrgs" - Definition of organizations managing orderer nodes +# --------------------------------------------------------------------------- +OrdererOrgs: + # --------------------------------------------------------------------------- + # Orderer + # --------------------------------------------------------------------------- + - Name: Orderer + Domain: example.com + CA: + Country: US + Province: California + Locality: San Francisco +# Template: +# Count: 2 + # --------------------------------------------------------------------------- + # "Specs" - See OrdererOrgs below for complete description + # --------------------------------------------------------------------------- + Specs: + - Hostname: orderer0 + - Hostname: orderer1 + - Hostname: orderer2 +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org1 + # --------------------------------------------------------------------------- + - Name: Org1 + Domain: org1.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + # --------------------------------------------------------------------------- + # "Specs" + # --------------------------------------------------------------------------- + # Uncomment this section to enable the explicit definition of hosts in your + # configuration. Most users will want to use Template, below + # + # Specs is an array of Spec entries. Each Spec entry consists of two fields: + # - Hostname: (Required) The desired hostname, sans the domain. + # - CommonName: (Optional) Specifies the template or explicit override for + # the CN. By default, this is the template: + # + # "{{.Hostname}}.{{.Domain}}" + # + # which obtains its values from the Spec.Hostname and + # Org.Domain, respectively. + # --------------------------------------------------------------------------- + # Specs: + # - Hostname: foo # implicitly "foo.org1.example.com" + # CommonName: foo27.org5.example.com # overrides Hostname-based FQDN set above + # - Hostname: bar + # - Hostname: baz + # --------------------------------------------------------------------------- + # "Template" + # --------------------------------------------------------------------------- + # Allows for the definition of 1 or more hosts that are created sequentially + # from a template. By default, this looks like "peer%d" from 0 to Count-1. + # You may override the number of nodes (Count), the starting index (Start) + # or the template used to construct the name (Hostname). + # + # Note: Template and Specs are not mutually exclusive. You may define both + # sections and the aggregate nodes will be created for you. Take care with + # name collisions + # --------------------------------------------------------------------------- + Template: + Count: 2 + # Start: 5 + # Hostname: {{.Prefix}}{{.Index}} # default + # --------------------------------------------------------------------------- + # "Users" + # --------------------------------------------------------------------------- + # Count: The number of user accounts _in addition_ to Admin + # --------------------------------------------------------------------------- + Users: + Count: 1 + # --------------------------------------------------------------------------- + # Org2: See "Org1" for full specification + # --------------------------------------------------------------------------- + - Name: Org2 + Domain: org2.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/ca/835c212d9a3bf900b8898b5a5ea10990c276478419a17aef025478292708a0a2_sk b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/ca/835c212d9a3bf900b8898b5a5ea10990c276478419a17aef025478292708a0a2_sk new file mode 100644 index 00000000..c67e0bca --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/ca/835c212d9a3bf900b8898b5a5ea10990c276478419a17aef025478292708a0a2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqMqZY8MRhTc0UNJx +WD0UrxFPBYBLaZsg0NIxHPtqAN6hRANCAAQE4NkiEOucWnRl4z64kRsAxgU554+0 +5gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWo +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk new file mode 100644 index 00000000..ce273a3b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqmO+JljFoPfIhim6 +eVmCHpkHFA+2M+vgwrRvkKCGTaihRANCAAQ5eah0RR8AQsvUjwBw26wrMzRSXNx+ +BOMdSraHfIV7y0kKJWxgYy3LAG/pCuEyQCkTINCAN5VxNjcOAFa3qW3Y +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem new file mode 100644 index 00000000..d210203f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt new file mode 100644 index 00000000..c82cc76d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key new file mode 100644 index 00000000..a3bb80d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg44um53xAgcGf36I8 +hEosFEThX/q/xK6mdBJEGxiNnAChRANCAAQbS9GZ+ZvKy9zpyN2lNXTdmDfSbuH9 +TOZVL5ImNEB8+vRfhvgMsZqbCRDR5JmqSIGSwqT98MRG37+jKxwD5m4P +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/49f44e969020d56e48fdfe532d9bb0cf88b0ee3ae01885ada2a8a124e492adb8_sk b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/49f44e969020d56e48fdfe532d9bb0cf88b0ee3ae01885ada2a8a124e492adb8_sk new file mode 100644 index 00000000..b630001f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/49f44e969020d56e48fdfe532d9bb0cf88b0ee3ae01885ada2a8a124e492adb8_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgo4etZOei/4j42mZx +qLjJuqVAMeqKFlSckbVmHJhgM8mhRANCAAT4rVPl+9zbVBkYKvtsD5AD3Wszgvl4 +yG2Ja6+QOZYAzKQ4PfiHcd9j7LcxQgcyN8Svvg2q2n9tKUxTy0O0USYm +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem new file mode 100644 index 00000000..51d0d27e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 ++Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +rkc= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt new file mode 100644 index 00000000..84352fa9 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key new file mode 100644 index 00000000..48082f5b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgeAn2qT0Xi2GNzoTr ++AJHiiiOW65+NWPrGQcOe508E6mhRANCAATQOJpkFZTU02G6ZzlqcNQ/efarFVPm +CDbX5YkJfhRlX6eOslMluLj94TtipmjCFcVl9HpepAbVmOJP7zR8QUNR +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/7b22d4c766036526a68d0103a4d8a03269922fc7169acb53b7eb458386e72ab3_sk b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/7b22d4c766036526a68d0103a4d8a03269922fc7169acb53b7eb458386e72ab3_sk new file mode 100644 index 00000000..4d4dfc62 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/7b22d4c766036526a68d0103a4d8a03269922fc7169acb53b7eb458386e72ab3_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgQ83ryNMdclKveF5H +lo/ezTZLFzz1CdyUq9Hl67t6xI+hRANCAAS8ImiXidPbE3cNTAVRUuCERGVQB/MD +drjCpKyGvLpn6a/yJ0Xmzu9HeX/UV4zGpjL6VRC6teX/xSYIHSKL8co4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem new file mode 100644 index 00000000..64e2fcbb --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDjCCAbSgAwIBAgIRAN+s1O7GI0UOMZvmoXtLQ1YwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABLwiaJeJ09sTdw1MBVFS4IREZVAH8wN2uMKkrIa8umfpr/In +RebO70d5f9RXjMamMvpVELq15f/FJggdIovxyjijTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQCaK9TwZhkZlKcM6m+SNiI0 +E0GWKJ8reffQGfFs/3HOTwIgagYUi0kZAQPl5hFBQns2vt2nCPA+hmOrUD0pfqND +93Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt new file mode 100644 index 00000000..9b2fded5 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key new file mode 100644 index 00000000..aee43bd1 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGsyJwJxyY3hS9b0F +wYdxVC7oWsmgcoLpkyLbyjaW53ehRANCAAQdyKySnGCtriQ3Z06H03GphhH72EL9 +07kLgy0oJgpoCdzTsKfQAwaoaUJPGW4sC+I7j31PDpYn3/O5O+J3b9mp +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/tlsca/5c2f599bc3821984fb52f066ff27022fdefdc3badae0b251d14ab6234ff4cb26_sk b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/tlsca/5c2f599bc3821984fb52f066ff27022fdefdc3badae0b251d14ab6234ff4cb26_sk new file mode 100644 index 00000000..d7ef5bd4 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/tlsca/5c2f599bc3821984fb52f066ff27022fdefdc3badae0b251d14ab6234ff4cb26_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgd4tdFjKsTCKKVnho +WwN2D2IS7WCwhZelVYerkGEWlFehRANCAARw7YgLYl/zQiN89EXJyZP/RyHBdBgb +5sZ9j5yHYX8xYb68MwLX9UjnmkOrE4WtXAVNkipPAm0RQ4jPcN4+wPjj +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/12cfccdd860122001f6fd5d3f837bd2a9859141bd4da4c3b6d208eb36138f549_sk b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/12cfccdd860122001f6fd5d3f837bd2a9859141bd4da4c3b6d208eb36138f549_sk new file mode 100644 index 00000000..2edcb1b1 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/12cfccdd860122001f6fd5d3f837bd2a9859141bd4da4c3b6d208eb36138f549_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgPCGHUkO5hsN4qk3h +gyYXMLrdtJooiP8uWxUPs0QiEOWhRANCAATc6HK5MOc7/vumy14U1gmXWu/qsOkR +her+U4lPeT+2vX/yppesmRcuSe7JEDI4EvO+ecNbQavzdsrHInhjjR9B +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt new file mode 100644 index 00000000..2a36dbd5 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLDCCAdOgAwIBAgIRAJVGkdRzcqvkjXMT774PbBQwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABHXzFhJjAcF2E7HHcCG9J8loMQxrzBsZjID3kDizlPVfxjmO +TRzog1Y/PB9aRAC3zBqUk6TvQ79/CiJaqESwqNSjbDBqMA4GA1UdDwEB/wQEAwIF +oDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAr +BgNVHSMEJDAigCBcL1mbw4IZhPtS8Gb/JwIv3v3DutrgslHRSrYjT/TLJjAKBggq +hkjOPQQDAgNHADBEAiATrDX4/soATOQs7BCZ8e3QnzI45ufbKguu2x4T98Br5AIg +IugHkF9jH9TkMFZQrfeZ/RCSCLydnP36ng3fsOEr95w= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key new file mode 100644 index 00000000..fd7a705b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgdrCdvPZgtf7ekzyW +YaunDxRki8O18sO1AWTsj+JDwu6hRANCAAR18xYSYwHBdhOxx3AhvSfJaDEMa8wb +GYyA95A4s5T1X8Y5jk0c6INWPzwfWkQAt8walJOk70O/fwoiWqhEsKjU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/ca/bd5440d00b09329c9e0ed9821e39d53850847c0170753f7ddc0e5180bdcc981e_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/ca/bd5440d00b09329c9e0ed9821e39d53850847c0170753f7ddc0e5180bdcc981e_sk new file mode 100644 index 00000000..032391e5 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/ca/bd5440d00b09329c9e0ed9821e39d53850847c0170753f7ddc0e5180bdcc981e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgRv+cZYfeX3RmplgX +22EtSL2AFMBTo4tXkK5dCPiWoHmhRANCAARTCgKBQ4dpPn3olMhlO8k6mpaWoagZ +rlvtJT2FzdYsZVKZl9a1sK5JOmvzqPbqFpAjcoAvnbTs2Ek+r7o2nyvv +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk new file mode 100644 index 00000000..2970c648 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgeP2LQOw5AZkA13tp +ACTuYfk9KWIKKuwBeQbAw3fue0ShRANCAAQ/W7e8kQaphjbqD/ylNv3TMwbzxL8J +TIaMl/48ANHSmiiTck5TBu+ipGxYJSQ6ASql422oLE+ccxA9u8gantkA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem new file mode 100644 index 00000000..a63da555 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt new file mode 100644 index 00000000..fdf98be1 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAO/LwmuxNPrIF8MN1GoxzTswCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABPQC76QOrYVvKdeohtSkHQY3if0h +PzH78wUy/Jbr2AG/Ff3LW/zkEelEi03acjE6XfL9r4agwGKpUjrVMNYkfQSjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIGqRTRuJKCKrVqBWCJaVvoViiIIz +67DYtcHS/6oIMgrAMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQDQv4ysSqE0gW/wphHjFRJYfWjUcrPp +5UKIxsjA0QFcsQIgMFStVXjt5mF0wJq98AKPiBkaw9RY3cIwkuAK6xtiuVs= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key new file mode 100644 index 00000000..aa350747 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgPJu78+r2RvtQbMvq +KsczX/xDqEYIK2UCID1pldzKyKWhRANCAAT0Au+kDq2FbynXqIbUpB0GN4n9IT8x ++/MFMvyW69gBvxX9y1v85BHpRItN2nIxOl3y/a+GoMBiqVI61TDWJH0E +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b_sk new file mode 100644 index 00000000..88ee895c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQga2xfa/FhOd6YolFn +NBb7owCaUomyas0EeQMmuIEcnn+hRANCAAQM9+i754FA/Orc0VZIP57ArJ8x0o4o +ql9yHj+EsP/SrjRbnVtGUNMqgvDggKHKgs7cRm69n3t1unCKpxoF5kPs +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem new file mode 100644 index 00000000..dd8c8b9b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt new file mode 100644 index 00000000..c441af2b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAKZWFo8h/lrUtUMqmfjcaEswCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB8iBq9A/OWW1zu3XfSRavsAEcLj +uCd/Lrb1W9x5/WIk/hVbM7s7mF0+dvkKzc9y8t9z1bVteLzBjEGZiAQE9PujgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIGqRTRuJKCKrVqBWCJaVvoViiIIz +67DYtcHS/6oIMgrAMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIE2VgPzWE4xzAX+gzEPXiaILUzUsGsoN +k14xyWCpxz79AiBoTX3KeC/Jz2mtQN+dnyoO5/wRNKwQg8e+3T9lcAce/g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key new file mode 100644 index 00000000..499000b7 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg2LKnl+10oWXAfouB +tgpY7pOdn/9l8RVzIJxZcgi6HU2hRANCAAQfIgavQPzlltc7t130kWr7ABHC47gn +fy629Vvcef1iJP4VWzO7O5hdPnb5Cs3PcvLfc9W1bXi8wYxBmYgEBPT7 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/tlsca/6a914d1b892822ab56a056089695be8562888233ebb0d8b5c1d2ffaa08320ac0_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/tlsca/6a914d1b892822ab56a056089695be8562888233ebb0d8b5c1d2ffaa08320ac0_sk new file mode 100644 index 00000000..9148c4d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/tlsca/6a914d1b892822ab56a056089695be8562888233ebb0d8b5c1d2ffaa08320ac0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgv4sTsBvXAL94E0gB +/DgO7Gc3COMElMQqxs0BdFFQrs6hRANCAASm6N/SexTQxQgzySEn0QWsZHA8h75C +S+Yuid+qJ1459NM70AcKH5Q1MtRHsfd7PKI2ZRQ5tqVCoR+CdLeXRT5x +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/df6c017c31e3c5be907f21f6247bb34b21a27ab9686fa91bc2953e33c46b3145_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/df6c017c31e3c5be907f21f6247bb34b21a27ab9686fa91bc2953e33c46b3145_sk new file mode 100644 index 00000000..a87ab544 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/df6c017c31e3c5be907f21f6247bb34b21a27ab9686fa91bc2953e33c46b3145_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg3QvNIz/tkmhWprd2 +QqL9a+wtu/B/NnzT0wDZ//X+5NyhRANCAARANlBmuACHQscjwwCwmmw5Y9wC2mUJ +oR1OKyo51uafQYVfwe91nAix07fE8bdoUKJ/XNrLaK1nj6PdD/JjTTBu +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..b18bda74 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.crt new file mode 100644 index 00000000..be29faaa --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAIKNTTUkyDgyleo2PxtZORgwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABKP4JNNn6wMvSRUr0oJysoWaarSF ++rEMNLhz1WNl7byg5MkmE2nqG9vJ7F5AOINxVHobHpeSMSGs/Znr6FbzI2ijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBqkU0biSgiq1agVgiWlb6FYoiCM+uw +2LXB0v+qCDIKwDAKBggqhkjOPQQDAgNIADBFAiEA+ZowroCMeKrTRXqsc/u0syOk +wF+o8ArYNHZn2laeUBsCIDKlmGGMdKOWm8LtfnDNthX33ZIvgwLP+FPsZJbJkUjp +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.key new file mode 100644 index 00000000..00b5a769 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1vXsIXg9IKA9rp2p +3IlP9mVyiHmCE5sFtHMPy9Oy5o+hRANCAASj+CTTZ+sDL0kVK9KCcrKFmmq0hfqx +DDS4c9VjZe28oOTJJhNp6hvbyexeQDiDcVR6Gx6XkjEhrP2Z6+hW8yNo +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/c0829e59116970d331524fe41b1a6060e1ccc03a83cfe24b0ed87648881569a9_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/c0829e59116970d331524fe41b1a6060e1ccc03a83cfe24b0ed87648881569a9_sk new file mode 100644 index 00000000..9c066a4c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/c0829e59116970d331524fe41b1a6060e1ccc03a83cfe24b0ed87648881569a9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg4kK8TmTO78P/Oncv +g0pFYf7hs/cnCxCmupAc7FWqiQ2hRANCAATuEgRLDV+iBL/oScz538CyL2VeKVzY +7LXtWjksZKPcd1dvXL/sfzRvjaePkzq9NxWfJg4uVfn8CKgzqbIOVYGC +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem new file mode 100644 index 00000000..55f0034b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIQFI6NU9CGdUn7SLc1/UOz8TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzEuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATuEgRLDV+i +BL/oScz538CyL2VeKVzY7LXtWjksZKPcd1dvXL/sfzRvjaePkzq9NxWfJg4uVfn8 +CKgzqbIOVYGCo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCC9VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjO +PQQDAgNIADBFAiEA/1pe9y7MMqa5JjAFkJWHHwSpM1+2GJnB0ve9gXpBnQcCIFmt +lYxnNqqtHmKzv+KfveAt2VzZeywo7CMA3iVRkifJ +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt new file mode 100644 index 00000000..13210140 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAOR+2UD/6XIM68JHdlYu7PQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABG5UyI1BKWFpkcSqDxye3DgTrBVP +QDNSD1umwDrA54vixDbploIyid/4maleYJz2i139CltTs9GTf7CNCjnTPXSjbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBqkU0biSgiq1agVgiWlb6FYoiCM+uw +2LXB0v+qCDIKwDAKBggqhkjOPQQDAgNIADBFAiEAzhQRglHRHODEEjvHoJVs4UtY +lFV1vXoe8vWWNU5l6VYCIHDXEEAwB2GJoITAtv8mTtSNzcT97doalh6p5YFmcr4J +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key new file mode 100644 index 00000000..9a314d34 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwiQuDPM6Uz7jxAGM +NVFCWCefwG3cRRYkFeR9GrRRkb2hRANCAARuVMiNQSlhaZHEqg8cntw4E6wVT0Az +Ug9bpsA6wOeL4sQ26ZaCMonf+JmpXmCc9otd/QpbU7PRk3+wjQo50z10 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/ca/8e6b95d07fdf634dca5f886fce79e141950837075de34d2274819d75c2ccb4d4_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/ca/8e6b95d07fdf634dca5f886fce79e141950837075de34d2274819d75c2ccb4d4_sk new file mode 100644 index 00000000..66be4bf3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/ca/8e6b95d07fdf634dca5f886fce79e141950837075de34d2274819d75c2ccb4d4_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggFCfyPb/M4ISAZPf +r/n34zdZlrWaknkbw+I1b8V4nnehRANCAASkCyEAG3158WaJBns8JCfWjC9kCfNU +z8SL8m14yOGVYfTq1s14EuaAkXiyW2TS38SnTyXo0Qzz0GyVS8cOPKDa +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6_sk new file mode 100644 index 00000000..c1b13761 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgHCEZCrNMUyhkDhwj +ApJVk5R1YTXjJmhaDpnnIG3965KhRANCAAQOszMaI7KOFL5VZ75P/w5iJ8qcpO98 +h/eLApiMqGXWAJ5ZVmcdgo49tS4g+3tozrEv3fK6/Ggx3eIAmQ9Luh3b +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem new file mode 100644 index 00000000..d7f1c8c8 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt new file mode 100644 index 00000000..49b7c340 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAKfWe7hE3PhC/aN4gbWoqHkwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABL35BKkD4mxBH0KyfOWDaKHjd+XU +07FUS7T96AIZeOctXABaIIZhRDGlKRSBmZkWDjj3t5+eRyqjYb4Et4PF2eujgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIAJ2WQYlwhstNQciIkGpa5JR/KZo +At7cNRJ6nunLWHSVMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzIuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0cAMEQCICRrgV2erVFXl19u1TIkIMK48cT8FSSj +2ICdN6PSzU5BAiAtOxAAFHx7pAU/xCIFOcM6TzXtDuLdbFNDBg7/MAXvkg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key new file mode 100644 index 00000000..c9badc6b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgD0YZPUOSnMCUMu1M +Xk4mdtecjJNYDBzCYO1A8sLHYJGhRANCAAS9+QSpA+JsQR9Csnzlg2ih43fl1NOx +VEu0/egCGXjnLVwAWiCGYUQxpSkUgZmZFg4497efnkcqo2G+BLeDxdnr +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c_sk new file mode 100644 index 00000000..10c6f218 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgY5GLRvGDEwVqiJYB +SS4+onxB4Eu0j+/tKa67+fnlKEehRANCAAQLdyPNh+Nga0v+JgxIKCBtbFVWiB0d +Lf3J+ao9rPbRxZV9V64Kech8O52ZCIAYha9lp1sNUkyI/Hb44uXs/3W/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem new file mode 100644 index 00000000..5dbf6bec --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt new file mode 100644 index 00000000..5b619d3b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAPC9IsalrUsd1tl/XDr6HfswCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABM1WYOWPZkWFIqvkYwsZL9HozWRL +9LAFtureEpbBfz/HGrOKqaUL+Yj+DTFoDCoIuJ7gNKNgc+6f8EoCXQs4aMejgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIAJ2WQYlwhstNQciIkGpa5JR/KZo +At7cNRJ6nunLWHSVMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzIuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDwSh/JoMhgx4iG3dy/XQuvQ/VTNNCq +yXIL8x1Uir4mnwIgfvA6T66kwA2cJ5FgxGtmzzhdJj9s6y9274xbd4iDjBg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key new file mode 100644 index 00000000..6a3ee312 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkQ/pcW2Quo3OTSRj +hmnBENhyu7rJOH1cvAImXwpKWMuhRANCAATNVmDlj2ZFhSKr5GMLGS/R6M1kS/Sw +Bbbq3hKWwX8/xxqziqmlC/mI/g0xaAwqCLie4DSjYHPun/BKAl0LOGjH +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/tlsca/0276590625c21b2d3507222241a96b9251fca66802dedc35127a9ee9cb587495_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/tlsca/0276590625c21b2d3507222241a96b9251fca66802dedc35127a9ee9cb587495_sk new file mode 100644 index 00000000..cc31f3ce --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/tlsca/0276590625c21b2d3507222241a96b9251fca66802dedc35127a9ee9cb587495_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgPdxufDVxjaChZ/0t +d1Fp5gmmBsaSCumlM2hzZ6FIefWhRANCAAQAEMMfeqb0tHmKOtswVw2RRn6bKgVf +8NZWxCytT2eOBKpO547PolGtZ5P5FlM6QZgKreN8fXCZUrJ6g7jDYZsL +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/3484dd771bbf204041394fa77ae071c5972b8af2e6db75f4f8b27c75de09a34b_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/3484dd771bbf204041394fa77ae071c5972b8af2e6db75f4f8b27c75de09a34b_sk new file mode 100644 index 00000000..9c307b77 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/3484dd771bbf204041394fa77ae071c5972b8af2e6db75f4f8b27c75de09a34b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgNlYCdWYeDVrozdZ7 +sCiiS06dJyNgJz6NH50Ycv4j8GOhRANCAAT/lmk7kbPo8XNf6tmMXceLWf7jCOzi +zDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJnvAi9JKDnng6 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..d93ac564 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.crt new file mode 100644 index 00000000..f827ef07 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAIk5KQpi3Wa1x2NnQsW4oCYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABDqRI8I8NKjgv8K0rOO6+L5tXucy +Ux2xr9s1+nrH23SwrobWshCMnplbsQyBAxEiqCs0VwQpE3QYGytlp6SDvj2jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCACdlkGJcIbLTUHIiJBqWuSUfymaALe +3DUSep7py1h0lTAKBggqhkjOPQQDAgNHADBEAiB5266eS6DqJE1HOMkEFZcx+rFW +dzhKZAtJUDENcWy5kAIgCYm6WizAPWYo5WnGG1ucBD3TOqVh3ZvygmJRGL54pTw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.key new file mode 100644 index 00000000..2a01aee6 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtdkgH3y/a69wQWbi +dp3nDo9JEqJUxchecrCKNKEs9XWhRANCAAQ6kSPCPDSo4L/CtKzjuvi+bV7nMlMd +sa/bNfp6x9t0sK6G1rIQjJ6ZW7EMgQMRIqgrNFcEKRN0GBsrZaekg749 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/b21871f83a4311030ddb4740f501988cc9745adcf540ffb162af91f3e339ac7c_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/b21871f83a4311030ddb4740f501988cc9745adcf540ffb162af91f3e339ac7c_sk new file mode 100644 index 00000000..5c0f1594 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/b21871f83a4311030ddb4740f501988cc9745adcf540ffb162af91f3e339ac7c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgzSgiM8PbRtrIuxc/ +aoE6RvUPWB9ljCJ2aYq+C9gxspyhRANCAAQ4mv0wfBSFndzbdCjX36lzAn3ncVph +LOTpus8rKXuf9BwRL1aWOLGEVmQJiIOsJ5zpTyTDhpNfc0rmq3Z8vk9f +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem new file mode 100644 index 00000000..3edd36e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAPARhzH6q8F759zh1givme0wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOJr9MHwU +hZ3c23Qo19+pcwJ953FaYSzk6brPKyl7n/QcES9WljixhFZkCYiDrCec6U8kw4aT +X3NK5qt2fL5PX6NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZI +zj0EAwIDSAAwRQIhAN8f3GuE0d0BviUDCclSjJRBYhNiETrUSwdmaxFlfxPbAiBE +guJyRqOTpjAIz+AZ9/GGo3VcyBgN8IWAG5foW1ra6w== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt new file mode 100644 index 00000000..48223f00 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAL2mE1rLqqQi/r2uvHCmSm0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH2WhnUUbwBA3lGz2eFmWYMfIvEV +rNX+Bh5LBb8aPxZ1T3V+xfGygbFDEOFm0oZf8oCXsuV/wjWaB13/E3HrRnijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCACdlkGJcIbLTUHIiJBqWuSUfymaALe +3DUSep7py1h0lTAKBggqhkjOPQQDAgNHADBEAiA4oaOVCaPU9ct06P1nT6UvhxvB ++p3WrY0s1tjVuEFxtwIgIwCWnHDR+ZRu5FgIHnGFd1DcbyJvZCYx6rkYSJkAKuw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key new file mode 100644 index 00000000..78b8ae3c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZfDhev7WB/mNWakE +mnrzP/ZDGuVVneU5iprUzbiLUbKhRANCAAR9loZ1FG8AQN5Rs9nhZlmDHyLxFazV +/gYeSwW/Gj8WdU91fsXxsoGxQxDhZtKGX/KAl7Llf8I1mgdd/xNx60Z4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk new file mode 100644 index 00000000..45972fca --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgcmU5hHQfNnzjg4az +RKQSD9RgxiFWqIiDryomGy35lp+hRANCAASkfqYVKYDeEuhn5ymHW8oI5Wv716Xy +87zpe7qL/tH9duivwoEVqw8RIaAZHW6KeUp4PcWMySx2f97R8AHddCHJ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk new file mode 100644 index 00000000..ee3aab50 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgJCzb+ZKzQoFnfLFR +Q31npnJfrRd2Xe34RVLlMAQAFqmhRANCAARbgk5JAT6X2pJM0+UmiindL6DNVGtO +EAs/TALn5q+X4UHWuEZH0gOQNyHcnvwKcwXBqdliHWLrL4wOubno+W62 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..c9384c29 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrrtKXqYQD+q3TM2oC9TnwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFuCTkkBPpfa +kkzT5SaKKd0voM1Ua04QCz9MAufmr5fhQda4RkfSA5A3Idye/ApzBcGp2WIdYusv +jA65uej5brajTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGKqVM53Vt+yUehYqlJ7/7zrk+OgTY82PL3XwuohMIURMAoGCCqGSM49 +BAMCA0cAMEQCIDIH9kzDurmSCQVHkthwEBCZwk4p03DRiYpkf1oyBWN1AiAFfZpU +aEENnw5XUIPAoRyzOOSTY0I6GtydC1NpR8FHAw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..aec1664d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMA2l1rNUWWc9seezl856ZMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN3Um9a+FQxYJ1DWxT8Jhrx9SRBC +JM/0+zR11n4mia05HLbDkTID0rCbg45kcXg2XRgLEZL4gqQx6AhfijPUFgejgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/ +rl7zUkfSQPPX7PaYMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQD5m/MiLVdgLPKgd6j4H+NHNa7GoCVx +w3howyS8C0ChtQIgeYwU8+cLcfQFvQODJHoiwoD5yy9pE6kEb/CXvIhi0zw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..f9bbe2c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgB667xyPSl1+zAEQX +tdh+e9XPGLfOhf2jQfnFetOZ79qhRANCAATd1JvWvhUMWCdQ1sU/CYa8fUkQQiTP +9Ps0ddZ+JomtORy2w5EyA9Kwm4OOZHF4Nl0YCxGS+IKkMegIX4oz1BYH +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk new file mode 100644 index 00000000..f9f8044b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgg+NTgE/U6uQ0FjLO +bIbAVtwudJiyZ2b/0SjDXDhF1+ShRANCAATDYUicHa7jK+lGZSBq66KDMDgynuAL +zvEz6H4MWzPeMJL5UQuAw221MUgOoGH4PM1vxxPTV4bhygOestXtafRb +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..6bc7edcd --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIRAIBMNPpMs7nwScnRzsPIEu0wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMNhSJwdruMr +6UZlIGrrooMwODKe4AvO8TPofgxbM94wkvlRC4DDbbUxSA6gYfg8zW/HE9NXhuHK +A56y1e1p9FujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGKqVM53Vt+yUehYqlJ7/7zrk+OgTY82PL3XwuohMIURMAoGCCqGSM49 +BAMCA0gAMEUCIQCO1d9DWHQziVxi0MDw8XBjR8KPAfcxtupiJKgZSEzuiAIgIKBO +JKeHTZq1BeY0CXQyichphK/mtDPLYQ0BgPIURQk= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..31391b9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRANQWZco+vteAJbiiCQhXEkYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLUPejsEpYbmMB2Wdj0PjPrj6i18 +E9iS/Q2wyNIdXP3lBVHkaeKGAvgsUwgYh3VcTc4iE/DcZ0L/bBzcoqog3W6jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/ +rl7zUkfSQPPX7PaYMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCICHbbc0B4jiXVZ2QHYWDVZ/UPlP5TsFD +T1uGe3SQpqL1AiACJwPFESbS5oQ4tIGq5xgaX7jGO8tUtxa9ZwdPzg9+zg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..2599f46b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbFm24U3lwsMeoIsv +/f1xZyEOhEBDx7ts/EB46rl8mhuhRANCAAS1D3o7BKWG5jAdlnY9D4z64+otfBPY +kv0NsMjSHVz95QVR5GnihgL4LFMIGId1XE3OIhPw3GdC/2wc3KKqIN1u +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk new file mode 100644 index 00000000..5c7686f6 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgAmLaRgf/Xu30U/8Z +2mFBgBEWNPZdxauvQMtJrr6y/qmhRANCAARwv90la+t9fdIBzUJErJPaC6kRjSdU +nUqSMqnb0J3QAvrIIid6+1RWvHQzdeeGx9bUXoTyCROCIjYhh0Qi1AFN +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk new file mode 100644 index 00000000..994dea45 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQglcdFwvvVibyvpf0r +xhsGqeryE4FUBbcSPWKRTppvkqKhRANCAAQVQ0Pu9k39+7UR1ikZd88E5ZfnirQG +McPBvqzCqpoCXhN98Q/tgcof+G/6aDk/TWhP1mkI/8rThD3s6RQjNf7C +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..174683ec --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAPqtprB/A3ATzGlHfGEnB5wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQVQ0Pu9k39 ++7UR1ikZd88E5ZfnirQGMcPBvqzCqpoCXhN98Q/tgcof+G/6aDk/TWhP1mkI/8rT +hD3s6RQjNf7Co00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCBiqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjO +PQQDAgNIADBFAiEAnbhJdCCRNvwBj9V3NV2QaSVINJih4TFNYZa/SwN0M/YCIAyU +A47JPbiKphK2XHyxbB3tZnYsvq5bPuPxrlfP/Yp2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt new file mode 100644 index 00000000..f88de09f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAJBSKB/l1MpjIwbI31xmzdgwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHVmoqoD8/CcTY/bPz26IbcwKtLp +ZeH6rs/BKoNZK26KiknyrLHB5KxG5YZeXbGTlceTgSrRNxyaTlwCC+GfbLijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCDmkGRdvaBA3/S7sTjJ7IVOYtySP65e +81JH0kDz1+z2mDAKBggqhkjOPQQDAgNHADBEAiBVJZqFkPw4blUc6m9XMY7V51sc +jPXZjnnk5Xu++XKKFgIgJvtzvtQJpjht3QROQZGtHcBinRMti4U0CRf1zG1WCS4= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key new file mode 100644 index 00000000..3382b281 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgmeFTv2ciA/kYRnh+ +kVWvfb4ktVUDkumCCXbih8OA//ehRANCAAR1ZqKqA/PwnE2P2z89uiG3MCrS6WXh ++q7PwSqDWStuiopJ8qyxweSsRuWGXl2xk5XHk4Eq0Tccmk5cAgvhn2y4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk new file mode 100644 index 00000000..73c8ef41 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg6LGxc+PqT81bLQuB +hkGmJcKaFwjsfutfkZBzHJlBZ12hRANCAATJ2cdr1D+/h4bT23rejW2hu7wo6qal +qujynRRNn9fe4bn1IZi9C02jhIQY0EaHzD+/nQuH4/N2uZbCm9B6BW1r +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..45ed7641 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQRydBj+PweWWoL77xQKSpdTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ2cdr1D+/ +h4bT23rejW2hu7wo6qalqujynRRNn9fe4bn1IZi9C02jhIQY0EaHzD+/nQuH4/N2 +uZbCm9B6BW1ro00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCBiqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjO +PQQDAgNHADBEAiBOjzu6Hc/xkY4rc7TcKBiWqsroVRT4C5kFMRWW/uLZBAIgR0J3 +B/hNgIBR3LgsLVfHBjFs/RiHdkYj2Ch6Nddmneo= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..542fb541 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQVTvJ6670W07z+fGIyCZWvjAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEpq6FkIq1GRnFROyFIU4fV/oaPWfL +S5Rj1fvNCeRB7fNqShdWBrJgm0C/RIuj/qeIPr9Ux/TZGh6MmS2Kppu3F6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/rl7z +UkfSQPPX7PaYMAoGCCqGSM49BAMCA0gAMEUCIQDpTO2+Ybk6EAFB+GP+y/gkNydc +ervKvJkljwWxqCFgXAIgMweY+oC827oZ/VhnYx2RrNzzs3ET9fN4eSoM/0yFlts= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..2a50e1f7 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsfvE1XUsEOWmUoe9 +OY2XrcfD0p5DVdrGeBwBUuRNUK6hRANCAASmroWQirUZGcVE7IUhTh9X+ho9Z8tL +lGPV+80J5EHt82pKF1YGsmCbQL9Ei6P+p4g+v1TH9NkaHoyZLYqmm7cX +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/docker-compose-1orgs-1peers-dev.yaml b/hyperledger_fabric/v1.4.4/docker-compose-1orgs-1peers-dev.yaml new file mode 100644 index 00000000..cb76dc7a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/docker-compose-1orgs-1peers-dev.yaml @@ -0,0 +1,92 @@ +# https://github.com/yeasy/files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 1 peer +# * cli for testing + +version: '2.0' + +services: + orderer.example.com: # There can be multiple orderers + extends: + file: base-dev.yaml + service: orderer.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-dev.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-dev.yaml + service: cli + depends_on: + - peer0.org1.example.com + - orderer.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-couchdb.yaml b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-couchdb.yaml new file mode 100644 index 00000000..18291a49 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-couchdb.yaml @@ -0,0 +1,107 @@ +# github.com/yeasy/docker-compose-files +# fabric network with couchdb as the peer state db. +# including: +# orderer.example.com: orderer node +# peer0.org1.example.com: peer0 node +# peer1.org1.example.com: peer1 node +# peer0.org2.example.com: peer2 node +# peer1.org2.example.com: peer3 node +# couchdb0: couchdb node +# couchdb1: couchdb node +# couchdb2: couchdb node +# couchdb3: couchdb node +# cli: cli node + +version: '2' + +services: + orderer.example.com: + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb0:5984 + depends_on: + - couchdb0 + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb1:5984 + depends_on: + - couchdb1 + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb2:5984 + depends_on: + - couchdb2 + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb3:5984 + depends_on: + - couchdb3 + + couchdb0: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb0 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "5984:5984" # this is the restful API addr, can also access fauxton web ui thru http://localhost:5984/_utils/ + + couchdb1: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb1 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "6984:5984" + + couchdb2: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb2 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "7984:5984" + + couchdb3: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb3 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "8984:5984" + + cli: + extends: + file: base-solo.yaml + service: cli + diff --git a/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-event.yaml b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-event.yaml new file mode 100644 index 00000000..5c4efd0d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-event.yaml @@ -0,0 +1,59 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: + + orderer.example.com: # There can be multiple orderers + extends: + file: base-event.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-event.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + peer1.org1.example.com: + extends: + file: base-event.yaml + service: peer1.org1.example.com + depends_on: + - orderer.example.com + + peer0.org2.example.com: + extends: + file: base-event.yaml + service: peer0.org2.example.com + depends_on: + - orderer.example.com + + peer1.org2.example.com: + extends: + file: base-event.yaml + service: peer1.org2.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-event.yaml + service: cli + + event-listener: + extends: + file: base-event.yaml + service: event-listener + depends_on: + - orderer.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com diff --git a/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-kafka.yaml b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-kafka.yaml new file mode 100644 index 00000000..1a1aac67 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-kafka.yaml @@ -0,0 +1,134 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-kafka.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer0.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer1.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-kafka.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-kafka.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-kafka.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-kafka.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-raft.yaml b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-raft.yaml new file mode 100644 index 00000000..365ac0f0 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-raft.yaml @@ -0,0 +1,76 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.4 MVE, including +# * 2 ca (not in use now) +# * 3 orderers +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-solo-be.yaml b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-solo-be.yaml new file mode 100644 index 00000000..5e5b2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-solo-be.yaml @@ -0,0 +1,82 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing +# * blockchain-explorer + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + + explorer: + extends: + file: base.yaml + service: explorer-base + container_name: explorer + hostname: explorer + depends_on: + - mysql + volumes: + - ./explorer-artifacts/config.json:/blockchain-explorer/config.json + - ./crypto-config:/blockchain-explorer/first-network/crypto-config + ports: + - "8080:8080" # HTTP port + + mysql: # mysql service + extends: + file: base.yaml + service: mysql-base + container_name: mysql + hostname: mysql + environment: + - MYSQL_ROOT_PASSWORD=root + - MYSQL_DATABASE=fabricexplorer + volumes: + - ./explorer-artifacts/fabricexplorer.sql:/docker-entrypoint-initdb.d/fabricexplorer.sql + #command: bash -c 'mysqld; sleep 1; mysql -uroot -proot < /tmp/fabricexplorer.sql; while true; do sleep 20171117; done' + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-solo.yaml new file mode 100644 index 00000000..082fb4c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/docker-compose-2orgs-4peers-solo.yaml @@ -0,0 +1,73 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer0.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + + prometheus: + extends: + file: base-solo.yaml + service: prometheus + depends_on: + - orderer0.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/README.md b/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/README.md new file mode 100644 index 00000000..22338f1d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/README.md @@ -0,0 +1,23 @@ +# Debug Chaincode with MockShim +Baohua Yang, 2019-01-17 + +The package will demonstrate how to debug the chaincode with the MockShim lib. + +This way is more efficient and quick to debug locally without any fabric network setup. + +## Usage + +Unzip the package and enter the package path, then run + +```bash +# Regular testing should return OK +$ go test . + +# Debug with more logs output +$ go test -v . +``` + +## Files + +* chaincode_example02.go: example02 chaincode from HLF repo; +* cc_test.go: test code to verify the example02 chaincode logic. diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/cc_test.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/cc_test.go new file mode 100644 index 00000000..6fb11c2c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/cc_test.go @@ -0,0 +1,58 @@ +package main + +import ( + "strconv" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +// TestMockShim test the chaincode with MockShim +func TestMockShim(t *testing.T) { + var Aval int + var err error + + // Instantiate mockStub using the sample example02 chaincode + stub := shim.NewMockStub("mockStub", new(SimpleChaincode)) + if stub == nil { + t.Fatalf("MockStub creation failed") + } + + // Init with tx_uuid, args + result := stub.MockInit("000001", [][]byte{[]byte("init"), []byte("a"), []byte("100"), []byte("b"), []byte("200")}) + if result.Status != shim.OK { + t.Fatalf("Error to Init the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000002", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 100 { + t.Errorf("Value is not equal to expected from query result") + } + + // Invoke to transfer + result = stub.MockInvoke("000003", [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.invoke the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000004", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 90 { + t.Errorf("Value is not equal to expected from query result") + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/chaincode_example02.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/chaincode_example02.go new file mode 100644 index 00000000..945084b1 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/cc02_mockTest/chaincode_example02.go @@ -0,0 +1,200 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +//WARNING - this chaincode's ID is hard-coded in chaincode_example04 to illustrate one way of +//calling chaincode from a chaincode. If this example is modified, chaincode_example04.go has +//to be modified as well with the new ID of chaincode_example02. +//chaincode_example05 show's how chaincode ID can be passed in as a parameter instead of +//hard-coding. + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + fmt.Printf("args = %+v\n", args) + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example01/chaincode_example01.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example01/chaincode_example01.go new file mode 100644 index 00000000..302f2d98 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example01/chaincode_example01.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +var A, B string +var Aval, Bval, X int + +// Init callback representing the invocation of a chaincode +// This chaincode will manage two accounts A and B and will transfer X units from A to B upon invoke +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + /************ + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval)) + if err != nil { + return nil, err + } + + stub.PutState(B, []byte(strconv.Itoa(Bval)) + err = stub.PutState(B, []byte(strconv.Itoa(Bval)) + if err != nil { + return nil, err + } + ************/ + return shim.Success(nil) +} + +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // Transaction makes payment of X units from A to B + X, err := strconv.Atoi(args[0]) + if err != nil { + fmt.Printf("Error convert %s to integer: %s", args[0], err) + return shim.Error(fmt.Sprintf("Error convert %s to integer: %s", args[0], err)) + } + Aval = Aval - X + Bval = Bval + X + ts, err2 := stub.GetTxTimestamp() + if err2 != nil { + fmt.Printf("Error getting transaction timestamp: %s", err2) + return shim.Error(fmt.Sprintf("Error getting transaction timestamp: %s", err2)) + } + fmt.Printf("Transaction Time: %v,Aval = %d, Bval = %d\n", ts, Aval, Bval) + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example02/chaincode_example02.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example02/chaincode_example02.go new file mode 100644 index 00000000..eb6f430b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example02/chaincode_example02.go @@ -0,0 +1,193 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go new file mode 100644 index 00000000..c6c8ed7f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go @@ -0,0 +1,112 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample02_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func TestExample02_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345"), []byte("B"), []byte("456")}) + + // Query A + checkQuery(t, stub, "A", "345") + + // Query B + checkQuery(t, stub, "B", "456") +} + +func TestExample02_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}) + checkQuery(t, stub, "A", "444") + checkQuery(t, stub, "B", "801") + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}) + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example03/chaincode_example03.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example03/chaincode_example03.go new file mode 100644 index 00000000..d667a822 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example03/chaincode_example03.go @@ -0,0 +1,100 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// This program is an erroneous chaincode program that attempts to put state in query context - query should return error +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init takes a string and int. These are stored as a key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is legal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke is a no-op +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"query\"") +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is illegal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + jsonResp := "{\"Error\":\"Cannot put state within chaincode query\"}" + return shim.Error(jsonResp) + } + + return shim.Success(nil) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go new file mode 100644 index 00000000..812650e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", res.Message) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample03_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=123 B=234 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123")}) + + checkState(t, stub, "A", "123") +} + +func TestExample03_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=345 B=456 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345")}) + + // Invoke "query" + checkInvoke(t, scc, stub, [][]byte{[]byte("query"), []byte("A"), []byte("345")}) +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example04/chaincode_example04.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example04/chaincode_example04.go new file mode 100644 index 00000000..b874ad73 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example04/chaincode_example04.go @@ -0,0 +1,174 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode invoking another chaincode - invokes chaincode_example02 + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. These are stored in the key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var event string // Indicates whether event has happened. Initially 0 + var eventVal int // State of event + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + event = args[0] + eventVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for event status") + } + fmt.Printf("eventVal = %d\n", eventVal) + + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke invokes another chaincode - chaincode_example02, upon receipt of an event and changes event state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var eventVal int // State of event + var err error + + if len(args) != 3 && len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 3 or 4") + } + + chainCodeToCall := args[0] + event = args[1] + eventVal, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Expected integer value for event state change") + } + channelID := "" + if len(args) == 4 { + channelID = args[3] + } + + if eventVal != 1 { + fmt.Printf("Unexpected event. Doing nothing\n") + return shim.Success(nil) + } + + f := "invoke" + invokeArgs := toChaincodeArgs(f, "a", "b", "10") + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channelID) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", string(response.Payload)) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + fmt.Printf("Invoke chaincode successful. Got response %s", string(response.Payload)) + + // Write the event state back to the ledger + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return response +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var err error + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting entity to query") + } + + event = args[0] + var jsonResp string + + // Get the state from the ledger + eventValbytes, err := stub.GetState(event) + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + event + "\"}" + return shim.Error(jsonResp) + } + + if eventValbytes == nil { + jsonResp = "{\"Error\":\"Nil value for " + event + "\"}" + return shim.Error(jsonResp) + } + + if len(args) > 3 { + chainCodeToCall := args[1] + queryKey := args[2] + channel := args[3] + f := "query" + invokeArgs := toChaincodeArgs(f, queryKey) + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channel) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + jsonResp = string(response.Payload) + } else { + jsonResp = "{\"Name\":\"" + event + "\",\"Amount\":\"" + string(eventValbytes) + "\"}" + } + fmt.Printf("Query Response: %s\n", jsonResp) + + return shim.Success([]byte(jsonResp)) +} + +// Invoke is called by fabric to execute a transaction +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go new file mode 100644 index 00000000..9d252e2d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go @@ -0,0 +1,119 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +// this is the response to any successful Invoke() on chaincode_example04 +var eventResponse = "{\"Name\":\"Event\",\"Amount\":\"1\"}" + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample04_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("123")}) + + checkState(t, stub, "Event", "123") +} + +func TestExample04_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Query A + checkQuery(t, stub, "Event", eventResponse) +} + +func TestExample04_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + chaincodeToInvoke := "ex02" + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeToInvoke, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeToInvoke, stubEx2) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "101") + checkQuery(t, stubEx2, "b", "232") + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "91") + checkQuery(t, stubEx2, "b", "242") +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example05/chaincode_example05.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example05/chaincode_example05.go new file mode 100644 index 00000000..35ef5074 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example05/chaincode_example05.go @@ -0,0 +1,215 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode querying another chaincode - invokes chaincode_example02 and computes the sum of a and b and stores it as state + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. The string will be a key with +// the int as a value. +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var sum string // Sum of asset holdings across accounts. Initially 0 + var sumVal int // Sum of holdings + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + sum = args[0] + sumVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for sum") + } + fmt.Printf("sumVal = %d\n", sumVal) + + // Write the state to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke queries another chaincode and updates its own state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + // Write sumVal back to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Printf("Invoke chaincode successful. Got sum %d\n", sumVal) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + fmt.Printf("Query chaincode successful. Got sum %d\n", sumVal) + jsonResp := "{\"Name\":\"" + sum + "\",\"Value\":\"" + strconv.Itoa(sumVal) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Success([]byte("Invalid invoke function name. Expecting \"invoke\" \"query\"")) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go new file mode 100644 index 00000000..1f6d3047 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go @@ -0,0 +1,128 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +var chaincodeName = "ex02" + +// chaincode_example05 looks like it wanted to return a JSON response to Query() +// it doesn't actually do this though, it just returns the sum value +func jsonResponse(name string, value string) string { + return fmt.Sprintf("jsonResponse = \"{\"Name\":\"%v\",\"Value\":\"%v\"}", name, value) +} + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, expect string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != expect { + fmt.Println("State value", name, "was not", expect, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, args [][]byte, expect string) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query", args, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", args, "failed to get result") + t.FailNow() + } + if string(res.Payload) != expect { + fmt.Println("Query result ", string(res.Payload), "was not", expect, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample05_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("432")}) + + checkState(t, stub, "sumStoreName", "432") +} + +func TestExample05_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 111 + 222 = 333 + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "333") // example05 doesn't return JSON? +} + +func TestExample05_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("222"), []byte("b"), []byte("333")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 222 + 333 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "222") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "333") + + // update A-=10 and B+=10 + checkInvoke(t, stubEx2, [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + + // a + b = 212 + 343 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "212") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "343") +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/README.md b/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/README.md new file mode 100644 index 00000000..eca40073 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/README.md @@ -0,0 +1,80 @@ +# Using EncCC + +To test `EncCC` you need to first generate an AES 256 bit key as a base64 +encoded string so that it can be passed as JSON to the peer chaincode +invoke's transient parameter. + +Note: Before getting started you must use govendor to add external dependencies. Please issue the following commands inside the "enccc_example" folder: +``` +govendor init +govendor add +external +``` + +Let's generate the encryption and decryption keys. The example will simulate a shared key so the key is used for both encryption and decryption. +``` +ENCKEY=`openssl rand 32 -base64` && DECKEY=$ENCKEY +``` + +At this point, you can invoke the chaincode to encrypt key-value pairs as +follows: + +Note: the following assumes the env is initialized and peer has joined channel "my-ch". +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key1","value1"]}' --transient "{\"ENCKEY\":\"$ENCKEY\"}" +``` + +This call will encrypt using a random IV. This may be undesirable for +instance if the chaincode invocation needs to be endorsed by multiple +peers since it would cause the endorsement of conflicting read/write sets. +It is possible to encrypt deterministically by specifying the IV, as +follows: at first the IV must be created + +``` +IV=`openssl rand 16 -base64` +``` + +Then, the IV may be specified in the transient field + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key2","value2"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"IV\":\"$IV\"}" +``` + +Two such invocations will produce equal KVS writes, which can be endorsed by multiple nodes. + +The value can be retrieved back as follows + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key1"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key2"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +Note that in this case we use a chaincode query operation; while the use of the +transient field guarantees that the content will not be written to the ledger, +the chaincode decrypts the message and puts it in the proposal response. An +invocation would persist the result in the ledger for all channel readers to +see whereas a query can be discarded and so the result remains confidential. + +To test signing and verifying, you also need to generate an ECDSA key for the appopriate +curve, as follows. + +``` +On Intel: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64 -w0` && VERKEY=$SIGKEY + +On Mac: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64` && VERKEY=$SIGKEY +``` + +At this point, you can invoke the chaincode to sign and then encrypt key-value +pairs as follows + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPTSIGN","key3","value3"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"SIGKEY\":\"$SIGKEY\"}" +``` + +And similarly to retrieve them using a query + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPTVERIFY","key3"]}' --transient "{\"DECKEY\":\"$DECKEY\",\"VERKEY\":\"$VERKEY\"}" +``` diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/enccc_example.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/enccc_example.go new file mode 100644 index 00000000..284695d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/enccc_example.go @@ -0,0 +1,223 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "fmt" + + "github.com/hyperledger/fabric/bccsp" + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + pb "github.com/hyperledger/fabric/protos/peer" +) + +const DECKEY = "DECKEY" +const VERKEY = "VERKEY" +const ENCKEY = "ENCKEY" +const SIGKEY = "SIGKEY" +const IV = "IV" + +// EncCC example simple Chaincode implementation of a chaincode that uses encryption/signatures +type EncCC struct { + bccspInst bccsp.BCCSP +} + +// Init does nothing for this cc +func (t *EncCC) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Encrypter exposes how to write state to the ledger after having +// encrypted it with an AES 256 bit key that has been provided to the chaincode through the +// transient field +func (t *EncCC) Encrypter(stub shim.ChaincodeStubInterface, args []string, encKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, encKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function Encrypter") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we encrypt cleartextValue and assign it to key + err = encryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("encryptAndPutState failed, err %+v", err)) + } + return shim.Success(nil) +} + +// Decrypter exposes how to read from the ledger and decrypt using an AES 256 +// bit key that has been provided to the chaincode through the transient field. +func (t *EncCC) Decrypter(stub shim.ChaincodeStubInterface, args []string, decKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function Decrypter") + } + + key := args[0] + + // here we decrypt the state associated to key + cleartextValue, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateAndDecrypt failed, err %+v", err)) + } + + // here we return the decrypted value as a result + return shim.Success(cleartextValue) +} + +// EncrypterSigner exposes how to write state to the ledger after having received keys for +// encrypting (AES 256 bit key) and signing (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) EncrypterSigner(stub shim.ChaincodeStubInterface, args []string, encKey, sigKey []byte) pb.Response { + // create the encrypter/signer entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, encKey, sigKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function EncrypterSigner") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we sign cleartextValue, encrypt it and assign it to key + err = signEncryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("signEncryptAndPutState failed, err %+v", err)) + } + + return shim.Success(nil) +} + +// DecrypterVerify exposes how to get state to the ledger after having received keys for +// decrypting (AES 256 bit key) and verifying (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) DecrypterVerify(stub shim.ChaincodeStubInterface, args []string, decKey, verKey []byte) pb.Response { + // create the decrypter/verify entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, decKey, verKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256DecrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function DecrypterVerify") + } + key := args[0] + + // here we decrypt the state associated to key and verify it + cleartextValue, err := getStateDecryptAndVerify(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateDecryptAndVerify failed, err %+v", err)) + } + + // here we return the decrypted and verified value as a result + return shim.Success(cleartextValue) +} + +// RangeDecrypter shows how range queries may be satisfied by using the decrypter +// entity directly to decrypt previously encrypted key-value pairs +func (t *EncCC) RangeDecrypter(stub shim.ChaincodeStubInterface, decKey []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance and the key + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, nil) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + bytes, err := getStateByRangeAndDecrypt(stub, ent, "", "") + if err != nil { + return shim.Error(fmt.Sprintf("getStateByRangeAndDecrypt failed, err %+v", err)) + } + + return shim.Success(bytes) +} + +// Invoke for this chaincode exposes functions to ENCRYPT, DECRYPT transactional +// data. It also supports an example to ENCRYPT and SIGN and DECRYPT and +// VERIFY. The Initialization Vector (IV) can be passed in as a parm to +// ensure peers have deterministic data. +func (t *EncCC) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + // get arguments and transient + f, args := stub.GetFunctionAndParameters() + tMap, err := stub.GetTransient() + if err != nil { + return shim.Error(fmt.Sprintf("Could not retrieve transient, err %s", err)) + } + + switch f { + case "ENCRYPT": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient encryption key %s", ENCKEY)) + } + + return t.Encrypter(stub, args[0:], tMap[ENCKEY], tMap[IV]) + case "DECRYPT": + + // make sure there's a key in transient - the assumption is that + // it's associated to the string "DECKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient decryption key %s", DECKEY)) + } + + return t.Decrypter(stub, args[0:], tMap[DECKEY], tMap[IV]) + case "ENCRYPTSIGN": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "ENCKEY" and "SIGKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", ENCKEY)) + } else if _, in := tMap[SIGKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", SIGKEY)) + } + + return t.EncrypterSigner(stub, args[0:], tMap[ENCKEY], tMap[SIGKEY]) + case "DECRYPTVERIFY": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "DECKEY" and "VERKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } else if _, in := tMap[VERKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", VERKEY)) + } + + return t.DecrypterVerify(stub, args[0:], tMap[DECKEY], tMap[VERKEY]) + case "RANGEQUERY": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } + + return t.RangeDecrypter(stub, tMap[DECKEY]) + default: + return shim.Error(fmt.Sprintf("Unsupported function %s", f)) + } +} + +func main() { + factory.InitFactories(nil) + + err := shim.Start(&EncCC{factory.GetDefault()}) + if err != nil { + fmt.Printf("Error starting EncCC chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/enccc_test.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/enccc_test.go new file mode 100644 index 00000000..7daf2813 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/enccc_test.go @@ -0,0 +1,234 @@ +package main + +import ( + "bytes" + "encoding/json" + "testing" + + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/stretchr/testify/assert" +) + +const ( + AESKEY1 = "01234567890123456789012345678901" + AESKEY2 = "01234567890123456789012345678902" + ECDSAKEY1 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIH4Uv66F9kZMdOQxwNegkGm8c3AB3nGPOtxNKi6wb/ZooAoGCCqGSM49 +AwEHoUQDQgAEEPE+VLOh+e4NpwIjI/b/fKYHi4weU7r9OTEYPiAJiJBQY6TZnvF5 +oRMvwO4MCYxFtpIRO4UxIgcZBj4NCBxKqQ== +-----END EC PRIVATE KEY-----` + ECDSAKEY2 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIE8Seyc9TXx+yQfnGPuzjkuEfMbkq203IYdfyvMd0r3OoAoGCCqGSM49 +AwEHoUQDQgAE4dcGMMroH2LagI/s5i/Bx4t4ggGDoJPNVkKBDBlIaMYjJFYD1obk +JOWqAZxKKsBxBC5Ssu+fS26VPfdNWxDsFQ== +-----END EC PRIVATE KEY-----` + IV1 = "0123456789012345" +) + +func TestInit(t *testing.T) { + factory.InitFactories(nil) + + scc := new(EncCC) + stub := shim.NewMockStub("enccc", scc) + stub.MockTransactionStart("a") + res := scc.Init(stub) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) +} + +// unfortunately we can't tese this cc though invoke since the +// mock shim doesn't support transient. We test failure scenarios +// and the tests below focus on the functionality by invoking +// functions as opposed to cc +func TestInvoke(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + res := stub.MockInvoke("tx", [][]byte{[]byte("barf")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("ENC")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("SIG")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("RANGE")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestEnc(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key", "value"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key", "value"}, []byte("badkey"), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"badkey"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY2), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestSig(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad signing key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY2)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"badkey"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) +} + +func TestEncCC_RangeDecrypter(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key2", "value2"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key3", "value3"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // failed range query + res = scc.RangeDecrypter(stub, nil) + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success range query + stub.MockTransactionStart("a") + res = scc.RangeDecrypter(stub, []byte(AESKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + keys := []keyValuePair{} + err := json.Unmarshal(res.Payload, &keys) + assert.NoError(t, err) + assert.Equal(t, keys[0].Key, "key1") + assert.Equal(t, string(keys[0].Value), "value1") + assert.Equal(t, keys[1].Key, "key2") + assert.Equal(t, string(keys[1].Value), "value2") + assert.Equal(t, keys[2].Key, "key3") + assert.Equal(t, string(keys[2].Value), "value3") + + _, err = getStateByRangeAndDecrypt(stub, nil, string([]byte{0}), string([]byte{0})) + assert.Error(t, err) +} + +func TestDeterministicEncryption(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c1, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c2, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + assert.True(t, bytes.Equal(c1, c2)) +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/utils.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/utils.go new file mode 100644 index 00000000..9af6e6fa --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/enccc_example/utils.go @@ -0,0 +1,147 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + "github.com/pkg/errors" +) + +// the functions below show some best practices on how +// to use entities to perform cryptographic operations +// over the ledger state + +// getStateAndDecrypt retrieves the value associated to key, +// decrypts it with the supplied entity and returns the result +// of the decryption +func getStateAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string) ([]byte, error) { + // at first we retrieve the ciphertext from the ledger + ciphertext, err := stub.GetState(key) + if err != nil { + return nil, err + } + + // GetState will return a nil slice if the key does not exist. + // Note that the chaincode logic may want to distinguish between + // nil slice (key doesn't exist in state db) and empty slice + // (key found in state db but value is empty). We do not + // distinguish the case here + if len(ciphertext) == 0 { + return nil, errors.New("no ciphertext to decrypt") + } + + return ent.Decrypt(ciphertext) +} + +// encryptAndPutState encrypts the supplied value using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func encryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string, value []byte) error { + // at first we use the supplied entity to encrypt the value + ciphertext, err := ent.Encrypt(value) + if err != nil { + return err + } + + return stub.PutState(key, ciphertext) +} + +// getStateDecryptAndVerify retrieves the value associated to key, +// decrypts it with the supplied entity, verifies the signature +// over it and returns the result of the decryption in case of +// success +func getStateDecryptAndVerify(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string) ([]byte, error) { + // here we retrieve and decrypt the state associated to key + val, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return nil, err + } + + // we unmarshal a SignedMessage from the decrypted state + msg := &entities.SignedMessage{} + err = msg.FromBytes(val) + if err != nil { + return nil, err + } + + // we verify the signature + ok, err := msg.Verify(ent) + if err != nil { + return nil, err + } else if !ok { + return nil, errors.New("invalid signature") + } + + return msg.Payload, nil +} + +// signEncryptAndPutState signs the supplied value, encrypts +// the supplied value together with its signature using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func signEncryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string, value []byte) error { + // here we create a SignedMessage, set its payload + // to value and the ID of the entity and + // sign it with the entity + msg := &entities.SignedMessage{Payload: value, ID: []byte(ent.ID())} + err := msg.Sign(ent) + if err != nil { + return err + } + + // here we serialize the SignedMessage + b, err := msg.ToBytes() + if err != nil { + return err + } + + // here we encrypt the serialized version associated to args[0] + return encryptAndPutState(stub, ent, key, b) +} + +type keyValuePair struct { + Key string `json:"key"` + Value string `json:"value"` +} + +// getStateByRangeAndDecrypt retrieves a range of KVS pairs from the +// ledger and decrypts each value with the supplied entity; it returns +// a json-marshalled slice of keyValuePair +func getStateByRangeAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, startKey, endKey string) ([]byte, error) { + // we call get state by range to go through the entire range + iterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return nil, err + } + defer iterator.Close() + + // we decrypt each entry - the assumption is that they have all been encrypted with the same key + keyvalueset := []keyValuePair{} + for iterator.HasNext() { + el, err := iterator.Next() + if err != nil { + return nil, err + } + + v, err := ent.Decrypt(el.Value) + if err != nil { + return nil, err + } + + keyvalueset = append(keyvalueset, keyValuePair{el.Key, string(v)}) + } + + bytes, err := json.Marshal(keyvalueset) + if err != nil { + return nil, err + } + + return bytes, nil +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/eventsender/eventsender.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/eventsender/eventsender.go new file mode 100644 index 00000000..45606252 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/eventsender/eventsender.go @@ -0,0 +1,92 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// EventSender example simple Chaincode implementation +type EventSender struct { +} + +// Init function +func (t *EventSender) Init(stub shim.ChaincodeStubInterface) pb.Response { + err := stub.PutState("noevents", []byte("0")) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke function +func (t *EventSender) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + noevts, _ := strconv.Atoi(string(b)) + + tosend := "Event " + string(b) + for _, s := range args { + tosend = tosend + "," + s + } + + err = stub.PutState("noevents", []byte(strconv.Itoa(noevts+1))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.SetEvent("evtsender", []byte(tosend)) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(nil) +} + +// Query function +func (t *EventSender) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + jsonResp := "{\"NoEvents\":\"" + string(b) + "\"}" + return shim.Success([]byte(jsonResp)) +} + +func (t *EventSender) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(EventSender)) + if err != nil { + fmt.Printf("Error starting EventSender chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go new file mode 100644 index 00000000..78d4ec61 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go @@ -0,0 +1,133 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init method of chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte("OK")) +} + +// Invoke transaction makes payment of X units from A to B +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte(fmt.Sprintf("{%d,%d}", Aval, Bval))) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go new file mode 100644 index 00000000..1d9d1e1f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go @@ -0,0 +1,97 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } + if retval != nil { + if res.Payload == nil { + fmt.Printf("Init returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Init returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } + + if retval != nil { + if res.Payload == nil { + fmt.Printf("Invoke returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Invoke returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func Test_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}, []byte("OK")) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func Test_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}, []byte("OK")) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}, []byte("{444,801}")) + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}, []byte("{567,678}")) +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/map/map.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/map/map.go new file mode 100644 index 00000000..b45b8471 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/map/map.go @@ -0,0 +1,200 @@ +// +build !experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/map/map_experimental.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/map/map_experimental.go new file mode 100644 index 00000000..16c9780f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/map/map_experimental.go @@ -0,0 +1,311 @@ +// +build experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "putPrivate": + if len(args) < 3 { + return shim.Error("put operation on private data must include three arguments: [collection, key, value]") + } + collection := args[0] + key := args[1] + value := args[2] + + if err := stub.PutPrivateData(collection, key, []byte(value)); err != nil { + fmt.Printf("Error putting private data%s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + return shim.Success(nil) + + case "removePrivate": + if len(args) < 2 { + return shim.Error("remove operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + + err := stub.DelPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation on private data failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "getPrivate": + if len(args) < 2 { + return shim.Error("get operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + value, err := stub.GetPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation on private data failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keysPrivate": + if len(args) < 3 { + return shim.Error("range query operation on private data must include three arguments, a collection, key and value") + } + collection := args[0] + startKey := args[1] + endKey := args[2] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 3 { + stime, _ = strconv.Atoi(args[3]) + } + + keysIter, err := stub.GetPrivateDataByRange(collection, startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed on private data. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "queryPrivate": + collection := args[0] + query := args[1] + keysIter, err := stub.GetPrivateDataQueryResult(collection, query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02/marbles_chaincode.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02/marbles_chaincode.go new file mode 100644 index 00000000..4ea4654a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02/marbles_chaincode.go @@ -0,0 +1,627 @@ +/* +Licensed to the Apache Software Foundation (ASF) under one +or more contributor license agreements. See the NOTICE file +distributed with this work for additional information +regarding copyright ownership. The ASF licenses this file +to you under the Apache License, Version 2.0 (the +"License"); you may not use this file except in compliance +with the License. You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, +software distributed under the License is distributed on an +"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +KIND, either express or implied. See the License for the +specific language governing permissions and limitations +under the License. +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble1","blue","35","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble2","red","50","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble3","blue","70","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarblesBasedOnColor","blue","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C myc1 -n marbles -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getMarblesByRange","marble1","marble3"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getHistoryForMarble","marble1"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +//The following examples demonstrate creating indexes on CouchDB +//Example hostname:port configurations +// +//Docker or vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for chaincodeid, docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":["chaincodeid","data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[\"chaincodeid\",\"data.docType\",\"data.owner\"]},\"name\":\"indexOwner\",\"ddoc\":\"indexOwnerDoc\",\"type\":\"json\"}" http://hostname:port/myc1/_index +// + +// Index for chaincodeid, docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"chaincodeid":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[{\"data.size\":\"desc\"},{\"chaincodeid\":\"desc\"},{\"data.docType\":\"desc\"},{\"data.owner\":\"desc\"}]},\"ddoc\":\"indexSizeSortDoc\", \"name\":\"indexSizeSortDesc\",\"type\":\"json\"}" http://hostname:port/myc1/_index + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + if function == "initMarble" { //create a new marble + return t.initMarble(stub, args) + } else if function == "transferMarble" { //change owner of a specific marble + return t.transferMarble(stub, args) + } else if function == "transferMarblesBasedOnColor" { //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + } else if function == "delete" { //delete a marble + return t.delete(stub, args) + } else if function == "readMarble" { //read a marble + return t.readMarble(stub, args) + } else if function == "queryMarblesByOwner" { //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + } else if function == "queryMarbles" { //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + } else if function == "getHistoryForMarble" { //get history of values for a marble + return t.getHistoryForMarble(stub, args) + } else if function == "getMarblesByRange" { //get marbles based on range query + return t.getMarblesByRange(stub, args) + } + + fmt.Println("invoke did not find func: " + function) //error + return shim.Error("Received unknown function invocation") +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0 1 2 3 + // "asdf", "blue", "35", "bob" + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) <= 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) <= 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) <= 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) <= 0 { + return shim.Error("4th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutState(marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutState(colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetState(name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetState(marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelState(marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelState(colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutState(marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetStateByPartialCompositeKey("color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetQueryResult(queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} + +func (t *SimpleChaincode) getHistoryForMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + marbleName := args[0] + + fmt.Printf("- start getHistoryForMarble: %s\n", marbleName) + + resultsIterator, err := stub.GetHistoryForKey(marbleName) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing historic values for the marble + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + response, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"TxId\":") + buffer.WriteString("\"") + buffer.WriteString(response.TxId) + buffer.WriteString("\"") + + buffer.WriteString(", \"Value\":") + // if it was a delete operation on given key, then we need to set the + //corresponding value null. Else, we will write the response.Value + //as-is (as the Value itself a JSON marble) + if response.IsDelete { + buffer.WriteString("null") + } else { + buffer.WriteString(string(response.Value)) + } + + buffer.WriteString(", \"Timestamp\":") + buffer.WriteString("\"") + buffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String()) + buffer.WriteString("\"") + + buffer.WriteString(", \"IsDelete\":") + buffer.WriteString("\"") + buffer.WriteString(strconv.FormatBool(response.IsDelete)) + buffer.WriteString("\"") + + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getHistoryForMarble returning:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/collections_config.json b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/collections_config.json new file mode 100644 index 00000000..e26017bd --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/collections_config.json @@ -0,0 +1,18 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999, + "memberOnlyRead": true +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":3, + "memberOnlyRead": true + } +] diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/collections_config_new.json b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/collections_config_new.json new file mode 100644 index 00000000..33ddd71a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/collections_config_new.json @@ -0,0 +1,16 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 + } +] diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json new file mode 100644 index 00000000..305f0904 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json @@ -0,0 +1 @@ +{"index":{"fields":["docType","owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go new file mode 100644 index 00000000..385687c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go @@ -0,0 +1,634 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble1","blue","35","tom","99"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble2","red","50","tom","102"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble3","blue","70","tom","103"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarblePrivateDetails","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["getMarblesByRange","marble1","marble3"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +// INDEXES TO SUPPORT COUCHDB RICH QUERIES +// +// Indexes in CouchDB are required in order to make JSON queries efficient and are required for +// any JSON query with a sort. As of Hyperledger Fabric 1.1, indexes may be packaged alongside +// chaincode in a META-INF/statedb/couchdb/indexes directory. Or for indexes on private data +// collections, in a META-INF/statedb/couchdb/collections//indexes directory. +// Each index must be defined in its own text file with extension *.json with the index +// definition formatted in JSON following the CouchDB index JSON syntax as documented at: +// http://docs.couchdb.org/en/2.1.1/api/database/find.html#db-index +// +// This marbles02_private example chaincode demonstrates a packaged index which you +// can find in META-INF/statedb/couchdb/collection/collectionMarbles/indexes/indexOwner.json. +// For deployment of chaincode to production environments, it is recommended +// to define any indexes alongside chaincode so that the chaincode and supporting indexes +// are deployed automatically as a unit, once the chaincode has been installed on a peer and +// instantiated on a channel. See Hyperledger Fabric documentation for more details. +// +// If you have access to the your peer's CouchDB state database in a development environment, +// you may want to iteratively test various indexes in support of your chaincode queries. You +// can use the CouchDB Fauxton interface or a command line curl utility to create and update +// indexes. Then once you finalize an index, include the index definition alongside your +// chaincode in the META-INF/statedb/couchdb/indexes directory or +// META-INF/statedb/couchdb/collections//indexes directory, for packaging +// and deployment to managed environments. +// +// In the examples below you can find index definitions that support marbles02_private +// chaincode queries, along with the syntax that you can use in development environments +// to create the indexes in the CouchDB Fauxton interface. +// + +//Example hostname:port configurations to access CouchDB. +// +//To access CouchDB docker container from within another docker container or from vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":["data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} + +// Index for docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +type marblePrivateDetails struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Price int `json:"price"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + switch function { + case "initMarble": + //create a new marble + return t.initMarble(stub, args) + case "readMarble": + //read a marble + return t.readMarble(stub, args) + case "readMarblePrivateDetails": + //read a marble private details + return t.readMarblePrivateDetails(stub, args) + case "transferMarble": + //change owner of a specific marble + return t.transferMarble(stub, args) + case "transferMarblesBasedOnColor": + //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + case "delete": + //delete a marble + return t.delete(stub, args) + case "queryMarblesByOwner": + //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + case "queryMarbles": + //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + case "getMarblesByRange": + //get marbles based on range query + return t.getMarblesByRange(stub, args) + default: + //error + fmt.Println("invoke did not find func: " + function) + return shim.Error("Received unknown function invocation") + } +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0-name 1-color 2-size 3-owner 4-price + // "asdf", "blue", "35", "bob", "99" + if len(args) != 5 { + return shim.Error("Incorrect number of arguments. Expecting 5") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) == 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) == 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) == 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) == 0 { + return shim.Error("4th argument must be a non-empty string") + } + if len(args[4]) == 0 { + return shim.Error("5th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + price, err := strconv.Atoi(args[4]) + if err != nil { + return shim.Error("5th argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Save marble private details ==== + objectType = "marblePrivateDetails" + marblePrivateDetails := &marblePrivateDetails{objectType, marbleName, price} + marblePrivateDetailsBytes, err := json.Marshal(marblePrivateDetails) + if err != nil { + return shim.Error(err.Error()) + } + err = stub.PutPrivateData("collectionMarblePrivateDetails", marbleName, marblePrivateDetailsBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutPrivateData("collectionMarbles", colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarbles", name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// =============================================== +// readMarblereadMarblePrivateDetails - read a marble private details from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarblePrivateDetails(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarblePrivateDetails", name) //get the marble private details from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get private details for " + name + ": " + err.Error() + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble private details does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetPrivateData("collectionMarbles", marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelPrivateData("collectionMarbles", marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelPrivateData("collectionMarbles", colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // Delete private details of marble + err = stub.DelPrivateData("collectionMarblePrivateDetails", marbleName) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetPrivateDataByRange("collectionMarbles", startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetPrivateDataByPartialCompositeKey("collectionMarbles", "color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetPrivateDataQueryResult("collectionMarbles", queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/passthru/passthru.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/passthru/passthru.go new file mode 100644 index 00000000..49d978bf --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/passthru/passthru.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// PassthruChaincode passes thru invoke and query to another chaincode where +// called ChaincodeID = function +// called chaincode's function = args[0] +// called chaincode's args = args[1:] +type PassthruChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +//Init func will return error if function has string "error" anywhere +func (p *PassthruChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + function, _ := stub.GetFunctionAndParameters() + if strings.Index(function, "error") >= 0 { + return shim.Error(function) + } + return shim.Success([]byte(function)) +} + +//helper +func (p *PassthruChaincode) iq(stub shim.ChaincodeStubInterface, function string, args []string) pb.Response { + if function == "" { + return shim.Error("Chaincode ID not provided") + } + chaincodeID := function + + return stub.InvokeChaincode(chaincodeID, toChaincodeArgs(args...), "") +} + +// Invoke passes through the invoke call +func (p *PassthruChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + return p.iq(stub, function, args) +} + +func main() { + err := shim.Start(new(PassthruChaincode)) + if err != nil { + fmt.Printf("Error starting Passthru chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/sleeper/sleeper.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/sleeper/sleeper.go new file mode 100644 index 00000000..088b598c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/sleeper/sleeper.go @@ -0,0 +1,124 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +// Sleeper chaincode sleeps and works with one state variable +// Init - 1 param, a sleep time in millisecs +// Invoke - 4 or 3 params, "put" or "get", value to set and sleep time in millisecs +// +// Sleeper can be used to test the "chaincode.executetimeout" property + +import ( + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SleeperChaincode example simple Chaincode implementation +type SleeperChaincode struct { +} + +func (t *SleeperChaincode) sleep(sleepTime string) { + st, _ := strconv.Atoi(sleepTime) + if st >= 0 { + time.Sleep(time.Duration(st) * time.Millisecond) + } +} + +// Init initializes chaincode...all it does is sleep a bi +func (t *SleeperChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + args := stub.GetStringArgs() + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + sleepTime := args[0] + + t.sleep(sleepTime) + + return shim.Success(nil) +} + +// Invoke sets key/value and sleeps a bit +func (t *SleeperChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "put" { + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "get" { + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"put\" or \"get\"") +} + +// Transaction makes payment of X units from A to B +func (t *SleeperChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // set state + key := args[0] + val := args[1] + + err := stub.PutState(key, []byte(val)) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[2] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success([]byte("OK")) +} + +// query callback representing the query of a chaincode +func (t *SleeperChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + key := args[0] + + // Get the state from the ledger + val, err := stub.GetState(key) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[1] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success(val) +} + +func main() { + err := shim.Start(new(SleeperChaincode)) + if err != nil { + fmt.Printf("Error starting Sleeper chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/Dockerfile b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/Dockerfile new file mode 100644 index 00000000..e3aa5d5f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/Dockerfile @@ -0,0 +1,40 @@ +# FIXME: someone from the UTXO team will need to verify or rework this +# Copyright London Stock Exchange Group All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# +FROM ubuntu:latest + +RUN apt-get update && apt-get install pkg-config autoconf libtool -y +RUN cd /tmp && git clone https://github.com/bitcoin/secp256k1.git && cd secp256k1/ +WORKDIR /tmp/secp256k1 +RUN ./autogen.sh +RUN ./configure --enable-module-recovery +RUN make +RUN ./tests +RUN make install + +WORKDIR /tmp +RUN apt-get install libtool libboost1.55-all-dev -y +RUN git clone https://github.com/libbitcoin/libbitcoin-consensus.git +WORKDIR /tmp/libbitcoin-consensus +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now SWIG +WORKDIR /tmp +# Need pcre lib for building +RUN apt-get install libpcre3-dev -y +RUN wget http://prdownloads.sourceforge.net/swig/swig-3.0.8.tar.gz && tar xvf swig-3.0.8.tar.gz +WORKDIR /tmp/swig-3.0.8 +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now add this for SWIG execution requirement to get missing stubs-32.h header file +RUN apt-get install g++-multilib -y + +ENV CGO_LDFLAGS="-L/usr/local/lib/ -lbitcoin-consensus -lstdc++" diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/README.md b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/README.md new file mode 100644 index 00000000..6b7f42c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/README.md @@ -0,0 +1,79 @@ +### UTXO Chaincode + +The UTXO example chaincode contains a single invocation function named `execute`. This function accepts BASE64 encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction components to the Bitcoin libconsensus C library for script verification. + +The purpose of this chaincode is to + +1. Demonstrate how the world state can be used to store and process unspent transaction outputs (UTXO). + +2. Demonstrate how to include and use a C library from within a chaincode. + +A client for exercising this chaincode is avilable at https://github.com/srderson/hyperledger-fabric-utxo-client-java. + + +The following are instructions for building and deploying the UTXO chaincode in Hypereledger Fabric. All commands should be run with vagrant. + +First, build the Docker image for the UTXO chaincode. + +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +docker build -t utxo:0.1.0 . +``` + +Next, modify the `core.yaml` file in the Hyperledger Fabric project to point to the local Docker image that was built in the previous step. In the core.yaml file find `chaincode.golang.Dockerfile` and change it from from `hyperledger/fabric-baseimage` to `utxo:0.1.0` + +Start the peer using the following commands +``` +peer node start +``` + +In a second window, deploy the example UTXO chaincode +``` +CORE_PEER_ADDRESS=localhost:7051 peer chaincode deploy -p github.com/hyperledger/fabric/examples/chaincode/go/utxo -c '{"Function":"init", "Args": []}' +``` +Wait about 30 seconds for the chaincode to be deployed. Output from the window where the peer is running will indicate that this is successful. + +Next, find the `image ID` for the deployed chaincode. Run +``` +docker images +``` +and look for the image ID of the most recently deployed chaincode. The image ID will likely be similar to +``` + dev-jdoe-cbe6be7ed67931b9be2ce31dd833e523702378bef91b29917005f0eaa316b57e268e19696093d48b91076f1134cbf4b06afd78e6afd947133f43cb51bf40b0a4 + ``` + Make a note of this as we'll be using it later. + +Stop the running peer. + +Build a peer docker image by running the following test. This will allow for easy testing of the chaincode by giving us the ability to reset the database to a clean state. +``` +go test github.com/hyperledger/fabric/core/container -run=BuildImage_Peer +``` + +Using the Docker image that we just built, start a peer within a container in `chaincodedev` mode. +``` +docker run -it -p 7051:7051 -p 7053:7053 hyperledger/fabric-peer peer node start --peer-chaincodedev +``` + + +In another window, start UTXO chaincode in a container. The refers to the UTXO image ID noted in a prior step. +``` +docker run -it /bin/bash +``` + +Build the UTXO chaincode. +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +go build +CORE_PEER_ADDRESS=172.17.0.2:7051 CORE_CHAINCODE_ID_NAME=utxo ./utxo +``` + +In another window, deploy the chaincode +``` +peer chaincode deploy -n utxo -c '{"Function":"init", "Args": []}' +``` + +The chaincode is now deployed and ready to accept transactions. + +Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License. +s diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/chaincode.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/chaincode.go new file mode 100644 index 00000000..ca1a2878 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/chaincode.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "encoding/base64" + "errors" + "fmt" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// The UTXO example chaincode contains a single invocation function named execute. This function accepts BASE64 +// encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction +// components to the Bitcoin libconsensus C library for script verification. A table of UTXOs is maintained to ensure +// each transaction is valid. +// Documentation can be found at +// https://github.com/hyperledger/fabric/blob/master/examples/chaincode/go/utxo/README.md + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init does nothing in the UTXO chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return nil, nil +} + +// Invoke callback representing the invocation of a chaincode +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "execute": + + if len(args) < 1 { + return nil, errors.New("execute operation must include single argument, the base64 encoded form of a bitcoin transaction") + } + txDataBase64 := args[0] + txData, err := base64.StdEncoding.DecodeString(txDataBase64) + if err != nil { + return nil, fmt.Errorf("Error decoding TX as base64: %s", err) + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + execResult, err := utxo.Execute(txData) + if err != nil { + return nil, fmt.Errorf("Error executing TX: %s", err) + } + + fmt.Printf("\nExecResult: Coinbase: %t, SumInputs %d, SumOutputs %d\n\n", execResult.IsCoinbase, execResult.SumPriorOutputs, execResult.SumCurrentOutputs) + + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + return nil, fmt.Errorf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + return nil, nil + + case "getTran": + + if len(args) < 1 { + return nil, errors.New("queryBTC operation must include single argument, the TX hash hex") + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + tx, err := utxo.Query(args[0]) + if err != nil { + return nil, fmt.Errorf("Error querying for transaction: %s", err) + } + if tx == nil { + var data []byte + return data, nil + } + return tx, nil + + default: + return nil, errors.New("Unsupported operation") + } + +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/consensus/consensus.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/consensus/consensus.go new file mode 100644 index 00000000..74b5b20c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/consensus/consensus.go @@ -0,0 +1,482 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +package consensus + +/* +#define intgo swig_intgo +typedef void *swig_voidp; + +#include + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + +typedef long long swig_type_1; +typedef long long swig_type_2; +extern void _wrap_Swig_free_consensus_0731991c73947514(uintptr_t arg1); +extern swig_intgo _wrap_verify_result_eval_false_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_eval_true_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_script_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_push_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_stack_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_verify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_equalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_der_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_return_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_none_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_dersig_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_low_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_script_consensus_0731991c73947514(swig_voidp arg1, swig_type_1 arg2, swig_voidp arg3, swig_type_2 arg4, swig_intgo arg5, swig_intgo arg6); +#undef intgo +*/ +import "C" + +import "unsafe" +import _ "runtime/cgo" +import "sync" + +type _ unsafe.Pointer + +var Swig_escape_always_false bool +var Swig_escape_val interface{} + +type _swig_fnptr *byte +type _swig_memberptr *byte + +type _ sync.Mutex + +func Swig_free(arg1 uintptr) { + _swig_i_0 := arg1 + C._wrap_Swig_free_consensus_0731991c73947514(C.uintptr_t(_swig_i_0)) +} + +const LIBBITCOIN_CONSENSUS_VERSION string = "2.0.0" +const LIBBITCOIN_CONSENSUS_MAJOR_VERSION int = 2 +const LIBBITCOIN_CONSENSUS_MINOR_VERSION int = 0 +const LIBBITCOIN_CONSENSUS_PATCH_VERSION int = 0 + +type LibbitcoinConsensusVerify_result_type int + +func _swig_getverify_result_eval_false() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_false_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_false LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_false() + +func _swig_getverify_result_eval_true() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_true_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_true LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_true() + +func _swig_getverify_result_script_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_script_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_script_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_script_size() + +func _swig_getverify_result_push_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_push_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_push_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_push_size() + +func _swig_getverify_result_op_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_count() + +func _swig_getverify_result_stack_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_stack_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_stack_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_stack_size() + +func _swig_getverify_result_sig_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_count() + +func _swig_getverify_result_pubkey_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkey_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkey_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkey_count() + +func _swig_getverify_result_verify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_verify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_verify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_verify() + +func _swig_getverify_result_equalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_equalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_equalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_equalverify() + +func _swig_getverify_result_checkmultisigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checkmultisigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checkmultisigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checkmultisigverify() + +func _swig_getverify_result_checksigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checksigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checksigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checksigverify() + +func _swig_getverify_result_numequalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_numequalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_numequalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_numequalverify() + +func _swig_getverify_result_bad_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_bad_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_bad_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_bad_opcode() + +func _swig_getverify_result_disabled_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_disabled_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_disabled_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_disabled_opcode() + +func _swig_getverify_result_invalid_stack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_stack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_stack_operation() + +func _swig_getverify_result_invalid_altstack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_altstack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_altstack_operation() + +func _swig_getverify_result_unbalanced_conditional() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unbalanced_conditional LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unbalanced_conditional() + +func _swig_getverify_result_sig_hashtype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_hashtype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_hashtype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_hashtype() + +func _swig_getverify_result_sig_der() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_der_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_der LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_der() + +func _swig_getverify_result_minimaldata() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_minimaldata LibbitcoinConsensusVerify_result_type = _swig_getverify_result_minimaldata() + +func _swig_getverify_result_sig_pushonly() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_pushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_pushonly LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_pushonly() + +func _swig_getverify_result_sig_high_s() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_high_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_high_s LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_high_s() + +func _swig_getverify_result_sig_nulldummy() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_nulldummy LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_nulldummy() + +func _swig_getverify_result_pubkeytype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkeytype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkeytype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkeytype() + +func _swig_getverify_result_cleanstack() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_cleanstack LibbitcoinConsensusVerify_result_type = _swig_getverify_result_cleanstack() + +func _swig_getverify_result_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_discourage_upgradable_nops LibbitcoinConsensusVerify_result_type = _swig_getverify_result_discourage_upgradable_nops() + +func _swig_getverify_result_op_return() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_return_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_return LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_return() + +func _swig_getverify_result_unknown_error() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unknown_error_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unknown_error LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unknown_error() + +func _swig_getverify_result_tx_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_invalid() + +func _swig_getverify_result_tx_size_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_size_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_size_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_size_invalid() + +func _swig_getverify_result_tx_input_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_input_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_input_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_input_invalid() + +func _swig_getverify_result_negative_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_negative_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_negative_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_negative_locktime() + +func _swig_getverify_result_unsatisfied_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unsatisfied_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unsatisfied_locktime() + +type LibbitcoinConsensusVerify_flags_type int + +func _swig_getverify_flags_none() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_none_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_none LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_none() + +func _swig_getverify_flags_p2sh() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_p2sh_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_p2sh LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_p2sh() + +func _swig_getverify_flags_strictenc() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_strictenc_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_strictenc LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_strictenc() + +func _swig_getverify_flags_dersig() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_dersig_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_dersig LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_dersig() + +func _swig_getverify_flags_low_s() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_low_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_low_s LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_low_s() + +func _swig_getverify_flags_nulldummy() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_nulldummy LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_nulldummy() + +func _swig_getverify_flags_sigpushonly() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_sigpushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_sigpushonly LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_sigpushonly() + +func _swig_getverify_flags_minimaldata() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_minimaldata LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_minimaldata() + +func _swig_getverify_flags_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_discourage_upgradable_nops LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_discourage_upgradable_nops() + +func _swig_getverify_flags_cleanstack() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_cleanstack LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_cleanstack() + +func _swig_getverify_flags_checklocktimeverify() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_checklocktimeverify LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_checklocktimeverify() + +func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + _swig_i_0 := arg1 + _swig_i_1 := arg2 + _swig_i_2 := arg3 + _swig_i_3 := arg4 + _swig_i_4 := arg5 + _swig_i_5 := arg6 + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_script_consensus_0731991c73947514(C.swig_voidp(_swig_i_0), C.swig_type_1(_swig_i_1), C.swig_voidp(_swig_i_2), C.swig_type_2(_swig_i_3), C.swig_intgo(_swig_i_4), C.swig_intgo(_swig_i_5))) + return swig_r +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx new file mode 100644 index 00000000..a2259cd0 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx @@ -0,0 +1,812 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +#define SWIGMODULE consensus + +#ifdef __cplusplus +/* SwigValueWrapper is described in swig.swg */ +template class SwigValueWrapper { + struct SwigMovePointer { + T *ptr; + SwigMovePointer(T *p) : ptr(p) { } + ~SwigMovePointer() { delete ptr; } + SwigMovePointer& operator=(SwigMovePointer& rhs) { T* oldptr = ptr; ptr = 0; delete oldptr; ptr = rhs.ptr; rhs.ptr = 0; return *this; } + } pointer; + SwigValueWrapper& operator=(const SwigValueWrapper& rhs); + SwigValueWrapper(const SwigValueWrapper& rhs); +public: + SwigValueWrapper() : pointer(0) { } + SwigValueWrapper& operator=(const T& t) { SwigMovePointer tmp(new T(t)); pointer = tmp; return *this; } + operator T&() const { return *pointer.ptr; } + T *operator&() { return pointer.ptr; } +}; + +template T SwigValueInit() { + return T(); +} +#endif + +/* ----------------------------------------------------------------------------- + * This section contains generic SWIG labels for method/variable + * declarations/attributes, and other compiler dependent labels. + * ----------------------------------------------------------------------------- */ + +/* template workaround for compilers that cannot correctly implement the C++ standard */ +#ifndef SWIGTEMPLATEDISAMBIGUATOR +# if defined(__SUNPRO_CC) && (__SUNPRO_CC <= 0x560) +# define SWIGTEMPLATEDISAMBIGUATOR template +# elif defined(__HP_aCC) +/* Needed even with `aCC -AA' when `aCC -V' reports HP ANSI C++ B3910B A.03.55 */ +/* If we find a maximum version that requires this, the test would be __HP_aCC <= 35500 for A.03.55 */ +# define SWIGTEMPLATEDISAMBIGUATOR template +# else +# define SWIGTEMPLATEDISAMBIGUATOR +# endif +#endif + +/* inline attribute */ +#ifndef SWIGINLINE +# if defined(__cplusplus) || (defined(__GNUC__) && !defined(__STRICT_ANSI__)) +# define SWIGINLINE inline +# else +# define SWIGINLINE +# endif +#endif + +/* attribute recognised by some compilers to avoid 'unused' warnings */ +#ifndef SWIGUNUSED +# if defined(__GNUC__) +# if !(defined(__cplusplus)) || (__GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4)) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +# elif defined(__ICC) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +#endif + +#ifndef SWIG_MSC_UNSUPPRESS_4505 +# if defined(_MSC_VER) +# pragma warning(disable : 4505) /* unreferenced local function has been removed */ +# endif +#endif + +#ifndef SWIGUNUSEDPARM +# ifdef __cplusplus +# define SWIGUNUSEDPARM(p) +# else +# define SWIGUNUSEDPARM(p) p SWIGUNUSED +# endif +#endif + +/* internal SWIG method */ +#ifndef SWIGINTERN +# define SWIGINTERN static SWIGUNUSED +#endif + +/* internal inline SWIG method */ +#ifndef SWIGINTERNINLINE +# define SWIGINTERNINLINE SWIGINTERN SWIGINLINE +#endif + +/* exporting methods */ +#if (__GNUC__ >= 4) || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4) +# ifndef GCC_HASCLASSVISIBILITY +# define GCC_HASCLASSVISIBILITY +# endif +#endif + +#ifndef SWIGEXPORT +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# if defined(STATIC_LINKED) +# define SWIGEXPORT +# else +# define SWIGEXPORT __declspec(dllexport) +# endif +# else +# if defined(__GNUC__) && defined(GCC_HASCLASSVISIBILITY) +# define SWIGEXPORT __attribute__ ((visibility("default"))) +# else +# define SWIGEXPORT +# endif +# endif +#endif + +/* calling conventions for Windows */ +#ifndef SWIGSTDCALL +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# define SWIGSTDCALL __stdcall +# else +# define SWIGSTDCALL +# endif +#endif + +/* Deal with Microsoft's attempt at deprecating C standard runtime functions */ +#if !defined(SWIG_NO_CRT_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) +# define _CRT_SECURE_NO_DEPRECATE +#endif + +/* Deal with Microsoft's attempt at deprecating methods in the standard C++ library */ +#if !defined(SWIG_NO_SCL_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_SCL_SECURE_NO_DEPRECATE) +# define _SCL_SECURE_NO_DEPRECATE +#endif + +/* Deal with Apple's deprecated 'AssertMacros.h' from Carbon-framework */ +#if defined(__APPLE__) && !defined(__ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES) +# define __ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES 0 +#endif + +/* Intel's compiler complains if a variable which was never initialised is + * cast to void, which is a common idiom which we use to indicate that we + * are aware a variable isn't used. So we just silence that warning. + * See: https://github.com/swig/swig/issues/192 for more discussion. + */ +#ifdef __INTEL_COMPILER +# pragma warning disable 592 +#endif + + +#include +#include +#include +#include +#include + + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + + + +#define swiggo_size_assert_eq(x, y, name) typedef char name[(x-y)*(x-y)*-2+1]; +#define swiggo_size_assert(t, n) swiggo_size_assert_eq(sizeof(t), n, swiggo_sizeof_##t##_is_not_##n) + +swiggo_size_assert(char, 1) +swiggo_size_assert(short, 2) +swiggo_size_assert(int, 4) +typedef long long swiggo_long_long; +swiggo_size_assert(swiggo_long_long, 8) +swiggo_size_assert(float, 4) +swiggo_size_assert(double, 8) + +#ifdef __cplusplus +extern "C" { +#endif +extern void crosscall2(void (*fn)(void *, int), void *, int); +extern char* _cgo_topofstack(void) __attribute__ ((weak)); +extern void _cgo_allocate(void *, int); +extern void _cgo_panic(void *, int); +#ifdef __cplusplus +} +#endif + +static char *_swig_topofstack() { + if (_cgo_topofstack) { + return _cgo_topofstack(); + } else { + return 0; + } +} + +static void _swig_gopanic(const char *p) { + struct { + const char *p; + } a; + a.p = p; + crosscall2(_cgo_panic, &a, (int) sizeof a); +} + + + + +#define SWIG_contract_assert(expr, msg) \ + if (!(expr)) { _swig_gopanic(msg); } else + + +static void Swig_free(void* p) { + free(p); +} + + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +void _wrap_Swig_free_consensus_0731991c73947514(void *_swig_go_0) { + void *arg1 = (void *) 0 ; + + arg1 = *(void **)&_swig_go_0; + + Swig_free(arg1); + +} + + +intgo _wrap_verify_result_eval_false_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_false; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_eval_true_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_true; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_script_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_script_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_push_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_push_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_stack_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_stack_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkey_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_verify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_verify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_equalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_equalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checkmultisigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checksigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_numequalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_bad_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_disabled_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_stack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_altstack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unbalanced_conditional; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_hashtype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_der_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_der; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_pushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_high_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkeytype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_return_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_return; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unknown_error; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_size_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_input_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_negative_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unsatisfied_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_none_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_none; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_p2sh; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_strictenc; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_dersig_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_dersig; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_low_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_low_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_sigpushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_checklocktimeverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_script_consensus_0731991c73947514(char *_swig_go_0, long long _swig_go_1, char *_swig_go_2, long long _swig_go_3, intgo _swig_go_4, intgo _swig_go_5) { + unsigned char *arg1 = (unsigned char *) 0 ; + size_t arg2 ; + unsigned char *arg3 = (unsigned char *) 0 ; + size_t arg4 ; + unsigned int arg5 ; + unsigned int arg6 ; + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + arg1 = *(unsigned char **)&_swig_go_0; + arg2 = (size_t)_swig_go_1; + arg3 = *(unsigned char **)&_swig_go_2; + arg4 = (size_t)_swig_go_3; + arg5 = (unsigned int)_swig_go_4; + arg6 = (unsigned int)_swig_go_5; + + result = (libbitcoin::consensus::verify_result_type)libbitcoin::consensus::verify_script((unsigned char const *)arg1,arg2,(unsigned char const *)arg3,arg4,arg5,arg6); + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +#ifdef __cplusplus +} +#endif + diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/store.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/store.go new file mode 100644 index 00000000..cc107411 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/store.go @@ -0,0 +1,91 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// Store struct uses a chaincode stub for state access +type Store struct { + stub shim.ChaincodeStubInterface +} + +// MakeChaincodeStore returns a store for storing keys in the state +func MakeChaincodeStore(stub shim.ChaincodeStubInterface) util.Store { + store := &Store{} + store.stub = stub + return store +} + +func keyToString(key *util.Key) string { + return key.TxHashAsHex + ":" + string(key.TxIndex) +} + +// GetState returns the transaction for a given key +func (s *Store) GetState(key util.Key) (*util.TX_TXOUT, bool, error) { + keyToFetch := keyToString(&key) + data, err := s.stub.GetState(keyToFetch) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + // Value found, unmarshal + var value = &util.TX_TXOUT{} + err = proto.Unmarshal(data, value) + if err != nil { + return nil, false, fmt.Errorf("Error unmarshalling value: %s", err) + } + return value, true, nil +} + +// DelState deletes the transaction for the given key +func (s *Store) DelState(key util.Key) error { + return s.stub.DelState(keyToString(&key)) +} + +// PutState stores the given transaction and key +func (s *Store) PutState(key util.Key, value *util.TX_TXOUT) error { + data, err := proto.Marshal(value) + if err != nil { + return fmt.Errorf("Error marshalling value to bytes: %s", err) + } + return s.stub.PutState(keyToString(&key), data) +} + +// GetTran returns a transaction for the given hash +func (s *Store) GetTran(key string) ([]byte, bool, error) { + data, err := s.stub.GetState(key) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + return data, true, nil +} + +// PutTran adds a transaction to the state with the hash as a key +func (s *Store) PutTran(key string, value []byte) error { + return s.stub.PutState(key, value) +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt new file mode 100644 index 00000000..36fb2e3a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////9NBP//AB0BBEVUaGUgVGltZXMgMDMvSmFuLzIwMDkgQ2hhbmNlbGxvciBvbiBicmluayBvZiBzZWNvbmQgYmFpbG91dCBmb3IgYmFua3P/////AQDyBSoBAAAAQ0EEZ4r9sP5VSCcZZ/GmcTC3EFzWqCjgOQmmeWLg6h9h3rZJ9rw/TO84xPNVBOUewRLeXDhN97oLjVeKTHAra/EdX6wAAAAA +Block: 1 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCDnSU0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGury+GOKEpoxVvvn5e9jUiawuv1JX/A6/iyEPX46S1GsAAAAAA== +Block: 2 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDLnSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDin9u8cjKDFiKpT+oYBKAd8nmwR5oMPTX7k52Ola3cY+sAAAAAA== +Block: 3 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIbnSU0BUQYvUDJTSC//////AQDyBSoBAAAAIyED9tn/TBKVlEXKVUnIEWg7+ciOY3siLdLgMRFUxMhc9COsAAAAAA== +Block: 4 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrnSU0BHQYvUDJTSC//////AQDyBSoBAAAAIyECH3LeHP8Xd6lYTzGtxFgEGBTDvDnGYkGsTUMTbXEGrr6sAAAAAA== +Block: 5 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBjoSU0BagYvUDJTSC//////AQDyBSoBAAAAIyEDc+pzmn503u60Qxptd99BlywYXm6D4cMA65ExCWM5g+esAAAAAA== +Block: 6 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDHoSU0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDoO+Q7VYFbhJuvloUwRLwuciQyU/ytKvp5xSIo6qUABasAAAAAA== +Block: 7 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIHoSU0BUAYvUDJTSC//////AQDyBSoBAAAAIyEChbxHksK4djxvfgi4VoytTM664Bd6zgo+7E8+TQRHFE+sAAAAAA== +Block: 8 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKDoSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECMETlaS4M62G/iAGKu5m89dAGPi8IKk5Fh5oWQHKNtbysAAAAAA== +Block: 9 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP3oSU0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDnBGEA/SSj8H0oPqm/ML/5R5FShONBOGCB2tmehT/dUasAAAAAA== +Block: 10 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDXpSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDjIZh3LP/iadr3RHpVxLAn7AZWAajLl8O1zmwZHVne/+sAAAAAA== +Block: 11 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3pSU0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDH96UU8YWwE7gP4Cf+gSH7sk0QMqxrQbuaga2oYw4kpasAAAAAA== +Block: 12 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBELqSU0CwgAGL1AyU0gv/////wEA8gUqAQAAACMhAgIKNC4+LiDFAAd8tDBKMVXae1qYWOoTaazXtuyzwyUErAAAAAA= +Block: 13 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJnqSU0BUgYvUDJTSC//////AQDyBSoBAAAAIyECKjNeYBvHflQBDnsV9ZeC1vcEhbC64+uF3yW6QeOtfIesAAAAAA== +Block: 14 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKHqSU0BBQYvUDJTSC//////AQDyBSoBAAAAIyEDrIfcVRiUMUkBOa7g5pC4wNQedwKRq5DOjaHqqOE732isAAAAAA== +Block: 15 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK3qSU0BCQYvUDJTSC//////AQDyBSoBAAAAIyECpAwbcwsLplZwrckU2YVwjav4xSSwMl1E7id30QVVbKGsAAAAAA== +Block: 16 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMPqSU0BEgYvUDJTSC//////AQDyBSoBAAAAIyECwfrFEBgeQHRGx3JzWrx2WrgZdbsMPKmxYXSY6SnIhW+sAAAAAA== +Block: 17 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFHrSU0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAu9x/ERPDFCLH+Zz9EkGacdLHUNJBNJlrjHPj8qij36nrAAAAAA= +Block: 18 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3rSU0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDsbskjzdWg95PsEVNPlF9UYlBUaDX7pRlaPutz07igl2sAAAAAA== +Block: 19 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLDrSU0BLwYvUDJTSC//////AQDyBSoBAAAAIyECAela3YC/7QecmoXpwcVBHvmq9Igg7/pPrp6+po6gOeasAAAAAA== +Block: 20 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLPrSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyECOCTb7SV0yI7jdXiNlWnfDqCyTM/Socpx6ix0Q2fec1usAAAAAA== +Block: 21 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBnsSU0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDOxvsrCrf3LzfkqF6sW2hdDI0STQcvDDKFaguehlJhjSsAAAAAA== +Block: 22 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBbtSU0C+gAGL1AyU0gv/////wEA8gUqAQAAACMhA7eHkgWUy0f7/M7pFb765ArC4rKVIkRg7uB1rQraTAxUrAAAAAA= +Block: 23 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE3tSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECKifvqihaTQSfERtUPc1YLGxxuyHyCyKniRx3yXX7O8OsAAAAAA== +Block: 24 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGnuSU0CFwEGL1AyU0gv/////wEA8gUqAQAAACMhA8BULZnHhUkkwRuChgNlmiruT0O6R8lNAKmIjwuhr7/zrAAAAAA= +Block: 25 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP/wSU0CjQIGL1AyU0gv/////wEA8gUqAQAAACMhAxGkBMZd+Vjgbo7VWoLTzgo/gcV4AiFLSVS9x890lFRirAAAAAA= +Block: 26 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDrxSU0BMwYvUDJTSC//////AQDyBSoBAAAAIyECffJ5kZ4Q7JLmSbsjk86Kh21LCmDi2MuN4ESioZnesPKsAAAAAA== +Block: 27 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFnxSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECcJP3Vfc3TUatwc3raJDpEf2EI3rQ30yLph5MO/sy012sAAAAAA== +Block: 28 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF7xSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDhOZsm1BYwtjpDfh7mAKxflVlaFthoun6idSM7fGafSOsAAAAAA== +Block: 29 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNrxSU0BdwYvUDJTSC//////AQDyBSoBAAAAIyECWXKM/kRtVcixvUPEg9y21vCzgqdLCEQG4Ig8mZMlzKisAAAAAA== +Block: 30 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIHySU0CowAGL1AyU0gv/////wEA8gUqAQAAACMhAs/LJ+fERSyRleiLOeSxjUX14Ecz5yzVWDF3lx/L0wJTrAAAAAA= +Block: 31 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrySU0BJwYvUDJTSC//////AQDyBSoBAAAAIyECPU5mVU5PatRnuw8wIibdoUzITkeZQhk67Kpv5ezUjTSsAAAAAA== +Block: 32 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL/ySU0BEwYvUDJTSC//////AQDyBSoBAAAAIyECtvPaaw1EP0rmDVLOibHEztobgYLCWYhVSXZJArIwpHusAAAAAA== +Block: 33 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM7ySU0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDzFQB490ZDRQ1WMOuhSC4sZ651G9sh2DJ+ZcuWuIflWCsAAAAAA== +Block: 34 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNPySU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECSylQW41EXWOZ31CvExD6+aXabV0TrFSinEwMY9+pj86sAAAAAA== +Block: 35 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBTzSU0BPgYvUDJTSC//////AQDyBSoBAAAAIyECE8p6oDbtxI7jSmW2lNfLn6oxtoLi88KLdQB7BfBeBlusAAAAAA== +Block: 36 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG3zSU0BVgYvUDJTSC//////AQDyBSoBAAAAIyEChAl8To2kjVb58pc1oWzLfRImNg9q8srVh4VHczZYV12sAAAAAA== +Block: 37 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3zSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDE5yzxxZ4WFoduT16wym78lpcAw+rP70r2eMnHZ94ScqsAAAAAA== +Block: 38 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN/0SU0CXwEGL1AyU0gv/////wEA8gUqAQAAACMhAhPWoDG6689omfxxvV8+TJgHb8Id0gkb2k3i0rkvZ/oorAAAAAA= +Block: 39 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA71SU0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDQIng3kzxC1cm+G0Bnth9Sa7KOHFuCm3z4xLyYCJ7O4+sAAAAAA== +Block: 40 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJD1SU0BfgYvUDJTSC//////AQDyBSoBAAAAIyECoY1wflhE9PVB9dwhSknejApBY/eIE0CvIKObEuf6B+asAAAAAA== +Block: 41 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNL2SU0CPwEGL1AyU0gv/////wEA8gUqAQAAACMhAmcdzpOspNYs6o/TN5CzDiqhx9K96neEhROlO47zm49arAAAAAA= +Block: 42 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOP2SU0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDfO7OWX00d7xOLX5GiwhH9WSnZqMSzmnOLg1oZ86i4cGsAAAAAA== +Block: 43 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE/3SU0BawYvUDJTSC//////AQDyBSoBAAAAIyEDOsp3p/iuhz87/hjiQaW5MLFTEAMjdHBG9toI78bR6CWsAAAAAA== +Block: 44 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI/3SU0BPQYvUDJTSC//////AQDyBSoBAAAAIyEDWGIJZypV1ghaNLShPzAtGfr2hY41jb8JAJ8hk9v2NwusAAAAAA== +Block: 45 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBC34SU0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAp+9ICcmETU29ZlGo4RRY25HXEhmg91nRnSBASYH18B7rAAAAAA= +Block: 46 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFD6SU0CHQIGL1AyU0gv/////wEA8gUqAQAAACMhA4XwdH0k+Heveh7uQ3phvM9SVCbtT1l9Eq0Y3fPYsjtQrAAAAAA= +Block: 47 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGb6SU0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDZhcjinxBQXVgFLA+iAGp1VZsalDx+gptnX5pzTFgLomsAAAAAA== +Block: 48 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHv6SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyEC1/pOUjVLwQLKHrbmzekcK3mM5m27Pw2DfceQQWGPIAesAAAAAA== +Block: 49 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKD7SU0CIgEGL1AyU0gv/////wEA8gUqAQAAACMhAiDrQHypfIhJFYRfd0eD5sw0sUdED2ddyxZjTYRiTU0OrAAAAAA= +Block: 50 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNn7SU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECzrgonxvoWIwfydrc0JwZfPFzpoqE7TRNHP6fDLJXYR6sAAAAAA== +Block: 51 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFz8SU0BfQYvUDJTSC//////AQDyBSoBAAAAIyEDr0DSfmYfDJs++dvPnylmZNXo6w+uI1FSJ9pE0/LgxQisAAAAAA== +Block: 52 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGX8SU0BBgYvUDJTSC//////AQDyBSoBAAAAIyECR0ME6erPMG6zEPONKd2e4PkWuxQbS3McimdcBviLh5SsAAAAAA== +Block: 53 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBX9SU0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhA/EIOKqd9tFpqUFm5q8D3f0UmaPOpXYHzC+BdKh9Q11lrAAAAAA= +Block: 54 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDX9SU0BGgYvUDJTSC//////AQDyBSoBAAAAIyEClk2EdET+f2E7Kt/Ayfl+I9X7zZ6Mz8jkqR2flAMszmusAAAAAA== +Block: 55 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPn9SU0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA8v9vShdzgiq3fYDiu7o2fmp0vTpVdo8k7kTuWLDU+xtrAAAAAA= +Block: 56 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP39SU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECmp028rYoYhYHasQ1vK47uroaK1B6WLIP1WHqfo4iAzisAAAAAA== +Block: 57 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEr+SU0BSQYvUDJTSC//////AQDyBSoBAAAAIyECej6GuUWYaRu62yUOCQje4vi8K9C+VTDELG/6lMPSPbqsAAAAAA== +Block: 58 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF/+SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyECcEE7ucUapHJFm85zreQ3upb18xlIoRNc+wdnsfzPUVSsAAAAAA== +Block: 59 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKP+SU0BQgYvUDJTSC//////AQDyBSoBAAAAIyECyPrrEQItHPOXtZlEQ9qQrCdLxzTF327jDNhBP+e9kHmsAAAAAA== +Block: 60 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLP+SU0BDgYvUDJTSC//////AQDyBSoBAAAAIyECyEpYC2LXJzJqHz8198VHG19CD1+n/kSCnxc2e6ZpBfqsAAAAAA== +Block: 61 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCX/SU0BbwYvUDJTSC//////AQDyBSoBAAAAIyEC5QZU5g1XN84Sap0NGdZwTrxu4t3M+0A+VJ1mYM0LMcSsAAAAAA== +Block: 62 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH7/SU0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDydEjy+7iKghK4PUM8ZyOqRFwsROlC5uw/gNCN2Q9UdqsAAAAAA== +Block: 63 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNL/SU0BTQYvUDJTSC//////AQDyBSoBAAAAIyED1WiZB9m6NTr+d+ME7Wj2XpWGXSnNkIsP72cPYxEHU42sAAAAAA== +Block: 64 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0ASk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECzGG9c2zi1DiTrg9QPSeB2rX+VIf/oONq+eJVPLX0qgasAAAAAA== +Block: 65 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJQASk0BUgYvUDJTSC//////AQDyBSoBAAAAIyEDeVzpequjyO8ZQQeEmHHhsoYTJsewby6iJGgc6KSWwpqsAAAAAA== +Block: 66 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKMASk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECAiEO+Qdmz5FpUwry8Ro1MOTfWXk5J1THOTFvnXFi6VysAAAAAA== +Block: 67 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKgASk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECirk7Gw8pjP7Ir8lsWfcMStVKPfkms+Go/OqOJmr0lXGsAAAAAA== +Block: 68 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOIASk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECh5wT3uZUInQ/YidZdpAh8mLwMJ7VCQxJR6ieVMBNRrGsAAAAAA== +Block: 69 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBMBSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDA66EL4cQecB7lIS2SvJhOKdVbBqDvMz2sUpg3XCrwK6sAAAAAA== +Block: 70 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4BSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDk1oBxCVyg2vY53MZolz9+ZSWC+MZx9p3j3k8OFAHJ9GsAAAAAA== +Block: 71 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGYBSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECDmH2JO8GPQAM7t9hooYcj5sUinvZ78qBuw4Dd4n0K5usAAAAAA== +Block: 72 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKUBSk0BOgYvUDJTSC//////AQDyBSoBAAAAIyECFF5f5/Z+jml3cQzeXcJRDdK8UipNynl5WxeDmlSjq1SsAAAAAA== +Block: 73 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwBSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyECnhA+aRuRezF2e8WEGG/s7V8nc8EtaztPL+0EpbfjPZqsAAAAAA== +Block: 74 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM0CSk0CzQAGL1AyU0gv/////wEA8gUqAQAAACMhA8IkXPeRF5hovk2URYw48sE8qBZN2/hVmGHDTqfIOUPqrAAAAAA= +Block: 75 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCEESk0CTwEGL1AyU0gv/////wEA8gUqAQAAACMhAyF77cSm6Fcc1+7SixaXLAjqbcACJueGouOB/8fL9KdbrAAAAAA= +Block: 76 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgESk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhA4Q4ZrFzL7O+rRNPn1GlFZSj1QPbpIB2mB+Nl8BtW3JgrAAAAAA= +Block: 77 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEFSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDBWUMsPAGRZhzGK/mJPCnGUdp9Uv+IEvklL2r1UTpj8CsAAAAAA== +Block: 78 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLgFSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDeN6b8cqvdr+sNsSTYFnPf1UdCFbmKi0gWv1FKVHr7mqsAAAAAA== +Block: 79 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcFSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyECxtpvDSQjzrxLIXUx1r9SY34QVRzE+AzhV/lFnFMV2aisAAAAAA== +Block: 80 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP8GSk0CIQEGL1AyU0gv/////wEA8gUqAQAAACMhA4fXPIkMjM8Fw51yXPpY0LpoBqIRi49vNM2NvDZZRrNCrAAAAAA= +Block: 81 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoHSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDPiCVXPu1XICM1gydMr47Nc0ePwNmnm7hUBXmqskaY0SsAAAAAA== +Block: 82 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI4HSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyED4YYspc2ccGWimDbH1cofSdDAkepk8ackLroibbzSpIusAAAAAA== +Block: 83 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ8HSk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECTp/aW1UTcPN28O7w1Go7jamne+51lR8QCiSC57OzxWWsAAAAAA== +Block: 84 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLwHSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDLD0fFf178690BLd3hIBRMWutBwHaeksqee/yOiAdxNmsAAAAAA== +Block: 85 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPkISk0COgEGL1AyU0gv/////wEA8gUqAQAAACMhA8ku4jTOrGgCQdXBhEmQwa8CIcIYVrgKek4mIuFlxOr8rAAAAAA= +Block: 86 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH4JSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhArdNqbvb9LnevbFlhSY+uK9qvP7Ue7psxbAcg4rlJ3eWrAAAAAA= +Block: 87 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUKSk0CcgEGL1AyU0gv/////wEA8gUqAQAAACMhA6S52CxTnl/IQyoeBkQYmzBZckrsJoGYVwOEOiZERacPrAAAAAA= +Block: 88 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDcLSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC/xp5RA5PGqknb6ogNmXbB87Wz3BDHcexnVgIQRSCbeysAAAAAA== +Block: 89 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDsLSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECERJMGxQyGb/271PHI4bhd1jU9F3RNHBSRzEgBKCY0BmsAAAAAA== +Block: 90 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgMSk0CCQEGL1AyU0gv/////wEA8gUqAQAAACMhAknGp243wvzVZofd5rdbvfcvze6rb+gVYanEGskNnR9IrAAAAAA= +Block: 91 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIkMSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECC6nvDf8UAxjJV0TJgszNp0/vSx6s/xp3jS9KNQPNECqsAAAAAA== +Block: 92 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLMMSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDX/Pb/4LxrP8BUqJ5toAAX7zLYkAnR6CSS73Mza4uJ/SsAAAAAA== +Block: 93 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAYNSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyED238//BrNaXpFgoJQqhDfbG03KklVowE63vIF/LhRwzWsAAAAAA== +Block: 94 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDgOSk0CKQEGL1AyU0gv/////wEA8gUqAQAAACMhA3Lt3dFjLO00uwOF5Qi0rbMWM5i4w1Px/zIKRDhJNU8ArAAAAAA= +Block: 95 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0OSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDuKDxIuMDhmTrMmCxNE6VDkEzSChCj8yFp/VZ9ydLsASsAAAAAA== +Block: 96 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEOSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDaMPL9oFu1z1Q8EjbqHa/qAZLxBTLLyVrKxEi3Yok30SsAAAAAA== +Block: 97 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFsOSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyECA23/zJ/0yI3V3PGTelRLpNJwSDDjSmV4vwATu0APHSusAAAAAA== +Block: 98 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGIOSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECseBU+/S+VjT6CZMxNhF7s7MdCesDGFzR3+7ebDcDIJGsAAAAAA== +Block: 99 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHQOSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDYJIpTSiKIZSZb4WuYs6egFJKl/UljgFQHNA+aU+wlzSsAAAAAA== +Block: 100 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOEOSk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECp0EHEWS0CwHErSiRPEqioQFcxbBk8MgCJyVS8Xrgh1CsAAAAAA== +Block: 101 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN8PSk0C/AAGL1AyU0gv/////wEA8gUqAQAAACMhAuDXugKxeyPjCOvbF3DocZCvUcibYhIRvwm6c4WnnLOErAAAAAA= +Block: 102 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOgPSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECjWrD9Yi8FDFKE0YTDEAIqat0AqqfwVq+Fc2LFSEwSbKsAAAAAA== +Block: 103 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO4PSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDYorAJhhfbpTZx4n/5cuSwMREKksSS49oEfoujNLXrtqsAAAAAA== +Block: 104 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAQSk0BHgYvUDJTSC//////AQDyBSoBAAAAIyEC3XXrVkgaG+NMvqLawe0bJMcD/ULrIQ+8MBEt9Tc+zBGsAAAAAA== +Block: 105 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFMQSk0BPgYvUDJTSC//////AQDyBSoBAAAAIyEDKziPAFRNIxoclk2zUULokJ6weapTPItw8jlHqKMAKomsAAAAAA== +Block: 106 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIQSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECnap6EmSxNxBja9sb9WKBjEOc+IaVL11ZEfuhicQETSKsAAAAAA== +Block: 107 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPoQSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyEDQbRZLdFqTyYVWs1rOWpWBLenSg+e/GvSst+fkWElJtysAAAAAA== +Block: 108 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM8RSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhAlCVtoPrkh4/BjYdI2SNmZQslxj2Ai6F4L9nsNGOSQ94rAAAAAA= +Block: 109 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHsSSk0CqQAGL1AyU0gv/////wEA8gUqAQAAACMhAkVeiQoVVJnM3cKkTS2KpE6VtNM7Hv5m81yM0OLoeE35rAAAAAA= +Block: 110 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ4SSk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MYoWE+Nakd/ASdja62uaaDg8YBaBlPId6zNo9QvOeCsAAAAAA== +Block: 111 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAETSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEDulAFvCPjIXYYydMeS9Hy9GgxGV1FMXPhjeXT4TAsWwisAAAAAA== +Block: 112 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMETSk0CugAGL1AyU0gv/////wEA8gUqAQAAACMhApYlJaLMQwsCUvCvE2GitF+TAmd3RtY1/OlpcSRgBxWhrAAAAAA= +Block: 113 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAUUSk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDKEdW/gN0khwyVjZKfx9nJcvH4qOOczj8zqJLykLlCwesAAAAAA== +Block: 114 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoUSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyEDL/EK5v6tK6oGqFFqe8//IV0PA4SAAQSL9oBlHCE7+I2sAAAAAA== +Block: 115 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDAUSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDrFOsSWu4ejinHQ0ZyCsYeFn2lmOi0IZCNlCN7jEiEVOsAAAAAA== +Block: 116 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFIUSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECj0sipvPHM6oX2Suk6PK+LqKb1d4d/p1V/1QzP9w28zasAAAAAA== +Block: 117 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsVSk0C5wAGL1AyU0gv/////wEA8gUqAQAAACMhAmeMh63HQmd8cON/IfxgbUeQ7dFT1K21wLz9pxQS4Ry8rAAAAAA= +Block: 118 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHEVSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyECN/Qd2eah2UkEmQg2RIfkcLW0ioNNergQqVMdEfek6resAAAAAA== +Block: 119 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI4WSk0CGwEGL1AyU0gv/////wEA8gUqAQAAACMhAzMl14BRqQarAAF+6UfE6MZ9xSjCdSfs1kvgxHmb655FrAAAAAA= +Block: 120 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIsXSk0C9wAGL1AyU0gv/////wEA8gUqAQAAACMhAl/2wZV0zb65Vo0vpQlAoAGfK6mW/XdHHHGupdwMOK4vrAAAAAA= +Block: 121 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAMYSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDFeUkW4kgurJkKtZppFFONYbuCUqngDiX/Pt9+H0NJHSsAAAAAA== +Block: 122 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAYSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECjMDQibQYuqWWAFTuz6dY6kNMSlqIosrrvIdLsUQmfRusAAAAAA== +Block: 123 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoYSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDxmWiC8T1BP8SGur/FIWgXfxYYcHKeL4npwGuFq67ACKsAAAAAA== +Block: 124 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgZSk0CKwEGL1AyU0gv/////wEA8gUqAQAAACMhAwHf2sC7W2d2IH994GJVVX7tRHe32CbuCtrzo2MLuMYVrAAAAAA= +Block: 125 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFUZSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyED0hDa6WdJtpZ6p98G6m2UjqiixKyIuJ0MFPajGmjssBmsAAAAAA== +Block: 126 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKEZSk0BSwYvUDJTSC//////AQDyBSoBAAAAIyEC6Tum2NedfqmBS8N+FQE+NDwZ9KFXXPVWJyzmRk8JCCqsAAAAAA== +Block: 127 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8ZSk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC7KD44OHRMoAgeSAAC7x0Oj84FPEZi1Xg4SBSggQS4t2sAAAAAA== +Block: 128 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCEaSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyED03efe2zTPZ5E5IEp9ISyf0FMMZEaBTOW03/yCvR2GM+sAAAAAA== +Block: 129 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE4aSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyECwalSu7EuBcSrjEG2inHKaIpIuFyoK1DRQJVYLf+HSjWsAAAAAA== +Block: 130 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGwaSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyEDnJcLkSa7HVF9W8TBdvX3Vc0B5uy2lxV8HzLiYl89CSSsAAAAAA== +Block: 131 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKcbSk0CNgEGL1AyU0gv/////wEA8gUqAQAAACMhAgwI2E8OE8zFqqaK+g+tivMz9gGHpo+bHjh6ezyFdarBrAAAAAA= +Block: 132 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUbSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED3vQjnrHezODS7A3yL6p+uEqBalS+A3ZcnJv1TGYlmdusAAAAAA== +Block: 133 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECPgylKGKmLvlCsYsvfc6etncxnBfkOzyCsUc+2f/5/D+sAAAAAA== +Block: 134 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDkcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDmAG3xKRdjqz1TlXMHkjy8VCwBa7Z0BXDgSFyRhbSsiCsAAAAAA== +Block: 135 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQcSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAql6KbWWtQ3glHcRUGYj3ZoP5FNTn8LrGsWCelXHorCDrAAAAAA= +Block: 136 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOYcSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDI8XxVM4wiDQ8N0moqKA3aYzTf30OHKpT/oNa8gWnr2qsAAAAAA== +Block: 137 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMwdSk0C4QAGL1AyU0gv/////wEA8gUqAQAAACMhAo49WfWmzQi7F5tzwpGkvJ6e8RKR7OYSVJSeKT9IiGhtrAAAAAA= +Block: 138 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNodSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECi017LAVObSf/5Rwfix/FhWBC2jNRTlZ4KfrnUnvfmTOsAAAAAA== +Block: 139 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8dSk0BFAYvUDJTSC//////AQDyBSoBAAAAIyECW2XIUIXSxutXOlHs48KS0x7TKI/XXyPp59+kvgAFu6isAAAAAA== +Block: 140 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPcdSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDpl1cLBpqfSzONTnwQsdqHOFjhHH0fdVVFDXhrKHzcz2sAAAAAA== +Block: 141 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkeSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAo639YmdK+SsumPwiPgosjcIPN4bguWzANGhJONA6npKrAAAAAA= +Block: 142 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP4eSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDh1Y6ou0Q7r88w3LyFO4Ou+VAckXDrbCqK+ieFH3jksCsAAAAAA== +Block: 143 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAcfSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECgYYEfoORKB4/4+fBR2LN2pELTRbhJSpFEos+/kwqOWmsAAAAAA== +Block: 144 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJofSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAlR7Ij1Y612nx2kHSPcKO6sVCct1ePqskDI5nwtrzjHWrAAAAAA= +Block: 145 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsgSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA//fMrrnSOufu49dboDO10CHqbQrMLK8IVpadlmbklNIrAAAAAA= +Block: 146 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH0gSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyEC5OG3sNSMSlP9KpYGnUWZdDg5VNohjMPMsH5fW6AxYNesAAAAAA== +Block: 147 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOggSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeEPHfTsL4Bfb3ccC4idXbDyNqcTkrZKEZVvj17uvpRSsAAAAAA== +Block: 148 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAhSk0BGAYvUDJTSC//////AQDyBSoBAAAAIyED57ygEjbUgyC3aieMvHbX1pcm4LCUC3IOfdl+PP4fbGWsAAAAAA== +Block: 149 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4hSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyED+FCDPTLkqxp0MVfJluKh57I19Dn9Iih7Woi6Tb8afRWsAAAAAA== +Block: 150 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJIiSk0CXgEGL1AyU0gv/////wEA8gUqAQAAACMhA+mAqc9h4nD0t45VfLx2UUUA0/p4kqxabd2ZmYuq6gbkrAAAAAA= +Block: 151 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLQjSk0CHwEGL1AyU0gv/////wEA8gUqAQAAACMhAmPucb2v4yUFUs+fsMFzQHJ1j/9ce58LGgRe6RRh/euHrAAAAAA= +Block: 152 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB0kSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEC9xVG/Fl+Y+KnLa3u61DAymQHmlpTDLAd2TlxbUHp1ICsAAAAAA== +Block: 153 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIckSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECTRtIq6UP01DI9p7iiDVWNa/jito7eNknrlptxob8CMmsAAAAAA== +Block: 154 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUkSk0BOQYvUDJTSC//////AQDyBSoBAAAAIyEDRUuy+NWMnk9ILuZ8DsapFVsOEDCC2KhTZXhMPg/0pLGsAAAAAA== +Block: 155 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCglSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECpWAAkqzDwjMqnXaDKK1kwh8APDmky4ymzsjsiQwAPIysAAAAAA== +Block: 156 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOklSk0CvwAGL1AyU0gv/////wEA8gUqAQAAACMhAyNBmkFIDhmpISxIaAl8BYhRlGkBGV02hWlvr5HUQ8SNrAAAAAA= +Block: 157 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPMlSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECVUwl8GtKXoE/NvfIsnO79lk3xtuTS0whn0U9xaWNfZ2sAAAAAA== +Block: 158 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIEmSk0CiwAGL1AyU0gv/////wEA8gUqAQAAACMhA2eaRhiZvGK0In2a/nKOXB769+5t51fHwe27IRDD8RDWrAAAAAA= +Block: 159 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJUmSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECSnRxC9g7iWyJOp5+YM/FZgmbcbPsmVh5aSkjv/1Fr+KsAAAAAA== +Block: 160 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL8mSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEC5D7rknn6lh1+hyHQtrGTqi5eDm7RQ3kZ9nTgfZeqQO2sAAAAAA== +Block: 161 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIAnSk0CvgAGL1AyU0gv/////wEA8gUqAQAAACMhAky0lADzyWXLORNQEhDBS4Y+ALXvKIBDqAc++PzHoWMfrAAAAAA= +Block: 162 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwnSk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEDZl+fHnBeazj0LWAi5pTzm/sexX+/HOAWCH1HgkKwPJGsAAAAAA== +Block: 163 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMkoSk0CygAGL1AyU0gv/////wEA8gUqAQAAACMhA8WnNOO3JQUBUrPDxen13ndh2yW+n3MxlW+XRd2iTLcCrAAAAAA= +Block: 164 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOooSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEC/lxWWAay2wT4o39Tr2Ns7nwO+lyMF5SZq8rI1U1X/FKsAAAAAA== +Block: 165 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHspSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAk3t/tXOCj9LycCuXAWJ0v8jtOUZvOEgiA/jVcpaDVusrAAAAAA= +Block: 166 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBIqSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhA9xfxtKVRJeu2iyjBtle7aNf4PX9iJp49sOdNZngbhberAAAAAA= +Block: 167 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBUqSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDzt1mHK9GZEgenCDf5gVQ9pkqBW2ynXSIx+R/u1p4+7+sAAAAAA== +Block: 168 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB8qSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECcmG4uffmlftTc8/q0HovvNkqByGT9iSYD1JLoD3T2KGsAAAAAA== +Block: 169 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQqSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECKJDBT07ersXWrdbd1y6AZ2YDmQQ6+Vp4g6NLUMTJ+qysAAAAAA== +Block: 170 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGgqSk0BQgYvUDJTSC//////AQDyBSoBAAAAIyECZWWUoDCWh1c1W9w74ve+UH981Eo1UM5e/1v5cAU6fOSsAAAAAA== +Block: 171 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIYqSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDF2fHjUsx87d2NosEP+141eCTd+K3U51XYtvUrlrtDN6sAAAAAA== +Block: 172 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK4qSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDFRrbmh92qUy24UA0dOBXZkjabZdjzX09/eehBoXur4WsAAAAAA== +Block: 173 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDQsSk0CgwEGL1AyU0gv/////wEA8gUqAQAAACMhA9V0fQUO8S9LLUYyAF/C1pjsS4Nj04HBCWOIMBeJQpIfrAAAAAA= +Block: 174 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIsSk0BWgYvUDJTSC//////AQDyBSoBAAAAIyEDUY2+hN3z/qi3FLQeVdbXeo2qvk+n2HI7YnmL++mj2JqsAAAAAA== +Block: 175 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA0tSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyED2ajBIKQoSY0sQtN9UXzjxN9RdlATZuFxZtE/VNb8TRGsAAAAAA== +Block: 176 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCktSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED0zYlPDsSgALLnDg8eSTEv1O+XSZip7udyNxu6mct6dysAAAAAA== +Block: 177 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD4tSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECnmCVvaEzV5T+87o5aRJ7V+zCO1cDMiN8RQrpstQoIC2sAAAAAA== +Block: 178 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEtSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECw1GLuJsZoO7CcGxZqIj0Fde9iM46b2hCOkkPzYbPpVCsAAAAAA== +Block: 179 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQtSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhA9FiMoAzSvLf//IuTOJ7iIr42iWVGqjSPJgOwD/I11G1rAAAAAA= +Block: 180 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkuSk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhAgzoxgCUp6u2tfbFsyVyNtQa1/eOlPEKsP22ypizmbPArAAAAAA= +Block: 181 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcuSk0BSQYvUDJTSC//////AQDyBSoBAAAAIyED/KDiunzajPWWBt5052FD09r91nJKgwvJUXu9j+zK8qCsAAAAAA== +Block: 182 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOQuSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECAbjIKatNox8k1l5eferyl5W0rT74d1W4ZMHOlBmCypWsAAAAAA== +Block: 183 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDYvSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyECDCHJxkNMLSKT4njHLAKf6Fie9Y6EIKdO1Sh7OpFaHB2sAAAAAA== +Block: 184 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgvSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhAkuwZCiL1dTp6Gkdi29dKmRdOduF1BfZOSTmEeGVX6b0rAAAAAA= +Block: 185 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkvSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECxpIXgk3R2CVVVDs9VbcrPR9+ENIS/+EmgydRuJb02CisAAAAAA== +Block: 186 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJgwSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhAtL4lYkIp7ccSXLAtdvkK4ItTk1+TGDCEzuV5nEyBVErrAAAAAA= +Block: 187 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOwwSk0BUgYvUDJTSC//////AQDyBSoBAAAAIyECPCzw98DWpVH8vkz5wB/gBPPv/PSW9hpJuvuBmUzqyyKsAAAAAA== +Block: 188 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPsxSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhAvngQPVLq7NX+R44ubEpXFXPa54gDs75/TuqqNVfIISqrAAAAAA= +Block: 189 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQySk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECcV6R030jneqDLxRg6R42gRXYymzCOn2pZnlautnjtpmsAAAAAA== +Block: 190 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEIySk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECOsJ4ba9fVJTKq/sBzn8ZyEMY40Xde7mq8IqgxzJsiP2sAAAAAA== +Block: 191 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHwySk0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDYaxjeSGC4vmLLnZSBiOQoVs/N8OQhh1VjbsmvSJWDeOsAAAAAA== +Block: 192 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKcySk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDE6nEK2vcgUcSPaAGG1lcRoVpH9pMgMELnLyWp8PSEtSsAAAAAA== +Block: 193 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkySk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgiabwnuNypax6R76wnwP+WoSo5URuQfZJNXGzMJMDHCsAAAAAA== +Block: 194 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDozSk0BPAYvUDJTSC//////AQDyBSoBAAAAIyECRpq1+j+DYgxIgFHEm9UXzHN17P9kTVK05kSzXTwJbgusAAAAAA== +Block: 195 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUzSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhA255L0d5BkzSHLyHyk1k2g8YQ+rO+KUmbt2wRBdI4IAXrAAAAAA= +Block: 196 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBE0Sk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECAIZcl1++mP3bwjoeLm+zNyIQs+IvDkC1PCV4PTBlmtGsAAAAAA== +Block: 197 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHI0Sk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECjLR7uNNby9GgkoGEDLZJ9E+5jbEpdYjmn+DIaqV7EICsAAAAAA== +Block: 198 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIc0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyED2qBTZEmx5B7uBDjoBvifJC47pnN69ttFkXMLKYbIV/2sAAAAAA== +Block: 199 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN40Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDqq5d+o3hT8+n8SFTXNxKed5P2hHyzqF5aueZsBs8q/isAAAAAA== +Block: 200 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFw1Sk0BegYvUDJTSC//////AQDyBSoBAAAAIyECfYhreF3fEPCFznCYEHUP49yTjI2+QNlrB/Gnq5CcsF+sAAAAAA== +Block: 201 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MnOAprXSvn+yszmi8x3XMbvywAKC4zCs6rK1IULxLCsAAAAAA== +Block: 202 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIQ1Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDGLR8jsPYWgkNOT25W2J35cPx1tEynq0CqOcvIzc+/JesAAAAAA== +Block: 203 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKg1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDpTE0hjwmpiIpprcrlfdySjeIXsPXiHcRsbc1nuzsNeCsAAAAAA== +Block: 204 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM81Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECFv8YWuZ34zrgQrQJtZm7l1uU/+VAiK+MPKNp6LwyK/CsAAAAAA== +Block: 205 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNw1Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDqIiMpDLtIWiJdsenyU/cG+8Dkb1K6fFgIw0+xtrJpH+sAAAAAA== +Block: 206 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDg2Sk0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDkkPygwnlTXCiX1sKhnXsLegIt0Ljcr9xpFA1SAchL5usAAAAAA== +Block: 207 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEY2Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC0cirEKovJKnAWPMlnZASXhXiq5hBtVY9NmHia/SDip6sAAAAAA== +Block: 208 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIs2Sk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDR3mrcSLWZyPk+AEZeqDYbMU369AyilWs62jasGgH/FisAAAAAA== +Block: 209 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPc2Sk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECI1tcjpvtgMvY13MdVfn9cI0Q66cYW5MEW2YTmMF0DGqsAAAAAA== +Block: 210 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKU3Sk0CqwAGL1AyU0gv/////wEA8gUqAQAAACMhA4UT2yCaEBXO8+K1tsUXtXvcF/gUyER4o6Mp88+7U7o4rAAAAAA= +Block: 211 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM43Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDQztds6F7JDGdYV3FwkUj1r7QuyPBfdtwItfxQpwDjPSsAAAAAA== +Block: 212 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNc3Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDkO6NUxYzgjwm87IpiOTuAOggdX4N8eq3yLWExeVjzxWsAAAAAA== +Block: 213 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEM4Sk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECVggb+D65XJ0dUkYoiY6b8dQ2WrI/1Slbqnx1ksHEndSsAAAAAA== +Block: 214 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKo4Sk0BYwYvUDJTSC//////AQDyBSoBAAAAIyECBIkqmiTU8fNIMESRp4yM/BAhwbuwjyf3JgY3lYArr06sAAAAAA== +Block: 215 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI85Sk0C4gAGL1AyU0gv/////wEA8gUqAQAAACMhAkuKR3KQysRLoewC6BecSqjM+t3ka1XFiNlBB86Te8ARrAAAAAA= +Block: 216 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKE6Sk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7jPtN3qUeGA6atc5I6F+797GlFI9rOt/oDjZhAEJ/x6rAAAAAA= +Block: 217 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCE7Sk0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGcFv4b+90LIVuMhMZrmZrBL2HElwCE/ZeIwp2lSkbFOsAAAAAA== +Block: 218 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDI7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECVMM/t4acgW2wl3m7rNrmW2Bcb6o9eysiGc5ZkimmKk2sAAAAAA== +Block: 219 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEU7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyED9fuhtvoIzHBSYAYPUi18+TxpIuT3xLBEo5jugxaqzJKsAAAAAA== +Block: 220 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJg7Sk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEChBswuJJl+LxHr3C8ZIa0nhEHu9dF7CBr9KIg9nc3UWesAAAAAA== +Block: 221 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN07Sk0BQwYvUDJTSC//////AQDyBSoBAAAAIyECTfrdKVALUbJ2oTu3TOt89rmu14vx8AzqVBauraYZGgWsAAAAAA== +Block: 222 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM8Sk0BUQYvUDJTSC//////AQDyBSoBAAAAIyEDEV1Fnz7h+T1mFnKt5rmQfzQyPHUQ1+2t4ggDkaMcc9GsAAAAAA== +Block: 223 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE8Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC2sGJQbO4JHenGo2TZQQJcET2SFD2GiXBolI5/CuAU7ysAAAAAA== +Block: 224 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIk8Sk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECAvjkjnxZZ5iWH+/mxnKPN4D4g5CowExSUXPQpoi3S42sAAAAAA== +Block: 225 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM88Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDEuJepCVFIAzYpkz71pIQRcbXJntufmttiYSx4Je26desAAAAAA== +Block: 226 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNo8Sk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECLZc94YDLPFptsR2czEZhaZ+pcdPoLYYVJB751wF34FesAAAAAA== +Block: 227 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOI8Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECfG5yGKhAyG0ZcdqyJU/qSksw97f/IiRxi+V5VaeyOn6sAAAAAA== +Block: 228 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC89Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEDLtOWt889VoeQivkM0OD5gPvu4EZjsearjW+6aAktEIusAAAAAA== +Block: 229 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM9Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECANaEjBFFTE1JizLMEMoGfQVkfiSwJHqradz50PWbYwqsAAAAAA== +Block: 230 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGo+Sk0CMwEGL1AyU0gv/////wEA8gUqAQAAACMhAiRR64mo80zoSkOCKV95wLrA3gRJbNMCE9T0oxAIvcjYrAAAAAA= +Block: 231 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMQ+Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDcn8cAvoY/POn5kd0YqL63Ub6xgexr8TqR0Tls7wu60msAAAAAA== +Block: 232 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPA+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyECjWiw8RmTXPx4gsMqorvySezHazpv92KB9eZ9PHj04BqsAAAAAA== +Block: 233 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA4/Sk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECNdE1/RytMjMSHbHimpZmjabjB+8EYqZniTebq7N+ghKsAAAAAA== +Block: 234 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFE/Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDmekRYSKx5XfTCkyZVAdiP6Q4DTHxwNivraFaO97GvEKsAAAAAA== +Block: 235 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNY/Sk0CggAGL1AyU0gv/////wEA8gUqAQAAACMhAkHJPaTCsoHXiY2be2mOKtscOGlv2qpYRa79Jz7Vp3UnrAAAAAA= +Block: 236 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEBASk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeDF4XubIYSUDpx4+aosCmjB7gkUp08Nr6gs7QBx18N2sAAAAAA== +Block: 237 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJZASk0BUwYvUDJTSC//////AQDyBSoBAAAAIyEDq6NpbCSWZNlsn+fgnTEBAHEYnACZXZVzAmrrV+4Y4UKsAAAAAA== +Block: 238 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChBSk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAtyS1H1w3anahuWIOZyrKS1kex0IvtxmonHeXFfUWmEDrAAAAAA= +Block: 239 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9BSk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAlNuTA+BQrHA0LOtsgkwKzhzIuzDbyjyHdMgEQOc+ANSrAAAAAA= +Block: 240 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOBBSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDdrS5vHRcn6Akg58B/WI11I9TDq5rwQxpB87c95kCDOusAAAAAA== +Block: 241 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO1BSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC+sHBligYx4TtS+cWEZhv2wbBlXfUEPREeqnI5wWYNgmsAAAAAA== +Block: 242 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPFCSk0C/gAGL1AyU0gv/////wEA8gUqAQAAACMhAz5/DxQyf8ROkF4Pg2gD8MYJED0F/URrV0awvF4FMRKNrAAAAAA= +Block: 243 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ1DSk0CqgAGL1AyU0gv/////wEA8gUqAQAAACMhAvEL6Z0o6OqWZOUYN/3jknjg73MN6uEfYrO8U0szpYcOrAAAAAA= +Block: 244 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMVDSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDgzMUayirzRYw3yrhUGTSSwIKEH7UVviFj4UC72FDRlesAAAAAA== +Block: 245 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBClESk0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDsknmetlzUMelgrf+MTCgNbpc6IsOyW0170PjRJT2dFusAAAAAA== +Block: 246 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLJESk0ChQAGL1AyU0gv/////wEA8gUqAQAAACMhAuNLBd7+swlxHxCEeLiXEOYRW/gFQdlgwnIg1JmHbbFKrAAAAAA= +Block: 247 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAZFSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyED8NnbkMpwQSlCl2bnp7p9Ah38qaf/idUQWm5qElWt89OsAAAAAA== +Block: 248 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNxFSk0C1AAGL1AyU0gv/////wEA8gUqAQAAACMhAt7m1hSRY4iYKgdUxenze6Z4eKAe2wA3KD8ldqOw8IohrAAAAAA= +Block: 249 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPtFSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECoxw6WUVf3l0sGw5/qht59qsliYPKImFMIBrzITNSvbOsAAAAAA== +Block: 250 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB5GSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEDa/5HErDUCl+ilct1eVsU1FR8A3nFJHHBJX3myJtQuSusAAAAAA== +Block: 251 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJtGSk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDOfeN78x5nXPqNHxfujrEVkRbFrgKArtNuKQz4umMDMKsAAAAAA== +Block: 252 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO5GSk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgARqRE+dW6czGMxEd4Qp62s/tOtSOf2yfqTXLQigx/isAAAAAA== +Block: 253 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCFHSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyECGlK3+ujjmC3/bNJUwmrULEeC9wxE6uUTymGByu0Nop2sAAAAAA== +Block: 254 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHJHSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEDr1fLoRViqetDWdhvOnfoTg/YbqmCjZK6n5vUAjOHw1OsAAAAAA== +Block: 255 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJISk0CKgEGL1AyU0gv/////wEA8gUqAQAAACMhAiF850NCmPpCLZg6E1c2vK8Y12mh0SRqj5UHoiwegTE0rAAAAAA= +Block: 256 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN9ISk0BOwYvUDJTSC//////AQDyBSoBAAAAIyEDVsPykwKGvHLHzZXEaKdvUxqXECAP9vU1aEunYXrtTQCsAAAAAA== +Block: 257 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFhJSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDa7ISIXjuDKz+uNL5/TL3KYXhTFXj2qfjr02EURWSut2sAAAAAA== +Block: 258 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDFKSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA/VtPpHLdmU8spftyBYtXH857a+QxbZ/5G3YSxObE+lhrAAAAAA= +Block: 259 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDdKSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEChiMwbDSEP/9mZGdOsFD4JM/8Vhhu8zcqulQnDwtEhQKsAAAAAA== +Block: 260 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhKSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyECKsh+x8WJnVho7hFgccsYTtUwz0slkPW7SKfrY3QC0FysAAAAAA== +Block: 261 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEtKSk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDTn70G2FwjOklF1WM+0/h6OHxm6gEkcgB1gXdJ+wxo0CsAAAAAA== +Block: 262 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHxKSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyEDypCWFxqTkpoIgRo1OgVBTuxOMkz4n0IODvsmMFEG2kSsAAAAAA== +Block: 263 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAJLSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhA7Zo5osQ9NKd6UJNOmEqvjmveXdSUeIUkQHv7qSlQ6HVrAAAAAA= +Block: 264 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDZLSk0BMgYvUDJTSC//////AQDyBSoBAAAAIyEDfIBMO0DZ7ILWnWPjgPsbCXd2iCFmDhdnCL9+17M2bcusAAAAAA== +Block: 265 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKRLSk0BagYvUDJTSC//////AQDyBSoBAAAAIyECAMcAWmPnFWdAjyLXES99MTnr6TbIp9rkinzUOV0b04esAAAAAA== +Block: 266 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ9NSk0C+AEGL1AyU0gv/////wEA8gUqAQAAACMhAtK3cpic/viQVF/p4GRN7ZuuFbmka41cnYUgfhae21zLrAAAAAA= +Block: 267 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOZNSk0BRAYvUDJTSC//////AQDyBSoBAAAAIyECHZsSLy6OzVh6BTL+lnMJdJUFg/y+lNn1gQdFlQIu5iCsAAAAAA== +Block: 268 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPZNSk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECR26G1B7pkR0TbXpUbz0JJ3gA+J4ijsBy72VgfDV/xyysAAAAAA== +Block: 269 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBVOSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECuBY3aJnhxeMerlYihgEGBGF9vCfoypFS7Z1Xjm9P6I6sAAAAAA== +Block: 270 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPdOSk0C3gAGL1AyU0gv/////wEA8gUqAQAAACMhApd8Sk/3u6WL5vWSHaDvg3UUaZ604WHJfqODwT7TyA+QrAAAAAA= +Block: 271 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDNPSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDnBENVP9DDw7ClCIT+HHnwbXsUqh9MJ0TupDZ8rDdBoOsAAAAAA== +Block: 272 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBERQSk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7GPp0LHwkqy4FBy0SgDqXYhTiWEsCWs7GNqKgM1iYRPrAAAAAA= +Block: 273 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFdQSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECt+vOKLtL9wKpEUjVVVWrSsQ99sgx/YqV+8/CkUiY9HqsAAAAAA== +Block: 274 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIlQSk0BLwYvUDJTSC//////AQDyBSoBAAAAIyECs2+OzzEBWMfTShnFaTJnjEVCXava4psybbPWVrovnDqsAAAAAA== +Block: 275 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI1QSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECTZvPfgwKuXVlOrX5UJ54Mpxb4uVzFgSN7HYolgaJbMWsAAAAAA== +Block: 276 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKZQSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDU498ZAACzeVS1BhC1r6RWvBYcBlbiq9lLkteirNrzQisAAAAAA== +Block: 277 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHJRSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/RFf4WMmTOKzPGcvMS3CZmOYRCCC+fZzAFrhrULAvuPrAAAAAA= +Block: 278 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAtSSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAn4j+GKryGb9RE6dVgrP62b6Nq6hK3rEjZ+ZmLvWwOsNrAAAAAA= +Block: 279 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKBSSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhAu76Jj0FzhyaSUZQlcV3LuFbz1pOz1IfyvdlM4Oos8yHrAAAAAA= +Block: 280 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFlTSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhAs1FOotXlgkLRDgWQU/yi/aE0U8U/zQpR6PbM6pu0q4hrAAAAAA= +Block: 281 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLBUSk0CUQEGL1AyU0gv/////wEA8gUqAQAAACMhAkdpln3V9AtTGVHXI7VTPBdGiI9Rnb/wO28AHp//mHFnrAAAAAA= +Block: 282 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM5USk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDRMzrgAFXp9wnzwC8uCQqwgnar1WobSiC9WzGZNzfXVasAAAAAA== +Block: 283 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG9VSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA3j5R+g938N7rDkoun/hCAMimKYCp+86cJn/7z13BjXWrAAAAAA= +Block: 284 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFpWSk0C5gAGL1AyU0gv/////wEA8gUqAQAAACMhAgjV9Yp7qlyyUjp5/dIb2fmwXBp7gClhYOOpnlKCdQHSrAAAAAA= +Block: 285 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLlWSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECcSk5hCxpm5aMlEGVoaA9RywmsnNHrssmAsRGksFNnT2sAAAAAA== +Block: 286 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRWSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECv7BfnETqQMg9qkxrz2QfCbDysKg25BOhNICvsMqjw1ysAAAAAA== +Block: 287 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP5WSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyED4HbHp25RfjeF4/IL8+qUbozO7SV8OKJ4XkJ2OZmx+9usAAAAAA== +Block: 288 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGRYSk0CYgEGL1AyU0gv/////wEA8gUqAQAAACMhAtEEIYRvVcin+cG9/gPyEcuYrmfYMyuHqS3SzgnHr5ddrAAAAAA= +Block: 289 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN5YSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEC05rigcMpbb2gI6UjOmpb/88BwcYraM/jY2DxyM3FJmesAAAAAA== +Block: 290 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPxYSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECYiGYIUzxQ9c4YeyROSxocG03qkh20EfIbzSHcErfvZ2sAAAAAA== +Block: 291 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA9ZSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyECjyOgf/1GIcunyn0Cfe3RSX+sTQvyqAi7qJY2IPQ3bgqsAAAAAA== +Block: 292 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHRZSk0BYgYvUDJTSC//////AQDyBSoBAAAAIyEC0V1OVIMreuaIkQHBRjxouu1+JiPFsRewlyid9DhqlC2sAAAAAA== +Block: 293 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPhaSk0CfgEGL1AyU0gv/////wEA8gUqAQAAACMhAxu9yrpjkeru+WGSNSNnYZsFVyczB75DrMuFS0O1yfCjrAAAAAA= +Block: 294 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1bSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhA0YYJPx+9uCN8vVD4mM5yy4P1OuyBMGfQWXC3hHWShEprAAAAAA= +Block: 295 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9cSk0C/wAGL1AyU0gv/////wEA8gUqAQAAACMhAsPL3L0C3ePoQz3QeR49kSGk172zGa8GOtvgXF3j8AsLrAAAAAA= +Block: 296 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhdSk0BdgYvUDJTSC//////AQDyBSoBAAAAIyECGX/6hW/UpcmWJHDxEiKvpWKpxfMAM0UaWGEZX90iA96sAAAAAA== +Block: 297 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHddSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDDkC6bD0vBFNhdHlq71Fra3jvriynTUE+Tf8VCLYcE4ysAAAAAA== +Block: 298 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMBdSk0BRgYvUDJTSC//////AQDyBSoBAAAAIyECV+oP9slNLFb1OX8bo+r1BWGUuIA1T7cz+9WfbiDfyQCsAAAAAA== +Block: 299 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMtdSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECT/h+SGj1AvaJDPeLhBajxkANRuZel1P/8lBAXGHmxB2sAAAAAA== +Block: 300 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCNeSk0BVwYvUDJTSC//////AQDyBSoBAAAAIyECUDdwpPmbGWv7WSTQzccC+ZGKRZMQMw9ueAQebmL/Fm6sAAAAAA== +Block: 301 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDVeSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDShd/ShSrI5j25YHL6AdMyynwXwPLE7RA3zih+25NfPSsAAAAAA== +Block: 302 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKteSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDm5d0lWNxKRpg4haXTbnqyGGh4TkM6vqhwN5cKO9uET2sAAAAAA== +Block: 303 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ5gSk0C7gEGL1AyU0gv/////wEA8gUqAQAAACMhAxNe3FaWa8OEIOs7vES7Q1oobsGXPC+ZdrkgxtAxIxCGrAAAAAA= +Block: 304 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI5hSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhAiND40HQsVyLEQ9MBsuL2VRt2j781ePe+RlnqwIjCn3HrAAAAAA= +Block: 305 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNlhSk0BRQYvUDJTSC//////AQDyBSoBAAAAIyECskvdq1owUIMtUU0/wCJxztKXIn+SEb9h0o9tmH8Dbk2sAAAAAA== +Block: 306 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBpiSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECiHXTU2Qrp89KYrw5yarUE55ZxOgJK5p4QOC7f3Li5jWsAAAAAA== +Block: 307 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHNjSk0CVgEGL1AyU0gv/////wEA8gUqAQAAACMhA+bmB9+1FT/JHTSR0DXe9L5qTZMUGMkeCyAqvAh9x33GrAAAAAA= +Block: 308 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMZjSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyED04A+WhT5nJIlRChBs3K3PqoDj3GKt6Xs2ib+bI0EQlasAAAAAA== +Block: 309 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDZlSk0CawEGL1AyU0gv/////wEA8gUqAQAAACMhA9sulRR4GAhwIIoWySbA7Dv8JiHu3R25D1UuAZgUdmnBrAAAAAA= +Block: 310 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDtlSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECRAZ0utIh6PixGzYmncAGio8s9Er18UDGf8YOrr9qkC+sAAAAAA== +Block: 311 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMBlSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhAp2lvs7yS4KPZo+Rzl3O5r2U8zxJqx9BAe4RNWejmdmRrAAAAAA= +Block: 312 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChoSk0CYwIGL1AyU0gv/////wEA8gUqAQAAACMhApggy0FpE/aiEX61RBVgGj/jLyb+aEJkkApHWkP8SjlNrAAAAAA= +Block: 313 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDBoSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyEC1RZXAXheb0vne7pyxo0wJ+6gdMp8KrGy1ogtsA90N5GsAAAAAA== +Block: 314 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDloSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDu6E6EXgrPYWgrmSNq2HKl3o8Huo6YETBMtmnEkv4jh+sAAAAAA== +Block: 315 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKJoSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECn0ZcxFfxFSVd1QxxYiQy+4Xr4WgsyIV+bOGMSNJoxLOsAAAAAA== +Block: 316 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK1oSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECDR8TNLIw3DOojCFg18iSDPPyHd5Hr0dY4xZU/AbTpCusAAAAAA== +Block: 317 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBD1pSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAx/cpRd4jHhU40CZ3Tt09V6NV6fRnY6oops5AaK9hFkHrAAAAAA= +Block: 318 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBExpSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDWz3ypJACXosV1QLe/I8ajC08ezpMgRdpPO4RCyt0oP+sAAAAAA== +Block: 319 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRpSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDEQInMLJ9QQ6q+X9sFucLwJ22KlvRzbpgCcd0bRFvMdasAAAAAA== +Block: 320 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPJpSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDzDSFi5e6rt2VKVQUkHqaUJtMy4mH3KJzocE3/EqmW9msAAAAAA== +Block: 321 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLVqSk0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA1wQCXL/jFctyA6qFalYq5kGTXxrnlXw5kCN7BHt1N67rAAAAAA= +Block: 322 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPdqSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECYcgeGzWMxdkmN3wHj3FqGdiqCZ/s1gvDeaiJl6GW/m+sAAAAAA== +Block: 323 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBANsSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhArOwhWKN7fNEsylQYOs9FrELB8SbVvlhYfyWK1AIUYPyrAAAAAA= +Block: 324 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA1sSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyED6SIqWnTyJt0LeaMotEXe1vnDoifwcnOYzQ3GYPtKBbSsAAAAAA== +Block: 325 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBZsSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECW7o6ef/zh8wZx+wqvW+PGW49b2dGgXC3Olhnx8pUaWusAAAAAA== +Block: 326 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHdsSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEC54WZrmPKmTwjRDgZxaPojONpKtkTfLE1MDfDfNR7So+sAAAAAA== +Block: 327 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI5sSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyEDjSNUWZW6G78p6QlDKas3EGrj5TtxwcWmCpdLrLQ78CSsAAAAAA== +Block: 328 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ9sSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyEDzm4l+afXBIHj0t8M3TF9aBPC0y2yb2ShJrweti1oJ8GsAAAAAA== +Block: 329 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCxtSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAq+s961cy+5zZRwWiP64GdvmGWaCNG57f8agT/pQs78OrAAAAAA= +Block: 330 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJNtSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyECeYMamvcTAjuxTSHsVdyGrWsBE+DREQ5pcDlZFwbdJOSsAAAAAA== +Block: 331 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM1tSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyEDd/5YWLMVLlnl0XfU8rV5PwVj48yLh1H0H+xLZX1pTESsAAAAAA== +Block: 332 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOltSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDE9MeitjuD8RJO44P/dQhK8nRfb4w+WbPJQBn3TuQbyesAAAAAA== +Block: 333 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG5uSk0ChAAGL1AyU0gv/////wEA8gUqAQAAACMhA7TFGsk9cOJsjGgjkZUqCZ1InChkARUKbSqHyGXzb8WHrAAAAAA= +Block: 334 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAlvSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAgkQvHJqWPZWjZhL3O8FWochVbyoXZvKo8mRAAlsubADrAAAAAA= +Block: 335 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGtvSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyEDToi/gEVC+9ATssGR+xe8TrEGe7xT087HDfTpEaFQ4JOsAAAAAA== +Block: 336 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL9vSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyEDpcbNO3Den8ygi53GyDQNLhsM0AFsemnf+q5+f1SZ3TGsAAAAAA== +Block: 337 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRvSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDjTbrEyBGn55+QMdhMTW0ALOjMiBxJVdTv7O8vjz0PbKsAAAAAA== +Block: 338 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNxvSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyECv++suofydbTR2BshSi4TFSv9weOt3ziWGZSuXgyzsEesAAAAAA== +Block: 339 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLZwSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA7QLYU686ntrf/wH45PCQjghwcPS0KP7GuUWIrqCcE+lrAAAAAA= +Block: 340 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMFwSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyEDqkfWcPmElLwGnloEQGeiJaKbvS1ttNJcSJsrwc4t9FisAAAAAA== +Block: 341 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEJxSk0BfAYvUDJTSC//////AQDyBSoBAAAAIyECnfOs+lLcdqrdzKNb7tGW6n++dVtSQ/Uz6mTcWZwsHhGsAAAAAA== +Block: 342 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1ySk0ChwEGL1AyU0gv/////wEA8gUqAQAAACMhAj0hDV0TQPXA4+ZuWecJc39kBtnueq0mwtFSnezLLUv+rAAAAAA= +Block: 343 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH5zSk0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhAtgsz0IPBasVvf73ZzDk/OUgRonWeLSaOTCswNvd48zdrAAAAAA= +Block: 344 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAB0Sk0BfQYvUDJTSC//////AQDyBSoBAAAAIyECcEHP7r1zbYuawJrt6no2y8N8tnUk9Mib+I/26ZgMoAmsAAAAAA== +Block: 345 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBR0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECAfxLln08efJ1y0XyGJRaEiNLIUELSr/LQk2DOL63wDCsAAAAAA== +Block: 346 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDl0Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDViUFv+39ptdQjCVo0V3s5b1sna+2UM37QPdSQEGR+KKsAAAAAA== +Block: 347 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNx0Sk0CnwAGL1AyU0gv/////wEA8gUqAQAAACMhA7W6nNXsPLrQGlqXYLjbrH4QA7Yew5XzfwgmmJ3++u0wrAAAAAA= +Block: 348 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOJ0Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDjWYOqswb4F95Qu4QnQD73TpcFfXYuTI5UHMx8qONuY+sAAAAAA== +Block: 349 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJ1Sk0CuwAGL1AyU0gv/////wEA8gUqAQAAACMhAvUBO2CyHCfprywohcYCrObMWDjWh4iGylfRt42/1Ke2rAAAAAA= +Block: 350 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNB1Sk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDY8Id8oMz8KkrFlWs2zYsO5n/HftyDzj3GKHxJ9V9CiisAAAAAA== +Block: 351 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPt1Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyECpw3MG+iKsTO2dOw/kPpg2bYgLtbrx+NRY3tAjb+cTVasAAAAAA== +Block: 352 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP91Sk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDJcoHYbHrsuX1EfRdUswfmhHkLNFPDIkdzadoUN7QPEqsAAAAAA== +Block: 353 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH12Sk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDHumdK3hqs7CZEyXy3oSJJGpqP9twD20FEbHYDPX0zUOsAAAAAA== +Block: 354 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJp2Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDHqOre8xHkf6rEaOlIqsM4UBRkFatZaXfGW/BGLvg9CusAAAAAA== +Block: 355 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCp3Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAoKaYUbtTnM73y3uxNDqKy2EjGcfb32Ucwh9Md77ea1crAAAAAA= +Block: 356 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF93Sk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEDBIr7jOb7aJ0a/iUHTn7M+cx5guxmfURqOuKR91Hfm5OsAAAAAA== +Block: 357 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAR4Sk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAtnHD4P5OuLMEOMkwaIhv/0BZgFPVfwHf+doYzMyMdTbrAAAAAA= +Block: 358 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLl4Sk0CtAAGL1AyU0gv/////wEA8gUqAQAAACMhA0dcBAU1zrAGZtQrALMpjf60ui9Aio1qm+lL9lzAHraVrAAAAAA= +Block: 359 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDR5Sk0BdwYvUDJTSC//////AQDyBSoBAAAAIyECu2AGwvBdGHsRUnGxV3tYL18ftxBRiUhHSPiZ31qmXcWsAAAAAA== +Block: 360 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDh5Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECdJAbBaGTd0AVUcdVxiIt31Liw14t1rADGJpqXUlSbvysAAAAAA== +Block: 361 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGh7Sk0CKwIGL1AyU0gv/////wEA8gUqAQAAACMhA9D5EgGSNwefKx9VG7GdxvuZGSqjQoPzZM2jAI23Yo1YrAAAAAA= +Block: 362 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBN8Sk0CpQAGL1AyU0gv/////wEA8gUqAQAAACMhAxGnoExVuiond8iy2n41H7oZmGcEX6VQWZz+3O0c9cXprAAAAAA= +Block: 363 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKV8Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAky76WsHdHTJbAkvnuv71R2saHBNel6F+sWbfPnJ+TyKrAAAAAA= +Block: 364 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKh8Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECwZ+K9C9cBS1I97OKfXeQJ5tvV2pyVJBYOT928W8+IKesAAAAAA== +Block: 365 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNF8Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDPW+87EPmSI5uMg5P8lfuj1SXRMdSzCHcu3EnOKEaTh2sAAAAAA== +Block: 366 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN98Sk0BCgYvUDJTSC//////AQDyBSoBAAAAIyECmpEQKEnlGICR+RkxXGObpraJYmDOMJRTixqGZnZYADmsAAAAAA== +Block: 367 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPx8Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECLTqckuVJ7uIQT0VfNhCToauL6WpF8Ou/lrtUqn/k1+KsAAAAAA== +Block: 368 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJt9Sk0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAxyoEW56li5Lxiceziox0uHpnsRqAMLMJFxCOLte8oCBrAAAAAA= +Block: 369 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNR9Sk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECsCKD2KHnlrbyu6WUGTT4JIEZZvQMv9PmvEbRwSoD4DCsAAAAAA== +Block: 370 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMp+Sk0C8gAGL1AyU0gv/////wEA8gUqAQAAACMhAoIdJ/fOa8RZvWU7iU/aGUaiOrQCMgKT5ZMJb2Vjk6SbrAAAAAA= +Block: 371 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNJ+Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDMXygp4z7PzMk9L7OEaGTetj4XOyHhWB29UHISJMqUIKsAAAAAA== +Block: 372 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP9+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDVX1IbruQG/FSHMZBck9prAvpQODDfxT75baRcm5iw2KsAAAAAA== +Block: 373 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBB/Sk0BDgYvUDJTSC//////AQDyBSoBAAAAIyED7q6wlz4R1zS4FOXOMyh4RLvVCAQ8AldHstZlA6PlZe+sAAAAAA== +Block: 374 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN5/Sk0CywAGL1AyU0gv/////wEA8gUqAQAAACMhAu5RJpSItwynYmPLEtbLfLzyCaG8cyfnEx8VTm4LOk+brAAAAAA= +Block: 375 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO9/Sk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDH/sHLBmnyAmHAmSlPZLUclfVIzBOl1ZgxCXL6yX14MesAAAAAA== +Block: 376 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG6ASk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEC5GhzlVJNLsDjLR/rP04KbenNO/6fkglYm+N1Wuo4LwisAAAAAA== +Block: 377 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDaBSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/kTeZISeowcv6IKrLBhWHjeB2wqtRN4gvvHh8CmHR+trAAAAAA= +Block: 378 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCuCSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhA9/eKmncdXdW9oiyDggTgYtgoZarW7FmkalS/WmZTHnprAAAAAA= +Block: 379 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMqCSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhA+zqQs/smSu3+uNnC6Wfr3epSEQDCasZgNQ221DSkdYvrAAAAAA= +Block: 380 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNKCSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDlg7ykxqE16PC4P4V7m7mW+KY7t61w2tV1aq/4EyVrdSsAAAAAA== +Block: 381 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGqDSk0BfgYvUDJTSC//////AQDyBSoBAAAAIyED2sP7jeQJZfQvtK+zuqB9MwS8KqKM/CXxK1LxUjaBRR2sAAAAAA== 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 +Block: 382 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJSDSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECyQc/AvZwyrHTCiSHE7OVE3hiXYaMb6HcDqixfIzW5AusAAAAAA== +Block: 383 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNiDSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC76d0dqCFNEIwEJdooWxlngL6mw6wnOzB3G/MzEq8qAmsAAAAAA== +AQAAAAJDTSsPKYh0w/bYRnwH3qaIOmUN4A1IKYzW+0joMi4QWAAAAABIRzBEAiAr8Xh4YIOG+y576Bs5z26mLrlAc/tSCVdA3AoYdZ6eOAIgPmpvra1X7KfblGuLSMBoyHx6m68HXlsomUEWwrMSa6oB/////+c5F21itYhWavpH9fu8DsAao/BYwDbKDujzzRPkIj4BAAAAAElIMEUCIQCiUWkgI7wj6Ls2yBHmgQoCSA/shxmxAnBLCnlimmuvmwIgJpQT7kHtd56+dMGlQKwc0knzs823gDNzP1cirD63EToB/////wJAT8PtAAAAABl2qRSyIFpNvB1YfF0Hdpl3lisXPqtQdoiswJRIZgEAAAAXqRRB+2UE+LyyggZZYYT9QKXtQrzlPYcAAAAA +AQAAAAJsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgAAAABsSTBGAiEAl0A6zPd6BxFwZo+o+MJIyjIeDRBNW3IC3DXAoWh67MACIQC4o5tDaAYqIV7qU/+lm3dRIIEiYwZ3SNPge1XCDegKWQEhApcd1yLs7nu8PNvIxqc2XbdBErbsQTarPVdzS9gNeEHf/////6ru+FspdiLs8xHcXSlmn9TjhjRUxv7qNh7OT1R7pS5qAAAAAEhHMEQCIGQTIa3I+y5klSwSm2zDINek016Q8pokSLGPrELPIZXDAiAeLkfySMQvKc2L0/DtY9eXCYud5hIc57VEkDZfxXNcjgH/////AoBAtigBAAAAGXapFLyfR0jI5kmy0HcomI7spk3zCtfjiKzAyq0qAQAAABepFCkLujKkkxV4mgMLtAsAR/j7kP9mhwAAAAA= +Block: 384 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHGESk0CjgAGL1AyU0gv/////wEA8gUqAQAAACMhAjEGa4bqDL3auhqvd6WOXyPzubyhsKYufOFrPP0fx2yXrAAAAAA= +AQAAAAKONDBXPP3i8+Huzorv5mHdhBvLZl01gyQVurT3UmeFIgAAAABJSDBFAiEAnMqPscSjSYLE6aWf0VhWQEwCCF+SYEPPxmZJJKW5420CIFgR+Fs5XENJIWS4szhn10UhHYx//c0bKI5W9029rtFbAf/////jq/WYGhvWRX7Azcq3bMKhdtwNfhb203ga68aE8TzE/QAAAABIRzBEAiA4e7zumeNw6iEV6sz9jEjrOAZTMDtmxpRuCQP7C7xvhgIgKy7wSFGdRVJUE/ZLcnodhf8s99katGBzCCJLTDDVhGgB/////wJA8fI6AAAAABl2qRQiA8pZ7fZpaXV+bMkjixs29Nw1uIiswPIYGQIAAAAXqRSeshmA3J1BPY6sJzFJOLnakg7lPocAAAAA +AQAAAAJzosVNU2wZ8NCRVu+60Yym+WsenzvISQNClY8k7Y/DLQAAAABJSDBFAiBMhuLgS149dvF38s3XyBcLJctyfM8cmxTOkmK2vGfp0QIhAPp2suH3JfxZ+04h48HWZ40QgcHt04ESfQJjzRuypfBTAf/////oBzpcCoD5jhX8Auz9GV1ioEUEKyc8ZVyLNg9mYOjnIgAAAABrSDBFAiAtloB14eFcqB/nJUQNxjV+AgMBlyXDygW3fL04vMVdBwIhAMZAhqcGKbMHV4U1XYtcVXdyvsnG/JZiNfkwUw0ympNkASECOZ3dTkuqwZZe/E2IJlbySGa+FM9bz2QiIzTx/dWSBIH/////AoDi5XUAAAAAGXapFHzHj+QlGySumyOjmeIWCHnxiDNiiKzAXuOhAQAAABepFONxeCWCpK3bVBNixVVl0s31b2SYhwAAAAA= +AQAAAAKjDj8UKb8qjtFMpuyfM5a4WTuLtqweTTW9Q18FBYCU6gAAAABIRzBEAiATvXKkQqFB1YzKA4QXAM1WETClMNONxQymJ4EMqf6DbQIgZpBxlR1C+pCwJjN1I+H/PKQvojKsHUp3ZpLoXXBjjJYB/////yQ1aPL/a/kDhqTXV20jzZIqgpx9mK0SUdeNnlGk32HyAAAAAGpHMEQCIGom075AfeA/vSILSItlgz4/T7VRZM1a69VJr4UGADTVAiAjOn1iq3gqJGfXl+IHbwQ/lgzkqx9gfCkiuxRlhPyrZQEhAsukzpMrON2dpTZox4fT/D0ks37RFtlrQsWIWFqGWf1W/////wLACT51AAAAABl2qRS0Qdm9GwTXUvkfFNxk7Xx7eu4TT4iswCh+3QEAAAAXqRQJ9wuJYWnDeYHStUs3HfDYGhNqLIcAAAAA +Block: 385 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCOJSk0BYQYvUDJTSC//////AaB4ByoBAAAAIyEDumW4wKCi0CnkzevDkYheRm5ly9+odjj4tkYNDSvo1aKsAAAAAA== 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 +Block: 386 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDKJSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDeTdOC2CP5ahK99R/fs1AWCY1BuzhE4oiDZ/tLY00/x+sAAAAAA== +Block: 387 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHyKSk0BLwYvUDJTSC//////AfA7CCoBAAAAIyEC9BAiK0EeqqMVSmZ6mkClvJ3+6BG153J0iJPKHv1EUl6sAAAAAA== +AQAAAASxJMyn6WhjdTgMhF0P0ALtcErvRHL0zBk/ykqhs0BNpAAAAAC0AEkwRgIhANPJunhkiDI8l1/mFZPfaoBBxUQnNvNhiHq/5clxdccrAiEAymFoj0cvTAHt4F/8UEJtaNs3X3KTe1851ng1sZG2QC8BTGdRQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZIQJ/EMMcsq1+A4jPUYeSTxKUCCul1MaXu8p/2Dpq9h231VKu/////7EkzKfpaGN1OAyEXQ/QAu1wSu9EcvTMGT/KSqGzQE2kAQAAAP0VAQBIMEUCIQCjW3/BlzoKiWLCQKcza1AeFJ7xZ0kQgejfkdx2H06WwgIgBO5NIJg6HQ+5bpvt+G3gO2bXvFBZUpWx+ztf0nQN88kBTMlRQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZQQSVti0edqkV5e02lCmMUBfSgY0irL8qi9n6TPY1GE4VJH3H4aSL64LB/d3DuErFjOwSyPi5yoM0GskCmcaX/JTLQQTjOU8+6kC3q+MvStN2qA9aITKH0TYbVYDj/nDROl2wZm4lkyg7a1q8AdmM//VnnYw2t8rvocTfgbELxFw4Et5fU67/////sSTMp+loY3U4DIRdD9AC7XBK70Ry9MwZP8pKobNATaQCAAAA/V4BAEcwRAIgYG1hh+Ct5pGS9KRHeUzau46ppOcN8JqovGiSQsf/7e0CIEFl7I7fyd4Z2KlOX0h8igMBh64WoR5XWpVfUyqBtjGtAUkwRgIhAPd2R2PRd1f/3to9Zs+qatO491ndyV6Pc4WNuocnYmWKAiEAnpA9UmWV/51tU4NYidgW3kxH14Nx16EyI/R2ArNLxx4BTMlSQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZQQSVti0edqkV5e02lCmMUBfSgY0irL8qi9n6TPY1GE4VJH3H4aSL64LB/d3DuErFjOwSyPi5yoM0GskCmcaX/JTLQQTjOU8+6kC3q+MvStN2qA9aITKH0TYbVYDj/nDROl2wZm4lkyg7a1q8AdmM//VnnYw2t8rvocTfgbELxFw4Et5fU67/////sSTMp+loY3U4DIRdD9AC7XBK70Ry9MwZP8pKobNATaQEAAAAikcwRAIgdcBmbUE/yFzKlOovJK3A/ttho7oPz7JAwaT9JYewO/kCIFJa1Nksa/Y1+Ll8GI6/SRxuNCt2elQy8xjLsCRaf2S+AUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmf////8BoCneXAUAAAAXqRQdnKce+jbYFEJOpsoUN+Zyh66+NIcAAAAA +AQAAAAGUV+Zp3Gs0TACQ0Q6yKgN3AiiY1GB/vfHjzvKjI8E/qQAAAACyAEcwRAIgRA1nOGon1nduECuCzi1YPiPVH4rDu5R0m9EMA85xQQ4CIEG0bF1GsU73KvnZb7gU+olAd9U0pN4SFTY+5o+41PUBAUxnUUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmSECfxDDHLKtfgOIz1GHkk8SlAgrpdTGl7vKf9g6avYdt9VSrv////8CUMMAAAAAAAAZdqkUYWeuruxZg2siRHuK8sXmH7Txt7CIrACj3FwFAAAAF6kUnrIZgNydQT2OrCcxSTi52pIO5T6HAAAAAA== +Block: 388 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKGLSk0CHQEGL1AyU0gv/////wEA8gUqAQAAACMhAwX9IJKSmlcapcG4YDQm05VDWbbhumnE3UuFJurVG6j/rAAAAAA= +AQAAAAFsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgEAAABrSDBFAiEA2eqQkvC+WlQ3MHYZM3373Scyzz8j+Zd/tDW0pbS/RmgCIAw33THNfTjV9LmgDHUekFk1b+8O1OiPUqdbTnx0PzRNASECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhb/////AsDOGB8WAAAAGXapFCOVLLskny8m3VZ8LoNF14XGNUN+iKwA8gUqAQAAABl2qRQyBAF4xc+ByyAKuZrxEx8Yd0W1FYisAAAAAA== +AQAAAAEkNWjy/2v5A4ak11dtI82SKoKcfZitElHXjZ5RpN9h8gEAAABwAEgwRQIhAOmPoLEPUZJMoLIdyy8enTg7ZSzi9RkWyu7x5H0T/2ekAiAmy5/zI82unted3YKaDMG0nJN0wmKT9U2RnLbcX48K4gElUSECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhZRrv////8CwNinAAAAAAAZdqkUSy0ZmkDUiL5v5TBaHUX0kFOvS/6IrADyBSoBAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +Block: 389 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAuMSk0BZQYvUDJTSC//////AVC1BioBAAAAIyEDJGxAijhRNKm/X0EFXtwmUwawz0PM+8WvaeoSnQegJsmsAAAAAA== +AQAAAAJSJqjPEi4VVb4BqQCCGW1UhFTnPFG0i0G7IE7FOPIZ9QEAAACMSTBGAiEAuW4v0gFbs/4iwjxxLDrEqGNtSnjffWabq9ZOq6MUwjYCIQD0AtfjOS0XcM4r4Mgj6rASK7g+4L1l9d5Uof61PkUu7QFBBMS+5ebbtcFlFDfLQ4bBUVx3dsZFNQdyBMbyTwWjfQSjK8eL6yGTtTsQTJlUxEsM4Wi8eO/V8eHH251sIbMBZZn/////cRmMYXCfjZiDFfRfo/kWCnDwUlX72tDY+6yriJwASNcAAAAAa0gwRQIhAJLpb0GF/Bu3S02cJYIZ3F/8ca+0PnPsDni92RuvvjhuAiAZ/Fs9lgIAW2H13HXnvU3eHBmgcAwKeVhQNSgBTTkBkQEhAidOrgHTkbvsMtS2DiTV0k+cwjyo2mcIz2wGI4G/pxAG/////wEA8gUqAQAAABl2qRTb+JUJF2qXXkHQTMCvJM/I3kOUqYisAAAAAA== +Block: 390 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFmMSk0BSgYvUDJTSC//////AVC1BioBAAAAIyEDfDnB8DlD9eTbYyQ10IiEdqtdt+iuGlZQ79UD9qNfIXusAAAAAA== +AQAAAAboBzpcCoD5jhX8Auz9GV1ioEUEKyc8ZVyLNg9mYOjnIgEAAACSAEgwRQIhAJBBmeGlaJDYHZVXilP7vGU7cdJTv3r7amIwhMR/d2oiAiBLCE75DLf+MR9xDlFsEicgKLcHFnZ9oJKTjUE1kaobhwFHUSECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhYhA/SA8bZI0NUWeAStTVhuDnV8wz/eDhM/0DbkXWDS21nhUq7/////cRmMYXCfjZiDFfRfo/kWCnDwUlX72tDY+6yriJwASNcBAAAA/UgBAEgwRQIhAKw06INxKPXAIAp3h4XdxMp4lNsgehkH6l8Hvg+qU3gHAiALmCUQrc2gBtRykbvnIMXsTxqmZl+ussn02o7Kgu2dSAFIMEUCIQC8Uuohl7lOF/B+vPq5rc8Ngog0SbkOG/FKc/VY3dToDgIgUkflx+QlIbxHuyHr83M5oGpBvQF4NK+EpHKPVegLxt0BSTBGAiEApsB3UUPvfleMYVn+Ln/0B1PZYiMLilAq0xqY82mnfLoCIQDgTVrBnqsoV8PEphIESZBCtZ3j01qvPjyNvws2yzvgHQFMaVMhAsoqgQqxckm2AzoDjeVjmDiBtAaScBg/PAq6lFZT5EIWIQP0gPG2SNDVFngErU1Ybg51fMM/3g4TP9A25F1g0ttZ4SEDwYEx2N6Z1F+3KndMqwzMJYzSq9lgVhDaILmiMsiKPLZTrv////+yyBJsy4LbegArWg61VwLSRQwVwpcxOUYPwsu8yK/XEwAAAABrSDBFAiBhi6lNXcCQCSQGyymONwRsC0dtDlKax/X/Z/HXZKJ81gIhAOl6XNOJyFP9l6HLVkpn9ka2xi1Y8H+2/MbxK+ksTOEAASEDEnxLvPb/FM/YU7+SF2lxMIy3shLaKORrKJ1ERMQhXlT/////ssgSbMuC23oAK1oOtVcC0kUMFcKXMTlGD8LLvMiv1xMBAAAAakcwRAIgARPiavSxwFKjCTfQpdu271OiaQMiwWa1c2soASiVUlECICoikRfdzJJoZBcygWBPfIfgoF4iaW5V4gXntkCti64hASECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhb/////UiaozxIuFVW+AakAghltVIRU5zxRtItBuyBOxTjyGfUAAAAAa0gwRQIgB9HtDBH9oIsz6+c+OdWR27B2zo6Z8ZhPxlH60Yzol8cCIQDgtVEqPco7rZ4LEqPzsF487AA6rT0qNti+K4OhzoofWgEhAr/BmwSVNL5aaSq0IHiWiAfDuHu1DKR330rNKW4p5RVz/////7EkzKfpaGN1OAyEXQ/QAu1wSu9EcvTMGT/KSqGzQE2kAwAAAGpHMEQCIEnw8K/fx/3SDZ9lT+ozvSqcdZ3kkVnpgoDVMeXkyxWSAiAc2Vz/wIYiwy8Q3uzcvAbj1Uhjg9BfdDAXmjSJwKBkxAEhA4c2LbJ9I8veyiFmSLo7pRnVO3dqYDHPjucKh5ODqZ1x/////wLQ3QYAAAAAABl2qRR+my2sJ4obHRDml7wpo2A8Cy43pIisgHN9SB4AAAAZdqkU2/iVCRdql15B0EzAryTPyN5DlKmIrAAAAAA= +Block: 391 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI+MSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEC9TSrbZ8/QJobDAd6MZORdK4GdzdThyfnkyXDILNNmn6sAAAAAA== +Block: 392 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFKPSk0BOgYvUDJTSC//////AVC1BioBAAAAIyEDvoTLWezyb45BZ7zEyR3Us3sUS0mYCzmelEbXIY64AUesAAAAAA== +AQAAAAHOQV6rnLo1SuBCwirJ8Gwaadel26ZxNvq++T2C83TdPgAAAABJSDBFAiB3NTA++3Fv5asTpCQePVx2VWuL5ToC8wKbhih4iuS8igIhAMZyNEufv2E8KRo+dfJfmzBLeevpe9ryVLihAw4NKiLiAf////8BAPIFKgEAAAAXqRQpC7oypJMVeJoDC7QLAEf4+5D/ZocAAAAA +AQAAAAGDKMjO0oyVqz+XgfONl6reqgfFgmf9roJ6x8plzhnwKQAAAABrSDBFAiB7cPcRvrTWTdVObIsT4VYcgwJdynx08WdNHm99d1PgwgIhAPJAUfw4vVIT147Ze6bYJCz+d6m+GcuIT81RaeHrRQKJASECZmcCPB/PiNe87QJpmXx7gTbPIOmu3oP/WVFORzQPHvT/////AYAaBgAAAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 393 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIGPSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyEDNpb7mdoBVlmuNermDC62XfiJkUfwG8ur8R0qSulSX4WsAAAAAA== +Block: 394 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM6PSk0BSwYvUDJTSC//////AVC1BioBAAAAIyEDn+iPQp+cSxRdE0IKHAFZmt2djOluPWsZhmm1BjnavT6sAAAAAA== +AQAAAAHkoS/eVsA+6hrLXrG1fTWrHablXVROghLEfOJ3QWsbPgAAAABKSTBGAiEA7es8koOmJhXkaSVtgxuox0Ggavk/t3eKgZp0LwcMRpwCIQDrYPJhNBhf4pz+OvDnT7vMhX+UrcxmFmDdjF2VPlotbwH/////AQDyBSoBAAAAF6kUQftlBPi8soIGWWGE/UCl7UK85T2HAAAAAA== +AQAAAAEARQQA2oX+EPd8W3TQYEMAO8TVxDpZyEeAEdKBR1IaXgAAAAAmJVEhAsoqgQqxckm2AzoDjeVjmDiBtAaScBg/PAq6lFZT5EIWUa7/////AbAuBSoBAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 395 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPmPSk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDOcEdldIyfNcAZe0ChYQJazMtYhbi9QeycTlbwnTERmisAAAAAA== +Block: 396 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA6TSk0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDtvkQ28+OY54ki+oXYvWa0fw11k8vxB/B4cMH7V58twOsAAAAAA== +Block: 397 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPyTSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECx9UHjpCRe3FVOjaiFqNnSgnF3v2HBWMDbbwmwU43LEOsAAAAAA== +Block: 398 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDiUSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyED6NynJo7IyuATbKSg3y1fpVP8O+mZS7AI0jEGsnyk6TusAAAAAA== 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 +Block: 399 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOSUSk0CoQAGL1AyU0gv/////wGADAwqAQAAACMhAwWATENJI4LZrxPmcvXDkIP4oILvDlNtpSIe3aTmbHs5rAAAAAA= +AQAAAAEYemFomu6WB6jgRLcc5wLhLo93JCrQbCIQVqLmKvjenwEAAABvAEcwRAIgMUBB7UkPFcKRwpQ2ppmrQEqAddlVGHWCxYOxDT2CndsCICAzb1oew8QRUfeL0wN/tUn1kcW4SC1a9+QYVf182CmeASVRIQLKKoEKsXJJtgM6A43lY5g4gbQGknAYPzwKupRWU+RCFlGu/////wIO5f8pAQAAABl2qRTA+jRUjiO4R3d2gGNIjjYeVHXAqYisokkFAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +AQAAAAHXS2aZtfwFQBnJTbR6pJBfBqBzDafhLxQWNarOn5uOAwAAAABrSDBFAiAmSZcfqh28snMwDar+myEZCC+zxsGVHLTItnIHif9PVQIhAJulOSfmABxEbf26o8qF8Z+7nXW1hnPL0VHZkYZ7/oFpASED8L+R4mecWZoxcSk/4Umczfiqw9HRCo/BnVT6SSMU+1j/////AsTH9SkBAAAAGXapFGu5nw1ZHDUK4KHbZH4c0eVS6PM7iKz6WQkAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAE2eVAxYywjiTegFBCqu0uBMkHUkuU/F391vqZwfy45SAAAAABqRzBEAiBAQK7Jahx3MIM1iN7ho/onuCnBKBNsgPskeWTDPxkh0wIgPdW3JCIfUO7D4GC3eC8jzbjP+OapMXWvbOlRbgBlxaIBIQNhca5PrHXijaGCrWaMJQg137sA2OwIlnGdCSnTg+4Y4v////8C7DvnKQEAAAAZdqkUY5ELymWFNoy3/g8x9bcPUUBUV4yIrIjIDQAAAAAAF6kUIsNpkEhO6uAL8Qo6dJeAC9DfNMSHAAAAAA== +AQAAAAEpb+k5AA/ztHSWTCHX+6iMYNeKmq6uENXr9V9cgvMOCwAAAABsSTBGAiEAxuEhqXApzED8r6FAL+y4hhHRk/LdnQqIWwzNjVYfD1gCIQCtPqibkMWAlF+AI6/Ae+qnyXwU7Kpe46Ome+hTcq8T2wEhAohuoz5IYQsp5skgDFRa3Txgdvxjsy8AGqml8D3+1sjj/////wI9Pd8pAQAAABl2qRSd1DexqbPGJvIj81jtpvKkjYuEWIisXzsHAAAAAAAXqRSZXr9dnjcFYRO/VrWJO0SvKktBj4cAAAAA +AQAAAAEy8Ytk2HmGug8/K66bkj2s0/qcy0B3UytaQ5hWTXgujwAAAABsSTBGAiEAtAA5AEJBF1I+u36MCpxXhzSgl/cM/CnNyQDaUAgsfR8CIQCcmP1p+dzb+ESjvy5pyRyWTqsswtJpmNweUhREvD5jTgEhAm/CSCKg7nlegfy0qICHE6KBO2nBIpwxZ1zvGQam6a5F/////wKjcdopAQAAABl2qRRsaEfTwgmX1Pcbsc8IBcOR4kIlnoisSggEAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAHeeGceSSZdHU94KZpwntO+yJ9zd0chWXc4TzwOjZNcOwAAAABrSDBFAiEArPj3U43jIhq0aIJFnwARQOl1HTsw71RqncGpl9r1Vg0CIFZ8Wi6teik0a2I8faD2hJEotPlqgefMeW3/KK71owaZASEDnsThhAFyNC7+eYnVNPtgJ78wpnn4FDwAXH3g946IHRv/////Aluq0CkBAAAAGXapFD7J68nMuNbVW8QCYXwGGntwYZX/iKz4AwkAAAAAABepFI1tVcAzzinCd63Lbz8rkcJZN98XhwAAAAA= +AQAAAAFV882a/8lBiW3mSCozGzkl+cFPa4lS1DitnbAk/E+rTwAAAABrSDBFAiAOw09Uj3EPXaEORyENJR8IeGpm5IX5EbPoCoAfz5chHwIhAO5dXG8PSpmsBHMbBJMzA5Xhwu1gF7CAcryk5pCx4K1ZASEDMeou/3Yr6k5eErytbqBuB1NYLuW4DUTIXjR/S2BUUw//////AqaYxSkBAAAAGXapFMj12lDzBNDLmZ4R9WxYoY2hk33UiKxlTgoAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAGftEel6MpHDpkuXZ1kKvi0Qal2B5jJxitUqDjzhhUAPQAAAABsSTBGAiEA+Gdv809SSSXZObCPMpaRd0bp3OulpBhbRa/D1yemHFECIQDv8AsavmQD+cWDbsD8Ak87oaAfuW4ZhCrp2MoDbTPDqwEhA4IY7wETnSynucnsTT6WH2wZSD986SVrb2VB+GHX1Qq1/////wLQEbgpAQAAABl2qRQ7GOxj//1/b8r1mCuCwFQT/+2hkIishsMMAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +Block: 400 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJmUSk0BOwYvUDJTSC//////AVDqEioBAAAAIyECuljqw+MP5l7/ICahRg6XtR3ohrGbc9po0hvur6RV+qesAAAAAA== +AQAAAAGcfq70oM6PdtBY9b+7K38netvpx2AvqDza56yZPhCWQgAAAABrSDBFAiEAjBMT9ZLueGLNFJuj5EsJYZCayziuIoM5yPD2//Pm09ICIEKJ+zbg99nYh4GfmDlYc76TC1WeLmFkG58M15MALiRlASECNct66ILT7FNAH1qtZYLwykxjfJfBMTrCa9PlVTlfuBr/////Atr5rikBAAAAGXapFG+iHhu9dY/X9mng+0Asp0l6YfnOiKymVAgAAAAAABepFMfU8xfvUh6lQcQoxV8SEybHjG2GhwAAAAA= +AQAAAAHQOZAeD1/nNmb8oygfZWOEsUuQtX6I0Ixz+hzDURPmYQAAAABrSDBFAiEA3Qen8yK3lbNGHRALn5IscTtkPM740+7S4r+ikCCnTqcCIGvKaoZXIwiwe3iVRy9Y4qWHgwG1Iww3veA3GwrcQvRoASEDyyKDUpm0oeYLNH/nnSkuTtlD9tHYUEhEceqt5T3ScA3/////ArZjpCkBAAAAGXapFCuZ8YeeD68fBVMn/A0aRFqNH69LiKzU0gkAAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAELnODRd4hSSTO5GK4pzShPQXrH0a1XJx5XUrKCf0UBCAAAAABrSDBFAiEAkRzk11GS3EvvD4Ih0ztnci9cjKLP4zLqkk2rY5ge7aECIFzdFZxNHd/ToHuMpXxYfjPTQhs01DgokCqp5KmpEgf0ASEDgTRcHa28ElD6UnpC+NcnDO9ok1b4M6VR3zjFQ5h2W2T/////AgdllikBAAAAGXapFJL49zjdmO0UNyzogBeB08zpzXyniKxfOw0AAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAGkw++cvZppjEmKxeUD5E7gqmEqUScTyuHKmscuPaf98gAAAABqRzBEAiAvzEy3HoQsJzC/e5W4025fOvEPKJaOjkI5iZemcvamRwIgMqVPVJ6/6KpwUSyBTE1cg6zm2APqzHnHV/PVs4kpYjoBIQOuUy9q/aNabiGg9HinqxGBPJ27U3cmYk+a9qcwns98z/////8CfR6MKQEAAAAZdqkUUeRU0WUEduMMeZU1vyOKUQdHjaWIrDqDCQAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAHQ9ln9ETnhrKSniE9X8yPRv8iYFNeSaGBgPSB5ctX+BgAAAABrSDBFAiEAsOYhpsBDwGcsTeM27u/qi0cc2N0hm45TnLa/Hko69QMCIA/Vkrb9XXM4j0Z1+0mY4ntN/4NXl/oPOc+maMIQO3mQASECsax3f09p7xIZiOeBQ1wb64cf1sDIQaL1hRg0Ecstp1X/////ApVbfikBAAAAGXapFPcNK8fchLSf+Oram/GDf+P5NjSpiKyY/wwAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFRc6cKU4PiyjqZRm+01NY7paVzDo0H+tlo6gsAeVs1yQAAAABrSDBFAiEA/MKednI+FqzD4jckhO/pcgHdOl0Il7EBC4Z5QRe7yFkCIHKm4WsLq8+GeqzcPA82U/VK2IZi60bdXqN4vb416xQ2ASEDGEXNI4MeBT9pNPyKiEBHxmvjDllZRrq29hh4UZOc0Tr/////AjfzeykBAAAAGXapFI2VnT9110MsOiIcl/VIxdtIbHFSiKwOpQEAAAAAABepFCeRXi//MqXnTFLLhNQjZsCI5hfGhwAAAAA= +AQAAAAHtaNLFyEkppn2lcYYwS2TyZp8KkNf+Mf0cUguMKcxFGQAAAABqRzBEAiAtWpVoE336x72BDn0Pmf1DyA/NVvn3nRDJBvo6FiFPFQIgQvXKZLKvgWaiu476kXuysm4v7/UsLnASYnnrzFuOUqQBIQP1abkWxRKczCsuIPfotroExZsuj+H3tVJ7FVCP8CJFPP////8C4YhqKQEAAAAZdqkUf3jmoh/3b/gU4YMLrPuheE+Kog2IrAanEAAAAAAAF6kUQnOMWbvZz5TgNv4PQL7vy6ImiSSHAAAAAA== +AQAAAAHJGYgT4exYOPKuth9MI18d+dWl9P6+EqxE1+/QujdxCwAAAABsSTBGAiEA4XVwfY06cae3KVF77J3dn2g9tPfBEJmPWXfT3ldoElICIQDSbvRzUx7zOgIKtvZDSz8Ov4Vg8CQqRdxtb0OLVejGDgEhAuRh4v4SZ800jBdcIeofvWvSjj2bjFWWv4Wh3HZJfPaX/////wIjq2cpAQAAABl2qRRpp65WuzA68Wv6Rsp9f4As9u2QB4isbhoCAAAAAAAXqRRl9vcVF8n9SFQXBJwt7VJ1U8LRB4cAAAAA +AQAAAAGY1WU2y/ekWi2sEl9os1oQG3jyQqdadeS204sJbXC3ZgAAAABrSDBFAiBOvslv8VEiq9GILx9657JZnQUXRlEpwuYWwIiKBwj1JwIhAIzQE7tBvnd77tP2onvaF5lwcL/XCoLE06+fi7BMCYRpASEDikwXTYhSnor4sOKV9ZgNW8LEeC2WneE2G69bHPJEfHP/////AuIpXykBAAAAGXapFNi3UymimO3HSFDwaWuZLbcxZsV3iKzxvQcAAAAAABepFBxkS5vaRBEfdQmIEg4010oAtZJDhwAAAAA= +AQAAAAFnDdares3SL46wrMe2PT91htYiDS4ZE00pCK4A0dJ/QQAAAABqRzBEAiAagjtYLwL7+RFp/KrbWO1e3fNcgISPe6j231KnK99r7AIgbL0HaEykDmrxAqiTk3W1/htsxgvONrHrilCYp2WlhaoBIQPhXU1lKOL0bLfS27sr2tzBjKVdHyWmb6fdbiDmijrI3P////8C1lhWKQEAAAAZdqkUUchR9w/Z71UaiLraS6TI5A8sCgeIrLwNCAAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +AQAAAAH08hXNlnj+6ovipjHshRvX5gpKNj3KpqnYGOvDM7ij2QAAAABqRzBEAiB/WHI0d/ce/9B0p+Sd19/KIFtdxYZ/+BY6SCpiPj5TpAIgI1gy4CL/x4qhwEVR0VwVI64rJQxnx8uPYhQeg8GOJcABIQPOgyOGDxR+gmzq1/Y/+cUaAznWp0p9b3e5gLHGer84yP////8C6DJKKQEAAAAZdqkUju5+a/ucoOqYvYbfCY6nirZ+KdmIrJ5iCwAAAAAAF6kUH6zk0Dqu1PtsA0Qes6cTeTI41iqHAAAAAA== +AQAAAAG6Rr7l1r92/eo1ELbA4/NmjqlNVb5U16VIcQ7TZwOGBQAAAABrSDBFAiEA5WcWj5pgI8NDrbCkeVTiVq7XZzzoccY1bfRMfxbvmsQCIHzoMAsInHgSTVxW5SeJyym/WXY4iaJ6G+XsLS8KuwuRASECwkdEydb52gO6nEXY+cuzvo6Z829eLvU8H+oySlPMFpr/////AjagQSkBAAAAGXapFBU8md/cdUTiRCzEH0kyLMGyfVwYiKxizwcAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAG3F5DG7Fk7qzG3N9sgnoY1au9o97KOr0mnSywZyBnKQwAAAABrSDBFAiBJssnJ6HVeO+CxnYWy6GDzFfomQ11dR5gaDG7WoEHwBwIhANRYH2KoV8n6fiJ6bDlMX1c35XT/k5As060b6gpbkjt0ASECHNIO+mzSD59nSUAj2mlsEOzJkn8xCTpeadZmTx4FB5r/////AnufMCkBAAAAGXapFJEEBLlBh/oH1DjnLX8/7rsNSFpTiKxrPRAAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAHaRwxA4IAWKTtYKWLDcxvt6XXxHbnjAnxFCtuEuctX8gAAAABsSTBGAiEA2dc5JmZ/U8DzuzUzku6IQoyC/CDWuI+6dTvnUQx7bI8CIQDxNfj2GP/6uik80SY1lUTX1segvr+coJjBdTDkpNM4DwEhA8dElXtq+rd0FN5F42aEsDStwmCrzeBscC0w1Gb3zQLe/////wK3DCkpAQAAABl2qRR12H9QK30a2EP6ExftmVYZQr5PGoisdM8GAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAEXKkTLcK5XS0TVyvr0Rviw4ErMjXr50O8ziTmtkskDsgAAAABsSTBGAiEAlqAWquKcSJN0oBpA3XgZ03SD48Jtq1qCiEudXClxuugCIQDfRsjX6oaNtAV1LeB4NCIbwiYAz6VI86/DviOULlh4JgEhAqW5roZJs44TS6FQCu9g51+xEfMPAS0YIPtZMj6EuZMZ/////wJFoRkpAQAAABl2qRSLcxDV73BYAAyMREolfTDZCbSyioisIqgOAAAAAAAXqRRfVwNJkfSX+zpuZwEfD1GA3sNtX4cAAAAA +AQAAAAEgi+PXNhDF5VeXNRyi33n9UUF4RSqqduI09+u23uKrIAAAAABrSDBFAiB6Ld60n2Yb5Lg54cCI/n0tof2m8Fo9oMwspIeqnBy3NQIhANR4oFie+uPD7wKIu441/pJBZZZpszzLaPMmo/Jl/0JMASED1o76SnVAOVNyXloiI3MFSKeRImww8PX3aMmqG2Qm1pb/////AvrsDikBAAAAGXapFGHkwIyrQu/svBETQKYlOO7v06HoiKz78AkAAAAAABepFGubNVoXj1KNBqCWh+Ro1lIByAJ8hwAAAAA= +AQAAAAFQU/65RIk62BuKpgs8eoFHJLo7hrDcuFeBdKOGZq1qQwAAAABrSDBFAiEA6TD97o9r9XXabUEVHzQ4Uhr4axp/Cv9I16Gr4NOWz0kCIBg96Xwi4M1otXvcm0TYAF1Hv2bukXI/f4LotFsNAJP5ASECod3bwFWudJfD3wvXMeukuFoCvoq6cYFceAANQeQhYE//////ArS2BCkBAAAAGXapFDv6JaXIzhUNtVbaXng5e4UD5FYViKz2cgkAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +Block: 401 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOKWSk0C2wEGL1AyU0gv/////wEgyBkqAQAAACMhAgscTMCFCnGAcQwe8kNEfLUeof18ljKXo1DC9Ht8+dY4rAAAAAA= +AQAAAAGTJtTE5/dTJ1HqrXwreHh/TnkOeaQ42w2evKKZAz6/8QAAAABrSDBFAiA/GIFTy1xkYt8ltNiVQQpiwv0j7RKfDI7ezezdELdWzQIhAKwEpQf2CXL1ldstpoPQVsY/8eW/YGyW89K2w/iH3GC1ASECIgHGOQGMZC/7iol3hwqeVE6R8HbsIQ8qGpQl4/L8PYb/////AhJv9CgBAAAAGXapFH+5bygr2Q4XxV8Nyqx0pVMnlmE0iKxShA8AAAAAABepFEJzjFm72c+U4Db+D0C+78uiJokkhwAAAAA= +AQAAAAGJ1IKldna3d0dFgtrclCS7uUM8Tt0q9OhvQ8yypF8EVQAAAABqRzBEAiBezsnGMeOQzMGL3mDwu4nwyd+cGWDBNWVu/YtkiuazaAIgFzvMFR41VNNpZletWGMRXVbdEjGPGDZSXnz23mROzEkBIQKfhCS60oMt6Wu6LmWMv0MaBNmi2k5Ugbf9fUafzTMzVv////8CjFPwKAEAAAAZdqkUWUvi0usosMNFBm205pkXPYbb2/SIrDZYAwAAAAAAF6kUCe1hclMwX9M0krdDwJ1TiQKgGIuHAAAAAA== +AQAAAAF/mIN+rhZZn6BSRjYjv/KyOif4rC1wSuNhl3uCkkJLEwAAAABqRzBEAiB9Dw4+M/bYz5i6R/53Xt244sQriCkzu1whY5ruI1fcegIgJrj3pTpFWAiQqrRu/HtSNGc39W89K9os3TA7JiDbaYMBIQP4y72Cs8xB87srV1Viy8hG0+KX35joN+TCiGB0Sq+WCP////8CTW7mKAEAAAAZdqkUjgC0d6wIam1kPrvrolO5pWj+Gp+IrO8hCQAAAAAAF6kUlw71MO1BgueZKT/FFDpadG470sqHAAAAAA== +AQAAAAEP1RpR4bObJFZIz9DoHL/4ZKzNGkIjhEn4ipC0+2VMwgAAAABrSDBFAiEAzHfntHhj4iVC8ZXl9LH6dQBacBZP9Nbhc+1xtFh/f2gCIH/8SPOukRlnlnQbq22rwvRjwhbQQ3NNr+T4NubLDGbHASED87Eq43fK2iuBoVsRFFtLOcrDBA7ilM3GDNjEDVTJKlb/////Ag9V4igBAAAAGXapFGmut4FbSRE57fi9f8HR+hsJVjsyiKzuVQMAAAAAABepFA7/Q7VGS+OSC6vcarEp4A2kB1DAhwAAAAA= +AQAAAAHDXmSWOe5A/eUxl8NCBULxcahqcXRvM2cexcCe7ZzJUgAAAABrSDBFAiEA+QLvjkkjf+ubuwWMOJYUdogkIeEpz7BXOqQ2FcIEuBYCIFiclw8gNcQ9vxzRpP19Eviy1i4JNPHrvKJi3BWlDP0EASED4tOhpaLIFAoq4ctAzFCx0UXlgAFg0Fele8fc8TQdpxH/////Av9O0igBAAAAGXapFOVDdRXtuHm9+MMX9frMtuDINOeRiKzAQg8AAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFGTD/8D8FVQmPZYxJhXH/1kcIPXy5NMw7YviC3GT6LVQAAAABsSTBGAiEAqDcLnkqjYZqskUC6nFpufgwXcx5RUaZdX39bKMh81DMCIQCCXn8D8142+EigZxDMw4QcJmSSxIm3FmMuFdONZSCsngEhA90IuwbWyK62SMyxYr1Wf7AiPZ2LJgfaBHJviXpLps/z/////wKgUMMoAQAAABl2qRSy3EZvcFQPF3jgURbCWYQ/kL7hOIisDzsOAAAAAAAZdqkUXH3PqYaN2NL1U7wKytbXj94dkJSIrAAAAAA= +AQAAAAG4gtvL/qOTk+IDKA1HVOEI5IpzPql8sArrC4cWBgdg+AAAAABsSTBGAiEAxgwfEqR/Rqs9CXY+Hkpa7Tbx+08m5bZ6P09y18aKc40CIQDYGoz59r1jDSNK19D8Zs/cVaTbUZYMKYL9yqBmDbTmGgEhA5b+7DYRCeVkWfXnyaAdVDh0Mi/LaHps2ZnKrNRIX1Ab/////wLrKbQoAQAAABl2qRT9zdFmsCWAcHvEWfAeejVy/xQ1pYisZWMOAAAAAAAXqRTyaCRInzdOLebd315gsmYPJUkh8YcAAAAA +AQAAAAGfxFdnaRSnQ2NBpaO8zNWP8/Pby9rI1jyPzy4zz0Y4sgAAAABrSDBFAiAbFpE4mxt/vTh0VtBMPlXKk+Rf/nlavLN7YaZmOXf4+QIhAMY/WLkqBaLkiA4n9DR2bX8d8JiZLXIZ6XhoG+OKc+9AASECWT7bxKI7nasipehR0z1UtikU2B+497gdwCkkHlbkZEf/////Ar7LqygBAAAAGXapFFQXZw+4JOGkAWrf+wk2S/H1SD/OiKzdmgcAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAHn5q/zccyRGGwqR6DV+n0/6qL2YyGrzYHbLPGmh1anlAAAAABrSDBFAiAhef2bZJPNLpu/9S3ZWhSbsbk3W0cL2UVjfFlGf1eygAIhAIPc/zBEu1WY3dNsqosDlthSV8VQJGzR8iTi0CIdsjW/ASECjvN28YrMrFvhPbo5TLofW+IOpT2VkKNR4yQaQ0Kd0fD/////AlZUmigBAAAAGXapFPQFp1NEjb77LpVOna0vL9LrH95oiKwYtBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGlaRcxw9Ku6PJyXQ1dEBR/FutpFbd7n294pO6D3TsvPgAAAABqRzBEAiBxhrQjuCka0mfMjtJXwHodf1hk5UBKvOy14no9uOptQAIgWD0r6gAmWLgDZ/W0e/WnvBTgbWZVXegE59biUXzSfnEBIQJFENnIXlPrbNrtF6L4ts0MjmzqIYjAsh2LpVvmPguJ4v////8CRC2XKAEAAAAZdqkUBXtvvQwdvLVHBQP+VRiDY+pOjmCIrMJjAgAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAFUW75Zjilj3nodFhAL1tsxNSjxbGCtQ9epU26DfZiCUgAAAABrSDBFAiEA8VzDISstpgv1RYQHnejltkv+TgJ03ko2PBLNKNnoltUCIA41pAu22gVt8h9ozZoNGpXL+ZGRI/l/d2v+RdIduZtBASEDG+npsopxUiDqjOJoyCZW/nz3iD9ruenXzUx+mK9rzOH/////AqY4hygBAAAAGXapFPbViWEB2X3wlIs10paFveMtTzl+iKxOMQ8AAAAAABl2qRTmqXsdldMegPwkwXYIDNZZVBjcmYisAAAAAA== +AQAAAAE/W2wpYtexaKQsNdsaWFC7WHOZQD15zOYdUReiYbRbNgAAAABrSDBFAiAToPf0JxGUv30ffu4iQ8fL84QsQta4WCd2RTnTyloFCAIhALtGvkoKqovpEdl/h2WcxMX5g0eq1+uVYgATAAnyZNOYASEDVI7biIh3dBiq9e+gdJ+8B70jXWeJyllwwjMHC7OFzNf/////AkL/gygBAAAAGXapFLoQQGF2DPOYzN5R3x07P0Dnh68UiKwUdgIAAAAAABepFMkl4CwFYNpdnNJjSBNHsCW48Zb0hwAAAAA= +AQAAAAGrz79785zaqrRR0yzC0yBLVWs6otxepIcjruM1KZc0HgAAAABsSTBGAiEArEdY27UgSizfux1Yf+t1TRV8ek88e4Cj3U/ijEWi5n4CIQCj42Ra636dKFK0Y8aQo3eaZ32KF2VUjmmZQMpwwFpl4gEhA7nSyWzM1YNFpZjhhfyYiKWa2yVYuGneOJ3UJn3jZgzX/////wICdnMoAQAAABl2qRSXclVUaZimDNFYusW2c3DW0Ne4G4is8MUPAAAAAAAXqRSNbVXAM84pwnety28/K5HCWTffF4cAAAAA +AQAAAAErq7eZWHeZDIJyzXI5A4JB714AHyQZ/Qi8qJT6QnpFMAAAAABrSDBFAiEAlHQli29XzMjZfdREYP0vjml7jY2mo3c9oyRtAZl9kF4CIEf+N8wv+sEIwhnXZsJPOjagHMmBGxypZ4k9l9A5TZe+ASEDQLE8Jd/4UjKqqv0g9hZbuTRhJhRMSQn/gahLtLjPqS7/////AlfSZigBAAAAGXapFPKz81RBpqWqEK9UKJjwHahRwsmriKxb4AsAAAAAABepFJcO9TDtQYLnmSk/xRQ6WnRuO9LKhwAAAAA= +AQAAAAHwmH1TOE2TfzN6Xq6R4aa+9RxD1z0ghRS4mnlij9Z0gwAAAABrSDBFAiBQWE7vjNlGIHLwVl2DniPjBPIAtgIKMJz35rRMAZZ0wAIhAOEWNXdXyDQOwDs4SkWtUp+SZ8nS9tXdfcH/1X35vEBEASED7BKqjiJ6sghAeZTbZ2Fpg+5ADJnG2glzn6vSssIPLy3/////AlJFXygBAAAAGXapFEyu8h4Nc3KndrO6ubUWoEB5560PiKy1yQYAAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAEa1T/ZH3XDtEeeMdANUXmxg5GcrMuqqJUSp3EbXrk2PwAAAABrSDBFAiEAukPaPaFF7CKUWBdFNp5zw6pHRFgA94Ad/HwCigLhtC0CIEJROvwND0msoDGDijfTBClxr0nMog2/SVCpRe/yQzyrASECVJ17spsT4d98Vh3DloDt6Nw/jHHksdqA0bZmxbNUyoX/////AhH9VSgBAAAAGXapFENuCOpnDWQzYCC474lS0176MPmniKzxhAgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAHyM+TbkiDOY7jmt0tapKJkhZDETfZA5x8ivvRo0jqnTwAAAABrSDBFAiBLYjokv1G7Ohf7J+USrxUb3NsrL28IWl69fKO6hC3oBAIhAMTy6Z6qj93+mChGi3lKlWfwNcEML6e4Xi3EUc9CHH2sASECzCpep5pXoAVFYXVWeeGxTBNiyfZWIwyxJUbSVUGpuTL/////AjtzUSgBAAAAGXapFL+hMkmc6698V2Q/uXWXWEAEpRiOiKyGxgMAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAH15hDOJs4bn6PEC8Nca4fKWa/IiTwEkLEMg7NMgxiYNgAAAABrSDBFAiBjZgJLyjYpymdvSkDZRw31LTKgB3+f5XKtRfXPaR/r4AIhAOFp/gJONgcUv63ifyzFTw5oewTtJpGEw26gwD3/LaTpASED8oB96uKoGrUjFFYId3Nls7y3FyOXvyCD6jGlHtCTgyX/////At3yQCgBAAAAGXapFFn3M4+xxsPG1k8fA+DmzdNLhKxliKwOvQ8AAAAAABepFNnybMqBf6EW3HbhvnoXBn64Q2JQhwAAAAA= +AQAAAAEYk0RR4CUgBmde6mM1deR3ZT2lpQVogpEoQacNkBctnwAAAABrSDBFAiBwj9F8Ex3P1QJ23aLa502SAS1660Y/AeoKl/DFcUl/UwIhAJztXyRQH32OFzqtcbCGgYDQCv6NXkCq57mSEjmBc2cDASEDf7XfIfyf/qYjwpdpYWOvSqNx+Xopvg2H0A8HsZoghj3/////AiCJNigBAAAAGXapFFhu+lUBHmsth8DP6TvJ5RbGKi6viKxtpgkAAAAAABepFCT7x3zcYnAq3nTc+YnBXl0/kkC8hwAAAAA= +AQAAAAEbYxv8LHT7RjGhYBnxrOuv9BsWhvCOaEXYHly09OH9rwAAAABrSDBFAiEA9lV3GlJFQgu2+MBXPN3a+6QtIfZPT9V+1+250KqrGnkCIDyzrzuuERO1nVpVKtY9ka60ai5bjGE9oFv47zhQ8qYBASED7vY+CJBaLpw/77gtjE3Y09GP6q0o4dXjBSGS2KUdRL7/////AnbKKigBAAAAGXapFArTPlMcAcIFm2Xexpsd0DYcJ2m5iKxa+woAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAETKA9uizysSplRc9fkHifDk0YSgZEvO1iiXcNNu98f6AAAAABrSDBFAiBvcxELmknpGz2Apf7kKFkDjPNMd4+8WMreeOzHk0W20wIhAKnQ/3R5dyhvNUg8h9PRnxtIdFyLSTGdACKgIf5i8IqCASEDuhtTipecE8/6s7Yxn8vIRmm4zDVv3+3gGnSlJjrLEVn/////AihFIigBAAAAGXapFMJ+lMWIeBzC11Ol8ZGRa3RzIRUIiKz+wQcAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAFs2gsV/WLsKH9YK8V1oK47erMlUAtv1tOIYDoylKlEwAAAAABrSDBFAiBRkDhmiTx+zwMMpOM+tzIVuPCk5O/Ae2wjOy3t89xJbQIhAKItaPbdlX+lrOQPG8A7ObktERMQqinJbT6J2qT17OQ4ASECbFXDl6iDaHlkke8mdvUVudni08tsdx5ouZec8YAlBsP/////AvGLGCgBAAAAGXapFBdXIWQLJ6I7hBwVICKcw9TAUtNYiKzn9QgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAGd89YKaJVulFS2Gfcm33z45mj3Rre7vDvsCjIAjgJazAAAAABsSTBGAiEAwpwcOO9K2le4Lvz5j8zMYgvrcEC1PW7WtZVjoeAkJasCIQDIkqYCsC3/8pjrw3Blr3AmGmMW1ACLFNol0ADxSRBgxwEhA87KU1b9lLElRBYRF9OtqEcwO1yHmheBWkMjBPT6SP+L/////wIWkAcoAQAAABl2qRTONQIRxEtW9SsyAtIZ7wtOVhezg4isizgQAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAEeBHbpQ11WeGJQjOijIRCT21tlAPNO3yWcPFy4EXx1WAAAAABsSTBGAiEAvkNLJfsodcnty9x8gzPsrpe4FGFLimiTEVqFaspGHpUCIQDeG6hkRa/rV/g/pzGqztG8+hnHlFxYDsW9eHGzBBq1HQEhAwmBHH6c+fovMbL2FNC3A0veM6lzZ3te04LGT1AuUn35/////wJ6agAoAQAAABl2qRT2dVCcapkZ79FoDef7okIm73iB+oisTGIGAAAAAAAXqRQbLY7XmfWfDni4bLjwiwbu9VHC2ocAAAAA +AQAAAAH//s43h7fBBbYVQNi8HUajlFyzCPMrN9EkawYkiCLgZQAAAABrSDBFAiBjxGhLge66PdoA447w9DVJP3rcvMwrrs+9QCTXHKAN3gIhAI1TX/wNyXQvf4fh2w5xKgbqq7Xlvlh4Pik6dwKGEu6tASEDScdRyT9LxSKCWfvpc+jF299FNQ6FuJAHqy6JAsrknPD/////AqeM7ycBAAAAGXapFH2YJpHXnnGKaWdBqlC6jLOohJISiKyDGhAAAAAAABl2qRRrIEQUakQ45uW/vGXxR6/rZNFPu4isAAAAAA== +AQAAAAFh4eXWCRWng3e+5m/qYC/Fa/lj6kkCZ8Obga0CzdpIIAAAAABrSDBFAiEAyZuIJa6TO/fvT1fpQRHpqHxnmLu4HjXF9XZweS7qf+8CIBd4OAipJo0D+EAgsupNlDiJuxymik6ZJd381YysjgUgASECybGhGFtgZlzUxui7d+hMVDTkpnRQPB1SqpTgHefVzOf/////AoV73ycBAAAAGXapFN9LaQDiBlmxSiW4So6GiffhxuGsiKzSTQ8AAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +Block: 402 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNCXSk0CBgEGL1AyU0gv/////wGADAwqAQAAACMhA3+M++h1JdbP1HAHYfJr7Q0RXt7Hq1UJ2G9lPUjcwRetrAAAAAA= +AQAAAAHL5wTCw8rYtFAW1UQV1vHxnyqJlzkHYhwWs0QD4TAObQAAAABqRzBEAiAbP1foWNsXMXm/dECgbg2iQmBCWflA/s4BIK4Nb5fKwAIgNJSlqOAvdXeui4gpPFKlmq/mL+QXYcXabNFtTJzOSWwBIQIUCw64u7ylPDjedBubTz4TlupWqa9k24dLiayq69W0I/////8CNbjPJwEAAAAZdqkUF2tBCrx7zsCVg5uTP0rAIyFARhGIrAAADwAAAAAAF6kUzK3zVW0ntkCGxoNQee2Hyk5VfL2HAAAAAA== +AQAAAAHdrnAJUQWUukcwzjlw5uDxwlIYLRI+pYLmpvJwML7yGgAAAABsSTBGAiEAyS6FQmRV0xJwLBSyg6QlVZCeQ4oKzOfmeBy7RQVwHWwCIQDxt5Xa8kGBmQCILbdkOsgX8omXEaQfMtfesdjD2Ez/PgEhAq/B4eqLNXMhUm4Dw51c6qQmCHnFJson5BwyXsEOhPHs/////wKGjsgnAQAAABl2qRRF575Jki2SG5weA/lQkyv2nzUBCIisX2YGAAAAAAAZdqkUyKWPTVXb8sHXngtGrDnKDcvjBD+IrAAAAAA= +AQAAAAGr3bTX/YRb1upzkcurYDSuGO5T2rE3po7YyEhb+xzzuQAAAABsSTBGAiEA5Ami2xM09VfI9AcIykIzH2IR8uVMR3lxKNLMjl6KmAUCIQCSEXQ6yC0DSJeTg80QSdL35I8GKqY/I5c026+LtEN/iwEhAtrYe07Zs062b7HKEvv5lvZ1BwpGf7Yl+L69XIPZgs2M/////wJ4GcYnAQAAABl2qRQDwpqKGS5nt+EZ4UWwrI6twZjQAYisvrEBAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAGdQ/v3jJ3ViQOXFA2r/rmagZV3G9/ZxWFhelg1tJJevwAAAABrSDBFAiEA/f/kp37kWGEnqM/5o4Y+mbSEpBJh9mwoJpLrQDRJtEUCIE2g04/iAG9xe5OWkmHGXIqmeuVQZCRsx3X5WDAPK/JxASEDHCAjg0rY2O8TQTzB2QAUDtHn9+kk8tNaWQhkuIMR08X/////AiaWtCcBAAAAGXapFGZYMpX8bCN3BwWV+g7Ch1H/P/S2iKwCwBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGWTB+jyYBMXNyiyyvzdFTt7VXyZjRh3xlll1QiLF/wZwAAAABqRzBEAiAkTyx5nyhXEcC1DINjyUwRoDsMKfXd+vTm6n2SHAgTXQIgSeO68BfxAh+Q5FwqXpJdCvOb7VPobMS1IKwY6O8oeE0BIQJKJ/zvbvfzDuXmlLdAUTyDO41K/EEfncCsJXSIcwVxof////8C27OvJwEAAAAZdqkU2CAIs5dATq8UbFcyZ6kWyVG0LueIrPseBAAAAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +AQAAAAGcLMGup2NLfZBgX26g4ZMcEtLkcX+vBhVZQmPjvl6OvwAAAABsSTBGAiEAzAuK2giXg/RlrqYRM8spZWT0xCWin5Sf1pnRXUPjV5oCIQC0+A/btj49aQV1zhv4BZ4+8xySpX1jf0d9FpOPrAS+0wEhAgz0NmeyL5FWp1KH7SYmX+suMfU43lfvKShy8YfJEQNl/////wKk+acnAQAAABl2qRTUeMO5lgM0XhKsk3Ko6tMShLT5b4is5/YGAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAHzo2RLFswQmZ5rlpP6o79E+NHuNXeClenkXgS1W5Fm4QAAAABrSDBFAiEAl7UjSZa56bmA47b5XmKGHoDmiJDPcY81Qley8PdSKKwCIA4pQu8tB0ZHutPM5rRWN/rXPL1wP/6NGm7+bvOqZiZQASEDR9DfFJp6EJSkO88cvm5JgzIjf2H5GPPYWVPcj+z4X9z/////AhADmycBAAAAGXapFB64z7qhyLLt/NNe9hYRrlZUWD/SiKxEMwwAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAFjDa8Em2WFSA+Grs2Ng4nOZP8Q6JJiN7F81VybPhAFigAAAABrSDBFAiEA7EEASmaWCJR3odqA1v3Eckw2ZCveeT/Gx8fiv8J4DUMCIBbvGO5FDsJmQgdwKIlwt407jjMtTns5PKB8B8WxqrxFASEDImQJn+V3lneDFXyhTvjTPQj0jFaSjgbpcCrrYlnLa2D/////Ao7nlycBAAAAGXapFINGWvWHLyZT2B0Tn0WEcR9X8IMmiKwyWAIAAAAAABl2qRR+q9Qqp86HQGQfNbbuAtmb9lwSL4isAAAAAA== +Block: 403 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNeYSk0CigAGL1AyU0gv/////wEA8gUqAQAAACMhAvSAIBforWw9d5r61WUFwLbKiqG7Tp+aErawLUcCCw9BrAAAAAA= +Block: 404 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEuZSk0C5wAGL1AyU0gv/////wGQwgkqAQAAACMhA2M90osFInstoaaOr1OuVZ68aSxOd4R1qmtfVh38juDPrAAAAAA= +AQAAAAHUz5ov//pM08kXm1o2SBNfLeyYmaP9/7v6utrFI8jiZQAAAABqRzBEAiAvPMxWNCWyfhfCGKBsu9BBnfGhj/Z4TOZCOh53+ypBMAIgKQTG1IJA/WaHUP4uWOi6nsRW42jVmqH539sowoy5eTMBIQMtlAKfQyMs9rD7Od6KLeXjL83x0LAqYCg9Jl0P6nO9Y/////8CnoyJJwEAAAAZdqkUhcLH3x399PH5vfZsvUgypPnj1YWIrKCXDQAAAAAAGXapFJI6pCiACahG/QRJoZ57kFlM9aW5iKwAAAAA +AQAAAAETJi/Em9crkuHXMYc4av2HOPRwgR0bl+5K21jgh+/dbgAAAABrSDBFAiEAs5Bs1KcJLYpbPRJXfCLDiPfAoy5Z9mXt+mN3Wh0VK9wCIHEtTY79qYP865OodCc7J9qQde7OPZi+TRLAK+KzVyNPASEDcl0mtwg9OItg6p4NEsMl1rPtf1dkb4dBturQdRnx9rr/////AvIyfCcBAAAAGXapFPjNQHXq/0oRUc1H5trANhjd1Hd+iKxclgwAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAHNH3Yh//0+QlQ4KMVm0wi4AB+4LI7tE+KFvtp9KEWiEwAAAABsSTBGAiEAi09l6CH4tlTGfpJpsLIJoES+MglJXJ0scV3lvYuiDvcCIQDcYqnWS71lO40xjwaDeGlQU1Tfpt4NVo1cKNwDgAC3tAEhAmay0ZebRYarD30nSlO4rKAX/8h63499dbdXXyKNIFM//////wI3YngnAQAAABl2qRSugUfjKIsvTmPoR1eYaPGrIsGx+Yisaw0DAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAFBe12aREF9QTLAfeZARnqRBNgvc8cHVdGU8IfO40uWsQAAAABqRzBEAiB/xOllg6Pqly0rhU3mKT65GThAvBQIhaOBLK+tQr6+NAIgE5cposZIj9e+jGhBxrFoEX/+muYz8NJMwyRg5wPjvSYBIQPdNRiHz07EbettCy4OQRw/v9mo3o8AAG0kDOCT7lO0Zv////8Cz0xzJwEAAAAZdqkU6HnXJoHyQItNzFADHpdOkG6L+8+IrBhSBAAAAAAAF6kUr7+3TumUx9RfZphzi8QibQZSZveHAAAAAA== +AQAAAAGIjBCCsjgls53v4HcZvaWIlbJAn1W6eTiqefPP9NTwDgAAAABqRzBEAiB4evy04bEzyTTB1l1MfmvnFET5FSmUO4uVvOuvAvB3YwIgd8cCiHMcB/kGWp4xpUnZtRL+LLRZVUWQvTpMsZ5JilwBIQNsVirqETKlqd8w7wMTdW3YrscT6ZELH6ts7jJNTei5U/////8CAiltJwEAAAAZdqkUqOjsIat4A4FqxXwrWQ7Ilm42vaiIrH1gBQAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +Block: 405 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBOZSk0BJQYvUDJTSC//////AWCgECoBAAAAIyECkBtqJQm5YwuQc2mtkL4R8wNRLVEvJXO9n25nMQ2cQE6sAAAAAA== +AQAAAAFhldXXUfA8qI5grl07VtrzyM9xBWyH3uHkoD64c273igAAAABrSDBFAiAb0vXSFTGgFvlF8WQIgZIbQwqcGVEU/jgyoUikD9iqmQIhAL6LNwvzkG4uWva0f5GKzDJAFyF+FKxidhvRsGhATS3IASEDovMc0ddyWkwSZcDgsmBX2TfVoYDAoMi2F70I78P5Udb/////AgO8aCcBAAAAGXapFKMK+dh2UxMCPe11K/lyd50ZPd3iiKyvqQMAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAGyOCbJrPrzGpy1nA+0q8Hg6ExxBOSnyQiawMFfrnorwwAAAABrSDBFAiEAxI67mKvZMvUI8UhPSvIXnU2bEP9rK1ykZjwJcNO5TF8CIDysrUX3UpJOgwOs1RKkztAthskd9dZ8sTgvnLE0wtOEASEC+KGUbAvD6InsFfYQ3XwLsV9euPWPMCHMlapNGQXnqFn/////AuJzWicBAAAAGXapFLnytHG3TwFFBgTckCyiEAsG3PrwiKzRhA0AAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAFYU2PU5kuBwcJLBK9XZl96b8st7aYHna/KsujD1e0pBwAAAABrSDBFAiEAjJ2iivel8Maa+jswt0hFdfD+ZUY53zYpT/JFj9I/WQcCIGUoAvaldJHyYFbmLLib9/JvxXmOv6VT7S/zYor4PHUwASECJL4GCi64cZgHLaT/lYmH68Onwk0k9djagcMNzKclZO3/////At3rUCcBAAAAGXapFEqPZHTUFSN4WjmzcB1jd5hhAJPEiKy1xAgAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAEY42X4Ld8uymyn2Rvu/rFBy788uDnkSe0sqwT8PKKymwAAAABrSDBFAiBJ0Vt7RIXCL5sVqG5gm98Bn+RhnVMO4BkMg7+lX/ImlQIhAMEwvj/oiw99qHIqQDn/njRhuLTV6rNt9V6CZTFPn9K6ASEC+gUNEFUuJI+vPj1tPnvZ6lByNdRNV5ydk9EkzV8j71H/////AraxTCcBAAAAGXapFGGEsDebzf4aHma6j5QO0oD6N4jgiKzXdgMAAAAAABl2qRTBI26HmhE8AhJQ3EBHkwW2Lw/25IisAAAAAA== +AQAAAAH/aHqY3wtK2wUG3Elmz+rU/91y+MIOl9dhMHt9hpRTqAAAAABrSDBFAiEAhYkDXYns6LMztX4EFhwiTgrIN8Rdla9nBNLNPj/zV6UCIGO+cYlT4Ma9fTSIT6/fUTUYW3rh/0U66Wue5RHKxNRvASECr2l8hpB7XeO8Ya1SZmCWDNuwzrzOWkPqc/V9P1/c50b/////ArfTQCcBAAAAGXapFByorEBlr6G5gpZ8KMckZB3gA3WniKyvGgsAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAFpH0edqd1pTTin6zPek35NZ/DoLBQB5mcxz5dxVrot1wAAAABrSDBFAiA3zCqnTclkg6NC86G/2CQs2IoMSFdFnZ6u9Yfc+QErGQIhANJqEYChnRdmm8rg4ky4j9d7zp2EzcHu20ifafty/rkmASECD1N6YNQe8g6mG94PF3sGUePQyru32DoF5u6fwRQoHTX/////AgtmPScBAAAAGXapFO4jdIus1KvVWDRApglfvHkIp7jDiKxcqgIAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAEA74iO28JmRYEuR2G6spASybE7T54xqM++fiijlBEAKgAAAABrSDBFAiBA8F+NIrtFjahWEgrSOCzG4ZJD4dSvjHCM4MARNvCTsgIhAJ6nD0PPINdMkLbM1mjw2yIhvpB5t7UF+sUwkZvvAUSoASED6ZFni2vECCgvpbz5A3rN07mAecanEANZwU0Yq3Sw6R7/////Arx+NycBAAAAGXapFMmMKeBgpqVTSivQVOGTDT5mGz8UiKz/IwUAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAGqre8N2pavcDOCNDKK7bo534zFo0XqsJMcsHx7h7+6dgAAAABrSDBFAiEAjdK1aPBwZeNmPJlcozS8dd3/P8eNPDfzPhcaonFS4/MCIFMgbL7umAsxk/rAk8VDdePbJZKQnDSrkyKho+zhDv5nASEDV3CpenYFdHUzjoMG8pDWcj+PIQ5Tw5p8eAuD3Ywavkz/////AibaKicBAAAAGXapFJ6RXMzJ41l2SNk/4pIEZvdwWzHxiKxG4QsAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +AQAAAAGvPOv89gbEZQBrOl7H9y0o7fd6iqWcBJbL8uNOkNhHUQAAAABqRzBEAiBvq4hcoCmU0IaY7boYg8BimonJPzXtECaidXT2WQFqjwIgKkE80nHXsfIFbpFiBVLJFWhA+G6cuM+IQu7ubM+yrTABIQOOzp0qDbIH3L0JBSxKPtvW+B8nZ/rwXKIT+gAgvHzdUv////8C2qUZJwEAAAAZdqkU5RQJh5ecQHkg29azYbgQ+4gQt+OIrPxwEAAAAAAAGXapFDqj7ClcYp+kQzbctKO946eVAoNIiKwAAAAA +AQAAAAGVV22mSgPrcOFgajkgI3/tORHA5ix2lr0V9iCli4Y3hQAAAABsSTBGAiEA8GhExGDxaLXRehAXFJUY/EiObEhVmdKGOKebbiLcTQMCIQDRspQnjFd70dYSi+i2RDohcEzkmqWzEhajS8L4vEDJJAEhAmMHJwCToZWoQgKuc6fCsUrZ7z7C8Vp7A5TUZCfgoh8I/////wJ3/xYnAQAAABl2qRQa822KO9zdQUE6d/j1ODUsL2SRWIisE+MBAAAAAAAZdqkUC0MirAFxkDCnELYLCjOXwHTPnt+IrAAAAAA= +AQAAAAHMsXnTs46zU+YiNiNHtoZaZaQ/xqAaffNMIkH8Hngv5wAAAABsSTBGAiEAtSUn/YrIbUk5CsVyfF9ubs2cC06PYa4N4CjAzPSdo7wCIQC4Oc6fOnjSaAW4/zdJ+sXXHSZHTk0FYl5y2gDSut7+QwEhApqKcAtp9We40KHb+VbXyYLQH6tOvjVZkxof44CGU5YK/////wICLgsnAQAAABl2qRS+7VGnGMMgnqTQ/p1IujJzP0roRIisJQ4LAAAAAAAZdqkU7bHfr24LOUSdqBEnU4bt8utUurqIrAAAAAA= +AQAAAAF752CCpayw4GVGHNONFMyYwKKnmLbswm65+2v+h7UEyAAAAABqRzBEAiBwFzcBFCEBsO+1vMA/gn30WTWN1Gxok7cPtaIi/qsuXAIgde/sbLMwCO3YuMSQS7s7hVelN5FdnbnMor70zA7I3UwBIQOMykXrEU8XLaLD53bGdzelui3cD6gzqCp9Nt5mjSd/Kf////8C8Lf5JgEAAAAZdqkUwoL3jmIARIqGEwLqjHDba9Qm6l6IrMKyEAAAAAAAGXapFOapex2V0x6A/CTBdggM1llUGNyZiKwAAAAA +AQAAAAELkd36RITtsW01m4W4vSwMr0Me3EAYy0CEnvAO9bOthwAAAABqRzBEAiA1LZrTV9j41wTaABvOhUZgz6Kx0eeHs/U8cT4TUtNazgIgGYcLkEA6mkg1WcZ61cQtg2b02SZ0MtBf54tVpKA10uUBIQPN5RghsnVku8Spq0S4mn0Xf+6RbRBS1YLl2MwXuKvg5P////8CYXPpJgEAAAAZdqkU27jKWhJ4hRvi8pId3LEa+wLsU/eIrD+BDwAAAAAAF6kUqLs6uFxWMQTKkMQFGhRlMta38UOHAAAAAA== +AQAAAAEZ5Oce0Ev1SPzT6/xb4SvzWWRiMlL92NsKZhT5L2PkRgAAAABsSTBGAiEApMCzbaxQOhzHvLEcJd1I5c35bFYnzj3RkxOEqXFj26gCIQCoX1b/vBgiBUJmmgrUe3Vmpc0o0UEETSV7vLHwCkKvUgEhA6945mYaZYvjdMNrBidI1NSLbvaSMkzdJLW+7OhKFjhP/////wJtYuUmAQAAABl2qRQApNRHhMQXlIN8aWITZ3aHbwtxqYispE0DAAAAAAAXqRSvv7dO6ZTH1F9mmHOLxCJtBlJm94cAAAAA \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt new file mode 100644 index 00000000..3850b45e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +Transacion 0: A4E5E1B4AA8BF9A32315A8883CB18CF716F86776E3C27CA72B21B7A7DFDE3AB3 +Block: 1 +Transacion 0: 0F13F5CF8307D907DA65742E028453D83D47F5C33E7824328CA0C729AF0B8CAB +Block: 2 +Transacion 0: 0222E29BF085595596621C21BBA50AFDA45BBA3C01E7126A59A0CEB3E253142E +Block: 3 +Transacion 0: 174261297DDA0C89C010E867A40579F4951E56B78AA8B15130EAA235CFA5AB14 +Block: 4 +Transacion 0: D2F156E779F027C4C46D099414258AB32D79DC018EE69D03AD2ADD6775D679C4 +Block: 5 +Transacion 0: 8610BC1457372250463CEC3CD43DA980972EE47AA5C71AABA6B3C8111C6C6C3B +Block: 6 +Transacion 0: 8E541CF5D114C509F18BBA0D04816D6BBABCE03F3A58B5B742DC9A6896207E1D +Block: 7 +Transacion 0: DA362EAC5D49076F8B3800BCF91C84DA1CD14A083928BE397C9144EC95F17D1C +Block: 8 +Transacion 0: 6796EC299FF3A9DF15FFEA42E34070B64E5E80C86F5910AA6BEDE9EDC5334120 +Block: 9 +Transacion 0: 25AEB9B769B7906FA26CFEC93E56CED4FC80AAABD601ED6FD843D51627447916 +Block: 10 +Transacion 0: 45461B3C2F15060F81F3DA864A6038D8D2A10CEA0E950970E2EC9423C6622CE2 +Block: 11 +Transacion 0: 5EE1217BDAF7E1AB3716DA73AF2E048DEA39CEFAF09C1D62A3F85BDFA594BF92 +Block: 12 +Transacion 0: 1831BACF2664CE54943CE4B34683608DB0E8E23A26CC810F8C5757554435D8E7 +Block: 13 +Transacion 0: B69E8C913E734AF35B8327569232EAE99927D9055BEDBA6B8ECA0F3E53EB3FAE +Block: 14 +Transacion 0: FD0025868F865136D4050245D0CE6BF6EC90F7529B49B23FB88DB8AF3443C44D +Block: 15 +Transacion 0: 9E4D7F149C78A036E538B1D03AE8C8D734C25FC2C842AA56A7910E932C85FE0A +Block: 16 +Transacion 0: 0D58283D17F1570D586C8178F40B0D94EA905DCE59CEF6A5DB82F9B44517C245 +Block: 17 +Transacion 0: 71920001780EECEB8A1DD41E56D3C55F69829D47B61CEA567F671FBCFA7FBEDA +Block: 18 +Transacion 0: FC357DCC8DA390A9FCCB13E91EC0E1B3013E4DB26A575B96DF6D6BC98B2DBDE4 +Block: 19 +Transacion 0: 374A89A8FD64B25604FC5A09790814472B89FC4A937FC3A170C2C2F6DBEB757C +Block: 20 +Transacion 0: 4DF5D97A639197E9D9B70DC32C097E8057AEC4AB5DB6B8FF1A1553BFBBD39FAE +Block: 21 +Transacion 0: 17A43D53A865866049E18BF7144FC2A9896AB17AC368370C6B7569A190EAD705 +Block: 22 +Transacion 0: D22CC7D8B4895F2EDE00C9CF61A44C99F0810EC3D4B5177E089F8C7B2B5C1F15 +Block: 23 +Transacion 0: F36ACF2E619EC1D99C6A6217869E8DFB4BEA75EA0C2D560944C2EF6C8E326328 +Block: 24 +Transacion 0: 9FED83E8D0CBA6F70DA131CCA8A7072DA5032DCBE98E792858C47A5A452E9EEF +Block: 25 +Transacion 0: F43C1FC65D59123D5E042E7E2AF1AB855683B347F0529D7AA24488C84F984F09 +Block: 26 +Transacion 0: 2A19795218960268DEF8E2C4D882027ED2A31CDEFF6584BCF66B61089C355D6B +Block: 27 +Transacion 0: 02371302C953F1C670BB9A40ABAEDC9F6095882B51859EEA03999F324DD43F2F +Block: 28 +Transacion 0: F3DAD74E05BD02BF367339E434B3D170233D661DCF8F9F5CB198E8883AEB5C6E +Block: 29 +Transacion 0: 3DBCC2BF111806EDD2AF70D8C999399395F796A88B93F0F31469335A1798E62E +Block: 30 +Transacion 0: A2D96809C737AA708BF5F195662F25E2D21D0FC2D95317A77E8E8ACAF8D6BFC4 +Block: 31 +Transacion 0: B16C8BCA53554A697CF4C3BB66A80BA195647EF11810283D5E9AAD453783B822 +Block: 32 +Transacion 0: 8939616292F1BF479806F15D6E07E26B50F06A73020EE334929E28956B3D04E5 +Block: 33 +Transacion 0: C196190DE8616BF4E140104CA8437B0B693E9AB9B7770B748112116A4CA10B5E +Block: 34 +Transacion 0: F4AA9D561AA29BE53CF4E220E2DF856E45B5F565495565FA795C7C29E1CAC19A +Block: 35 +Transacion 0: 5D503E8FC5B7ECF3C0222D9F1281814F1A3A0A613122833D2050A07F8219F19E +Block: 36 +Transacion 0: E65228ABB7A5968CB8D820718E33D34932CA4B6B8451DE66569547CF55DBAC96 +Block: 37 +Transacion 0: 57379ADBBC73CA97E43ADCB4022DA01F02EAF8F14C17493A1CCE9784AF2904F2 +Block: 38 +Transacion 0: 70195C1C86B83B8BE6B9C59297BF20A1B91E0CA561152BBA72366B36CBDF3ECE +Block: 39 +Transacion 0: E6169C8D9A63269D482903A22C8153374537F6597F4FAF9436F26D3412ABC234 +Block: 40 +Transacion 0: 56815D13D9AA1FF1A596BD66A2D2B04A88B356BBB8521FB5A823FCA752BB3A11 +Block: 41 +Transacion 0: 4C959D16CC06A721FACDA6A802E0481FDAE802122C47F51EE22013DD09AC64EB +Block: 42 +Transacion 0: A9E267F4B01648CE18FF63C5A117889D71DD0580EDDA12F65CB1DDC709435279 +Block: 43 +Transacion 0: 6323464AD31CC13367992E482999DACA95F9229AC152B1648699675AA1F11A78 +Block: 44 +Transacion 0: E1E929712E75314C38EF659CB11ABB8DF7C4EF3E83C190236E94229BAF73189A +Block: 45 +Transacion 0: C3369FDA7A0C7FA6AC29A63239DDB3B6172487AB9DB8B4214C2D3D891175125D +Block: 46 +Transacion 0: E880D69D5CBFD81FBA371A352C353B372B768D602510D1942D0F97958F05C4D2 +Block: 47 +Transacion 0: CD491CE8CD04CDAC46011ADE0EB98D6769111E35FC28251BAA6B35A4C6980B7B +Block: 48 +Transacion 0: 4B188DFB56D2D2A93FFCCAD074CE30C573A74F89BF156416ABA374BA6901E1C1 +Block: 49 +Transacion 0: 782CA94DD3DAF11B870CF1949F2A0E5FE2B4F6EB13617CCB413CF80AD93086F6 +Block: 50 +Transacion 0: 42C2FAC11C4F42A172391E5E70CCD95C272F36D9AFCAE0FCDBAD3AB935122D09 +Block: 51 +Transacion 0: 764FC1684F34CAE7004F49DDB6D52B9E99AA467EA735778290C64EBA233F71D0 +Block: 52 +Transacion 0: 73A4FA7498AE0294544540944B51AF0861AB49FD925EAFC0441384899A13CB7F +Block: 53 +Transacion 0: 8253DF0375A4A60B066C1BB8116ADB52E053D7BF63729DAD48EADDF29046F8F3 +Block: 54 +Transacion 0: EBF19047FB8CE2031DC0032639494C929749114DB29F4AA179FEA5452808FAF6 +Block: 55 +Transacion 0: 27FE886C65EE305D083A9530E0279958D85439EDBCE8E888CCD2E704F837D90A +Block: 56 +Transacion 0: 85312A3737DDFE943B0FFEF9A7D638A04781C968880EA63CD76C6B4375EAB744 +Block: 57 +Transacion 0: 2E2A48C47DF96F22D71BC451973C5FDD9F2AA3CAFA70B88BDA463A946742555B +Block: 58 +Transacion 0: 750AEEBD659E338668035B0EE706A0E540D5E0A8EC6030575BED6ECD524DFE5D +Block: 59 +Transacion 0: 77109E090BF6B6C5AF69876DB8DDDC30AC2EF21B65587F50EACCFDA9B2D41CE5 +Block: 60 +Transacion 0: 2E8E9E02EF089A5F847FD4511A2B36DE7C824641119FBF08DA6E9D7A072A3583 +Block: 61 +Transacion 0: 7F64EE18122B5CE6ADF968E2297FD1D3F5BD58964018D8D3EAE6149C2C7E397D +Block: 62 +Transacion 0: B6E7B6D0E4D21A650F5B5300327B63C21DF5213C8AC376ECDAF428578854DFC3 +Block: 63 +Transacion 0: 72AE85BAEC608215D46636BD4024989D8FCF76067FC416E5C3D1B519F58802AC +Block: 64 +Transacion 0: E469C10131523AC7CDD85870D87D0D302BB2794349759FF70C96A3667DBB4DAD +Block: 65 +Transacion 0: 793780DFDBAD331F77D5ADE2935AFD53EB760B80C606A0C7AF6564DEE6F39DA7 +Block: 66 +Transacion 0: 1CE9C6F3F200A2EFABE5644DCBF0DC2E70853537610A27AC9982C8422CE110D2 +Block: 67 +Transacion 0: EEF95E45637283470BDCACEB0E072B6653278CEA847BD9D46C535D0D2FB01AE8 +Block: 68 +Transacion 0: 42CC2E40E3ECA94551B6924C1C08C4C10D50EC9C79410F8C25065840D1C9B9D5 +Block: 69 +Transacion 0: 21F032E8663935EC5E621C874216AA93FC0F54ED14BD7C7224452E846FE339AB +Block: 70 +Transacion 0: 381D5FD0F83F0BABE7073E2605D7E31E60B5D94513F9320EF595BB97F6A4E79A +Block: 71 +Transacion 0: 11845976ACC2AD8E319F3ED6269EA60727C35423177389BE28DCC83B5748DAB2 +Block: 72 +Transacion 0: B5B337F698A9F4CBC31747616B17B61BA79C8CEE5FF3F28F82DBA2098C25E844 +Block: 73 +Transacion 0: B9F945589F1A2EEE2EA3AF7557D395F59C516F541D42EC4C66C3E35E98705578 +Block: 74 +Transacion 0: 6B2DFA54A31F104C4156AE706290E0B0E824E1FBD840F15A3C7EBB4855C2879C +Block: 75 +Transacion 0: 41C1793B12E76424EB296D61BB88128EE51CCE046C7D51A42A136B08D4B0F88B +Block: 76 +Transacion 0: 8ADCB38D0A4F4B5F59A9D52D3997771E607FA98EDB434F1E07F8737A1DEEFEA2 +Block: 77 +Transacion 0: C933E3D8FF83C1572E442B5084AA1B9487246F3373574D848BB6F2ACBCAB27B5 +Block: 78 +Transacion 0: F2FD55491D4D47650EB4061908525D02C5C0B15570D0BBA65387B75DB9DBFDC0 +Block: 79 +Transacion 0: A53BE0523C9E8C5E30F7CE58BB550AFEABE45209773318A922E997A1693D2A03 +Block: 80 +Transacion 0: 79AB45C7B83B56ABAA1385698CC7B40086621C71B43382AAF8E2E4802BF37B53 +Block: 81 +Transacion 0: 1DE8145EDC1A55C11121C4879C7DF75A0E604BC7A73E2F2417A4028F7C5D0F6F +Block: 82 +Transacion 0: 22C793F05837F6613DF3992FAC656E9D3D52A92526FA3CFCCA8F9F31C043756D +Block: 83 +Transacion 0: 864C4D0E50425D23128C84B739454B8FCD9BE09F5312D78D547C496DE51A4980 +Block: 84 +Transacion 0: BB756A5FF9F3D0FEC49872DCA7D3EBDF26691D5B752856E80FC30B46022FB9FD +Block: 85 +Transacion 0: 0723C7FB8998BD250C8924F52199CDBB59D370C0FB157EECA1203DEB69833377 +Block: 86 +Transacion 0: FFF9F5E1DCC63AB8813C971890CD7E5DC18EE0D135921DBA4F149D469A89C3E5 +Block: 87 +Transacion 0: 4929B967E61B21C313A6067D70CA568672599E87CA7959844CC415D064D917CA +Block: 88 +Transacion 0: BED49855568974D074D6622FBB032A2A57F835C16D942DA543BFAF47E2B821AC +Block: 89 +Transacion 0: 5EA4267AEF9246E30A721EA9C7077C6664B7491F8A6F613C5CB2C323EA5EBEAB +Block: 90 +Transacion 0: 20C5F74B054FC5C921E778D60136E3B9F8AA258B3D5ECDAE28EE68AD15B2B1A4 +Block: 91 +Transacion 0: 39BDFB42528C6BBD24F6F8B6821A70F0B1689310B5BB7F96F413B42DF591B4E5 +Block: 92 +Transacion 0: C7DDABEAC231AFDD3FA7860FBD86E032094B3ADB545BDD96EAEE0ECC0DA31A52 +Block: 93 +Transacion 0: 1CA2A5AC3EFE7D880F88CFAFD662E74D68181AEAD4F274B7AF060C0520476BEB +Block: 94 +Transacion 0: 462F13E5224DE320453FADC2F713BB02CEE41306C13A536AE5E06428F3380B5D +Block: 95 +Transacion 0: BBD413A6AC23D5915F4631137266B8DE22860A905AB9982E577B21E53B614DF4 +Block: 96 +Transacion 0: 9443F91C59B440AF8D136CEE76E5CC3DE5D654BA4BA801F131ADD3A79FB68F61 +Block: 97 +Transacion 0: 0CC41453670377733FDA84FE5E5D90BE8C381E0D84223B2ACEFCA6084A849223 +Block: 98 +Transacion 0: 6DCC0DA064CE086B24F46978169C4C0334C7587260C5D0F76EF380FF04183241 +Block: 99 +Transacion 0: B5A09B3E75769B73FC5557E4CD840B6F39BC64187122282C578707A634DC09D0 +Block: 100 +Transacion 0: 274AF90F85926F3CA180A9C9473194C81B1809FF8C9302E8762AC71C95332A89 +Block: 101 +Transacion 0: 1D24FF86321874A2D276316822CC09A63B37097F56A7D37431E3D420A315F90E +Block: 102 +Transacion 0: 6FEE3ADDF456635330445A533EA7148771B0AB818B174A426D691E694D3D5B55 +Block: 103 +Transacion 0: 95D84FF92436C233ACA0BF8357DD8A3219DA6BACFC1EC56D60A7B7FA8029FA94 +Block: 104 +Transacion 0: 769467A22E021C7050557699CDCEB96B5AA4B788E14B9B1623A333360BD05B81 +Block: 105 +Transacion 0: 5BF2FC3095ABD4EA10EFECD4FB99704F9593F67F55EF3CFA44741A058B6456F8 +Block: 106 +Transacion 0: 4107D20DB19E32342C40AF84C8B0738FF1245008A7CF3395B71F41122B94E8A7 +Block: 107 +Transacion 0: B9845C6516211C96AB876A27700C30294947E14F5BBEED573E0D42EBFBA3B9B8 +Block: 108 +Transacion 0: 82F63509F597F986634B6185C242D8ECD6D34E2145F57DEAE3E2606C3574B5EB +Block: 109 +Transacion 0: 6EE27EAACAA4DEF6C905360A881A830C2FF3A8311C83BCAD467B44A014E14CB8 +Block: 110 +Transacion 0: 8F5CD5C2A31B270EAA3F2AB70DEC42362949D26AA350C4F6C8C52F6EDA19E28E +Block: 111 +Transacion 0: E3DD473F28D39FEBAF63176ABD5A7D96A1C60F9CA22C240EA453ABC9BAE514EC +Block: 112 +Transacion 0: 4600AE9F51506E4F515F5FE34975A5368C6669942D1B381D3FE14141272B33FF +Block: 113 +Transacion 0: 55C4C9F33F9B01148A29F909FE97E92185787F5B4BD7A7D888A8617B00C77719 +Block: 114 +Transacion 0: 810CD8B85D8152783330E9722BA547D58B6A928C77E22A6631C17078F2AD078A +Block: 115 +Transacion 0: F08DA27F8BC70DBC5A1DCE77D509A44DD0751FA2AB3EF3973AD3424DC863D45D +Block: 116 +Transacion 0: D2438452865CB38913FE6725085FF91D153C8FCE908F88766F8BD579D4F0DEEE +Block: 117 +Transacion 0: FDA9353057B3F0871A690DABF5826BC3C353D0407A6C89DB7455D6496592717D +Block: 118 +Transacion 0: B4518A34A3D058AD7A9A07842B9CFA718CF9A2C13458DF883F30B74D69210758 +Block: 119 +Transacion 0: B99BCC672614F4E61E78834B9FB955CA2AD7E7D17584465C8D604D91D5651C7B +Block: 120 +Transacion 0: 9700FF159A785C679924EC104DF962CFC18A229B725B2C1E84A8005A3629A690 +Block: 121 +Transacion 0: 1985DEF8BDCC65373924FE62694B041113B198DDB9732AC3BD674201D7D37E5B +Block: 122 +Transacion 0: 6B417A4E70C86DDE0CC3CC7833349DA8E71D4087081CDD36CF87A2C676804B83 +Block: 123 +Transacion 0: 9F558EBCCE91D5B1E59AE27DEA61235FAE1155B1CF7D3AF0DED0B6508C5734C1 +Block: 124 +Transacion 0: 4B27CA6FE3FADAC37657E04307DB40C59C0065F332A955AFFDB11F20F5896624 +Block: 125 +Transacion 0: A9F3AC66CD6D2E0E314B36045CF0D40808C2AF3E078B997B97DA25304325605C +Block: 126 +Transacion 0: 17588504EFF9F3706D3ECC205BF7486F5B48CD831228FB2759A78C618BC4592D +Block: 127 +Transacion 0: 32456269E0F40C03DC0A5A20A429CE3DBF4D69C2E0EDA2A09240375DCA2417B1 +Block: 128 +Transacion 0: 52BE53C2ACE54B98C9FCAE139E2214D6FFB9AB7E47B96DB9C23F66BB14029496 +Block: 129 +Transacion 0: 30A5899E2FC047CCFB11098C5447BECE0837A9DE522509EF73124ECB0052D5F0 +Block: 130 +Transacion 0: 5ADD490797C2A96DDF1A014D1BC9F9B2B270BE692D9335A0E0E10C1BF2A0CA8C +Block: 131 +Transacion 0: B7F959E0BAA981D1FBA7FEAD3D11C95ACF8C96C679153EE8C22754D4226B7251 +Block: 132 +Transacion 0: FF862E8F129AA42D1972281B3F9690AD2D1AA073840BCC87EB30631A78FD7B96 +Block: 133 +Transacion 0: A643E43EBB13BA2BFF89AD6996C3F0DCFD135384E992C0439B79775E49DAAD58 +Block: 134 +Transacion 0: 26DE07B5373DEAABF450F9ED0DADECCD0091E48EF1174675D0A379E845203600 +Block: 135 +Transacion 0: 7DD993C21FE2B29B85F4C71E7EF53EBD7591143E65828A5C99203F3D235661FF +Block: 136 +Transacion 0: DAAC50396C315BB389AAAA3D0BF7398D589519BAA6C6225184B6D87746EFFB7C +Block: 137 +Transacion 0: F1FF402E25DF797B4AAC64F3FF0263D4E9814A7B9190AEBC09599E6F150C8ADB +Block: 138 +Transacion 0: D2A49B49F0E0D2FDFA3A5DC8A12AD55E93B172104FFD454C6E672FEBE480AAC4 +Block: 139 +Transacion 0: 182497B07A3AFB497AD8B0ED1E675476A134E828801F9C3BBCB2FF5D745CE559 +Block: 140 +Transacion 0: 410A7CE37AA854449C6DF6A0D358FA15722F95FBE0FBBF1EB33486EA6CBB545C +Block: 141 +Transacion 0: B974F15E4BD428D4347F78E3317103BBEB186DA4F3A6077E98C42E40D8453653 +Block: 142 +Transacion 0: CC687462C47BC20D806651C62A464A1D1466C2989941FFA95BEE16FA9473A0F1 +Block: 143 +Transacion 0: 274DCF34CA75A6B4F2F1531E3B012A8DA301213AF6CD8731CE326764592033FC +Block: 144 +Transacion 0: 225876257F4BAB51423853D566BCB148DD166EFEA8ECEE1E3F2EDFC3750343E8 +Block: 145 +Transacion 0: 704E6A2D1F74223161491ABBF6FD90C69E81E68A96E110F40E14F69FCC09E622 +Block: 146 +Transacion 0: D54D07B9630AC02A00CA412E4CF349DB09E9378A92556E28558532837F86DBA0 +Block: 147 +Transacion 0: 95312925CD6AFAAA7F6583B02C3654652878C93992BE93F11015025FD6625E87 +Block: 148 +Transacion 0: F65FDFDE5D6BABC425105B36248BEE7D0C4082BD326C488135CA6AD833F16B2D +Block: 149 +Transacion 0: B142EC4CEC5091FD20A84F1439F461C1F3BD6CBB6F113DF33FE9B0860FC30B1F +Block: 150 +Transacion 0: C50C6A5AA28A141998510D930F40A523A1BF6AF9428142BA2544D2A0F9E66987 +Block: 151 +Transacion 0: 8501E2238E84BF6DC89284D00ED056A3886AED70C7648D6F3C478892F0B2D434 +Block: 152 +Transacion 0: 10040CB5759E5A8280DC82B0BFE7A00DB0C8838C0E220C24E5825237815101B5 +Block: 153 +Transacion 0: DE79DB20034CCFE9356ECA2D088A37BD65930A78FF8547EF086A470CA8986EF1 +Block: 154 +Transacion 0: CC4CCC27B0A3F659F4B6E25E13B86B1BF9B40B76CC7E176D6C7D4692754BC71B +Block: 155 +Transacion 0: D23CF8DE42F8592430948CB3F9E1B69F6AC81DABFE65190D0F91C635D45C2A37 +Block: 156 +Transacion 0: 4AF5A9429D64EFADB1C6E275B19A14CA9051F5D4A6953753689EFC3120C58DF6 +Block: 157 +Transacion 0: B97AF236B791CCCAE09A7FB91B00088096DB3D254646E7CEB9F286CA4AF76569 +Block: 158 +Transacion 0: 1B24142042F0976925620B518F8DD4F6E9A6FB566070F15407DDE707A728A5CE +Block: 159 +Transacion 0: 081275A54425179975884E95FC8C180898F999A7588F2E8C0C5D864DAFD2803E +Block: 160 +Transacion 0: A9124A08448259A61650202556D2B59B56002CD250F15FA089BEBBEF6CEC1AEC +Block: 161 +Transacion 0: C77230FD6B2B7CD4703C5FA4F7B146480DD7D7F703BF2EEF5107EDEBB6902F96 +Block: 162 +Transacion 0: ECC90E655EC6FFE481925BF7DC580CD1897DED8086B2C92E8C223A1A3C15B82B +Block: 163 +Transacion 0: F4F1F722AF674BAABDF6F9039029056E71D4A16E1F9C0D67CF26E4EBE50E1416 +Block: 164 +Transacion 0: CF0D80464703DAC273D32425212096528400C3D0607237605C22AEF50E20B2E4 +Block: 165 +Transacion 0: 2BED756E9291332DA0CC14CA5EEAA6A86DE4F98B483EB1806E8548E7108A89F5 +Block: 166 +Transacion 0: 1380A067B7AF4AF7C6193A4B03C2397C8D8BF11CFD686473B012BEC5909BFC5D +Block: 167 +Transacion 0: 65A1C9B523CBAF222290FF857AA9E0FFBCFF830E7CD8AE046AA284A751E11F57 +Block: 168 +Transacion 0: 34D14A443C5B63788468855A5E74DAFF6EB08B50A7FD1BBA6D8657AA23BB3054 +Block: 169 +Transacion 0: FA95FAA636E0896DD940F57A818305AD3054497B5582AAD4CE821F7DA7D5AE13 +Block: 170 +Transacion 0: 98BE93DF4054D67C601A6627BCDE85C2CDEA7DB1A6A4E2832AC4266BF8592EEB +Block: 171 +Transacion 0: 1E50E1C396BEE2AC32A307206C864D39EE9EC198EE133AC010AF002E34EC0EA1 +Block: 172 +Transacion 0: 5BA5B3BEB03EA33C268EB90D54C37555046348A430B69080D1FBAA9A40879264 +Block: 173 +Transacion 0: 776BAB8BF26A81F3A1387B50152EB2A75542B074F98027FAD943AB5E1D45851D +Block: 174 +Transacion 0: 4840EE9C31A591F83FF72F3F6B503FD4BE863B451C8E6AD0898C1EA9CABB6457 +Block: 175 +Transacion 0: 2F8DB71AD63FFD8D5BC13CE4E9E7B375C6BDBB27340C041278F33E784EE4BAD8 +Block: 176 +Transacion 0: 974F39F6A3DDC1831508C61E5911554B21601E1828697A975A7CB47760737516 +Block: 177 +Transacion 0: 7BB7EF28041E793A0C403E416431BA92CCC5DBD63F28BA5E689DD818EECEBB4B +Block: 178 +Transacion 0: E15FB5A869FB5ACA8AD56C68458CEDB4BF9C724E1B31BD65727E0652ABA18CD7 +Block: 179 +Transacion 0: 3291B6FDDDE92D944AD9A840561781E92A89F6D0FD542A113CBC367A2C442CA5 +Block: 180 +Transacion 0: 2EB377CDC77C8DFF306E0A34311BE354DAE5B9961F22A353D3CDF3DAF24E6E06 +Block: 181 +Transacion 0: BE5D1FA61FE999FEE18004D11ABA8A4D50DE218BE962385009FE4122D2F7632A +Block: 182 +Transacion 0: 9AC3185E4388F10F1ABD1BD0805A0533A66521F98301B09EF13F5C894DE1F4CF +Block: 183 +Transacion 0: 7DF85C829FE00738F2DC6BBF81C1835A33651D5F6AB862DA14EF502671666522 +Block: 184 +Transacion 0: 0A920E24FDB994B503FC591C8C78E698E2D93552D09716CF15B5F9C33F94DC19 +Block: 185 +Transacion 0: 53FE31BCA00D52655EA33035218EB9F4E16AD2F2A1BB63ADEEA64D09AFCEE5CF +Block: 186 +Transacion 0: 4013E6BE12D943854C7AA15FCBA3F5979BA2C2024EC2484808A509F27B17D474 +Block: 187 +Transacion 0: 75DB616F062ED403F6F326C69BC51DB6D70C6196D770475107182FA20EE34CCB +Block: 188 +Transacion 0: F44515939990A0DC688902918CC2A267EE2A544465A80ECA0C15BE23798BC1AC +Block: 189 +Transacion 0: 00038DB28BDAD97D66F49D2ECB410DEAD3C93BD4C25DD685865EFB98A92BF4C2 +Block: 190 +Transacion 0: 1E25E57201E1F145446D5B1984E2A1E6F30D785974E22F60F6FEB28232B19E86 +Block: 191 +Transacion 0: 8513A31BA0E68D6F694E67B9062A7E9F4AE5A828684D89BD32357B7B01B9D23A +Block: 192 +Transacion 0: 84478A66084ABB4935D771A69BE6D6466EF8716325EAFE3AB7311AA56FD4EBFE +Block: 193 +Transacion 0: 3D9DF8495896FADD682451329A4558743743E6BB638D47D773D5DC8D37B7CCE0 +Block: 194 +Transacion 0: B25A526C33669B7E184112E42681A27E7BA4E6ADFAAD8F07568308EF17960C33 +Block: 195 +Transacion 0: 72E9408813BCE244D1B6DA2B04F295129CE5A2D11B0143F4F9C26AB430637848 +Block: 196 +Transacion 0: 046F44EFE24A07E4DD99AE2ECF3E1ADD608C4252D0250FAF0106307140E1E557 +Block: 197 +Transacion 0: DDE670E27B0E29CACA83621C3D6412C881D807875940CF6197E5156A650A39E9 +Block: 198 +Transacion 0: 05E31685EE3F88D6F6DBD9731CBF0E4A471D64E98A149575A68E2C024DF20B96 +Block: 199 +Transacion 0: F7603D45451CE00405E3304B776E359DA698FE741CE054896F33EF6F5B8BF0FC +Block: 200 +Transacion 0: 547104DB4D373CC3A29D12D341318778EDD268281DFA38363244BBA44C214D88 +Block: 201 +Transacion 0: DF4CC31F486CBEA1873D6F61E7D0CD671A2CC67BACDC0CE7546DB1A1895FBA3E +Block: 202 +Transacion 0: B32F74E782D6748C99977B415F130798ED9546FD94A423719C6E8DDDBD0DDB41 +Block: 203 +Transacion 0: 335E2EAC0B5ACCFEFF0AAD66F5B8FDBD78902612B864538CF4FAFE5F64A7AD7E +Block: 204 +Transacion 0: E7E9EC57FEBB95FD3BE82454AF9174346336D62B355806A6ED1C2C13F7A686FD +Block: 205 +Transacion 0: EA0F17D9ADC6C33B9C30D98BB6C3A19AD79A32828B92B1F927E9EC88514731C9 +Block: 206 +Transacion 0: 646E19BB59854C33324257C02137DD229968837178B8F8BE7C784D180ECD5898 +Block: 207 +Transacion 0: 5F38A6A30CFBC62554127E6CE228FC63AAAACFDCA30B736AD4718FA75455DE96 +Block: 208 +Transacion 0: 26C32873E5596D430ED220A8A56FA7E379002CB526183EE7A7DD352D4331FBE5 +Block: 209 +Transacion 0: 2EEB010E97A954ACB04CF95567229A5AC8157F5979E32AA864A1B20BBDC818F3 +Block: 210 +Transacion 0: EC42B7CE0A6A9B2997975941A07444A6730A484EF154EE479BD4A9550ED4A433 +Block: 211 +Transacion 0: BFE7DAA72079393E28C925A3ADFFC3D6AED7CC12798C331527D1F269FA63092D +Block: 212 +Transacion 0: 92BF17129D0C1347508907DD878F2BBC976E0934EA9C8FC3B91972CA46465F4A +Block: 213 +Transacion 0: 5ED0C457ACC8B1E615B51BD74543E8FFA861DE7A959D3C33A21CFED0CED063A8 +Block: 214 +Transacion 0: 29B1E8AD9C4BFB47F97643BE82945CB59C5EF685559504844DDD46A1DCC37BE2 +Block: 215 +Transacion 0: 243260DA2118368CFD808A484B7959012F833A869AEA72141F86FDA89DE4F58F +Block: 216 +Transacion 0: 722B3FAEAFE96569BE678A69C05905E227B746F043D430A13A5C99B19AEF622D +Block: 217 +Transacion 0: B0283F61968394BA35B7F9601FFAC6F1B8A177E16179A0BEC4AF62F47ADC88F3 +Block: 218 +Transacion 0: 7178A912E54E192CF1DB3E2EBD090F735E171E673208A8E3AC533C71110FD7B5 +Block: 219 +Transacion 0: 24FB2B2C07ED381C3EBC1F32C374E609C6E568A4A29D8C04842F0F0DC0242997 +Block: 220 +Transacion 0: AE49085050F534DB53D4E1CA6BB8B3958B6933F9CE6AC41DE8A2FB9241F3E03A +Block: 221 +Transacion 0: 0338BC898080D83A808870F3A59C253C0AB25A249337B63CE26DF34D641B11C3 +Block: 222 +Transacion 0: 93D392D2650FEDD9D2CD4CD67AF8792526BDF7509AD9C4104F766EFCAEB3C71B +Block: 223 +Transacion 0: BF2A8B59866740CD1BD0C1A399FDB1B5801AAA84EB632B9FE70B5A89C54DF42E +Block: 224 +Transacion 0: 4C365AE469930A4CE2C2B52BB6CB0CC25328A3C424F8A948C34F07B4B40F23C8 +Block: 225 +Transacion 0: C5DAF96771C7646ACEEEC484892CD4E8D9778FB9EC7C8579941C298DBD060F95 +Block: 226 +Transacion 0: 17F898824DE670FDDAC71EE77474FE3235F638968995840020CD834AE06C046F +Block: 227 +Transacion 0: 67C3B1FE96340ED2C96069BE1E3829E26275C584D9FE709A9B98AFDA73C3CA95 +Block: 228 +Transacion 0: FD784B0505E776DF56731C579985984CF739864F1B349FBE031827506353E52E +Block: 229 +Transacion 0: 2124DD113F28088226FF292FD05D9AE665C9FD9D0A45028A47F7388BF1FEA351 +Block: 230 +Transacion 0: AB3D904C6C32198304D1ABEE9A3EDEF06DD3173DE598069F18964443B8693812 +Block: 231 +Transacion 0: 2B2F2AF6E7FCD81AB3AF6D453ADDA38E7CAECF2A4AF76D7330CB4B0F8A1E8F7F +Block: 232 +Transacion 0: B5EE6BF7B6A0B0B70CFEE686E58CD51B97F95595F4B4BF0131A4A904A2C9B46E +Block: 233 +Transacion 0: E3B1B614772EC74C2128E445D55E6AD1BA53D75B1BE5BCA1AEE30C65EDF21A4E +Block: 234 +Transacion 0: 35DC0CBE986E28ACC5532DE06D6F067403CAF57CA129B7985FB0DF8C88A53AF0 +Block: 235 +Transacion 0: 0FC94817E1476C418BAF9E387A37CB7BA744FF999977401482D86FB87D99CE3B +Block: 236 +Transacion 0: 550377252E9922FBAAB445B1393944288094831059B54D7148F6DF463C8B52C1 +Block: 237 +Transacion 0: A6E25AB745F4ECE163AEEF6C4543683E4DF96692D5CD113FCE226792B58FEEAA +Block: 238 +Transacion 0: B59FEB8D4DBFF34EE30262E81875DE29ED1B85643D577BA8A222B6368A381DAC +Block: 239 +Transacion 0: CC16AB9F1835608FADF8D91E5020F3EDD0CD9462D9A86CA7F6C3881B94A2D95D +Block: 240 +Transacion 0: 760DB09C3A33EB03DCAC07BC773D0DCB980529751D1C20799C667B42A3B0992A +Block: 241 +Transacion 0: 10E3224E31DC3F8EE0AC630C850F3AA10CE0CBBF5F74AFA665885B26D671937E +Block: 242 +Transacion 0: BF15760DEA728B80335BEC2797EC77FFC1A01F2B4E8C2812217E5DD2CEC2F5AF +Block: 243 +Transacion 0: E146943CD1D6EFD812B1D7059A9455277E71F39CB1A5643A3A81A853E3D58F17 +Block: 244 +Transacion 0: A47E3DE47480ED9CDFBF0158FE838286A5F7D789E6724867E029F9E8A033A046 +Block: 245 +Transacion 0: 64290A6A8911A348C1820C333039F770052AC4981B0199B46AAD556A270F60C8 +Block: 246 +Transacion 0: 11C47D4554BCFA439E844A2137E6F09E62DE50AA741EF9FA90BF187AF1EA3903 +Block: 247 +Transacion 0: C2C27A64DD86B0F2B02E626AF8CF2F945F9805C43B590E0108C0D69CA6290E2F +Block: 248 +Transacion 0: E04FB7918E070C886A4044B7B56BF7EB35F2743685088C58511A3DBDF4DE503C +Block: 249 +Transacion 0: CCB64DA9DB3AC1752806F2C9EF207B55E77D110B9A9320C1BCA749C596CFE804 +Block: 250 +Transacion 0: F09D91F3D8AAEFD8F100E54C5955A0EB05ADBD2C502B9141E595F77ED04D35CF +Block: 251 +Transacion 0: C6F00826031E4E572D3BF8C5E4E89262C0F34B3F2451D1D8B15D49EBE6E156C3 +Block: 252 +Transacion 0: 238AA765770816A8BDE3A8B039E42AA470613CF7E5A915F7C314962EB02E0B29 +Block: 253 +Transacion 0: 15AE5DD71A77AAD7B14B9D62AE93A2C416D5158DC1DC12ABAFB2CBC737ECEECE +Block: 254 +Transacion 0: 904A5F0927AA6AA53DEAB0E4743BF9F8176AC0B5BD99BCEFAA13B876AE3EC218 +Block: 255 +Transacion 0: 3A0E1E9B7A22020A156DAA08F1B1248DA8A64D76344EE5B97E10763AC2612691 +Block: 256 +Transacion 0: 7B64E63E637AC7F9128B792FCC9ACF026AF45A21892C6E21731DEBDCD68187AB +Block: 257 +Transacion 0: 708CDF710539593B56B92626DB7ED741782E1AD739718DDE0F39C6651F097105 +Block: 258 +Transacion 0: 5AE06A6FF0F242FA09997DFC47761E948943F50DE170BB951F4A9B3F8B01A8F5 +Block: 259 +Transacion 0: 952A69E8A179A49B4DA6C55ACDC5CF022678D9813385E7D14BFADEB917C59847 +Block: 260 +Transacion 0: 8358B279FF43030387BA5D95BCDB85A4900E1BD6BFB8AE53390DB20EDD88B6C4 +Block: 261 +Transacion 0: 3A29DF8EB46B59C66AF3F2299994F9163CDE3E759B676D2B2B93AD2E7D47AD41 +Block: 262 +Transacion 0: 36927167905873357B104C399B47C243774CC70283AE55B54BD5C2B443D4FC67 +Block: 263 +Transacion 0: 2A4957FBF6A80F74D6F344A094114EE338E5A5C576A85D5A3278DB4F554A8CD2 +Block: 264 +Transacion 0: EE8167476C693DB55DE1500619C39EC674318193E9B2327C1B8D7A36598FE070 +Block: 265 +Transacion 0: EAA56C2DAC02C8E12A663273D16561C9421209CD5264F84078E764A22BE94FA4 +Block: 266 +Transacion 0: F4DBE6D395C7E93CF0E527C3D6C5FB14F1CAB10088B2FE0B782C4CB04329D437 +Block: 267 +Transacion 0: 3FAD31404D8404988697F3C3221E26C3E5CE81FB4523F368AC5F29F358758257 +Block: 268 +Transacion 0: 0A4FE4E326D3E9FE15FDE6732B39DFB5A1AC26691A6515EDF71F866AB394CD62 +Block: 269 +Transacion 0: 68F723467C0D39CD822314E57CD56554C3C93C19C135536B4A50C3E9E738A35E +Block: 270 +Transacion 0: 975E17E211AFAB0674B881B4FB820360C3A31A2A2CC77B60DBC27C2F531C3080 +Block: 271 +Transacion 0: 418F2343797ACB0990B77634CFF89B8004736186731DA21B69C1170BBD4291DA +Block: 272 +Transacion 0: E8AE5D397F893664281E375F02B9D4ACF7ACB9CF3BB9D86862A064881C8B0155 +Block: 273 +Transacion 0: 87A7327727E0B63577808F62DED3FB460253A34A0AE03176E7CDD965E37F4D45 +Block: 274 +Transacion 0: DF4A6FC4671F456EF277B6719EE69E16244F81ECE8F20DEC7A8AA13A5EB5A6A6 +Block: 275 +Transacion 0: C8E3DF1808DCB932EDD2903EF5DAF5B228A294373F075A4C0FE1A7AF76737081 +Block: 276 +Transacion 0: BCB248F3CA047C720068837652DBD2F6FD18928D328269713F41972E7090A51E +Block: 277 +Transacion 0: 3B224AC24234E0C9699ECBE3C00EF8FA0830BACDA03D039E88FC498C1E88CD6F +Block: 278 +Transacion 0: 884967FF0184272F9CA36C15FE924B6C4F08D061E1F28A951F88CC839E2BC118 +Block: 279 +Transacion 0: 7D6294D1EDD1E8D094BDA5E171C8629932E3B5C7A47AF7F5DDAAC3922F89FFB0 +Block: 280 +Transacion 0: 07927F55432755A5424FBAA5772907614EE972A65BC2EBA6A2DC80D1A7005B77 +Block: 281 +Transacion 0: A286B5736560D59ECF4478C802303B897387BB2EC900AC3038C573CF5D503405 +Block: 282 +Transacion 0: 7F5CA571B6BC1D00A863777A6029F426FA98E4A450E9AF3D959C4F493D9C9761 +Block: 283 +Transacion 0: B760A4BD2C34A782B9B7165B4C404853FAF145B21C73E7E6738DA21E29D6BD52 +Block: 284 +Transacion 0: E3E040D88DA72F2B805D1A73CB86E132BBD2BBA436437AB5B0D24DE3487B0619 +Block: 285 +Transacion 0: E291A329072C2310F6DCA22D6F96F6A98F8E700B98992524094B7E4943A91851 +Block: 286 +Transacion 0: 4DF437A5C7CEB7150BCBA89AE850226E322E591F5FD304B8A958767B4344EF6C +Block: 287 +Transacion 0: 9009265BBE017E7739030E7D75292A37E77017137AE671DCC7385606098F6D21 +Block: 288 +Transacion 0: CBBF961139F9F8B1330A9B2FCA606B9BC12AE77ECF9C1B4CFB6FE33F5754BA54 +Block: 289 +Transacion 0: 880A09AB0ED3D5C360A48DCEF4982A6C92FABD0738C9ADD39ECE4530D04FE272 +Block: 290 +Transacion 0: 6FD4837D07212F04C08278CD4BFB7DF567D1F3DD871ED9FF20E39913BFDB57F1 +Block: 291 +Transacion 0: 1C3CD06143D410F638D51A29CFB3CBB7C74F2C27285B83270B2D45EAC36422A7 +Block: 292 +Transacion 0: ED567767572E73D8C36543265DC07ADDA68D9D77030EDCCEC80F6D1DB2E89937 +Block: 293 +Transacion 0: A0807C71A404637606295AA2C34E64360B0C3FDC3AF5B6BCEADBD1D6B896D840 +Block: 294 +Transacion 0: 6F0284045D2E8CEDB02B8361A907A88676FEB700DE502F10148EC08C1C5F48FE +Block: 295 +Transacion 0: FB9928BC2D57A6E23B3F134BA687B3D7E33B94B111D2C148DA88D4BF0EB7B02D +Block: 296 +Transacion 0: 2B544C2144C96E18865BDC2587608994B3040870C3203EEC4764BB05D901F57F +Block: 297 +Transacion 0: 5349C232586129C7199A903B2AF1BE9D952BD5AD46E5E22315329452876B1DFC +Block: 298 +Transacion 0: 5237D9837A59972316691BA82D8B865F301CCE5FEC64640FBF82A78CBFD2C421 +Block: 299 +Transacion 0: EE408DEF96C7F38E05378E9069B597343499C04694CFD51A64680FC0C158F69C +Block: 300 +Transacion 0: FED86F29C1533394C0EF76A659C00A830C369D816221C40BEE701A8E87CBEE57 +Block: 301 +Transacion 0: 8E27628916CCDCAAD5D7379057C6D79C40AC21250E51A06E79E18751A970C937 +Block: 302 +Transacion 0: 2AF236410966662C0C5257F46DA184C3830272F6D5551966C75C262B2B645B6A +Block: 303 +Transacion 0: 34578F62E43649464CCE0E9AA54763376DC8D7511336C03290F36350121C99AB +Block: 304 +Transacion 0: 70DADADF7728CD087A77EB7E3AB9B8E72A12C0D135AD63BAF78572AA0F00D6FD +Block: 305 +Transacion 0: 40610F7D6525C7EADFE147D8BB4C13239BAE3EAE77B8191AF083020FCC65E016 +Block: 306 +Transacion 0: 73363375BAB4F662B4FD2FBDCE2BEC3A5E0B9DFE83DDBE7D7FAE14C95099FFAF +Block: 307 +Transacion 0: 90E5BE62397951A3BD95AD76AF33B4DC3E7A19B3494E8CE0A18AC54AA485A0EB +Block: 308 +Transacion 0: 18D2236DB947FCC7FA2D81158C747BE4D473143D55394FEE3E32391051FC095C +Block: 309 +Transacion 0: F4D9F729573ABF344386410355B456CF9B8587E4812810A9747C1C04E1731F7A +Block: 310 +Transacion 0: 98D9C4D7A64D0689B5EEF36BE54E98F5497339DAB2D8E3C44A3CA3DB47AC4940 +Block: 311 +Transacion 0: 6639E7E42AE559FCF44A940EDDCEE8E63C39932FC637576F9E3C5D238AE18006 +Block: 312 +Transacion 0: 515EA5F03C185AA49F3E728FC522700028AF4B05CE1F0CD826F39CC07D2B1DF6 +Block: 313 +Transacion 0: F38E4AD932FCEE2878C9FEF03AEAA968FC7CB938FF10EEA71EA5EE458788CC4A +Block: 314 +Transacion 0: BC39041B0E204EAAF5E609C48C634B6B68EAF6B8009AA902D8584F9A0C77185E +Block: 315 +Transacion 0: B2EFF3AC5056EE12E2B5A96AF746F5973818AAB93FCF4738B3F391F27C66B159 +Block: 316 +Transacion 0: 18993059912EC40D6E99D0DA4EEAB6B6C68B9F959B31DC0C2D4D2D30498A62E2 +Block: 317 +Transacion 0: B100A150AEF9B61591B6CA2CFD8692925204627EE2F661B37D151E08885A446A +Block: 318 +Transacion 0: DD3925C652A893370AC0D0D3B5DEC42AF6391A3AAFF91996EE48E71E58DB290F +Block: 319 +Transacion 0: 835FFAFF59E532597D29F974049EC861AB865AD8991DD054EDCFBB4DA5C945BB +Block: 320 +Transacion 0: C026E8D8047E96DA914FB6EBE3BF7ECFBCFAA19D8A1DD6732C2D4B8787C315BC +Block: 321 +Transacion 0: 30F086EEFFEF66AB6314B07C9617FC740DB852B92C2A9D79AE2115038D0E3A16 +Block: 322 +Transacion 0: 6CFDF75F7A699B9856521D5982DA57E5668D02E94AA614F9669763A784C8FDBC +Block: 323 +Transacion 0: 817ED60CCE3E03EA3BA82C06EFCFA7441861E7BD3EE016852596BAFF29EA61FC +Block: 324 +Transacion 0: 6C2B940931F1F4807BA24CB13ACA6B13F26100E84D5C4BA55CBFB679895CEE71 +Block: 325 +Transacion 0: 2B3F28B6368049E01917F44EEAF8EF96844B9D0CC72475C86323BFA4AF8DEF0A +Block: 326 +Transacion 0: 21512B092BDE6528C9840184F1D78E665C78BD1C765C829803B0A482A5D46161 +Block: 327 +Transacion 0: 8B8C325B6B2C154F774CF1DDB46EA98494963793D38EC3E416980CD89D33FB24 +Block: 328 +Transacion 0: 06DE54975CC13CB84CB43B229496ED9D1F004BEE7C2B52601C8031591D60E3B7 +Block: 329 +Transacion 0: 0569C1508BF9FB344A65935BD8AF967F7C72B2DE7D1ED6A3BC9AF082517B3EBE +Block: 330 +Transacion 0: 39AEF4674D4C0B262F46D7737A9A19A9CDB6E567F8585BA57C30489C3DFA0641 +Block: 331 +Transacion 0: 8720B1B397FF28606E4EA4317F9D5E7B01EF8C89617A37516215D8FC443D31AC +Block: 332 +Transacion 0: 5629FA1E2E63C145471455E7FA87A47165572007EA1324B5CF7147C91B143F41 +Block: 333 +Transacion 0: 70B0FE7E9F9A287348DFA35A534BAD004A064403E9B8029DB18B705B7D5CB82A +Block: 334 +Transacion 0: 7CCFECBAE66AF4EAFAF3306F1CDE711ABE277E216DF252A3D74F10B79C76926A +Block: 335 +Transacion 0: 3F9AE2B0505EAD2BD2B701C419DF519538AFF99CC036A174AE2B6C569CA2CABC +Block: 336 +Transacion 0: C098334CCD1B4BB48FC6B460A3F6FF3E1184AB9776181E55A80097E0B690FF3B +Block: 337 +Transacion 0: CB090B2BD2CDB73C3ED8A828AA20FFC3EAFFE72B53A345363E15C0DF188E4447 +Block: 338 +Transacion 0: 3DDEC50405754518AD33CA09D9B35D4AC00439AA88D8A5B5D57D72765135F787 +Block: 339 +Transacion 0: 0D46267788252FCC1C88FEA3C59AC443DC8A058127121AB83A4FA078B94850DF +Block: 340 +Transacion 0: F0AA1AF92FD3E1287043D7B3B9CCD1798454776D87D1985BEEB24F2F6EBFA80E +Block: 341 +Transacion 0: AADC016A5DC27002B6B7D5BC70ADE49F46A3E83A86D48C1BA0F68D003383E6E1 +Block: 342 +Transacion 0: 32BA3D2E00F08F8A89461B76261DDFB73388AA230C1271D5215CF163DBB40F1C +Block: 343 +Transacion 0: BCC5E3AE406243C4DF00290D31DDBE4827575C0B6F929C2C5DB775BF69A84255 +Block: 344 +Transacion 0: 6743246DCA88E466A693633F39A4D68C95404506ECEB214C40855310C2C05C53 +Block: 345 +Transacion 0: F38136E53DA65AB5367A0EC73B6A495A5050D49133B1DDC5C6D90F409710F62C +Block: 346 +Transacion 0: D71CBADDDBD255A7321C73FA552BEA8AD8969A2D3DBCBBA2652DC9BF604BF089 +Block: 347 +Transacion 0: 3D756DF956E48B9A6E376B17C8C6A3A98D85B3CD47903AF1F3FFBFE52648A139 +Block: 348 +Transacion 0: ABB7EE4AAEDE4D65C06245655ACA8F4035284A6947D686AF6D2314351346FD9D +Block: 349 +Transacion 0: E771ADC73320CD15D1374E3B406ACBA471A17894927BC034F8004C2E9EF94C29 +Block: 350 +Transacion 0: B791A0CA3698AF9FD0F9D0D67AFFE631C3A5D3BBC6F65085C00C96E7843BBC93 +Block: 351 +Transacion 0: 39AC112A53A81BD270242242CF853DB983F793268C817AE29383B90D5315721A +Block: 352 +Transacion 0: 4EA1F74C4877C69D3133945CDD07285D34431E0E0697C123BCAB0F4779BBE9AB +Block: 353 +Transacion 0: 10A40D28A379C75B8A5AB4DF9CAA72EC94768CF31DC5F4F97220856827D51E0C +Block: 354 +Transacion 0: 18FF334A67C25F9312F923895F7100BF7D64FA4BC8D84944FBBB4BB7AD2640E3 +Block: 355 +Transacion 0: 3B938EFA4F754E3E457DFD664FDF088EDEBF787220FAB267C44433E0CFE47713 +Block: 356 +Transacion 0: F09ED1E006F39C4B9D49E3CEC362EE052438DFEE57B60D3BB8B31DD1194D3B6B +Block: 357 +Transacion 0: 5EF8635853C98DB3FB1BFBCFB08E1617BC24CBE442CE0AF56AF8F21AA99A2F53 +Block: 358 +Transacion 0: DFC03A58B170B6244A97C2207188601D2C93FFE61483CDF6B95B3D34C4A8EC5A +Block: 359 +Transacion 0: 78FF80396E51F5688468B6F2CE72BFEF36E5B474AEF07772059FE3A1008DE4DD +Block: 360 +Transacion 0: DE2386BEFCE7D2934F53FEEB632A291EB329069816E708784269F382F880D3FB +Block: 361 +Transacion 0: B8F38E7AA14AFF384CEF118EAFE364AEAE6DB1BE7BD57D016C11EB2BA2FA588E +Block: 362 +Transacion 0: 85A87B92A8A4393F2602BA45179FA9296C0C72FE3036AA9AFDD83B1D5330D7E1 +Block: 363 +Transacion 0: 5C10C7F312B6E5D80363D168430CEA4118FAEB3CD5663BFC155ACF006452CA31 +Block: 364 +Transacion 0: C5E412DDE2BE6FC6C4F150EA2F8C92BDE8FE662ADCFADDEFE1264274EF16D326 +Block: 365 +Transacion 0: D778D6BF6A6EBBA3A4C33838214587F24BED311CB2BF3A1E12AAC926065446C7 +Block: 366 +Transacion 0: 438E41EDAD640494590741B6105EDF9E3DA85730A4D89B8FE0C4E541BF7BBD43 +Block: 367 +Transacion 0: 9FFAA000736EB73EFEAC89AA4F2FCD9358EEA8616A271E8F9F4D7E3E79C35DC7 +Block: 368 +Transacion 0: 178FE851AA72D32A9DA1D93D1F77A699BFB0BEF3742A86264E66411E13730B88 +Block: 369 +Transacion 0: F938C68D867385EE6A891E7E2A4F29FE4A6E69344D5B7DDC3D98E5B0E27D3C0B +Block: 370 +Transacion 0: 7769CDA03EA71EA44847C758A4BC073C8F37A3161A06A83B84FDCEF13B2702E5 +Block: 371 +Transacion 0: B77B35FE0F7C5888EF6846E3DBFAFA65AB7C22F6D5BC66BE90945690CE8B8C50 +Block: 372 +Transacion 0: 55D0DB951F6797C7ED0169E7D9D05C3C88816554D3F8C9202A9FE7A9FFC8AA40 +Block: 373 +Transacion 0: BDC4623D731C77710B3A6590E50279E35504BC1C16B2E1F39C22E5E14820BC72 +Block: 374 +Transacion 0: 5C6E48FC0AB0AAB94A3C133799C40E61A05DB1D1731B71DC69D01EC7EDAED98E +Block: 375 +Transacion 0: D50BD0A86C0AB145BE4F8681AB6827C81041CE05843E311416FF0EE01DE3A4C3 +Block: 376 +Transacion 0: 8B011A55762D2C6B44B934FE325F13855540BA6C7AB340DB803BB4158578C8D4 +Block: 377 +Transacion 0: 27C8C2A828A410A45073E44D08CBFCD761C5F34F4B41EC0D82EFD2D60B183DEA +Block: 378 +Transacion 0: D11603AB55FC62A9BFBB41DFEE89C54D4DE3A6A1DC2C62A4624E95F55C3D86C8 +Block: 379 +Transacion 0: BB6EF035598980E62580AF72361758E315249470CF9E439C013857EE93B129B7 +Block: 380 +Transacion 0: 699EA87979D27AFC031F13272C76B9B316320C9A105C9002748C4FD12DFEE4D7 +Block: 381 +Transacion 0: 8E8518921E64EE0BAAA7DB3C95F0C89502CCF54FD2FA502CB3924DEAB515CF22 +Transacion 1: E726E1BE2078A40B938A65F63DF654196EE5AC561383572281245CD36E09D7C6 +Block: 382 +Transacion 0: D62508A97EB750BA19C9BF50C27A4998F2262BE5D76802C09158905C4BAF9699 +Block: 383 +Transacion 0: 2898FBBE9E8F2E7EADCC82B2FB00F43FE5A6CB4B4492680EFFE435E8B9AEDCEA +Transacion 1: 227E8E0666F063B8C556C372B240540A26D591DFCE20CF51E89F08A0C5A3708E +Transacion 2: 2F16FD4A15E9D87D1521DA89D7C928A229DC32D6757D4A68309FB6FF2F865342 +Block: 384 +Transacion 0: AC520F75AD7B0AF214965F51167958484D8B0C3E21A0B7B257F481EC95C76DB2 +Transacion 1: 34DC823C5B563492E82E463E0CE12FDD189872B60D1CFCB6686209817C01EC82 +Transacion 2: AB4001EB2CE2BCA9B526093813B18170ABD28D6EE86116432F67C4EEA73EB15A +Transacion 3: 3C3255FE1993305732405C297ED7297DCB2D1CBCD41DC7A3728F665FEA100EA7 +Block: 385 +Transacion 0: 04E527C66B6925E81CB850A3B81AD55D3050E4DDD392C2979CFCCBF6B9CC0E81 +Transacion 1: 4AD4043B1AA4ACF391CC4F2744FEA407DE200DF0D548C0835736869E7ACC421B +Block: 386 +Transacion 0: 32B636C9DF02C715EE9159BFC45BFC608B6D06305720BAADD2FD13047BF4EB7E +Block: 387 +Transacion 0: FB83034C0C5DA5874753F2C0FE2F926AAC593AF06748F90FA0A79BF2EA4E9EC0 +Transacion 1: 9AF31C323A2FEC3E1FDBF7064D8982207730A22BE01D0900C443B6CD966E7549 +Transacion 2: 7D8400C988BACABF8D0DADBF55250F07A0619F3AF54F513889D8F90716C89117 +Block: 388 +Transacion 0: D4FBA46266A7D8B70FFA3351A1B2FEA755A3CE47064262A69229A52845E99F07 +Transacion 1: 317DFA8CCBBC2CF0649313792C51C0542D20755BE0A5B200A7BD28BCC6218C2B +Transacion 2: 5F912F835CE402BB14B84B15C37E454845D69128009A10EB5551E221FC8A6225 +Block: 389 +Transacion 0: 5E70FCA75E3E1F0F50878A30097A7F6119DD223C7B3CD8EB699826A555662B0E +Transacion 1: B3E5EC565F885DFB33CCE989EF57993129FB79DB775C83AD260EF01FB2947058 +Block: 390 +Transacion 0: 19F1401F10E728631AF6294CE0C5758A06A60F7CD445A55810145EF0F97D735A +Transacion 1: 920F91EC56AC7CA728EADF76285C70AAEDAA79D83F1879F3BA59C82DEC8C8238 +Block: 391 +Transacion 0: C331B8CE4CAADD98E5038EB84BFA0DAFEBDDCF409917259A12F877B2204F4022 +Block: 392 +Transacion 0: 1916C6C9E984615DB98F97D4BF71B1058E81717B4CD186931186B4E285EBDCA2 +Transacion 1: E5A12574182D1108748C95A34C5D4CB30034060D47B5C77F01EF58AD00405400 +Transacion 2: 86A78DCA2B352AB665FC7E84040CD6A2D160BF8766E7F2C57462A24E7B7C22A0 +Block: 393 +Transacion 0: D7F0AE58D2C8407B8F40426A60801AD0429BEC3A038B9ECD25458DDCFECEDA09 +Block: 394 +Transacion 0: 3673D57B4E344E199CB9FC64EC9424D25007F8386B35539C53ED0E0A8655BEFF +Transacion 1: 20082DF2A8AA12B0E98C050976CE5C32FB9706D93887CC6591867548C84FC24E +Transacion 2: 3B1CD9874B59B39674714AD789258FAEC1DCC49FA354ABE2340A9FD7C7BD6255 +Block: 395 +Transacion 0: 3BE24FBE826513125DD8A21EB33EAEC8A0B5A41F74C3FFB10E33930D53004337 +Block: 396 +Transacion 0: 38D507C7E9C2DCE2F2090B1C2BCB97BDF16942EBE355284102697AA0CA6AA190 +Block: 397 +Transacion 0: 2B714EABF8CC8A4DE641032FE78FB6650D6A8A5161AE7A3FA384D65A77212BCE +Block: 398 +Transacion 0: 5590BA3AF5F8F283307E90941BC59ECA29B66D1C865F415F058C57511218F097 +Transacion 1: F9ED8FA26E2A650122C60DA24277F8E21E207EC17B440E8A7069EEA98616A781 +Block: 399 +Transacion 0: 31F20390249989D70E2945981B0A8A97386BCD187F80AAB6D1549A30564F0997 +Transacion 1: 30E8B9F9ECAA536141F21E7AD0370A60F5094AA74BD49C910450CF5B9966B47D +Transacion 2: 8493E2F7076AEB57F771F35E294D142318B4BBAA01410A739832C23613059763 +Transacion 3: B0E03F28C5F55FBE5D01EAEAA9A87D06C88ABF7D12C469474B3FF000939EF692 +Transacion 4: F8E287D4658934A5B2357704BCC9AF3DCAD329B9EAB2F3F0AB68978D46B81F23 +Transacion 5: B3C539D8E0C3F483779512747737F98CEB3DE907A99287F4D1D56294E17687ED +Transacion 6: F4BAF4CF420BD9DA834D2598B6F41C9F5293B133A2846ED698149CFFA9DC3F55 +Transacion 7: D30051683F838A45B26C9C8970679A144B8FA246D9D5E299E074AC8E5A744BF9 +Transacion 8: 246901E399CA7EADC38AF2067C9EBDA772F7B2BBFB5F850D67F8EC0A4FEAE7C9 +Block: 400 +Transacion 0: AB736A9180F675EE3B9751FC9B83AA726C49998DA7E09227CD3D8B486DD50B6C +Transacion 1: 166E31153CC1AF37C80D88E75B09B41B483656F1823ACF66637EF5F0E109930D +Transacion 2: 801054F7282B2575E17275DA1D7CA714F482DC92EA819B33942588771D0EC9B0 +Transacion 3: 2FDF7AD3E27CA9AC1EAC317215A216AA0EE44E305E5CA894C896A9DBC9FE3C4A +Transacion 4: 60EF5D279702D3060686297D41898CFB1D323F75F4887A4ACA1E9311DF956F0D +Transacion 5: 9C53B59700B0AE869DAF70D8E0375A5AB36D4D4BF66499A3AC2E3835A07A3715 +Transacion 6: 9154CC92C8B025C1DF13EF7D09A0F9662F46B40368175AD76A92948C5C2D86DE +Transacion 7: B01773AB0DFE7D44CA21EBEF4F5A5D9FD1F532C4F16BEA2F8385CE1E3188919C +Transacion 8: 667B07D690B83D6B4E57A57A242F87B101A53B86F521CAD2A54A7FBC63565D89 +Transacion 9: 14F72D1D00EA8092D43191E2D0226D6857F3D36B7CCA0BE8F22DDCA7BA6DD076 +Transacion 10: 9D3A8B333CBE818D9A6AACD363A4A06E7DB158CE136A2EB8AEEF8769DC512F4F +Transacion 11: 506830763DE017845A7D45EB55D49AE8663F3E0C6B0153AEDF67FB6D5EEB64AB +Transacion 12: 34AC918C91C2B47A94FAE82B7F86FEA65368E902BD737B13BAB395CE6C09717B +Transacion 13: 2F75BC9B48BDA054C7203E9BD11F579EDEB1373C269285B39261080E04C074AD +Transacion 14: 2B309C29DA939833FE0D9FA7D8CCA40E0B8F644FAFAC5D44B475EA07BC44A271 +Transacion 15: 02BA2EED6BBE7F432E67AAA254871415DF97FD2AC15379755E5C01637D3EB802 +Transacion 16: 34A6DA66683A4718758BCD0B68B3AB427418A7C3B06AA8B18DA398449BEF3505 +Transacion 17: 1FFBE330992ACBE9D0BD834A97E097E4F78787B2C7DAAE1572357F7E4C4D6239 +Block: 401 +Transacion 0: CC3E7A487087173B934A76752009F90F6689C56994A2EB186B08A9973586A788 +Transacion 1: 5540F54A2BCC34F68E4FA2DDE4C3349BBB4249CDAD285474777B67675A284D98 +Transacion 2: 31B4242928B779163EA407D2CA8F72A32B2FFB326364250AF99561EAE73889F7 +Transacion 3: 2CC456BF4B09A88F94483224A1DCCA468FFBC18E0DFC846542B93B1E15A15DF0 +Transacion 4: 259CC9DEE90C5CE17633F64717A68A171F2450243C79135EDF04EE936946E53C +Transacion 5: 55B8E3917B02EB8DE033D4E2F5F02C195FF7C51621369D3624551CF0CFF3C464 +Transacion 6: 8F0670606178B0BEA00BC79AE337A84E801E4574D082302E39393AEFBCBD288B +Transacion 7: 2B8364FC33E2FCF8C36D8CADBCBD3F3FF85DCCCB3A5A1436347A419676754CF9 +Transacion 8: 497A65786A1FC2BD18DCBA12366F2AAEF3D7AF5D0A74A2C68119CC173FFA6E7E +Transacion 9: E3F2B3DD38EE4A87F6F9B77B5196BE61F74101D5D0D5272F8EEA2D3C1371965A +Transacion 10: 252889D738E6359A7D34DA06C61F825313BD6DB00161D1A7ED3692E895EBB545 +Transacion 11: 63B54B162A7115D16ECC97D304993785BB0585A1BD53C24A861B7D2692C6B5F3 +Transacion 12: E1437992533EEA32784AE5CD2AA3B655B4023D2CC23D154BAAADC93FB7FBFCBA +Transacion 13: 0354A724AF498ACB80DF9142F100E5FE1428309327DC2728C0997785997BBAB2 +Transacion 14: 38476DF82697A98B415802D37D34C15FEB6A1E19EAE5A733F739D48335D7890F +Transacion 15: F3639BE5B1177A21598AAABCCAC919381B9715D00D13E9744B3C57F19DF35DA1 +Transacion 16: F47AA32D864FEB22F17E046FD44C0958462A4AA5B47B6E8B36EC0229BD4E332F +Transacion 17: 63898138C43B38C01B0940C3988CFA95AC78B6C53CB04C3AF9B1EC62EC016E5F +Transacion 18: F9D27109D07A1482192886505A5AD356774E575336AEE5766002520E15443981 +Transacion 19: FADF1E4F4BC5E18D5486E80F6861B14FFABECA1F91061A1364BF47C2CFB136B1 +Transacion 20: 8EF1FDBBD43CD52A85B3F219182164393C72E14E7D371599A4CAC3B8E6F08231 +Transacion 21: 0C449A4923A306883D6DF6B005523BA7B3EA0A575CB285F782CE26DF51B0ADC6 +Transacion 22: CCA520E80023A0CEB3CBBB7B647F866E8FC7FD627F916B4549E65986A06D3FD9 +Transacion 23: 8557C7118BC5C3C952FDE43F0056B5BD3901123A8EC805268765D5349E6740E1 +Transacion 24: 560E22884260B6421D73B23F803BC5493A64D1CB8D04516B501C7B7873ECEFFF +Transacion 25: 0284ADDC20DA18B93C762094AE369FB65CF206AEF66EEB77387A51906D5E1E16 +Transacion 26: D6E0031E30443B61C12670937998A2F91F1F6D51445D61054B8DAC3C2C407EBC +Block: 402 +Transacion 0: 57F707DB2C7C4429E5C97AE81C32E923426A2908A3FEBE51FC9B4F4114C735D7 +Transacion 1: A12FEB03072F6A6E285AE321D281252C1F0E6E0793EC0374AB4950159007EADD +Transacion 2: 9B3FC1BFB5848C8DE86A731BAD35EE81EA4306BABC1937AE6DB548DF7D4BDDBA +Transacion 3: FBE5294B5385A716165C9DFDB1775918A99BEFBAD0417930985DD9C87FBF34D9 +Transacion 4: 760FF5C22245795691FD1643662F55DEDE45473FB2BC2ACDC5C4089C3AF1C469 +Transacion 5: FBE8E5EB3E3624955160FAF7174E2D21C1391E0AE6F50609D7B4367AEA1CC2C9 +Transacion 6: 1E6619B55B40E54E9E59287753EE1D8F44FB3AAF3969B6E99901CC61B4463A3F +Transacion 7: A85001E3B9C55DC71B7326298E01FF46EC9838D8DCEA68F0845856B940FAD036 +Transacion 8: 562E8C325CADABAFBBFFDF3A9989CED2F5318463A5B9719C3DC4AFFFF2A9FC4D +Block: 403 +Transacion 0: 6140D0FDFA767DAB82B9EEE930305EF058B9AB4FEEC0C8B78D3884387E37BE5C +Block: 404 +Transacion 0: E01622E1F3B2E1E99140A5738BE1759FB8653F68B9B0F94F6769A4A69BAD1317 +Transacion 1: E6DDFE780E85BDA4EE79B1D118074F8378DFA68378137D1E29B27DB94CF26231 +Transacion 2: 312A5482D7ADEB582E31DEE8C28BF1008B803D665C82834524E3DFFF1267F1DC +Transacion 3: 1B69B43EEC780F491D55707C37F28D4019A764046ED70C2314D71444A9D5B714 +Transacion 4: E00F4D4FFC3F97AA8397AB55F9042B59885ADB91770EFED93B52832B2801C888 +Transacion 5: A87FE6378BE30A4E1EED78C65017FC8C3FAD65B3D5EA06E88AC30F157D5D5916 +Block: 405 +Transacion 0: A7B74FA49643B6503E5D5ABA47A0984A996C47E0BFFF2307911F0B847446AB67 +Transacion 1: 3CB2A7EAF51C0CA9809C7A4E4017C48E0E1CBA4BF0C95BC9A13FAFCA9C62832B +Transacion 2: 7092DE5D3C8E2BACFAD9706ADED2BCF6A7F56675FA40B42C1C18B46E4D363585 +Transacion 3: B92B2AC3CF40BAC2DE944E938BC3FBBC141BEFEEB19D7AC6ACE2FDD28F563E81 +Transacion 4: 8A354968D7B703167D79E02C8F27DDFF4DAEFC6694CD6050BDA4B0FD89A786FF +Transacion 5: 7DD2AB651779FC13766E1041C28E0F76D4E739ED33BE7A83D496DD9AD974F196 +Transacion 6: A20011493A82E7EBFC8A13E9F4B31B9C21092BAB1674E21854662CBDE888FE00 +Transacion 7: 67ABFB78B7C70BC1390BAE543A5CC8FD93ABDEA82343283307FA69ADD0FEDAAA +Transacion 8: 15748D09E43E2FBC6940C95AA8A77FDE82D27F7CE5A3B600564C606FCFBEC3FA +Transacion 9: 587368B85A026F51DB6967C26E0C1193DEF7320293A6061E07BE30A46AD67559 +Transacion 10: 7EF287E1CF1422C43FD7A10A6CF34A56A5686B743263226E353BE83B3D971BCC +Transacion 11: 8C405B78EFB6BF9BE62CCE6B897A2A0C89CC41D83DC164560E0BCA5A28067EB7 +Transacion 12: 78DA3B5FE00FE94804BC8104CDE134FAC0C2DB8B58B953D61BDE4844AFDD19B0 +Transacion 13: 644E36F29F4166A0BD8DDF25232646953FB21EB5CFBE3DCF845FB40DE17E4E91 +Transacion 14: DC6F7949E46EC006FDF46C84F81499C427E567EC4BE05EF5E720CB5EC540C895 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/dah.pb.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/dah.pb.go new file mode 100644 index 00000000..0db9ed1b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/dah.pb.go @@ -0,0 +1,197 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: dah.proto + +/* +Package util is a generated protocol buffer package. + +It is generated from these files: + dah.proto + +It has these top-level messages: + TX +*/ +package util + +import proto "github.com/golang/protobuf/proto" +import fmt "fmt" +import math "math" + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package + +type TX struct { + Version uint32 `protobuf:"varint,1,opt,name=version" json:"version,omitempty"` + LockTime uint32 `protobuf:"varint,2,opt,name=lockTime" json:"lockTime,omitempty"` + Txin []*TX_TXIN `protobuf:"bytes,3,rep,name=txin" json:"txin,omitempty"` + Txout []*TX_TXOUT `protobuf:"bytes,4,rep,name=txout" json:"txout,omitempty"` + Blocks [][]byte `protobuf:"bytes,5,rep,name=blocks,proto3" json:"blocks,omitempty"` + Fee uint64 `protobuf:"varint,6,opt,name=fee" json:"fee,omitempty"` +} + +func (m *TX) Reset() { *m = TX{} } +func (m *TX) String() string { return proto.CompactTextString(m) } +func (*TX) ProtoMessage() {} +func (*TX) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0} } + +func (m *TX) GetVersion() uint32 { + if m != nil { + return m.Version + } + return 0 +} + +func (m *TX) GetLockTime() uint32 { + if m != nil { + return m.LockTime + } + return 0 +} + +func (m *TX) GetTxin() []*TX_TXIN { + if m != nil { + return m.Txin + } + return nil +} + +func (m *TX) GetTxout() []*TX_TXOUT { + if m != nil { + return m.Txout + } + return nil +} + +func (m *TX) GetBlocks() [][]byte { + if m != nil { + return m.Blocks + } + return nil +} + +func (m *TX) GetFee() uint64 { + if m != nil { + return m.Fee + } + return 0 +} + +type TX_TXIN struct { + Ix uint32 `protobuf:"varint,1,opt,name=ix" json:"ix,omitempty"` + SourceHash []byte `protobuf:"bytes,2,opt,name=sourceHash,proto3" json:"sourceHash,omitempty"` + Script []byte `protobuf:"bytes,3,opt,name=script,proto3" json:"script,omitempty"` + Sequence uint32 `protobuf:"varint,4,opt,name=sequence" json:"sequence,omitempty"` +} + +func (m *TX_TXIN) Reset() { *m = TX_TXIN{} } +func (m *TX_TXIN) String() string { return proto.CompactTextString(m) } +func (*TX_TXIN) ProtoMessage() {} +func (*TX_TXIN) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 0} } + +func (m *TX_TXIN) GetIx() uint32 { + if m != nil { + return m.Ix + } + return 0 +} + +func (m *TX_TXIN) GetSourceHash() []byte { + if m != nil { + return m.SourceHash + } + return nil +} + +func (m *TX_TXIN) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXIN) GetSequence() uint32 { + if m != nil { + return m.Sequence + } + return 0 +} + +type TX_TXOUT struct { + Value uint64 `protobuf:"varint,1,opt,name=value" json:"value,omitempty"` + Script []byte `protobuf:"bytes,2,opt,name=script,proto3" json:"script,omitempty"` + Color []byte `protobuf:"bytes,3,opt,name=color,proto3" json:"color,omitempty"` + Quantity uint64 `protobuf:"varint,4,opt,name=quantity" json:"quantity,omitempty"` +} + +func (m *TX_TXOUT) Reset() { *m = TX_TXOUT{} } +func (m *TX_TXOUT) String() string { return proto.CompactTextString(m) } +func (*TX_TXOUT) ProtoMessage() {} +func (*TX_TXOUT) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 1} } + +func (m *TX_TXOUT) GetValue() uint64 { + if m != nil { + return m.Value + } + return 0 +} + +func (m *TX_TXOUT) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXOUT) GetColor() []byte { + if m != nil { + return m.Color + } + return nil +} + +func (m *TX_TXOUT) GetQuantity() uint64 { + if m != nil { + return m.Quantity + } + return 0 +} + +func init() { + proto.RegisterType((*TX)(nil), "util.TX") + proto.RegisterType((*TX_TXIN)(nil), "util.TX.TXIN") + proto.RegisterType((*TX_TXOUT)(nil), "util.TX.TXOUT") +} + +func init() { proto.RegisterFile("dah.proto", fileDescriptor0) } + +var fileDescriptor0 = []byte{ + // 329 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x91, 0xc1, 0x4b, 0xc3, 0x30, + 0x18, 0xc5, 0x59, 0x9b, 0x4e, 0x8d, 0xdb, 0x90, 0x30, 0x24, 0xec, 0x20, 0x55, 0x3c, 0xf4, 0xd4, + 0x82, 0x9e, 0x45, 0xf0, 0xa4, 0x17, 0x85, 0x50, 0x61, 0x78, 0x6b, 0xb3, 0x6f, 0x6d, 0xb4, 0x6b, + 0xba, 0x34, 0x19, 0xdd, 0xd5, 0xbf, 0x5c, 0x92, 0x76, 0x63, 0x5e, 0x42, 0x7e, 0x79, 0x1f, 0xef, + 0xbd, 0x8f, 0xe0, 0x8b, 0x55, 0x56, 0xc6, 0x8d, 0x92, 0x5a, 0x12, 0x64, 0xb4, 0xa8, 0xee, 0x7e, + 0x7d, 0xec, 0xa5, 0x4b, 0x42, 0xf1, 0xd9, 0x0e, 0x54, 0x2b, 0x64, 0x4d, 0x47, 0xe1, 0x28, 0x9a, + 0xb2, 0x03, 0x92, 0x05, 0x3e, 0xaf, 0x24, 0xff, 0x49, 0xc5, 0x06, 0xa8, 0xe7, 0xa4, 0x23, 0x93, + 0x5b, 0x8c, 0x74, 0x27, 0x6a, 0xea, 0x87, 0x7e, 0x74, 0xf9, 0x30, 0x8d, 0xad, 0x63, 0x9c, 0x2e, + 0xe3, 0x74, 0xf9, 0xf6, 0xce, 0x9c, 0x44, 0xee, 0x71, 0xa0, 0x3b, 0x69, 0x34, 0x45, 0x6e, 0x66, + 0x76, 0x32, 0xf3, 0xf1, 0x99, 0xb2, 0x5e, 0x24, 0xd7, 0x78, 0x9c, 0x5b, 0xd7, 0x96, 0x06, 0xa1, + 0x1f, 0x4d, 0xd8, 0x40, 0xe4, 0x0a, 0xfb, 0x6b, 0x00, 0x3a, 0x0e, 0x47, 0x11, 0x62, 0xf6, 0xba, + 0xf8, 0xc6, 0xc8, 0xba, 0x93, 0x19, 0xf6, 0x44, 0x37, 0x74, 0xf5, 0x44, 0x47, 0x6e, 0x30, 0x6e, + 0xa5, 0x51, 0x1c, 0x5e, 0xb3, 0xb6, 0x74, 0x45, 0x27, 0xec, 0xe4, 0xc5, 0x26, 0xb4, 0x5c, 0x89, + 0x46, 0x53, 0xdf, 0x69, 0x03, 0xd9, 0xf5, 0x5a, 0xd8, 0x1a, 0xa8, 0x39, 0x50, 0xd4, 0xaf, 0x77, + 0xe0, 0x45, 0x81, 0x03, 0xd7, 0x92, 0xcc, 0x71, 0xb0, 0xcb, 0x2a, 0x03, 0x2e, 0x0f, 0xb1, 0x1e, + 0x4e, 0x2c, 0xbd, 0x7f, 0x96, 0x73, 0x1c, 0x70, 0x59, 0x49, 0x35, 0x24, 0xf5, 0x60, 0x83, 0xb6, + 0x26, 0xab, 0xb5, 0xd0, 0x7b, 0x17, 0x84, 0xd8, 0x91, 0x5f, 0x9e, 0xbf, 0x9e, 0x0a, 0xa1, 0x4b, + 0x93, 0xc7, 0x5c, 0x6e, 0x92, 0x72, 0xdf, 0x80, 0xaa, 0x60, 0x55, 0x80, 0x4a, 0xd6, 0x59, 0xae, + 0x04, 0x4f, 0xa0, 0xcb, 0x36, 0x4d, 0x05, 0x6d, 0xc2, 0xcb, 0x4c, 0xd4, 0x5c, 0xae, 0x20, 0x29, + 0x64, 0x62, 0x74, 0x67, 0x0f, 0x51, 0xe5, 0x63, 0xf7, 0xa5, 0x8f, 0x7f, 0x01, 0x00, 0x00, 0xff, + 0xff, 0xbb, 0x8b, 0x8c, 0x33, 0xdf, 0x01, 0x00, 0x00, +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/dah.proto b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/dah.proto new file mode 100644 index 00000000..a87236e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/dah.proto @@ -0,0 +1,43 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +syntax = "proto3"; + +option go_package = "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" ; + +package util; + +message TX { + uint32 version = 1; + uint32 lockTime = 2; + message TXIN { + uint32 ix = 1; + bytes sourceHash = 2; + bytes script = 3; + uint32 sequence = 4; + } + repeated TXIN txin = 3; + + message TXOUT { + uint64 value = 1; + bytes script = 2; + bytes color = 3; + uint64 quantity = 4; + } + repeated TXOUT txout = 4; + repeated bytes blocks = 5; + uint64 fee = 6; +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/store.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/store.go new file mode 100644 index 00000000..a4142fab --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/store.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +// Store interface describes the storage used by this chaincode. The interface +// was created so either the state database store can be used or a in memory +// store can be used for unit testing. +type Store interface { + GetState(Key) (*TX_TXOUT, bool, error) + PutState(Key, *TX_TXOUT) error + DelState(Key) error + GetTran(string) ([]byte, bool, error) + PutTran(string, []byte) error +} + +// InMemoryStore used for unit testing +type InMemoryStore struct { + Map map[Key]*TX_TXOUT + TranMap map[string][]byte +} + +// MakeInMemoryStore creates a new in memory store +func MakeInMemoryStore() Store { + ims := &InMemoryStore{} + ims.Map = make(map[Key]*TX_TXOUT) + ims.TranMap = make(map[string][]byte) + return ims +} + +// GetState returns the transaction for the given key +func (ims *InMemoryStore) GetState(key Key) (*TX_TXOUT, bool, error) { + value, ok := ims.Map[key] + return value, ok, nil +} + +// DelState deletes the given key and corresponding transactions +func (ims *InMemoryStore) DelState(key Key) error { + delete(ims.Map, key) + return nil +} + +// PutState saves the key and transaction in memory +func (ims *InMemoryStore) PutState(key Key, value *TX_TXOUT) error { + ims.Map[key] = value + return nil +} + +// GetTran returns the transaction for the given hash +func (ims *InMemoryStore) GetTran(key string) ([]byte, bool, error) { + value, ok := ims.TranMap[key] + return value, ok, nil +} + +// PutTran saves the hash and transaction in memory +func (ims *InMemoryStore) PutTran(key string, value []byte) error { + ims.TranMap[key] = value + return nil +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/util.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/util.go new file mode 100644 index 00000000..d9094c37 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/util.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "bytes" + "encoding/binary" +) + +func decodeInt32(input []byte) (int32, []byte, error) { + var myint32 int32 + buf1 := bytes.NewBuffer(input[0:4]) + binary.Read(buf1, binary.LittleEndian, &myint32) + return myint32, input, nil +} + +// ReadVarInt reads an int that is formatted in the Bitcoin style +// variable int format +func ReadVarInt(buffer *bytes.Buffer) uint64 { + var finalResult uint64 + + var variableLenInt uint8 + binary.Read(buffer, binary.LittleEndian, &variableLenInt) + if variableLenInt < 253 { + finalResult = uint64(variableLenInt) + } else if variableLenInt == 253 { + var result uint16 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 254 { + var result uint32 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 255 { + var result uint64 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = result + } + + return finalResult +} + +// ParseUTXOBytes parses a bitcoin style transaction +func ParseUTXOBytes(txAsUTXOBytes []byte) *TX { + buffer := bytes.NewBuffer(txAsUTXOBytes) + var version int32 + binary.Read(buffer, binary.LittleEndian, &version) + + inputCount := ReadVarInt(buffer) + + newTX := &TX{} + + for i := 0; i < int(inputCount); i++ { + newTXIN := &TX_TXIN{} + + newTXIN.SourceHash = buffer.Next(32) + + binary.Read(buffer, binary.LittleEndian, &newTXIN.Ix) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXIN.Script = buffer.Next(int(scriptLength)) + + // Appears to not be used currently + binary.Read(buffer, binary.LittleEndian, &newTXIN.Sequence) + + newTX.Txin = append(newTX.Txin, newTXIN) + + } + + // Now the outputs + outputCount := ReadVarInt(buffer) + + for i := 0; i < int(outputCount); i++ { + newTXOUT := &TX_TXOUT{} + + binary.Read(buffer, binary.LittleEndian, &newTXOUT.Value) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXOUT.Script = buffer.Next(int(scriptLength)) + + newTX.Txout = append(newTX.Txout, newTXOUT) + + } + + binary.Read(buffer, binary.LittleEndian, &newTX.LockTime) + + return newTX +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/utxo.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/utxo.go new file mode 100644 index 00000000..06e95601 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/utxo.go @@ -0,0 +1,144 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "crypto/sha256" + "encoding/hex" + "fmt" + "math" + + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// UTXO includes the storage for the chaincode API or an in memory +// store for testing +type UTXO struct { + Store Store +} + +// MakeUTXO constructs a new UTXO with the given store +func MakeUTXO(store Store) *UTXO { + utxo := &UTXO{} + utxo.Store = store + return utxo +} + +// Key represents the key for a transaction in storage. It has both a +// hash and index +type Key struct { + TxHashAsHex string + TxIndex uint32 +} + +// GetTransactionHash returns the Bitcoin hash (double sha256) of +// the given transaction +func (u *UTXO) GetTransactionHash(txData []byte) [32]byte { + firstHash := sha256.Sum256(txData) + txHash := sha256.Sum256(firstHash[:]) + return txHash +} + +// IsCoinbase returns true if this is a coinbase transaction, false otherwise +func (u *UTXO) IsCoinbase(index uint32) bool { + return index == math.MaxUint32 +} + +var mandatoryFlags = consensus.Verify_flags_p2sh + +var standardFlags = mandatoryFlags | + consensus.Verify_flags_dersig | + consensus.Verify_flags_strictenc | + consensus.Verify_flags_minimaldata | + consensus.Verify_flags_nulldummy | + consensus.Verify_flags_discourage_upgradable_nops | + consensus.Verify_flags_cleanstack | + consensus.Verify_flags_checklocktimeverify | + consensus.Verify_flags_low_s + +// ExecResult is the result of processing a transaction +type ExecResult struct { + SumCurrentOutputs uint64 + SumPriorOutputs uint64 + IsCoinbase bool +} + +// Execute processes the given transaction and outputs a result +func (u *UTXO) Execute(txData []byte) (*ExecResult, error) { + newTX := ParseUTXOBytes(txData) + txHash := u.GetTransactionHash(txData) + execResult := &ExecResult{} + // Loop through outputs first + for index, output := range newTX.Txout { + currKey := &Key{TxHashAsHex: hex.EncodeToString(txHash[:]), TxIndex: uint32(index)} + _, ok, err := u.Store.GetState(*currKey) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if ok == true { + // COLLISION + return nil, fmt.Errorf("COLLISION detected for key = %v, with output script length = %d", currKey, len(output.Script)) + } + // Store the output in utxo + u.Store.PutState(*currKey, &TX_TXOUT{Script: output.Script, Value: output.Value}) + execResult.SumCurrentOutputs += output.Value + } + // Now loop over inputs, + for index, input := range newTX.Txin { + prevTxHash := input.SourceHash + prevOutputIx := input.Ix + if u.IsCoinbase(prevOutputIx) { + execResult.IsCoinbase = true + //fmt.Println("COINBASE!!") + } else { + //fmt.Println("NOT COINBASE!!") + // NOT coinbase, need to verify + keyToPrevOutput := &Key{TxHashAsHex: hex.EncodeToString(prevTxHash), TxIndex: prevOutputIx} + value, ok, err := u.Store.GetState(*keyToPrevOutput) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if !ok { + // Previous output not fouund, + return nil, fmt.Errorf("Could not find previous transaction output with key = %v", keyToPrevOutput) + } + // Call Verify_script + txInputIndex := uint(index) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(standardFlags)) + if result != consensus.Verify_result_eval_true { + result = consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(mandatoryFlags)) + if result != consensus.Verify_result_eval_true { + return nil, fmt.Errorf("Unexpected result from verify_script, expected %d, got %d, perhaps it is %d", consensus.Verify_result_eval_true, result, consensus.Verify_result_invalid_stack_operation) + } + } + // Verified, now remove prior outputs + u.Store.DelState(*keyToPrevOutput) + execResult.SumPriorOutputs += value.Value + } + + hex := hex.EncodeToString(txHash[:]) + fmt.Printf("PUT TRAN %s", hex) + u.Store.PutTran(hex, txData) + } + return execResult, nil +} + +// Query search the storage for a given transaction hash +func (u *UTXO) Query(txHashHex string) pb.Response { + tx, _, err := u.Store.GetTran(txHashHex) + return tx, err +} diff --git a/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/utxo_test.go b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/utxo_test.go new file mode 100644 index 00000000..ec979c3d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/examples/chaincode/go/utxo/util/utxo_test.go @@ -0,0 +1,206 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "encoding/base64" + "encoding/hex" + "fmt" + "io/ioutil" + "strings" + "sync" + "testing" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// func TestMain(m *testing.M) { +// // viper.Set("ledger.blockchain.deploy-system-chaincode", "false") +// +// os.Exit(m.Run()) +// } + +const txFileHashes = "./Hashes_for_first_500_transactions_on_testnet3.txt" +const txFile = "./First_500_transactions_base64_encoded_on_testnet3.txt" + +const consensusScriptVerifyTx = "01000000017d01943c40b7f3d8a00a2d62fa1d560bf739a2368c180615b0a7937c0e883e7c000000006b4830450221008f66d188c664a8088893ea4ddd9689024ea5593877753ecc1e9051ed58c15168022037109f0d06e6068b7447966f751de8474641ad2b15ec37f4a9d159b02af68174012103e208f5403383c77d5832a268c9f71480f6e7bfbdfa44904becacfad66163ea31ffffffff01c8af0000000000001976a91458b7a60f11a904feef35a639b6048de8dd4d9f1c88ac00000000" +const consensusScriptVerifyPreviousOutputScript = "76a914c564c740c6900b93afc9f1bdaef0a9d466adf6ee88ac" + +type block struct { + transactions []string +} + +func makeBlock() *block { + //return &block{transactions: make([]string, 0)} + return &block{} +} + +func (b *block) addTxAsBase64String(txAsString string) error { + b.transactions = append(b.transactions, txAsString) + return nil +} + +//getTransactionsAsUTXOBytes returns a readonly channel of the transactions within this block as UTXO []byte +func (b *block) getTransactionsAsUTXOBytes() <-chan []byte { + resChannel := make(chan []byte) + go func() { + defer close(resChannel) + for _, txAsText := range b.transactions { + data, err := base64.StdEncoding.DecodeString(txAsText) + if err != nil { + panic(fmt.Errorf("Could not decode transaction (%s) into bytes use base64 decoding: %s\n", txAsText, err)) + } + resChannel <- data + } + }() + return resChannel +} + +var blocksFromFile []*block +var once sync.Once + +// getBlocks returns the blocks parsed from txFile, but only parses once. +func getBlocks() ([]*block, error) { + var err error + once.Do(func() { + contents, err := ioutil.ReadFile(txFile) + if err != nil { + return + } + lines := strings.Split(string(contents), string('\n')) + var currBlock *block + for _, line := range lines { + if strings.HasPrefix(line, "Block") { + currBlock = makeBlock() + blocksFromFile = append(blocksFromFile, currBlock) + } else { + // Trim out the 'Transacion XX:' part + //currBlock.addTxAsBase64String(strings.Split(line, ": ")[1]) + currBlock.addTxAsBase64String(line) + } + } + }) + + return blocksFromFile, err +} + +func TestVerifyScript_InvalidTranscation(t *testing.T) { + arg1 := []byte("arg1") + arg2 := int64(4) + arg3 := []byte("arg2") + arg4 := int64(4) + arg5 := uint(100) + arg6 := uint(1) + //func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) + result := consensus.Verify_script(&arg1[0], arg2, &arg3[0], arg4, arg5, arg6) + t.Log(result) + t.Log(consensus.Verify_result_tx_invalid) + if result != consensus.Verify_result_tx_invalid { + t.Fatalf("Should have failed to verify transaction") + } +} + +func TestParse_GetBlocksFromFile(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + } + t.Logf("Number of blocks = %d from file %s", len(blocks), txFile) +} + +//TestBlocks_GetTransactionsAsUTXOBytes will range over blocks and then transactions in UTXO bytes form. +func TestBlocks_GetTransactionsAsUTXOBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + //t.Logf("Tx as bytes = %v", txAsUTXOBytes) + _ = len(txAsUTXOBytes) + } + } +} + +func TestParse_UTXOTransactionBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + utxo := MakeUTXO(MakeInMemoryStore()) + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + + newTX := ParseUTXOBytes(txAsUTXOBytes) + t.Logf("Block = %d, txInputCount = %d, outputCount=%d", index, len(newTX.Txin), len(newTX.Txout)) + + // Now store the HEX of txHASH + execResult, err := utxo.Execute(txAsUTXOBytes) + if err != nil { + t.Fatalf("Error executing TX: %s", err) + } + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + t.Fatalf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + txHash := utxo.GetTransactionHash(txAsUTXOBytes) + retrievedTx := utxo.Query(hex.EncodeToString(txHash)) + if !proto.Equal(newTX, retrievedTx) { + t.Fatal("Expected TX to be equal. ") + } + } + } + +} + +func TestParse_LibbitconTX(t *testing.T) { + txData, err := hex.DecodeString(consensusScriptVerifyTx) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + prevTxScript, err := hex.DecodeString(consensusScriptVerifyPreviousOutputScript) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + t.Logf("TX data from libbitcoin: %v", txData) + + tx := ParseUTXOBytes(txData) + + // Call Verify_script + txInputIndex := uint(0) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &prevTxScript[0], int64(len(prevTxScript)), txInputIndex, uint(consensus.Verify_flags_p2sh)) + if result != consensus.Verify_result_eval_true { + t.Fatalf("Unexpected result from verify_script, expected %d, got %d", consensus.Verify_result_eval_true, result) + } + t.Log(result) + t.Log(consensus.Verify_result_eval_true) + t.Logf("TX from %v", tx) +} diff --git a/hyperledger_fabric/v1.4.4/explorer-artifacts/config.json b/hyperledger_fabric/v1.4.4/explorer-artifacts/config.json new file mode 100644 index 00000000..1fe07a38 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/explorer-artifacts/config.json @@ -0,0 +1,57 @@ +{ + "network-config": { + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "peer1": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "peer1": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } + }, + "host":"explorer", + "port":"8080", + "channel": "businesschannel", + "GOPATH":"/opt/gopath", + "keyValueStore":"/tmp/fabric-client-kvs", + "eventWaitTime":"30000", + "mysql":{ + "host":"mysql", + "port":"3306", + "database":"fabricexplorer", + "username":"root", + "passwd":"root" + } +} diff --git a/hyperledger_fabric/v1.4.4/explorer-artifacts/fabricexplorer.sql b/hyperledger_fabric/v1.4.4/explorer-artifacts/fabricexplorer.sql new file mode 100644 index 00000000..557abb4c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/explorer-artifacts/fabricexplorer.sql @@ -0,0 +1,115 @@ +/* + Navicat MySQL Data Transfer + + Source Server : 172.16.10.162 + Source Server Type : MySQL + Source Server Version : 50635 + Source Host : 172.16.10.162 + Source Database : fabricexplorer + + Target Server Type : MySQL + Target Server Version : 50635 + File Encoding : utf-8 + + Date: 07/07/2017 10:14:31 AM +*/ + +DROP DATABASE IF EXISTS `fabricexplorer`; + +CREATE DATABASE fabricexplorer; + +use fabricexplorer; +SET NAMES utf8; +SET FOREIGN_KEY_CHECKS = 0; + +-- ---------------------------- +-- Table structure for `blocks` +-- ---------------------------- +DROP TABLE IF EXISTS `blocks`; +CREATE TABLE `blocks` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `blocknum` int(11) DEFAULT NULL, + `datahash` varchar(256) DEFAULT NULL, + `prehash` varchar(256) DEFAULT NULL, + `channelname` varchar(128) DEFAULT NULL, + `txcount` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='blocks'; + +-- ---------------------------- +-- Table structure for `chaincodes` +-- ---------------------------- +DROP TABLE IF EXISTS `chaincodes`; +CREATE TABLE `chaincodes` ( + `id` int(11) NOT NULL AUTO_INCREMENT, + `name` varchar(255) DEFAULT NULL, + `version` varchar(255) DEFAULT NULL, + `path` varchar(255) DEFAULT NULL, + `channelname` varchar(255) DEFAULT NULL, + `txcount` int(11) DEFAULT '0', + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=10 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT; + +-- ---------------------------- +-- Table structure for `channel` +-- ---------------------------- +DROP TABLE IF EXISTS `channel`; +CREATE TABLE `channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `name` varchar(64) DEFAULT NULL, + `blocks` int(11) DEFAULT NULL, + `trans` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=3 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='channel'; + +-- ---------------------------- +-- Table structure for `peer` +-- ---------------------------- +DROP TABLE IF EXISTS `peer`; +CREATE TABLE `peer` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `org` int(11) DEFAULT NULL, + `name` varchar(64) DEFAULT NULL, + `mspid` varchar(64) DEFAULT NULL, + `requests` varchar(64) DEFAULT NULL, + `events` varchar(64) DEFAULT NULL, + `server_hostname` varchar(64) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='peer'; + +-- ---------------------------- +-- Table structure for `peer_ref_channel` +-- ---------------------------- +DROP TABLE IF EXISTS `peer_ref_channel`; +CREATE TABLE `peer_ref_channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `peerid` int(11) DEFAULT NULL, + `channelid` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT=''; + +-- ---------------------------- +-- Table structure for `transaction` +-- ---------------------------- +DROP TABLE IF EXISTS `transaction`; +CREATE TABLE `transaction` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `channelname` varchar(64) DEFAULT NULL, + `blockid` int(11) DEFAULT NULL, + `txhash` varchar(256) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + `chaincodename` varchar(255) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='transtaion'; + +-- ---------------------------- +-- Table structure for `write_lock` +-- ---------------------------- +DROP TABLE IF EXISTS `write_lock`; +CREATE TABLE `write_lock` ( + `write_lock` int(1) NOT NULL AUTO_INCREMENT, + PRIMARY KEY (`write_lock`) +) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8 COLLATE=utf8_bin; + +SET FOREIGN_KEY_CHECKS = 1; diff --git a/hyperledger_fabric/v1.4.4/kafka/README.md b/hyperledger_fabric/v1.4.4/kafka/README.md new file mode 100644 index 00000000..1222cf5a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/kafka/README.md @@ -0,0 +1,8 @@ +## Start a network base on kafka + +### Quick testing + +```bash +$ HLF_MODE=kafka make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.4/kafka/configtx.yaml b/hyperledger_fabric/v1.4.4/kafka/configtx.yaml new file mode 100644 index 00000000..87870f6a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/kafka/configtx.yaml @@ -0,0 +1,764 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: kafka + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 10 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 512 KB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.4/network_config.json b/hyperledger_fabric/v1.4.4/network_config.json new file mode 100644 index 00000000..96769bb4 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/network_config.json @@ -0,0 +1,65 @@ +{ + "ordererOrg": { + "name": "OrdererOrg", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "type": "peerOrg", + "peer0": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/orderer.yaml b/hyperledger_fabric/v1.4.4/orderer.yaml new file mode 100644 index 00000000..5d65476c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/orderer.yaml @@ -0,0 +1,36 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric orderer node in solo and kafka modes + +version: '2' # v3 does not support 'extends' yet + +services: + orderer-solo: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + + orderer-kafka: # orderer in kafka mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls diff --git a/hyperledger_fabric/v1.4.4/org3/configtx.yaml b/hyperledger_fabric/v1.4.4/org3/configtx.yaml new file mode 100644 index 00000000..fd92173e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/configtx.yaml @@ -0,0 +1,54 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# Section: Organizations +# +# - This section defines the different organizational identities which will +# be referenced later in the configuration. +# +################################################################################ +Organizations: + - &Org3 + # DefaultOrg defines the organization which is used in the sampleconfig + # of the fabric.git development environment + Name: Org3MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID to load the MSP definition as + ID: Org3MSP + + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + Policies: + Readers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.peer', 'Org3MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + AnchorPeers: + # AnchorPeers defines the location of peers which can be used + # for cross org gossip communication. Note, this value is only + # encoded in the genesis block in the Application section context + - Host: peer0.org3.example.com + Port: 7051 diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config.yaml b/hyperledger_fabric/v1.4.4/org3/crypto-config.yaml new file mode 100644 index 00000000..02409282 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config.yaml @@ -0,0 +1,23 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org3 + # --------------------------------------------------------------------------- + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk new file mode 100644 index 00000000..45972fca --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgcmU5hHQfNnzjg4az +RKQSD9RgxiFWqIiDryomGy35lp+hRANCAASkfqYVKYDeEuhn5ymHW8oI5Wv716Xy +87zpe7qL/tH9duivwoEVqw8RIaAZHW6KeUp4PcWMySx2f97R8AHddCHJ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk new file mode 100644 index 00000000..ee3aab50 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgJCzb+ZKzQoFnfLFR +Q31npnJfrRd2Xe34RVLlMAQAFqmhRANCAARbgk5JAT6X2pJM0+UmiindL6DNVGtO +EAs/TALn5q+X4UHWuEZH0gOQNyHcnvwKcwXBqdliHWLrL4wOubno+W62 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..c9384c29 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrrtKXqYQD+q3TM2oC9TnwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFuCTkkBPpfa +kkzT5SaKKd0voM1Ua04QCz9MAufmr5fhQda4RkfSA5A3Idye/ApzBcGp2WIdYusv +jA65uej5brajTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGKqVM53Vt+yUehYqlJ7/7zrk+OgTY82PL3XwuohMIURMAoGCCqGSM49 +BAMCA0cAMEQCIDIH9kzDurmSCQVHkthwEBCZwk4p03DRiYpkf1oyBWN1AiAFfZpU +aEENnw5XUIPAoRyzOOSTY0I6GtydC1NpR8FHAw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..aec1664d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMA2l1rNUWWc9seezl856ZMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN3Um9a+FQxYJ1DWxT8Jhrx9SRBC +JM/0+zR11n4mia05HLbDkTID0rCbg45kcXg2XRgLEZL4gqQx6AhfijPUFgejgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/ +rl7zUkfSQPPX7PaYMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQD5m/MiLVdgLPKgd6j4H+NHNa7GoCVx +w3howyS8C0ChtQIgeYwU8+cLcfQFvQODJHoiwoD5yy9pE6kEb/CXvIhi0zw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..f9bbe2c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgB667xyPSl1+zAEQX +tdh+e9XPGLfOhf2jQfnFetOZ79qhRANCAATd1JvWvhUMWCdQ1sU/CYa8fUkQQiTP +9Ps0ddZ+JomtORy2w5EyA9Kwm4OOZHF4Nl0YCxGS+IKkMegIX4oz1BYH +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk new file mode 100644 index 00000000..f9f8044b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgg+NTgE/U6uQ0FjLO +bIbAVtwudJiyZ2b/0SjDXDhF1+ShRANCAATDYUicHa7jK+lGZSBq66KDMDgynuAL +zvEz6H4MWzPeMJL5UQuAw221MUgOoGH4PM1vxxPTV4bhygOestXtafRb +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..6bc7edcd --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIRAIBMNPpMs7nwScnRzsPIEu0wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMNhSJwdruMr +6UZlIGrrooMwODKe4AvO8TPofgxbM94wkvlRC4DDbbUxSA6gYfg8zW/HE9NXhuHK +A56y1e1p9FujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGKqVM53Vt+yUehYqlJ7/7zrk+OgTY82PL3XwuohMIURMAoGCCqGSM49 +BAMCA0gAMEUCIQCO1d9DWHQziVxi0MDw8XBjR8KPAfcxtupiJKgZSEzuiAIgIKBO +JKeHTZq1BeY0CXQyichphK/mtDPLYQ0BgPIURQk= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..31391b9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRANQWZco+vteAJbiiCQhXEkYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLUPejsEpYbmMB2Wdj0PjPrj6i18 +E9iS/Q2wyNIdXP3lBVHkaeKGAvgsUwgYh3VcTc4iE/DcZ0L/bBzcoqog3W6jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/ +rl7zUkfSQPPX7PaYMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCICHbbc0B4jiXVZ2QHYWDVZ/UPlP5TsFD +T1uGe3SQpqL1AiACJwPFESbS5oQ4tIGq5xgaX7jGO8tUtxa9ZwdPzg9+zg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..2599f46b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbFm24U3lwsMeoIsv +/f1xZyEOhEBDx7ts/EB46rl8mhuhRANCAAS1D3o7BKWG5jAdlnY9D4z64+otfBPY +kv0NsMjSHVz95QVR5GnihgL4LFMIGId1XE3OIhPw3GdC/2wc3KKqIN1u +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk new file mode 100644 index 00000000..5c7686f6 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgAmLaRgf/Xu30U/8Z +2mFBgBEWNPZdxauvQMtJrr6y/qmhRANCAARwv90la+t9fdIBzUJErJPaC6kRjSdU +nUqSMqnb0J3QAvrIIid6+1RWvHQzdeeGx9bUXoTyCROCIjYhh0Qi1AFN +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk new file mode 100644 index 00000000..994dea45 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQglcdFwvvVibyvpf0r +xhsGqeryE4FUBbcSPWKRTppvkqKhRANCAAQVQ0Pu9k39+7UR1ikZd88E5ZfnirQG +McPBvqzCqpoCXhN98Q/tgcof+G/6aDk/TWhP1mkI/8rThD3s6RQjNf7C +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..174683ec --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAPqtprB/A3ATzGlHfGEnB5wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQVQ0Pu9k39 ++7UR1ikZd88E5ZfnirQGMcPBvqzCqpoCXhN98Q/tgcof+G/6aDk/TWhP1mkI/8rT +hD3s6RQjNf7Co00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCBiqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjO +PQQDAgNIADBFAiEAnbhJdCCRNvwBj9V3NV2QaSVINJih4TFNYZa/SwN0M/YCIAyU +A47JPbiKphK2XHyxbB3tZnYsvq5bPuPxrlfP/Yp2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt new file mode 100644 index 00000000..f88de09f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAJBSKB/l1MpjIwbI31xmzdgwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHVmoqoD8/CcTY/bPz26IbcwKtLp +ZeH6rs/BKoNZK26KiknyrLHB5KxG5YZeXbGTlceTgSrRNxyaTlwCC+GfbLijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCDmkGRdvaBA3/S7sTjJ7IVOYtySP65e +81JH0kDz1+z2mDAKBggqhkjOPQQDAgNHADBEAiBVJZqFkPw4blUc6m9XMY7V51sc +jPXZjnnk5Xu++XKKFgIgJvtzvtQJpjht3QROQZGtHcBinRMti4U0CRf1zG1WCS4= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key new file mode 100644 index 00000000..3382b281 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgmeFTv2ciA/kYRnh+ +kVWvfb4ktVUDkumCCXbih8OA//ehRANCAAR1ZqKqA/PwnE2P2z89uiG3MCrS6WXh ++q7PwSqDWStuiopJ8qyxweSsRuWGXl2xk5XHk4Eq0Tccmk5cAgvhn2y4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk new file mode 100644 index 00000000..73c8ef41 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg6LGxc+PqT81bLQuB +hkGmJcKaFwjsfutfkZBzHJlBZ12hRANCAATJ2cdr1D+/h4bT23rejW2hu7wo6qal +qujynRRNn9fe4bn1IZi9C02jhIQY0EaHzD+/nQuH4/N2uZbCm9B6BW1r +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..45ed7641 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQRydBj+PweWWoL77xQKSpdTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ2cdr1D+/ +h4bT23rejW2hu7wo6qalqujynRRNn9fe4bn1IZi9C02jhIQY0EaHzD+/nQuH4/N2 +uZbCm9B6BW1ro00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCBiqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjO +PQQDAgNHADBEAiBOjzu6Hc/xkY4rc7TcKBiWqsroVRT4C5kFMRWW/uLZBAIgR0J3 +B/hNgIBR3LgsLVfHBjFs/RiHdkYj2Ch6Nddmneo= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..542fb541 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQVTvJ6670W07z+fGIyCZWvjAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEpq6FkIq1GRnFROyFIU4fV/oaPWfL +S5Rj1fvNCeRB7fNqShdWBrJgm0C/RIuj/qeIPr9Ux/TZGh6MmS2Kppu3F6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/rl7z +UkfSQPPX7PaYMAoGCCqGSM49BAMCA0gAMEUCIQDpTO2+Ybk6EAFB+GP+y/gkNydc +ervKvJkljwWxqCFgXAIgMweY+oC827oZ/VhnYx2RrNzzs3ET9fN4eSoM/0yFlts= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..2a50e1f7 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsfvE1XUsEOWmUoe9 +OY2XrcfD0p5DVdrGeBwBUuRNUK6hRANCAASmroWQirUZGcVE7IUhTh9X+ho9Z8tL +lGPV+80J5EHt82pKF1YGsmCbQL9Ei6P+p4g+v1TH9NkaHoyZLYqmm7cX +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.4/peer.yaml b/hyperledger_fabric/v1.4.4/peer.yaml new file mode 100644 index 00000000..5c6c3dbe --- /dev/null +++ b/hyperledger_fabric/v1.4.4/peer.yaml @@ -0,0 +1,37 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric peer node + +version: '2.0' + +services: + peer-solo: # example peer node in solo mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # grpc + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 # chaincode + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 # gossip + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + + peer-kafka: # example peer node in kafka mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls diff --git a/hyperledger_fabric/v1.4.4/prometheus.yml b/hyperledger_fabric/v1.4.4/prometheus.yml new file mode 100644 index 00000000..2efaca40 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/prometheus.yml @@ -0,0 +1,45 @@ +# my global config +global: + scrape_interval: 15s # Set the scrape interval to every 15 seconds. Default is every 1 minute. + evaluation_interval: 15s # Evaluate rules every 15 seconds. The default is every 1 minute. + # scrape_timeout is set to the global default (10s). + +# Alertmanager configuration +alerting: + alertmanagers: + - static_configs: + - targets: + # - alertmanager:9093 + +# Load rules once and periodically evaluate them according to the global 'evaluation_interval'. +rule_files: + # - "first_rules.yml" + # - "second_rules.yml" + +# A scrape configuration containing exactly one endpoint to scrape: +# Here it's Prometheus itself. +scrape_configs: + # The job name is added as a label `job=` to any timeseries scraped from this config. + #- job_name: 'prometheus' + + # metrics_path defaults to '/metrics' + # scheme defaults to 'http'. + + #static_configs: + #- targets: ['localhost:9090'] + + - job_name: 'orderer0' + static_configs: + - targets: ['orderer0.example.com:8443'] + - job_name: 'peer0_org1' + static_configs: + - targets: ['peer0.org1.example.com:9443'] + - job_name: 'peer1_org1' + static_configs: + - targets: ['peer1.org1.example.com:9443'] + - job_name: 'peer0_org2' + static_configs: + - targets: ['peer0.org2.example.com:9443'] + - job_name: 'peer1_org2' + static_configs: + - targets: ['peer1.org2.example.com:9443'] diff --git a/hyperledger_fabric/v1.4.4/raft/README.md b/hyperledger_fabric/v1.4.4/raft/README.md new file mode 100644 index 00000000..ff229433 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/README.md @@ -0,0 +1,8 @@ +## Start a network base on raft + +### Quick testing + +```bash +$ HLF_MODE=raft make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org1MSP.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org1MSP.json new file mode 100644 index 00000000..4a3a955a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org1MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org1MSPanchors.tx new file mode 100644 index 00000000..9947cbbf Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org1MSPanchors.tx differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org2MSP.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org2MSP.json new file mode 100644 index 00000000..3c690199 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org2MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWYyZ0F3SUJBZ0lRWEJLVjBEQzlmYUhLNENvcFE3M2F6VEFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTUKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN5TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN5TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVBQkRESDNxbTlMUjVpanJiTUZjTmtVWitteW9GWC9EV1ZzUXNyVTluamdTcVR1ZU96NkpScldlVAorUlpUT2tHWUNxM2pmSDF3bVZLeWVvTzR3MkdiQzZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQUNkbGtHSmNJYkxUVUhJaUpCcVd1U1VmeW1hQUxlM0RVU2VwN3B5MWgwbFRBS0JnZ3Foa2pPUFFRRApBZ05JQURCRkFpRUE2aXRjNHRYMy94RGV6NUxEZWdBeWlFR0NZSWRPSm8xNnRhcVcwK3FEMzlFQ0lISTE0aGF4CnUwK2o4VUZQUlBPbTJSU0Izc3pLS1FXY0c1dFhWUWEzdnJUdQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org2MSPanchors.tx b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org2MSPanchors.tx new file mode 100644 index 00000000..6e5a13ae Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org2MSPanchors.tx differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org3MSP.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org3MSP.json new file mode 100644 index 00000000..12090b0f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/Org3MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel.tx b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel.tx new file mode 100644 index 00000000..7900fee3 Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel.tx differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel.tx.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel.tx.json new file mode 100644 index 00000000..c9c8883a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel.tx.json @@ -0,0 +1,230 @@ +{ + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T04:29:34Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": null + } + }, + "signature": null +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block new file mode 100644 index 00000000..91fc2c41 Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block.json new file mode 100644 index 00000000..fc67a89f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block.json @@ -0,0 +1,1105 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQVBYclNNcXJGc2QveUkwYXNoOGg2TlV3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkJ0TDBabjVtOHJMM09uSTNhVTFkTjJZTjlKdTRmMU01bFV2a2lZMFFIejYKOUYrRytBeXhtcHNKRU5Ia21hcElnWkxDcFAzd3hFYmZ2Nk1ySEFQbWJnK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNREFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBYlBpejFUNDZDTlJiNGZzODhoeFR0VTZsTkZuNTN0NmZOU0JXS0RiY1hzUUlnCkYveUtuYUhMbGJpK3JDcmo2eDdyZFZndFliZ3dVTm53ekUxazZzUTBQM3c9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQD1sxz0xLs/0gMMbxXZaFkKaUmhY50HFFKA26TlJyx7PgIgCusEdDFLO+Ecn3in6vLG2Tzu/5fWNxOoeDJ6P2vF5/k=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "3hL15oI5TZ7DuDhXBMID3rWMhkBa2uG4" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "njtLDend7t3TPuNBOvHtZ5CABMxl24je" + } + } + }, + "signature": "MEQCIELzb7ARMzlc9Y24aJadJi2bZ1EHisUjTzsfkNcqu4JMAiBv/nKYVL17SCzBnEPp5UjBGnBmgj0TvWQTQzESMzRylg==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "5mMh9XoYQS+e89Ig/l6tFcYgMrCr4MkC" + } + } + }, + "signature": "MEQCIB5UxaGfDbNrNIcQxhI654ehAbmYgXVY+gK9qkAB7rC/AiB0BCeLEsc1Eq47/MyBbSEHfsGLTl0VS3MTZ5AQZiFFdw==" + } + ] + }, + "header": { + "data_hash": "wyg17bx8cmhB424TfRnZtK1glI9wiaCNvPJhevrD/G8=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block.json-flat.json new file mode 100644 index 00000000..e8d88cda --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_0.block.json-flat.json @@ -0,0 +1,399 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1\nOTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy\n1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E\nAwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=1 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQD1sxz0xLs/0gMMbxXZaFkKaUmhY50HFFKA26TlJyx7PgIgCusEdDFLO+Ecn3in6vLG2Tzu/5fWNxOoeDJ6P2vF5/k= +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=3hL15oI5TZ7DuDhXBMID3rWMhkBa2uG4 +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-11-19T05:21:41Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=njtLDend7t3TPuNBOvHtZ5CABMxl24je +.data.data[0].payload.data.last_update.signature=MEQCIELzb7ARMzlc9Y24aJadJi2bZ1EHisUjTzsfkNcqu4JMAiBv/nKYVL17SCzBnEPp5UjBGnBmgj0TvWQTQzESMzRylg== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:21:41Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=5mMh9XoYQS+e89Ig/l6tFcYgMrCr4MkC +.data.data[0].signature=MEQCIB5UxaGfDbNrNIcQxhI654ehAbmYgXVY+gK9qkAB7rC/AiB0BCeLEsc1Eq47/MyBbSEHfsGLTl0VS3MTZ5AQZiFFdw== +.header.data_hash=wyg17bx8cmhB424TfRnZtK1glI9wiaCNvPJhevrD/G8= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block new file mode 100644 index 00000000..554813cf Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block.json new file mode 100644 index 00000000..6d1b97ed --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block.json @@ -0,0 +1,985 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXRENDQWY2Z0F3SUJBZ0lSQUlvendvVlFYYWR5anNWcnF6VzdDSU13Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd09USTBNREExT1RBd1doY05Namt3T1RJeE1EQTEKT1RBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCS2JvMzlKN0ZOREZDRFBKSVNmUkJheGtjRHlIdmtKTDVpNkozNm9uWGpuMDB6dlFCd29mbERVeQoxRWV4OTNzOG9qWmxGRG0ycFVLaEg0SjB0NWRGUG5HamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdhcEZORzRrb0lxdFdvRllJbHBXK2hXS0lnalByc05pMXdkTC9xZ2d5Q3NBd0NnWUlLb1pJemowRQpBd0lEU0FBd1JRSWhBS1FsUWE1QXluT0E3RzIxbkhheUtmbmViakh2ZmRDREF2Q1loaC9WRGpqWEFpQXllNEo3ClhWTVhFbXVQVXdmMk1Db293MUUwQnVCUHpldEFQRW1Cb0RsOVNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDekNDQWJHZ0F3SUJBZ0lSQVBzdHBtTHR5MS9Vd3IrWHRMdU5WNGt3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNRll4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJvd0dBWURWUVFEREJGQlpHMXBia0JsZUdGdGNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHClNNNDlBd0VIQTBJQUJOem9jcmt3NXp2Kys2YkxYaFRXQ1pkYTcrcXc2UkdGNnY1VGlVOTVQN2E5Zi9LbWw2eVoKRnk1Sjdza1FNamdTODc1NXcxdEJxL04yeXNjaWVHT05IMEdqVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTQpCZ05WSFJNQkFmOEVBakFBTUNzR0ExVWRJd1FrTUNLQUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUVHYUY2Cjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGdBTUVVQ0lRRDFsR3NDTkVkbzJOeThiTnJXcG1JWkw0dU8KVzNqeVZnTEplM1lCNUkxN2FBSWdWK0JMb3c0TmFYZzlWaDVqcjA3TEpBa09FTXh5ZlBGNW9SSkFHUkptV0VnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQUxrQTNrQSsvL29hZ1NEbElxeUhPS3N3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBUUU0TmtpRU91Y1duUmw0ejY0a1JzQXhnVTUKNTQrMDVndGViZmxzajgrNGo3TjhpbGMwMFE1amorL3BtbmJmbUl0ZUpOVFhnancxbEpWaFBOcUVRU1dvbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUUKR2FGNjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lIejN1ZFdibmZwWlNwRWxwVng4WHFXSgpSTkcva00zWjFyenFRNzFOZEoxSUFpQUtlVTg5cEsyMWZ0dWUyWFVPOHZqRXR5bVhSb2hjVnQwUU51U2pTRGdVCjFnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRakNDQWVtZ0F3SUJBZ0lRR1loTXRiajNYMlVFTGRWbGtqMW5ZVEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93YkRFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEZEQVNCZ05WQkFvVEMyVjRZVzF3YkdVdVkyOXRNUm93R0FZRFZRUURFeEYwYkhOallTNWxlR0Z0CmNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkhEdGlBdGlYL05DSTN6MFJjbkoKay85SEljRjBHQnZteG4yUG5JZGhmekZodnJ3ekF0ZjFTT2VhUTZzVGhhMWNCVTJTS2s4Q2JSRkRpTTl3M2o3QQorT09qYlRCck1BNEdBMVVkRHdFQi93UUVBd0lCcGpBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFnWUlLd1lCCkJRVUhBd0V3RHdZRFZSMFRBUUgvQkFVd0F3RUIvekFwQmdOVkhRNEVJZ1FnWEM5Wm04T0NHWVQ3VXZCbS95Y0MKTDk3OXc3cmE0TEpSMFVxMkkwLzB5eVl3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnY200UnVQbVNZZThWK0V5Zwo5OGhIMzdaTUxuQzlGYzJhVHlxcUlrSjVtc0FDSUJycndVRzhxQ293c3FUZFNaaHV3ZnByWEZjM29lNHU3SUl4CkszYnJ0QVc1Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "2" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQD7GI5RTAWaNtC13PaY1FBVzjNyXJltnNUr+N+dU3SISwIgC/ab9F0AdO6dZ9bV2HbqmZyTXHnypBFkNE3tqZzdQO8=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "D1ZPsQz2GETBxQLA0RVfUmGpyyGeNQxm" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:46Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "8rOyGb68Zb+/iBzBDH0+EK8Zb8wTo3/K" + } + } + }, + "signature": "MEQCIB/n9Yw5KhzccPmQGWIIzEdewt4CO41F6Mj9fNhbaUjvAiBcMJyAPo/8QCYfoOf6F2Mgfzozps+2CDuSNXShmDNvgA==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:46Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "hsSDSB89cNtn6AI9X4j4OSJzwRs082vC" + } + } + }, + "signature": "MEUCIQDDxFuj0ytkwDVh1pXLQvNT7e/tcoJtdevHps/xBjYRYwIgHAzHxNZu5/BDZ3Gn/U8RD87Jhp+DraRYvrNcZPTi3U0=" + } + ] + }, + "header": { + "data_hash": "SYqq4ZFSjQlehRROzDpY+cd3vUYoAd2rdtZaeGFdVZY=", + "number": "1", + "previous_hash": "680fB6BEftuww9g4sjEKbaYUFIbvUxaLJ/WDzD7L/Yw=" + }, + "metadata": { + "metadata": [ + "ChEKAggBEgsKCQoDAQIDEAQYBRL9BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiT2dBd0lCQWdJUWJ0UUZrVlVra2tLMjZPVUhHclZ3anpBS0JnZ3Foa2pPUFFRREFqQnBNUXN3CkNRWURWUVFHRXdKVlV6RVRNQkVHQTFVRUNCTUtRMkZzYVdadmNtNXBZVEVXTUJRR0ExVUVCeE1OVTJGdUlFWnkKWVc1amFYTmpiekVVTUJJR0ExVUVDaE1MWlhoaGJYQnNaUzVqYjIweEZ6QVZCZ05WQkFNVERtTmhMbVY0WVcxdwpiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0dBMVVFCkJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdVkybHoKWTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSQpLb1pJemowREFRY0RRZ0FFT1htb2RFVWZBRUxMMUk4QWNOdXNLek0wVWx6Y2ZnVGpIVXEyaDN5RmU4dEpDaVZzCllHTXR5d0J2NlFyaE1rQXBFeURRZ0RlVmNUWTNEZ0JXdDZsdDJLTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUEKTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEVlIwakJDUXdJb0FnZzF3aExabzcrUUM0aVl0YVhxRUprTUoyUjRRWgpvWHJ2QWxSNEtTY0lvS0l3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQU9iVXZIakxDbWJoVXhhaXVydExBVHZVClBvRnkyL054UEFpd0VvRlpPYTdzQWlBYkJ3MEhVNm5EUUR0ZmQrTTZ4QVdqdnpjdFRYV051ZklRTnBiZnQra3IKZlE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYljw/cQDeTGIwgxF47Qe9qDNjbGPQ3b0nEkYwRAIgfXN1uG8ZTeTE21jujc9s9NgjVD1BJ+Y+lIvwJi0u8ncCIGO7rWBQrq9gG1sf2uFerML7O+YGhawtdteoq5MPirqH", + "CgIIAQ==", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block.json-flat.json new file mode 100644 index 00000000..e547fd59 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_1.block.json-flat.json @@ -0,0 +1,364 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz\nY2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5\nMDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH\nEw1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD\nVQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D\nAQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT\n+RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud\nJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud\nDgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD\nAgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=2 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQD7GI5RTAWaNtC13PaY1FBVzjNyXJltnNUr+N+dU3SISwIgC/ab9F0AdO6dZ9bV2HbqmZyTXHnypBFkNE3tqZzdQO8= +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=D1ZPsQz2GETBxQLA0RVfUmGpyyGeNQxm +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-11-19T05:21:46Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=8rOyGb68Zb+/iBzBDH0+EK8Zb8wTo3/K +.data.data[0].payload.data.last_update.signature=MEQCIB/n9Yw5KhzccPmQGWIIzEdewt4CO41F6Mj9fNhbaUjvAiBcMJyAPo/8QCYfoOf6F2Mgfzozps+2CDuSNXShmDNvgA== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:21:46Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=hsSDSB89cNtn6AI9X4j4OSJzwRs082vC +.data.data[0].signature=MEUCIQDDxFuj0ytkwDVh1pXLQvNT7e/tcoJtdevHps/xBjYRYwIgHAzHxNZu5/BDZ3Gn/U8RD87Jhp+DraRYvrNcZPTi3U0= +.header.data_hash=SYqq4ZFSjQlehRROzDpY+cd3vUYoAd2rdtZaeGFdVZY= +.header.number=1 +.header.previous_hash=680fB6BEftuww9g4sjEKbaYUFIbvUxaLJ/WDzD7L/Yw= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAQ== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block new file mode 100644 index 00000000..335a14d6 Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..6615552f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,968 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXRENDQWY2Z0F3SUJBZ0lSQUlvendvVlFYYWR5anNWcnF6VzdDSU13Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd09USTBNREExT1RBd1doY05Namt3T1RJeE1EQTEKT1RBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCS2JvMzlKN0ZOREZDRFBKSVNmUkJheGtjRHlIdmtKTDVpNkozNm9uWGpuMDB6dlFCd29mbERVeQoxRWV4OTNzOG9qWmxGRG0ycFVLaEg0SjB0NWRGUG5HamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdhcEZORzRrb0lxdFdvRllJbHBXK2hXS0lnalByc05pMXdkTC9xZ2d5Q3NBd0NnWUlLb1pJemowRQpBd0lEU0FBd1JRSWhBS1FsUWE1QXluT0E3RzIxbkhheUtmbmViakh2ZmRDREF2Q1loaC9WRGpqWEFpQXllNEo3ClhWTVhFbXVQVXdmMk1Db293MUUwQnVCUHpldEFQRW1Cb0RsOVNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRakNDQWVtZ0F3SUJBZ0lRR1loTXRiajNYMlVFTGRWbGtqMW5ZVEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93YkRFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEZEQVNCZ05WQkFvVEMyVjRZVzF3YkdVdVkyOXRNUm93R0FZRFZRUURFeEYwYkhOallTNWxlR0Z0CmNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkhEdGlBdGlYL05DSTN6MFJjbkoKay85SEljRjBHQnZteG4yUG5JZGhmekZodnJ3ekF0ZjFTT2VhUTZzVGhhMWNCVTJTS2s4Q2JSRkRpTTl3M2o3QQorT09qYlRCck1BNEdBMVVkRHdFQi93UUVBd0lCcGpBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFnWUlLd1lCCkJRVUhBd0V3RHdZRFZSMFRBUUgvQkFVd0F3RUIvekFwQmdOVkhRNEVJZ1FnWEM5Wm04T0NHWVQ3VXZCbS95Y0MKTDk3OXc3cmE0TEpSMFVxMkkwLzB5eVl3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnY200UnVQbVNZZThWK0V5Zwo5OGhIMzdaTUxuQzlGYzJhVHlxcUlrSjVtc0FDSUJycndVRzhxQ293c3FUZFNaaHV3ZnByWEZjM29lNHU3SUl4CkszYnJ0QVc1Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQD0o2o+hZoRFlXZeVQHDCycpoWo4uk2AYzeKwwEVIT/iQIgcktYmv2qpdTFPzbylqCygne/XqquI+1ZSlZxqy43WEo=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "waN2ShL10tzUWf6AGQ85x/qhiAvEnD+G" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:48Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "NtXlLpbEwR9cv4zHvBSIjuV6JVYwFw8l" + } + } + }, + "signature": "MEUCIQDWY5T6abGhYr3DDHg6YhbjF+cX1Tgtz4g+3sQjExrFmgIgQemCvrg1dJDm3CJcYtIR3MQ5NbpWPdo6So6P94ppR9U=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:48Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "6ywsqCOBgLGh/exqdlgXfDp5c1wHdDvA" + } + } + }, + "signature": "MEQCIDzaW3/4C3jdVmAHb1VQlngRE0koiVKTt7Kdu00cGgEyAiBjxHzKp9ZIxRCbAC1NWaZ6wmJitZs6zvCe52El+mbTbA==" + } + ] + }, + "header": { + "data_hash": "by4Q3hZ5TIw9QJIaTXuRTGXShKLX+8y1ti04Kkc7dBA=", + "number": "2", + "previous_hash": "YB7ht6EZacPztVERUpRgDXvQP5+gKiSmJfjdVD25yoQ=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYBhL+BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiT2dBd0lCQWdJUWJ0UUZrVlVra2tLMjZPVUhHclZ3anpBS0JnZ3Foa2pPUFFRREFqQnBNUXN3CkNRWURWUVFHRXdKVlV6RVRNQkVHQTFVRUNCTUtRMkZzYVdadmNtNXBZVEVXTUJRR0ExVUVCeE1OVTJGdUlFWnkKWVc1amFYTmpiekVVTUJJR0ExVUVDaE1MWlhoaGJYQnNaUzVqYjIweEZ6QVZCZ05WQkFNVERtTmhMbVY0WVcxdwpiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0dBMVVFCkJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdVkybHoKWTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSQpLb1pJemowREFRY0RRZ0FFT1htb2RFVWZBRUxMMUk4QWNOdXNLek0wVWx6Y2ZnVGpIVXEyaDN5RmU4dEpDaVZzCllHTXR5d0J2NlFyaE1rQXBFeURRZ0RlVmNUWTNEZ0JXdDZsdDJLTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUEKTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEVlIwakJDUXdJb0FnZzF3aExabzcrUUM0aVl0YVhxRUprTUoyUjRRWgpvWHJ2QWxSNEtTY0lvS0l3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQU9iVXZIakxDbWJoVXhhaXVydExBVHZVClBvRnkyL054UEFpd0VvRlpPYTdzQWlBYkJ3MEhVNm5EUUR0ZmQrTTZ4QVdqdnpjdFRYV051ZklRTnBiZnQra3IKZlE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYabSRDZqXwEGRXw4vd9d+rLfr0d+sy5O6EkcwRQIhAIIX01BezFlgMQ5sd7Kki0XqcTBn2+DBM0Ij+J4HsExrAiAxhZsswNuJgRMZDqxIqzfGD12BZ2jGsBy/+WRjNP+QNg==", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block.json-flat.json new file mode 100644 index 00000000..e63b6319 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_2.block.json-flat.json @@ -0,0 +1,359 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6\n9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq\nhkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQD0o2o+hZoRFlXZeVQHDCycpoWo4uk2AYzeKwwEVIT/iQIgcktYmv2qpdTFPzbylqCygne/XqquI+1ZSlZxqy43WEo= +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo\n8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ\nnvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO\nPQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=waN2ShL10tzUWf6AGQ85x/qhiAvEnD+G +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-11-19T05:21:48Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=NtXlLpbEwR9cv4zHvBSIjuV6JVYwFw8l +.data.data[0].payload.data.last_update.signature=MEUCIQDWY5T6abGhYr3DDHg6YhbjF+cX1Tgtz4g+3sQjExrFmgIgQemCvrg1dJDm3CJcYtIR3MQ5NbpWPdo6So6P94ppR9U= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:21:48Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=6ywsqCOBgLGh/exqdlgXfDp5c1wHdDvA +.data.data[0].signature=MEQCIDzaW3/4C3jdVmAHb1VQlngRE0koiVKTt7Kdu00cGgEyAiBjxHzKp9ZIxRCbAC1NWaZ6wmJitZs6zvCe52El+mbTbA== +.header.data_hash=by4Q3hZ5TIw9QJIaTXuRTGXShKLX+8y1ti04Kkc7dBA= +.header.number=2 +.header.previous_hash=YB7ht6EZacPztVERUpRgDXvQP5+gKiSmJfjdVD25yoQ= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block new file mode 100644 index 00000000..7921692d Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..1a08c58c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,156 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "E/Rvj5QJF0b64PmWiIMJiRUarwIDXYgm" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEQCICSpEXXmttj8P9zm8QUYU715INBeErGWZ09BzHfSyKudAiAP0UAF4/+Lq7R3CzLhIEh+Bup0lzEjoxRAVrgtpNSqLA==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "1.4.4" + }, + "events": null, + "response": { + "message": "", + "payload": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB", + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "MTAw" + }, + { + "is_delete": false, + "key": "b", + "value": "MjAw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "exp02", + "value": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB" + } + ] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "IAT9pa/7RJ7MY82foEWM4kxLwQFuM0jNsCl0qXZNFxI=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "" + }, + "input": { + "args": [ + "ZGVwbG95", + "YnVzaW5lc3NjaGFubmVs", + "CigIARIMEgVleHAwMhoDMS4wGhYKBGluaXQKAWEKAzEwMAoBYgoDMjAw", + "EgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==", + "ZXNjYw==", + "dnNjYw==" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgYSBGxzY2M=", + "timestamp": "2019-11-19T05:21:56.338043Z", + "tls_cert_hash": null, + "tx_id": "afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "E/Rvj5QJF0b64PmWiIMJiRUarwIDXYgm" + } + } + }, + "signature": "MEUCIQC7LD0nl2M21RSNWCZkNOZWxQu8E+e/rP1mNUhope7jmwIgeXFCA6ihvgdo2ouuX62bxbXfAH2+7NEizSiX+vwkeFI=" + } + ] + }, + "header": { + "data_hash": "IJlC7bdSQS14fsr6MmfbL6J+x+7vlLfKm2QiQn2CDZg=", + "number": "3", + "previous_hash": "OTSW7lBerXj8A6OsIen7UhlO0ZHCPLgLcJuyPd20yNg=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYBxL9BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiT2dBd0lCQWdJUWJ0UUZrVlVra2tLMjZPVUhHclZ3anpBS0JnZ3Foa2pPUFFRREFqQnBNUXN3CkNRWURWUVFHRXdKVlV6RVRNQkVHQTFVRUNCTUtRMkZzYVdadmNtNXBZVEVXTUJRR0ExVUVCeE1OVTJGdUlFWnkKWVc1amFYTmpiekVVTUJJR0ExVUVDaE1MWlhoaGJYQnNaUzVqYjIweEZ6QVZCZ05WQkFNVERtTmhMbVY0WVcxdwpiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0dBMVVFCkJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdVkybHoKWTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSQpLb1pJemowREFRY0RRZ0FFT1htb2RFVWZBRUxMMUk4QWNOdXNLek0wVWx6Y2ZnVGpIVXEyaDN5RmU4dEpDaVZzCllHTXR5d0J2NlFyaE1rQXBFeURRZ0RlVmNUWTNEZ0JXdDZsdDJLTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUEKTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEVlIwakJDUXdJb0FnZzF3aExabzcrUUM0aVl0YVhxRUprTUoyUjRRWgpvWHJ2QWxSNEtTY0lvS0l3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQU9iVXZIakxDbWJoVXhhaXVydExBVHZVClBvRnkyL054UEFpd0VvRlpPYTdzQWlBYkJ3MEhVNm5EUUR0ZmQrTTZ4QVdqdnpjdFRYV051ZklRTnBiZnQra3IKZlE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYayZHH9Uv/ttuzDU7LPZxfLtHqpJm2eWDEkYwRAIge3pILeYFwhCC+cK1dnx4PkEooTH/DKnPrLpHZU3TtNYCIGKEfz2UgbjYrxYtmg/tnOoZMJVTbI1aa4snYZj0GYVR", + "CgIIAg==", + "", + "CgkKAwECAxAEGAc=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block.json-flat.json new file mode 100644 index 00000000..79d0a6d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_3.block.json-flat.json @@ -0,0 +1,59 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=E/Rvj5QJF0b64PmWiIMJiRUarwIDXYgm +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEQCICSpEXXmttj8P9zm8QUYU715INBeErGWZ09BzHfSyKudAiAP0UAF4/+Lq7R3CzLhIEh+Bup0lzEjoxRAVrgtpNSqLA== +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.4.4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'100') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'200') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].value=b64(b'\n\x05exp02\x12\x031.0\x1a\x04escc"\x04vscc*(\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP2D\n \xa1\xd5r\xedIl>\xac\xc8\xcd\x10\xc3\xe2\xeb\xb8!6Y\xd2\xf9\xc7]\xa8\\Ix\xe2\xbc\xda\xaa\xdd7\x12 \xac\xa4\x17x\xa8\xdb\x1a\xbd\xeb\x81\xce]w\xa7\x99\x81\x83\x06f\x005\xb8K\x87\xf4:s\x998\x06,\x1e: \x08\xcag\\9\xa8\xba\xe2c\x18G\xa5!\xfc\x92\xe1)i\xfe\x12+\xd4\xa9\xdf\np|\xf1\x05\x9e\x870B,\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\r\x12\x0b\n\x07Org1MSP\x10\x01\x1a\r\x12\x0b\n\x07Org2MSP\x10\x01') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=IAT9pa/7RJ7MY82foEWM4kxLwQFuM0jNsCl0qXZNFxI= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'deploy') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'businesschannel') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'\n(\x08\x01\x12\x0c\x12\x05exp02\x1a\x031.0\x1a\x16\n\x04init\n\x01a\n\x03100\n\x01b\n\x03200') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[4]=b64(b'escc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[5]=b64(b'vscc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgYSBGxzY2M= +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:21:56.338043Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=E/Rvj5QJF0b64PmWiIMJiRUarwIDXYgm +.data.data[0].signature=MEUCIQC7LD0nl2M21RSNWCZkNOZWxQu8E+e/rP1mNUhope7jmwIgeXFCA6ihvgdo2ouuX62bxbXfAH2+7NEizSiX+vwkeFI= +.header.data_hash=IJlC7bdSQS14fsr6MmfbL6J+x+7vlLfKm2QiQn2CDZg= +.header.number=3 +.header.previous_hash=OTSW7lBerXj8A6OsIen7UhlO0ZHCPLgLcJuyPd20yNg= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYBxL9BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiT2dBd0lCQWdJUWJ0UUZrVlVra2tLMjZPVUhHclZ3anpBS0JnZ3Foa2pPUFFRREFqQnBNUXN3CkNRWURWUVFHRXdKVlV6RVRNQkVHQTFVRUNCTUtRMkZzYVdadmNtNXBZVEVXTUJRR0ExVUVCeE1OVTJGdUlFWnkKWVc1amFYTmpiekVVTUJJR0ExVUVDaE1MWlhoaGJYQnNaUzVqYjIweEZ6QVZCZ05WQkFNVERtTmhMbVY0WVcxdwpiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0dBMVVFCkJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdVkybHoKWTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSQpLb1pJemowREFRY0RRZ0FFT1htb2RFVWZBRUxMMUk4QWNOdXNLek0wVWx6Y2ZnVGpIVXEyaDN5RmU4dEpDaVZzCllHTXR5d0J2NlFyaE1rQXBFeURRZ0RlVmNUWTNEZ0JXdDZsdDJLTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUEKTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEVlIwakJDUXdJb0FnZzF3aExabzcrUUM0aVl0YVhxRUprTUoyUjRRWgpvWHJ2QWxSNEtTY0lvS0l3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQU9iVXZIakxDbWJoVXhhaXVydExBVHZVClBvRnkyL054UEFpd0VvRlpPYTdzQWlBYkJ3MEhVNm5EUUR0ZmQrTTZ4QVdqdnpjdFRYV051ZklRTnBiZnQra3IKZlE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYayZHH9Uv/ttuzDU7LPZxfLtHqpJm2eWDEkYwRAIge3pILeYFwhCC+cK1dnx4PkEooTH/DKnPrLpHZU3TtNYCIGKEfz2UgbjYrxYtmg/tnOoZMJVTbI1aa4snYZj0GYVR +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAc= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block new file mode 100644 index 00000000..d5f3eda3 Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..e48f7f3a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "yabFXi+b14kN9mP1KZJQOn3EVBHTvUVG" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQCpg0hi0hXYiwKUYaO8f6FhjGpDuyvHIX80e7QW2XQ55QIgKX1T8IEKX1vOzIuf3psRR6X+vdFbv8QF2awZrCvjouU=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "3", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "OTA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjEw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "yhytWWfUP6ed4MKBvT7jWYBRT3EdD4dp/tXPtxmuYtI=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-11-19T05:22:33.577374700Z", + "tls_cert_hash": null, + "tx_id": "e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "yabFXi+b14kN9mP1KZJQOn3EVBHTvUVG" + } + } + }, + "signature": "MEQCICu6H+BWuMmPJbmsoxI76Y6Dt61IKqjMvKLBjfGm5mWRAiAQ+8c/7JLfnYjSpUpKAmOHIuhc3dUSzlfyq4VrXxJWBQ==" + } + ] + }, + "header": { + "data_hash": "euBdyUkrYTtInyZVR4oNMaGocndD9uAAAmaJ5PbOxlg=", + "number": "4", + "previous_hash": "r+hzMzYN+RIZeQ0kQlt9qZirztyYNkVuJiuGdmo3R3U=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAg=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block.json-flat.json new file mode 100644 index 00000000..b3399099 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_4.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=yabFXi+b14kN9mP1KZJQOn3EVBHTvUVG +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=CgdPcmcxTVNQEqYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNKekNDQWM2Z0F3SUJBZ0lRSjVVWW9YbDFaeE9qMkU2NkpXQ2sxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUdveEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVEwd0N3WURWUVFMRXdSd1pXVnlNUjh3SFFZRFZRUURFeFp3WldWeU1DNXZjbWN4CkxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUVQMXUzdkpFR3FZWTIKNmcvOHBUYjkwek1HODhTL0NVeUdqSmYrUEFEUjBwb29rM0pPVXdidm9xUnNXQ1VrT2dFcXBlTnRxQ3hQbkhNUQpQYnZJR3A3WkFLTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUFNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqCkJDUXdJb0FndlZSQTBBc0pNcHllRHRtQ0hqblZPRkNFZkFGd2RUOTkzQTVSZ0wzTW1CNHdDZ1lJS29aSXpqMEUKQXdJRFJ3QXdSQUlnYnBBYW5sZXpvM3l3MXFxTDAyemZpcmtXbC9ZZVRkUXhlcjhNNHlpYkhia0NJQjlJR1VVTwpkb0c2eVFuQlhmeWFDdGZOWWRwZWkzRUwrdDJhTnErakRobk8KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQCpg0hi0hXYiwKUYaO8f6FhjGpDuyvHIX80e7QW2XQ55QIgKX1T8IEKX1vOzIuf3psRR6X+vdFbv8QF2awZrCvjouU= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'90') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'210') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=yhytWWfUP6ed4MKBvT7jWYBRT3EdD4dp/tXPtxmuYtI= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:22:33.577374700Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=yabFXi+b14kN9mP1KZJQOn3EVBHTvUVG +.data.data[0].signature=MEQCICu6H+BWuMmPJbmsoxI76Y6Dt61IKqjMvKLBjfGm5mWRAiAQ+8c/7JLfnYjSpUpKAmOHIuhc3dUSzlfyq4VrXxJWBQ== +.header.data_hash=euBdyUkrYTtInyZVR4oNMaGocndD9uAAAmaJ5PbOxlg= +.header.number=4 +.header.previous_hash=r+hzMzYN+RIZeQ0kQlt9qZirztyYNkVuJiuGdmo3R3U= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAg= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block new file mode 100644 index 00000000..d1b3225c Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block.json new file mode 100644 index 00000000..c0e7313e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "+cBBBIVyWeWrLjFidz8prZGo7IqSGLOi" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQChlmsn++xQe8E3lqIcK28FdPW+plk44VYqmdfCTQdLcAIgKkAIVb6DB/7hTqizLmNkiNpShbtvssseL5mLBlf37aQ=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "4", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "4", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "ODA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjIw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "/GNTnbS3ZjMEIP8zvLCxiDzUUm1Bwe7gxaDtbGe+LCk=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-11-19T05:22:36.365553100Z", + "tls_cert_hash": null, + "tx_id": "2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "+cBBBIVyWeWrLjFidz8prZGo7IqSGLOi" + } + } + }, + "signature": "MEQCICeNP95LMN2Q/1qstBmAOBq9xWwlA8Oogjq1yt5amaDBAiAGCkXtnr3og8vqhjRdJrFVdhIFMJRgJm2yR1JsCRUnDg==" + } + ] + }, + "header": { + "data_hash": "eZi665nRihdU2OD5e7bo+tho5AUKJ9WDTDxk+AysqIU=", + "number": "5", + "previous_hash": "BOcMhTpJMFJyq9uoezO6HPlYmb+Jpl0dykBtoLxNPWI=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYCRL+BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiT2dBd0lCQWdJUWJ0UUZrVlVra2tLMjZPVUhHclZ3anpBS0JnZ3Foa2pPUFFRREFqQnBNUXN3CkNRWURWUVFHRXdKVlV6RVRNQkVHQTFVRUNCTUtRMkZzYVdadmNtNXBZVEVXTUJRR0ExVUVCeE1OVTJGdUlFWnkKWVc1amFYTmpiekVVTUJJR0ExVUVDaE1MWlhoaGJYQnNaUzVqYjIweEZ6QVZCZ05WQkFNVERtTmhMbVY0WVcxdwpiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0dBMVVFCkJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdVkybHoKWTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSQpLb1pJemowREFRY0RRZ0FFT1htb2RFVWZBRUxMMUk4QWNOdXNLek0wVWx6Y2ZnVGpIVXEyaDN5RmU4dEpDaVZzCllHTXR5d0J2NlFyaE1rQXBFeURRZ0RlVmNUWTNEZ0JXdDZsdDJLTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUEKTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEVlIwakJDUXdJb0FnZzF3aExabzcrUUM0aVl0YVhxRUprTUoyUjRRWgpvWHJ2QWxSNEtTY0lvS0l3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQU9iVXZIakxDbWJoVXhhaXVydExBVHZVClBvRnkyL054UEFpd0VvRlpPYTdzQWlBYkJ3MEhVNm5EUUR0ZmQrTTZ4QVdqdnpjdFRYV051ZklRTnBiZnQra3IKZlE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYaNDiq6DX3mfDWGZJ7gZK7G1riRaYTMQDEkcwRQIhAPaCKk43VQ2AQojAgTv5spXbi6RCuXwUYsc1m8Z76rwuAiBe6LfZ2WioYBXEZARUtwgzPni3Va2Dzg829TRaZ8s4bw==", + "CgIIAg==", + "", + "CgkKAwECAxAEGAk=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block.json-flat.json new file mode 100644 index 00000000..f87100f1 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_5.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org2MSP +.data.data[0].payload.data.actions[0].header.nonce=+cBBBIVyWeWrLjFidz8prZGo7IqSGLOi +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQChlmsn++xQe8E3lqIcK28FdPW+plk44VYqmdfCTQdLcAIgKkAIVb6DB/7hTqizLmNkiNpShbtvssseL5mLBlf37aQ= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'80') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'220') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=/GNTnbS3ZjMEIP8zvLCxiDzUUm1Bwe7gxaDtbGe+LCk= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:22:36.365553100Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo\n8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ\nnvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO\nPQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.header.signature_header.nonce=+cBBBIVyWeWrLjFidz8prZGo7IqSGLOi +.data.data[0].signature=MEQCICeNP95LMN2Q/1qstBmAOBq9xWwlA8Oogjq1yt5amaDBAiAGCkXtnr3og8vqhjRdJrFVdhIFMJRgJm2yR1JsCRUnDg== +.header.data_hash=eZi665nRihdU2OD5e7bo+tho5AUKJ9WDTDxk+AysqIU= +.header.number=5 +.header.previous_hash=BOcMhTpJMFJyq9uoezO6HPlYmb+Jpl0dykBtoLxNPWI= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAk= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block new file mode 100644 index 00000000..c6e4808d Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block.json new file mode 100644 index 00000000..545060d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block.json @@ -0,0 +1,1360 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "2" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRakNDQWVtZ0F3SUJBZ0lRR1loTXRiajNYMlVFTGRWbGtqMW5ZVEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93YkRFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEZEQVNCZ05WQkFvVEMyVjRZVzF3YkdVdVkyOXRNUm93R0FZRFZRUURFeEYwYkhOallTNWxlR0Z0CmNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkhEdGlBdGlYL05DSTN6MFJjbkoKay85SEljRjBHQnZteG4yUG5JZGhmekZodnJ3ekF0ZjFTT2VhUTZzVGhhMWNCVTJTS2s4Q2JSRkRpTTl3M2o3QQorT09qYlRCck1BNEdBMVVkRHdFQi93UUVBd0lCcGpBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFnWUlLd1lCCkJRVUhBd0V3RHdZRFZSMFRBUUgvQkFVd0F3RUIvekFwQmdOVkhRNEVJZ1FnWEM5Wm04T0NHWVQ3VXZCbS95Y0MKTDk3OXc3cmE0TEpSMFVxMkkwLzB5eVl3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnY200UnVQbVNZZThWK0V5Zwo5OGhIMzdaTUxuQzlGYzJhVHlxcUlrSjVtc0FDSUJycndVRzhxQ293c3FUZFNaaHV3ZnByWEZjM29lNHU3SUl4CkszYnJ0QVc1Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "4" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHTUWzlfvq+8KGFTbK+8ZEqDwCBENuh3qWXSAP4e0OK2AiBpV3aAkkhszI6mzce46iurF0ksztfpEkcWWChATIn1OA==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "uaVdPrpK95EWujCSsTuF9gfpu48K8Sux" + } + }, + { + "signature": "MEQCIFI7GJE76YNSeB+u6LpYPBP4QhQ7hCls0TaCMitRg5AgAiBRP8b0b2DzQNuO7btuwrZ1bOmh8WT1cq69P0a/hByMNQ==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "zMv7vdciZPeAiVS30KpDg/GJM6NRLv0u" + } + }, + { + "signature": "MEQCID7ptudbHdemLzPcz7M2gyMI4coWhMEapA5nkD+Do1hQAiBsfyd4f6GgOu+QH3s7qgqnMffE0d0UD16huytuTGxQFw==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLRENDQWMrZ0F3SUJBZ0lRYzhUN0gwQjdtUVp0UEkvemIzMkJGREFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCRUEyVUdhNEFJZEMKeHlQREFMQ2FiRGxqM0FMYVpRbWhIVTRyS2puVzVwOUJoVi9CNzNXY0NMSFR0OFR4dDJoUW9uOWMyc3RvcldlUApvOTBQOG1OTk1HNmpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUwxVVFOQUxDVEtjbmc3WmdoNDUxVGhRaEh3QmNIVS9mZHdPVVlDOXpKZ2VNQW9HQ0NxR1NNNDkKQkFNQ0EwY0FNRVFDSUU0c0IyZ2k3OWdQK0g2ekM0a0ZDYU8zMUdZeGMvWVVRdW5FM3NWa1U0b3hBaUFIam5DUAozRU1wdlRTTlRoMmRjc2dHa0lnUnhFMnZSZWtTemZRNXA3ODVZZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "UDZNA91Zznhmf2k6iC8InWi08ms939ay" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:22:53Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "v6rZxsyuiPcNu1xhe7EXsxsRZejdgVLo" + } + } + }, + "signature": "MEUCIQCTDEukI3M006kv6uZSBx79SeK85Okwe6CixIlEjxPvXQIgA15mp/qnkPxszgy932PevbwWgQNAEWRJPpMB00nyS7M=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:22:53Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "91NGXXeVdFaB8Zt08F0hQYWWLlTMJytJ" + } + } + }, + "signature": "MEQCIFLBuWCs5+OOTDX149BXTBcrY+lOD5AbEWYzrEU2ukGgAiBoHT1VOtQsLjvstdRAWmcjdgV2uWPj/5SG1DWUwUmG8Q==" + } + ] + }, + "header": { + "data_hash": "vsLe1qfLyFhW1X8MYyY6XMvnoquZTEnGVP+PsD8HdY0=", + "number": "6", + "previous_hash": "RN+zA1AJiyMfyNSww2DTISQ3r2d1Rr5XRCYWfCaZjqc=" + }, + "metadata": { + "metadata": [ + "ChEKAggGEgsKCQoDAQIDEAQYChL9BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiT2dBd0lCQWdJUWJ0UUZrVlVra2tLMjZPVUhHclZ3anpBS0JnZ3Foa2pPUFFRREFqQnBNUXN3CkNRWURWUVFHRXdKVlV6RVRNQkVHQTFVRUNCTUtRMkZzYVdadmNtNXBZVEVXTUJRR0ExVUVCeE1OVTJGdUlFWnkKWVc1amFYTmpiekVVTUJJR0ExVUVDaE1MWlhoaGJYQnNaUzVqYjIweEZ6QVZCZ05WQkFNVERtTmhMbVY0WVcxdwpiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0dBMVVFCkJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdVkybHoKWTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSQpLb1pJemowREFRY0RRZ0FFT1htb2RFVWZBRUxMMUk4QWNOdXNLek0wVWx6Y2ZnVGpIVXEyaDN5RmU4dEpDaVZzCllHTXR5d0J2NlFyaE1rQXBFeURRZ0RlVmNUWTNEZ0JXdDZsdDJLTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUEKTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEVlIwakJDUXdJb0FnZzF3aExabzcrUUM0aVl0YVhxRUprTUoyUjRRWgpvWHJ2QWxSNEtTY0lvS0l3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQU9iVXZIakxDbWJoVXhhaXVydExBVHZVClBvRnkyL054UEFpd0VvRlpPYTdzQWlBYkJ3MEhVNm5EUUR0ZmQrTTZ4QVdqdnpjdFRYV051ZklRTnBiZnQra3IKZlE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYU7AO8NR5gJwV+JFo1Mqv10A+qDHKUsIxEkYwRAIgUcbOcRfGDTzR4+aJN5cHqi21AsioHLleFm/DzHZZ6OkCIHoLjNzA7z9rWyQszOvDWAnmzLN2FAjgs2IOFiG21Zxh", + "CgIIBg==", + "", + "CgkKAwECAxAEGAo=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block.json-flat.json new file mode 100644 index 00000000..17c75737 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_6.block.json-flat.json @@ -0,0 +1,497 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK\neD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi\nqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF\nAiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.name=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5\n54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE\nGaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ\nRNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6\n9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq\nhkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ\n3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq\nhkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=4 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.name=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ndYwS3hhngHiwgZ04VycGu5gUPC+j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.type=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=2 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIHTUWzlfvq+8KGFTbK+8ZEqDwCBENuh3qWXSAP4e0OK2AiBpV3aAkkhszI6mzce46iurF0ksztfpEkcWWChATIn1OA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=uaVdPrpK95EWujCSsTuF9gfpu48K8Sux +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature=MEQCIFI7GJE76YNSeB+u6LpYPBP4QhQ7hCls0TaCMitRg5AgAiBRP8b0b2DzQNuO7btuwrZ1bOmh8WT1cq69P0a/hByMNQ== +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.nonce=zMv7vdciZPeAiVS30KpDg/GJM6NRLv0u +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature=MEQCID7ptudbHdemLzPcz7M2gyMI4coWhMEapA5nkD+Do1hQAiBsfyd4f6GgOu+QH3s7qgqnMffE0d0UD16huytuTGxQFw== +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.nonce=UDZNA91Zznhmf2k6iC8InWi08ms939ay +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-11-19T05:22:53Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=v6rZxsyuiPcNu1xhe7EXsxsRZejdgVLo +.data.data[0].payload.data.last_update.signature=MEUCIQCTDEukI3M006kv6uZSBx79SeK85Okwe6CixIlEjxPvXQIgA15mp/qnkPxszgy932PevbwWgQNAEWRJPpMB00nyS7M= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:22:53Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=91NGXXeVdFaB8Zt08F0hQYWWLlTMJytJ +.data.data[0].signature=MEQCIFLBuWCs5+OOTDX149BXTBcrY+lOD5AbEWYzrEU2ukGgAiBoHT1VOtQsLjvstdRAWmcjdgV2uWPj/5SG1DWUwUmG8Q== +.header.data_hash=vsLe1qfLyFhW1X8MYyY6XMvnoquZTEnGVP+PsD8HdY0= +.header.number=6 +.header.previous_hash=RN+zA1AJiyMfyNSww2DTISQ3r2d1Rr5XRCYWfCaZjqc= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIBg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAo= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block new file mode 100644 index 00000000..c6e4808d Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block.json new file mode 100644 index 00000000..6615552f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block.json @@ -0,0 +1,968 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWYyZ0F3SUJBZ0lRWEJLVjBEQzlmYUhLNENvcFE3M2F6VEFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTUKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN5TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN5TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVBQkRESDNxbTlMUjVpanJiTUZjTmtVWitteW9GWC9EV1ZzUXNyVTluamdTcVR1ZU96NkpScldlVAorUlpUT2tHWUNxM2pmSDF3bVZLeWVvTzR3MkdiQzZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQUNkbGtHSmNJYkxUVUhJaUpCcVd1U1VmeW1hQUxlM0RVU2VwN3B5MWgwbFRBS0JnZ3Foa2pPUFFRRApBZ05JQURCRkFpRUE2aXRjNHRYMy94RGV6NUxEZWdBeWlFR0NZSWRPSm8xNnRhcVcwK3FEMzlFQ0lISTE0aGF4CnUwK2o4VUZQUlBPbTJSU0Izc3pLS1FXY0c1dFhWUWEzdnJUdQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQD0o2o+hZoRFlXZeVQHDCycpoWo4uk2AYzeKwwEVIT/iQIgcktYmv2qpdTFPzbylqCygne/XqquI+1ZSlZxqy43WEo=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "waN2ShL10tzUWf6AGQ85x/qhiAvEnD+G" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:48Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "NtXlLpbEwR9cv4zHvBSIjuV6JVYwFw8l" + } + } + }, + "signature": "MEUCIQDWY5T6abGhYr3DDHg6YhbjF+cX1Tgtz4g+3sQjExrFmgIgQemCvrg1dJDm3CJcYtIR3MQ5NbpWPdo6So6P94ppR9U=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:48Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "6ywsqCOBgLGh/exqdlgXfDp5c1wHdDvA" + } + } + }, + "signature": "MEQCIDzaW3/4C3jdVmAHb1VQlngRE0koiVKTt7Kdu00cGgEyAiBjxHzKp9ZIxRCbAC1NWaZ6wmJitZs6zvCe52El+mbTbA==" + } + ] + }, + "header": { + "data_hash": "by4Q3hZ5TIw9QJIaTXuRTGXShKLX+8y1ti04Kkc7dBA=", + "number": "2", + "previous_hash": "YB7ht6EZacPztVERUpRgDXvQP5+gKiSmJfjdVD25yoQ=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block.json-flat.json new file mode 100644 index 00000000..e63b6319 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/businesschannel_config.block.json-flat.json @@ -0,0 +1,359 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5\n54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE\nGaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ\nRNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6\n9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq\nhkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ\n3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq\nhkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQD0o2o+hZoRFlXZeVQHDCycpoWo4uk2AYzeKwwEVIT/iQIgcktYmv2qpdTFPzbylqCygne/XqquI+1ZSlZxqy43WEo= +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=waN2ShL10tzUWf6AGQ85x/qhiAvEnD+G +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-11-19T05:21:48Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo\n8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ\nnvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO\nPQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=NtXlLpbEwR9cv4zHvBSIjuV6JVYwFw8l +.data.data[0].payload.data.last_update.signature=MEUCIQDWY5T6abGhYr3DDHg6YhbjF+cX1Tgtz4g+3sQjExrFmgIgQemCvrg1dJDm3CJcYtIR3MQ5NbpWPdo6So6P94ppR9U= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:21:48Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=6ywsqCOBgLGh/exqdlgXfDp5c1wHdDvA +.data.data[0].signature=MEQCIDzaW3/4C3jdVmAHb1VQlngRE0koiVKTt7Kdu00cGgEyAiBjxHzKp9ZIxRCbAC1NWaZ6wmJitZs6zvCe52El+mbTbA== +.header.data_hash=by4Q3hZ5TIw9QJIaTXuRTGXShKLX+8y1ti04Kkc7dBA= +.header.number=2 +.header.previous_hash=YB7ht6EZacPztVERUpRgDXvQP5+gKiSmJfjdVD25yoQ= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta.json new file mode 100644 index 00000000..3d41e9f8 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta.json @@ -0,0 +1,308 @@ +{ + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta.pb b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta.pb new file mode 100644 index 00000000..f56a0465 Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta.pb differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta_env.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta_env.json new file mode 100644 index 00000000..02630a3f --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta_env.json @@ -0,0 +1,320 @@ +{ + "payload": { + "header": { + "channel_header": { + "channel_id": "businesschannel", + "type": 2 + } + }, + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUtNcVhZU0RmcUtNL1l5eDBuMjBOcDh3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpNdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd09USTBNREExT1RBd1doY05Namt3T1RJeE1EQTEKT1RBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCSEMvM1NWcjYzMTkwZ0hOUWtTc2s5b0xxUkdOSjFTZFNwSXlxZHZRbmRBQytzZ2lKM3I3VkZhOApkRE4xNTRiSDF0UmVoUElKRTRJaU5pR0hSQ0xVQVUyamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWc1cEJrWGIyZ1FOLzB1N0U0eWV5RlRtTGNrait1WHZOU1I5SkE4OWZzOXBnd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdWcko3cS9WRzNURnYrVXhBTzJOTWxWRE1JajUxTFdUU08xY3B5aHdMVS9nQ0lGU0xYR0NjCjloSmVNUk1WR3VicXduRkxxV0lXQTBlRUFPZDVIUmx4VDMzbAotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + } + } + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta_env.pb new file mode 100644 index 00000000..727909f9 Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/config_delta_env.pb differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block new file mode 100644 index 00000000..8be7f48d Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block.json new file mode 100644 index 00000000..4d6487a3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXRENDQWY2Z0F3SUJBZ0lSQUlvendvVlFYYWR5anNWcnF6VzdDSU13Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd09USTBNREExT1RBd1doY05Namt3T1RJeE1EQTEKT1RBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCS2JvMzlKN0ZOREZDRFBKSVNmUkJheGtjRHlIdmtKTDVpNkozNm9uWGpuMDB6dlFCd29mbERVeQoxRWV4OTNzOG9qWmxGRG0ycFVLaEg0SjB0NWRGUG5HamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdhcEZORzRrb0lxdFdvRllJbHBXK2hXS0lnalByc05pMXdkTC9xZ2d5Q3NBd0NnWUlLb1pJemowRQpBd0lEU0FBd1JRSWhBS1FsUWE1QXluT0E3RzIxbkhheUtmbmViakh2ZmRDREF2Q1loaC9WRGpqWEFpQXllNEo3ClhWTVhFbXVQVXdmMk1Db293MUUwQnVCUHpldEFQRW1Cb0RsOVNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T04:29:33Z", + "tls_cert_hash": null, + "tx_id": "91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "zR57LJNJvtI6WwFd/Wjjev+wflreUU01" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block.json-flat.json new file mode 100644 index 00000000..2e1d7273 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1\nOTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy\n1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E\nAwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5\n54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE\nGaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ\nRNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n\njrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw\nKQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG\nSM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T04:29:33Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=zR57LJNJvtI6WwFd/Wjjev+wflreUU01 +.data.data[0].signature=None +.header.data_hash=kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block_updated.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block_updated.block new file mode 100644 index 00000000..421520ab Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block_updated.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block_updated.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block_updated.json new file mode 100644 index 00000000..57b78494 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer0.genesis.block_updated.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T04:29:33Z", + "tls_cert_hash": null, + "tx_id": "91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "zR57LJNJvtI6WwFd/Wjjev+wflreUU01" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block new file mode 100644 index 00000000..8be7f48d Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block.json new file mode 100644 index 00000000..4d6487a3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDekNDQWJHZ0F3SUJBZ0lSQVBzdHBtTHR5MS9Vd3IrWHRMdU5WNGt3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNRll4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJvd0dBWURWUVFEREJGQlpHMXBia0JsZUdGdGNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHClNNNDlBd0VIQTBJQUJOem9jcmt3NXp2Kys2YkxYaFRXQ1pkYTcrcXc2UkdGNnY1VGlVOTVQN2E5Zi9LbWw2eVoKRnk1Sjdza1FNamdTODc1NXcxdEJxL04yeXNjaWVHT05IMEdqVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTQpCZ05WSFJNQkFmOEVBakFBTUNzR0ExVWRJd1FrTUNLQUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUVHYUY2Cjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGdBTUVVQ0lRRDFsR3NDTkVkbzJOeThiTnJXcG1JWkw0dU8KVzNqeVZnTEplM1lCNUkxN2FBSWdWK0JMb3c0TmFYZzlWaDVqcjA3TEpBa09FTXh5ZlBGNW9SSkFHUkptV0VnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T04:29:33Z", + "tls_cert_hash": null, + "tx_id": "91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "zR57LJNJvtI6WwFd/Wjjev+wflreUU01" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block.json-flat.json new file mode 100644 index 00000000..2e1d7273 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer1.genesis.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6\n9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq\nhkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T04:29:33Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=zR57LJNJvtI6WwFd/Wjjev+wflreUU01 +.data.data[0].signature=None +.header.data_hash=kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block new file mode 100644 index 00000000..8be7f48d Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block.json new file mode 100644 index 00000000..4d6487a3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWYyZ0F3SUJBZ0lRWEJLVjBEQzlmYUhLNENvcFE3M2F6VEFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTUKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN5TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN5TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVBQkRESDNxbTlMUjVpanJiTUZjTmtVWitteW9GWC9EV1ZzUXNyVTluamdTcVR1ZU96NkpScldlVAorUlpUT2tHWUNxM2pmSDF3bVZLeWVvTzR3MkdiQzZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQUNkbGtHSmNJYkxUVUhJaUpCcVd1U1VmeW1hQUxlM0RVU2VwN3B5MWgwbFRBS0JnZ3Foa2pPUFFRRApBZ05JQURCRkFpRUE2aXRjNHRYMy94RGV6NUxEZWdBeWlFR0NZSWRPSm8xNnRhcVcwK3FEMzlFQ0lISTE0aGF4CnUwK2o4VUZQUlBPbTJSU0Izc3pLS1FXY0c1dFhWUWEzdnJUdQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRakNDQWVtZ0F3SUJBZ0lRR1loTXRiajNYMlVFTGRWbGtqMW5ZVEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93YkRFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEZEQVNCZ05WQkFvVEMyVjRZVzF3YkdVdVkyOXRNUm93R0FZRFZRUURFeEYwYkhOallTNWxlR0Z0CmNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkhEdGlBdGlYL05DSTN6MFJjbkoKay85SEljRjBHQnZteG4yUG5JZGhmekZodnJ3ekF0ZjFTT2VhUTZzVGhhMWNCVTJTS2s4Q2JSRkRpTTl3M2o3QQorT09qYlRCck1BNEdBMVVkRHdFQi93UUVBd0lCcGpBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFnWUlLd1lCCkJRVUhBd0V3RHdZRFZSMFRBUUgvQkFVd0F3RUIvekFwQmdOVkhRNEVJZ1FnWEM5Wm04T0NHWVQ3VXZCbS95Y0MKTDk3OXc3cmE0TEpSMFVxMkkwLzB5eVl3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnY200UnVQbVNZZThWK0V5Zwo5OGhIMzdaTUxuQzlGYzJhVHlxcUlrSjVtc0FDSUJycndVRzhxQ293c3FUZFNaaHV3ZnByWEZjM29lNHU3SUl4CkszYnJ0QVc1Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T04:29:33Z", + "tls_cert_hash": null, + "tx_id": "91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "zR57LJNJvtI6WwFd/Wjjev+wflreUU01" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block.json-flat.json new file mode 100644 index 00000000..2e1d7273 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/orderer2.genesis.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG\nSM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ\nFy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM\nBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6\n7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO\nW3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6\n9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq\nhkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n\njrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw\nKQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG\nSM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T04:29:33Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=zR57LJNJvtI6WwFd/Wjjev+wflreUU01 +.data.data[0].signature=None +.header.data_hash=kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/original_config.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/original_config.json new file mode 100644 index 00000000..220491b7 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/original_config.json @@ -0,0 +1,778 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/original_config.pb new file mode 100644 index 00000000..cf7d0eb3 Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/original_config.pb differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block new file mode 100644 index 00000000..8be7f48d Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block.json new file mode 100644 index 00000000..4d6487a3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDekNDQWJHZ0F3SUJBZ0lSQVBzdHBtTHR5MS9Vd3IrWHRMdU5WNGt3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNRll4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJvd0dBWURWUVFEREJGQlpHMXBia0JsZUdGdGNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHClNNNDlBd0VIQTBJQUJOem9jcmt3NXp2Kys2YkxYaFRXQ1pkYTcrcXc2UkdGNnY1VGlVOTVQN2E5Zi9LbWw2eVoKRnk1Sjdza1FNamdTODc1NXcxdEJxL04yeXNjaWVHT05IMEdqVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTQpCZ05WSFJNQkFmOEVBakFBTUNzR0ExVWRJd1FrTUNLQUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUVHYUY2Cjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGdBTUVVQ0lRRDFsR3NDTkVkbzJOeThiTnJXcG1JWkw0dU8KVzNqeVZnTEplM1lCNUkxN2FBSWdWK0JMb3c0TmFYZzlWaDVqcjA3TEpBa09FTXh5ZlBGNW9SSkFHUkptV0VnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQUxrQTNrQSsvL29hZ1NEbElxeUhPS3N3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBUUU0TmtpRU91Y1duUmw0ejY0a1JzQXhnVTUKNTQrMDVndGViZmxzajgrNGo3TjhpbGMwMFE1amorL3BtbmJmbUl0ZUpOVFhnancxbEpWaFBOcUVRU1dvbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUUKR2FGNjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lIejN1ZFdibmZwWlNwRWxwVng4WHFXSgpSTkcva00zWjFyenFRNzFOZEoxSUFpQUtlVTg5cEsyMWZ0dWUyWFVPOHZqRXR5bVhSb2hjVnQwUU51U2pTRGdVCjFnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQVBYclNNcXJGc2QveUkwYXNoOGg2TlV3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkJ0TDBabjVtOHJMM09uSTNhVTFkTjJZTjlKdTRmMU01bFV2a2lZMFFIejYKOUYrRytBeXhtcHNKRU5Ia21hcElnWkxDcFAzd3hFYmZ2Nk1ySEFQbWJnK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNREFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBYlBpejFUNDZDTlJiNGZzODhoeFR0VTZsTkZuNTN0NmZOU0JXS0RiY1hzUUlnCkYveUtuYUhMbGJpK3JDcmo2eDdyZFZndFliZ3dVTm53ekUxazZzUTBQM3c9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T04:29:33Z", + "tls_cert_hash": null, + "tx_id": "91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "zR57LJNJvtI6WwFd/Wjjev+wflreUU01" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block.json-flat.json new file mode 100644 index 00000000..2e1d7273 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_0.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6\n9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq\nhkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T04:29:33Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=zR57LJNJvtI6WwFd/Wjjev+wflreUU01 +.data.data[0].signature=None +.header.data_hash=kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block new file mode 100644 index 00000000..d7139b7e Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block.json new file mode 100644 index 00000000..1e59e5e6 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block.json @@ -0,0 +1,1129 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQD1sxz0xLs/0gMMbxXZaFkKaUmhY50HFFKA26TlJyx7PgIgCusEdDFLO+Ecn3in6vLG2Tzu/5fWNxOoeDJ6P2vF5/k=", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLRENDQWMrZ0F3SUJBZ0lRYzhUN0gwQjdtUVp0UEkvemIzMkJGREFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCRUEyVUdhNEFJZEMKeHlQREFMQ2FiRGxqM0FMYVpRbWhIVTRyS2puVzVwOUJoVi9CNzNXY0NMSFR0OFR4dDJoUW9uOWMyc3RvcldlUApvOTBQOG1OTk1HNmpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUwxVVFOQUxDVEtjbmc3WmdoNDUxVGhRaEh3QmNIVS9mZHdPVVlDOXpKZ2VNQW9HQ0NxR1NNNDkKQkFNQ0EwY0FNRVFDSUU0c0IyZ2k3OWdQK0g2ekM0a0ZDYU8zMUdZeGMvWVVRdW5FM3NWa1U0b3hBaUFIam5DUAozRU1wdlRTTlRoMmRjc2dHa0lnUnhFMnZSZWtTemZRNXA3ODVZZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "3hL15oI5TZ7DuDhXBMID3rWMhkBa2uG4" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "njtLDend7t3TPuNBOvHtZ5CABMxl24je" + } + } + }, + "signature": "MEQCIELzb7ARMzlc9Y24aJadJi2bZ1EHisUjTzsfkNcqu4JMAiBv/nKYVL17SCzBnEPp5UjBGnBmgj0TvWQTQzESMzRylg==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJPZ0F3SUJBZ0lRYnRRRmtWVWtra0syNk9VSEdyVndqekFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRGt5TkRBd05Ua3dNRm9YRFRJNU1Ea3lNVEF3TlRrd01Gb3dXVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4SFRBYkJnTlZCQU1URkc5eVpHVnlaWEl3TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJCktvWkl6ajBEQVFjRFFnQUVPWG1vZEVVZkFFTEwxSThBY051c0t6TTBVbHpjZmdUakhVcTJoM3lGZTh0SkNpVnMKWUdNdHl3QnY2UXJoTWtBcEV5RFFnRGVWY1RZM0RnQld0Nmx0MktOTk1Fc3dEZ1lEVlIwUEFRSC9CQVFEQWdlQQpNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqQkNRd0lvQWdnMXdoTFpvNytRQzRpWXRhWHFFSmtNSjJSNFFaCm9YcnZBbFI0S1NjSW9LSXdDZ1lJS29aSXpqMEVBd0lEU0FBd1JRSWhBT2JVdkhqTENtYmhVeGFpdXJ0TEFUdlUKUG9GeTIvTnhQQWl3RW9GWk9hN3NBaUFiQncwSFU2bkRRRHRmZCtNNnhBV2p2emN0VFhXTnVmSVFOcGJmdCtrcgpmUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "5mMh9XoYQS+e89Ig/l6tFcYgMrCr4MkC" + } + } + }, + "signature": "MEQCIB5UxaGfDbNrNIcQxhI654ehAbmYgXVY+gK9qkAB7rC/AiB0BCeLEsc1Eq47/MyBbSEHfsGLTl0VS3MTZ5AQZiFFdw==" + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T05:21:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 4, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJPZ0F3SUJBZ0lRYnRRRmtWVWtra0syNk9VSEdyVndqekFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRGt5TkRBd05Ua3dNRm9YRFRJNU1Ea3lNVEF3TlRrd01Gb3dXVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4SFRBYkJnTlZCQU1URkc5eVpHVnlaWEl3TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJCktvWkl6ajBEQVFjRFFnQUVPWG1vZEVVZkFFTEwxSThBY051c0t6TTBVbHpjZmdUakhVcTJoM3lGZTh0SkNpVnMKWUdNdHl3QnY2UXJoTWtBcEV5RFFnRGVWY1RZM0RnQld0Nmx0MktOTk1Fc3dEZ1lEVlIwUEFRSC9CQVFEQWdlQQpNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqQkNRd0lvQWdnMXdoTFpvNytRQzRpWXRhWHFFSmtNSjJSNFFaCm9YcnZBbFI0S1NjSW9LSXdDZ1lJS29aSXpqMEVBd0lEU0FBd1JRSWhBT2JVdkhqTENtYmhVeGFpdXJ0TEFUdlUKUG9GeTIvTnhQQWl3RW9GWk9hN3NBaUFiQncwSFU2bkRRRHRmZCtNNnhBV2p2emN0VFhXTnVmSVFOcGJmdCtrcgpmUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "TpV8nEiIz7cFDG67dlYr725YJ/1FPunS" + } + } + }, + "signature": "MEQCIFS+PspET2Sa0intugoL6eyTl5iItm0LB8TRYg3vgBSRAiARwTANTDc3aKmGASqd/3b110Rm+Pwtn+KKZqA4HVHXcw==" + } + ] + }, + "header": { + "data_hash": "m5VjazkguVyz+9WaTkqrQ2pfUsRBlRh/L2zJfSiKEoM=", + "number": "1", + "previous_hash": "euQPse491Gan/jtqXInoIaS4dzStUmtJ7vnVjwS/bwg=" + }, + "metadata": { + "metadata": [ + "Cg8KABILCgkKAwECAxAEGAUS/QYKsgYKlQYKCk9yZGVyZXJNU1AShgYtLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJQ0RUQ0NBYk9nQXdJQkFnSVFidFFGa1ZVa2trSzI2T1VIR3JWd2p6QUtCZ2dxaGtqT1BRUURBakJwTVFzdwpDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTlUyRnVJRVp5CllXNWphWE5qYnpFVU1CSUdBMVVFQ2hNTFpYaGhiWEJzWlM1amIyMHhGekFWQmdOVkJBTVREbU5oTG1WNFlXMXcKYkdVdVkyOXRNQjRYRFRFNU1Ea3lOREF3TlRrd01Gb1hEVEk1TURreU1UQXdOVGt3TUZvd1dURUxNQWtHQTFVRQpCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCR2NtRnVZMmx6ClkyOHhIVEFiQmdOVkJBTVRGRzl5WkdWeVpYSXdMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUkKS29aSXpqMERBUWNEUWdBRU9YbW9kRVVmQUVMTDFJOEFjTnVzS3pNMFVsemNmZ1RqSFVxMmgzeUZlOHRKQ2lWcwpZR010eXdCdjZRcmhNa0FwRXlEUWdEZVZjVFkzRGdCV3Q2bHQyS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBCk1Bd0dBMVVkRXdFQi93UUNNQUF3S3dZRFZSMGpCQ1F3SW9BZ2cxd2hMWm83K1FDNGlZdGFYcUVKa01KMlI0UVoKb1hydkFsUjRLU2NJb0tJd0NnWUlLb1pJemowRUF3SURTQUF3UlFJaEFPYlV2SGpMQ21iaFV4YWl1cnRMQVR2VQpQb0Z5Mi9OeFBBaXdFb0ZaT2E3c0FpQWJCdzBIVTZuRFFEdGZkK002eEFXanZ6Y3RUWFdOdWZJUU5wYmZ0K2tyCmZRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQoSGDbxg5GIneEq0u6w72u93jXy58Yo3R9DfxJGMEQCIDAzadCnpxphzYad3kA5hGVZBDAMbg0qoMGYNjq6nrm8AiBfZzfEMEN3qIDUW7BjpzuypQwEfs42QMZKAyYxyv1v9w==", + "", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block.json-flat.json new file mode 100644 index 00000000..845a425d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_1.block.json-flat.json @@ -0,0 +1,411 @@ +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt\ncGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ\nk/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A\n+OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB\nBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC\nL979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg\n98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.version=0 +.data.data[0].payload.data.payload.data.config.sequence=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature=MEUCIQD1sxz0xLs/0gMMbxXZaFkKaUmhY50HFFKA26TlJyx7PgIgCusEdDFLO+Ecn3in6vLG2Tzu/5fWNxOoeDJ6P2vF5/k= +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.nonce=3hL15oI5TZ7DuDhXBMID3rWMhkBa2uG4 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.timestamp=2019-11-19T05:21:41Z +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.nonce=njtLDend7t3TPuNBOvHtZ5CABMxl24je +.data.data[0].payload.data.payload.data.last_update.signature=MEQCIELzb7ARMzlc9Y24aJadJi2bZ1EHisUjTzsfkNcqu4JMAiBv/nKYVL17SCzBnEPp5UjBGnBmgj0TvWQTQzESMzRylg== +.data.data[0].payload.data.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.header.channel_header.timestamp=2019-11-19T05:21:41Z +.data.data[0].payload.data.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.header.channel_header.type=1 +.data.data[0].payload.data.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.data.payload.header.signature_header.nonce=5mMh9XoYQS+e89Ig/l6tFcYgMrCr4MkC +.data.data[0].payload.data.signature=MEQCIB5UxaGfDbNrNIcQxhI654ehAbmYgXVY+gK9qkAB7rC/AiB0BCeLEsc1Eq47/MyBbSEHfsGLTl0VS3MTZ5AQZiFFdw== +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T05:21:41Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=4 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=TpV8nEiIz7cFDG67dlYr725YJ/1FPunS +.data.data[0].signature=MEQCIFS+PspET2Sa0intugoL6eyTl5iItm0LB8TRYg3vgBSRAiARwTANTDc3aKmGASqd/3b110Rm+Pwtn+KKZqA4HVHXcw== +.header.data_hash=m5VjazkguVyz+9WaTkqrQ2pfUsRBlRh/L2zJfSiKEoM= +.header.number=1 +.header.previous_hash=euQPse491Gan/jtqXInoIaS4dzStUmtJ7vnVjwS/bwg= +.metadata.metadata[0]=Cg8KABILCgkKAwECAxAEGAUS/QYKsgYKlQYKCk9yZGVyZXJNU1AShgYtLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJQ0RUQ0NBYk9nQXdJQkFnSVFidFFGa1ZVa2trSzI2T1VIR3JWd2p6QUtCZ2dxaGtqT1BRUURBakJwTVFzdwpDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTlUyRnVJRVp5CllXNWphWE5qYnpFVU1CSUdBMVVFQ2hNTFpYaGhiWEJzWlM1amIyMHhGekFWQmdOVkJBTVREbU5oTG1WNFlXMXcKYkdVdVkyOXRNQjRYRFRFNU1Ea3lOREF3TlRrd01Gb1hEVEk1TURreU1UQXdOVGt3TUZvd1dURUxNQWtHQTFVRQpCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCR2NtRnVZMmx6ClkyOHhIVEFiQmdOVkJBTVRGRzl5WkdWeVpYSXdMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUkKS29aSXpqMERBUWNEUWdBRU9YbW9kRVVmQUVMTDFJOEFjTnVzS3pNMFVsemNmZ1RqSFVxMmgzeUZlOHRKQ2lWcwpZR010eXdCdjZRcmhNa0FwRXlEUWdEZVZjVFkzRGdCV3Q2bHQyS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBCk1Bd0dBMVVkRXdFQi93UUNNQUF3S3dZRFZSMGpCQ1F3SW9BZ2cxd2hMWm83K1FDNGlZdGFYcUVKa01KMlI0UVoKb1hydkFsUjRLU2NJb0tJd0NnWUlLb1pJemowRUF3SURTQUF3UlFJaEFPYlV2SGpMQ21iaFV4YWl1cnRMQVR2VQpQb0Z5Mi9OeFBBaXdFb0ZaT2E3c0FpQWJCdzBIVTZuRFFEdGZkK002eEFXanZ6Y3RUWFdOdWZJUU5wYmZ0K2tyCmZRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQoSGDbxg5GIneEq0u6w72u93jXy58Yo3R9DfxJGMEQCIDAzadCnpxphzYad3kA5hGVZBDAMbg0qoMGYNjq6nrm8AiBfZzfEMEN3qIDUW7BjpzuypQwEfs42QMZKAyYxyv1v9w== +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block new file mode 100644 index 00000000..8be7f48d Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block differ diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block.json new file mode 100644 index 00000000..4d6487a3 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQUxrQTNrQSsvL29hZ1NEbElxeUhPS3N3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBUUU0TmtpRU91Y1duUmw0ejY0a1JzQXhnVTUKNTQrMDVndGViZmxzajgrNGo3TjhpbGMwMFE1amorL3BtbmJmbUl0ZUpOVFhnancxbEpWaFBOcUVRU1dvbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUUKR2FGNjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lIejN1ZFdibmZwWlNwRWxwVng4WHFXSgpSTkcva00zWjFyenFRNzFOZEoxSUFpQUtlVTg5cEsyMWZ0dWUyWFVPOHZqRXR5bVhSb2hjVnQwUU51U2pTRGdVCjFnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-11-19T04:29:33Z", + "tls_cert_hash": null, + "tx_id": "91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "zR57LJNJvtI6WwFd/Wjjev+wflreUU01" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block.json-flat.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block.json-flat.json new file mode 100644 index 00000000..2e1d7273 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/testchainid_config.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz\nY2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5\nMDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH\nEw1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD\nVQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D\nAQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT\n+RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud\nJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud\nDgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD\nAgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt\ncGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ\nk/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A\n+OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB\nBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC\nL979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg\n98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-11-19T04:29:33Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=zR57LJNJvtI6WwFd/Wjjev+wflreUU01 +.data.data[0].signature=None +.header.data_hash=kU41oLYSOi4jw/QuXYcpoirh3tuCLXviDK/fCTHCYTg= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/updated_config.json b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/updated_config.json new file mode 100644 index 00000000..cdf5b793 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/updated_config.json @@ -0,0 +1,948 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.4/raft/channel-artifacts/updated_config.pb b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/updated_config.pb new file mode 100644 index 00000000..b19bab8f Binary files /dev/null and b/hyperledger_fabric/v1.4.4/raft/channel-artifacts/updated_config.pb differ diff --git a/hyperledger_fabric/v1.4.4/raft/configtx.yaml b/hyperledger_fabric/v1.4.4/raft/configtx.yaml new file mode 100644 index 00000000..9156ec47 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/configtx.yaml @@ -0,0 +1,795 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + + - &Org3 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org3MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org3MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org3Policies + Readers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org3.example.com + Port: 7051 +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V1_4_3: true + V1_4_2: false + V1_3: false + V1_1: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V1_4_2: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V2.0 for Application enables the new non-backwards compatible + # features and fixes of fabric v2.0. + V1_4_2: true + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: etcdraft + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + - orderer2.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.4/raft/logs/dev_all.log b/hyperledger_fabric/v1.4.4/raft/logs/dev_all.log new file mode 100644 index 00000000..e35da2a4 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/logs/dev_all.log @@ -0,0 +1,93756 @@ +Attaching to peer0.org2.example.com, peer1.org2.example.com, peer1.org1.example.com, peer0.org1.example.com, orderer2.example.com, orderer0.example.com, fabric-cli, orderer1.example.com +peer1.org2.example.com | [001 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer1.org2.example.com | [002 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer1.org2.example.com | [003 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer1.org2.example.com | [004 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer1.org2.example.com | [005 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer1.org2.example.com | [006 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org2.example.com | [007 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer1.org2.example.com | [008 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer1.org2.example.com | [009 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer1.org2.example.com | [00a 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer1.org2.example.com | [00b 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [00c 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer1.org2.example.com | [00d 11-19 05:21:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [00e 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer1.org2.example.com | [00f 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer1.org2.example.com | [010 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [011 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer1.org2.example.com | [012 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [013 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer1.org2.example.com | [014 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [015 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer1.org2.example.com | [016 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [017 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer1.org2.example.com | [018 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org2.example.com | [019 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer1.org2.example.com | [01a 11-19 05:21:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org2.example.com | [01b 11-19 05:21:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done +peer1.org2.example.com | [01c 11-19 05:21:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer1.org2.example.com | [01d 11-19 05:21:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer1.org2.example.com | [01e 11-19 05:21:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer1.org2.example.com-cert.pem +peer1.org2.example.com | [01f 11-19 05:21:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer1.org2.example.com | [020 11-19 05:21:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org2.example.com-cert.pem +peer1.org2.example.com | [021 11-19 05:21:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer1.org2.example.com | [022 11-19 05:21:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer1.org2.example.com | [023 11-19 05:21:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer1.org2.example.com | [024 11-19 05:21:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer1.org2.example.com | [025 11-19 05:21:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org2.example.com-cert.pem +peer1.org2.example.com | [026 11-19 05:21:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer1.org2.example.com | [027 11-19 05:21:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer1.org2.example.com | [028 11-19 05:21:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer1.org2.example.com | [029 11-19 05:21:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer1.org2.example.com | [02a 11-19 05:21:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer1.org2.example.com | [02b 11-19 05:21:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [02c 11-19 05:21:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [02d 11-19 05:21:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer1.org2.example.com | [02e 11-19 05:21:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [02f 11-19 05:21:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [030 11-19 05:21:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer1.org2.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org2.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org2.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [031 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c] at [/etc/hyperledger/fabric/msp/keystore/3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c_sk]... +peer1.org2.example.com | [032 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer1.org2.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org2.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org2.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [033 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2029-09-21 00:59:00 +0000 UTC +peer1.org2.example.com | [034 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org2.example.com | Version: 1.4.4 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.12.13 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Image Version: 0.4.18 +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger +peer1.org2.example.com | [035 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [036 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org2.example.com | [037 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org2.example.com | [038 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org2.example.com | [039 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org2.example.com | [03a 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer1.org2.example.com | [03b 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer1.org2.example.com | [03c 11-19 05:21:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer1.org2.example.com | [03d 11-19 05:21:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer1.org2.example.com | [03e 11-19 05:21:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer1.org2.example.com | [03f 11-19 05:21:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer1.org2.example.com | [040 11-19 05:21:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer1.org2.example.com | [041 11-19 05:21:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer1.org2.example.com | [042 11-19 05:21:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer1.org2.example.com | [043 11-19 05:21:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org2.example.com | [044 11-19 05:21:35.14 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org2.example.com | [045 11-19 05:21:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer1.org2.example.com | [046 11-19 05:21:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org2.example.com | [047 11-19 05:21:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer1.org2.example.com | [048 11-19 05:21:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer1.org2.example.com | [049 11-19 05:21:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer1.org2.example.com | [04a 11-19 05:21:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer1.org2.example.com | [04b 11-19 05:21:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer1.org2.example.com | [04c 11-19 05:21:35.18 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer1.org2.example.com | [04d 11-19 05:21:35.18 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org2.example.com | [04e 11-19 05:21:35.18 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer1.org2.example.com | [04f 11-19 05:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer1.org2.example.com | [050 11-19 05:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer1.org2.example.com | [051 11-19 05:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org2.example.com | [052 11-19 05:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer1.org2.example.com | [053 11-19 05:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer1.org2.example.com | [054 11-19 05:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer1.org2.example.com | [055 11-19 05:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org2.example.com | [056 11-19 05:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer1.org2.example.com | [057 11-19 05:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer1.org2.example.com | [058 11-19 05:21:35.27 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org2.example.com | [059 11-19 05:21:35.27 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +peer1.org2.example.com | [05a 11-19 05:21:35.28 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer1.org2.example.com | [05b 11-19 05:21:35.28 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +peer1.org2.example.com | [05c 11-19 05:21:35.28 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer1.org2.example.com | [05d 11-19 05:21:35.32 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org2.example.com | [05e 11-19 05:21:35.33 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com +peer1.org2.example.com | [05f 11-19 05:21:35.34 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org2.example.com:7052 +peer1.org2.example.com | [060 11-19 05:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.4 +peer1.org2.example.com | [061 11-19 05:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org2.example.com | [062 11-19 05:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.4 +peer1.org2.example.com | [063 11-19 05:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org2.example.com | [064 11-19 05:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.4 +peer1.org2.example.com | [065 11-19 05:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org2.example.com | [066 11-19 05:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer1.org2.example.com | [067 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer1.org2.example.com | [068 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [069 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer1.org2.example.com | [06a 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer1.org2.example.com | [06b 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer1.org2.example.com | [06c 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org2.example.com | [06d 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer1.org2.example.com | [06e 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [06f 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer1.org2.example.com | [070 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org2.example.com | [071 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org2.example.com | [072 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer1.org2.example.com | [073 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer1.org2.example.com | [074 11-19 05:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org2.example.com | [075 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer1.org2.example.com | [076 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org2.example.com | [077 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer1.org2.example.com | [078 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [079 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer1.org2.example.com | [07a 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer1.org2.example.com | [07b 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051] +peer1.org2.example.com | [07c 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [07d 11-19 05:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer1.org2.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org2.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org2.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [07e 11-19 05:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [07f 11-19 05:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [080 11-19 05:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [081 11-19 05:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [082 11-19 05:21:35.41 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7, Metadata: +peer1.org2.example.com | [083 11-19 05:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [084 11-19 05:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A20415E889B8E6788E1...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [085 11-19 05:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1AC707B8A6E23F6D3F52F9115EC4ACA386A0135C2443F8AFDCDB79589084D9FE +peer1.org2.example.com | [086 11-19 05:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Added A^���g�� +peer1.org2.example.com | ����U���ʒ�:+��aSpq�, total items: 1 +peer1.org2.example.com | [087 11-19 05:21:35.43 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org2.example.com:7051 started +peer1.org2.example.com | [088 11-19 05:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer1.org2.example.com | [089 11-19 05:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [08a 11-19 05:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [08b 11-19 05:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31DE3B892CF436D1E0E3052820BC7129F250371E3CFBF0925CD390139E23075D +peer1.org2.example.com | [08c 11-19 05:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [08d 11-19 05:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [08e 11-19 05:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [08f 11-19 05:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer1.org2.example.com | [090 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | [091 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.4 +peer1.org2.example.com | [092 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org2.example.com | [093 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.4 +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [094 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +peer1.org2.example.com | [095 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +peer1.org2.example.com | [096 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.4 +peer1.org2.example.com | [097 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +peer1.org2.example.com | [098 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.4 +peer1.org2.example.com | [099 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.4 +peer1.org2.example.com | [09a 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [09b 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [09c 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.4 +peer1.org2.example.com | [09d 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.4" , sending back REGISTERED +peer1.org2.example.com | [09e 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.4" +peer1.org2.example.com | [09f 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.4" +peer1.org2.example.com | [0a0 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.4" +peer1.org2.example.com | [0a1 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [0a2 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0a3 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU [fbdca067] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0a4 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU [fbdca067] notifying Txid:fbdca067-d73c-484a-ae7c-125f1d7969d3, channelID: +peer1.org2.example.com | [0a5 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0a6 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [0a7 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | [0a8 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.4 +peer1.org2.example.com | [0a9 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org2.example.com | [0aa 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.4 +peer0.org2.example.com | [001 11-19 05:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org2.example.com | [002 11-19 05:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org2.example.com | [003 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer0.org2.example.com | [004 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer0.org2.example.com | [005 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org2.example.com | [006 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer0.org2.example.com | [007 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer0.org2.example.com | [008 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer0.org2.example.com | [009 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer0.org2.example.com | [00a 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer0.org2.example.com | [00b 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer0.org2.example.com | [00c 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer0.org2.example.com | [00d 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer0.org2.example.com | [00e 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [00f 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer0.org2.example.com | [010 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [011 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer0.org2.example.com | [012 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [013 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer0.org2.example.com | [014 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [015 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer0.org2.example.com | [016 11-19 05:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [017 11-19 05:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer0.org2.example.com | [018 11-19 05:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [019 11-19 05:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer0.org2.example.com | [01a 11-19 05:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer0.org2.example.com | [01b 11-19 05:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done +peer0.org2.example.com | [01c 11-19 05:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer0.org2.example.com | [01d 11-19 05:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer0.org2.example.com | [01e 11-19 05:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org2.example.com-cert.pem +peer0.org2.example.com | [01f 11-19 05:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer0.org2.example.com | [020 11-19 05:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org2.example.com-cert.pem +peer0.org2.example.com | [021 11-19 05:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer0.org2.example.com | [022 11-19 05:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer0.org2.example.com | [023 11-19 05:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer0.org2.example.com | [024 11-19 05:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer0.org2.example.com | [025 11-19 05:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org2.example.com-cert.pem +peer0.org2.example.com | [026 11-19 05:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org2.example.com | [027 11-19 05:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org2.example.com | [028 11-19 05:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org2.example.com | [029 11-19 05:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org2.example.com | [02a 11-19 05:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org2.example.com | [02b 11-19 05:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [02c 11-19 05:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [02d 11-19 05:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer0.org2.example.com | [02e 11-19 05:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [02f 11-19 05:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [030 11-19 05:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [0ab 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +peer1.org2.example.com | [0ac 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +peer1.org2.example.com | [0ad 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.4 +peer1.org2.example.com | [0ae 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +peer1.org2.example.com | [0af 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +peer1.org2.example.com | [0b0 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +peer1.org2.example.com | [0b1 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +peer1.org2.example.com | [0b2 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.4 +peer1.org2.example.com | [0b3 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.4 +peer1.org2.example.com | [0b4 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [0b5 11-19 05:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [0b6 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.4 +peer1.org2.example.com | [0b7 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.4" , sending back REGISTERED +peer1.org2.example.com | [0b8 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.4" +peer1.org2.example.com | [0b9 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.4" +peer1.org2.example.com | [0ba 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.4" +peer1.org2.example.com | [0bb 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [0bc 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0bd 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | [0be 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU [f0ddf596] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0bf 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU [f0ddf596] notifying Txid:f0ddf596-0fe6-45b5-9de2-37ca6b33089c, channelID: +peer1.org2.example.com | [0c0 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0c1 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org2.example.com | [0c2 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +peer1.org2.example.com | [0c3 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +peer1.org2.example.com | [0c5 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +peer1.org2.example.com | [0c4 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | [0c6 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.4 +peer1.org2.example.com | [0c7 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org2.example.com | [0c8 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.4 +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [0c9 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +peer1.org2.example.com | [0ca 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +peer1.org2.example.com | [0cb 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.4 +peer1.org2.example.com | [0cc 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.4 +peer1.org2.example.com | [0cd 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.4 +peer1.org2.example.com | [0ce 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [0cf 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [0d0 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.4 +peer1.org2.example.com | [0d1 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.4" , sending back REGISTERED +peer1.org2.example.com | [0d2 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.4" +peer1.org2.example.com | [0d3 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.4" +peer1.org2.example.com | [0d4 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.4" +peer1.org2.example.com | [0d5 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer0.org2.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org2.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org2.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [031 11-19 05:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6] at [/etc/hyperledger/fabric/msp/keystore/35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6_sk]... +peer1.org2.example.com | [0d6 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0d7 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [0d8 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU [02b37d6b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0d9 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU [02b37d6b] notifying Txid:02b37d6b-3d99-4623-9607-99b320d3625d, channelID: +peer1.org2.example.com | [0da 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0db 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [0dc 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +peer1.org2.example.com | [0dd 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +peer1.org2.example.com | [0de 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +peer1.org2.example.com | [0df 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +peer1.org2.example.com | [0e0 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org2.example.com | [0e1 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +orderer2.example.com | 2019-11-19 05:21:32.274 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer2.example.com | "2019-11-19 05:21:32.426 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer2.example.com | General.LedgerType = "file" +orderer2.example.com | General.ListenAddress = "0.0.0.0" +orderer2.example.com | General.ListenPort = 7050 +orderer2.example.com | General.TLS.Enabled = true +orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.TLS.ClientAuthRequired = false +orderer2.example.com | General.TLS.ClientRootCAs = [] +orderer2.example.com | General.Cluster.ListenAddress = "" +orderer2.example.com | General.Cluster.ListenPort = 0 +orderer2.example.com | General.Cluster.ServerCertificate = "" +orderer2.example.com | General.Cluster.ServerPrivateKey = "" +orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.Cluster.DialTimeout = 5s +orderer2.example.com | General.Cluster.RPCTimeout = 7s +orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer2.example.com | General.Cluster.SendBufferSize = 10 +orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer2.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer2.example.com | General.Keepalive.ServerTimeout = 20s +orderer2.example.com | General.ConnectionTimeout = 0s +orderer2.example.com | General.GenesisMethod = "file" +orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer2.example.com | General.SystemChannel = "test-system-channel-name" +orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer2.example.com | General.Profile.Enabled = false +orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer2.example.com | General.LocalMSPID = "OrdererMSP" +orderer2.example.com | General.BCCSP.ProviderName = "SW" +orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer2.example.com | General.BCCSP.PluginOpts = +orderer2.example.com | General.Authentication.TimeWindow = 15m0s +orderer2.example.com | General.Authentication.NoExpirationChecks = false +orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer2.example.com | RAMLedger.HistorySize = 1000 +orderer2.example.com | Kafka.Retry.ShortInterval = 5s +orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer2.example.com | Kafka.Retry.LongInterval = 5m0s +orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer2.example.com | Kafka.Verbose = false +orderer2.example.com | Kafka.Version = 0.10.2.0 +orderer2.example.com | Kafka.TLS.Enabled = false +orderer2.example.com | Kafka.TLS.PrivateKey = "" +orderer2.example.com | Kafka.TLS.Certificate = "" +orderer2.example.com | Kafka.TLS.RootCAs = [] +orderer2.example.com | Kafka.TLS.ClientAuthRequired = false +orderer2.example.com | Kafka.TLS.ClientRootCAs = [] +orderer2.example.com | Kafka.SASLPlain.Enabled = false +orderer2.example.com | Kafka.SASLPlain.User = "" +orderer2.example.com | Kafka.SASLPlain.Password = "" +peer0.org2.example.com | [032 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer0.org2.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org2.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org2.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [033 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2029-09-21 00:59:00 +0000 UTC +peer0.org2.example.com | [034 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org2.example.com | Version: 1.4.4 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.12.13 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Image Version: 0.4.18 +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger +peer0.org2.example.com | [035 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [036 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org2.example.com | [037 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org2.example.com | [038 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org2.example.com | [039 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer0.org2.example.com | [03a 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer0.org2.example.com | [03b 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer0.org2.example.com | [03c 11-19 05:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer0.org2.example.com | [03d 11-19 05:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer0.org2.example.com | [03e 11-19 05:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer0.org2.example.com | [03f 11-19 05:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer0.org2.example.com | [040 11-19 05:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer0.org2.example.com | [041 11-19 05:21:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer0.org2.example.com | [042 11-19 05:21:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer0.org2.example.com | [043 11-19 05:21:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer0.org2.example.com | [044 11-19 05:21:35.69 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer0.org2.example.com | [045 11-19 05:21:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer0.org2.example.com | [046 11-19 05:21:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer0.org2.example.com | [047 11-19 05:21:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer0.org2.example.com | [048 11-19 05:21:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer0.org2.example.com | [049 11-19 05:21:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer0.org2.example.com | [04a 11-19 05:21:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer0.org2.example.com | [04b 11-19 05:21:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer0.org2.example.com | [04c 11-19 05:21:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer0.org2.example.com | [04d 11-19 05:21:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer0.org2.example.com | [04e 11-19 05:21:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer0.org2.example.com | [04f 11-19 05:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer0.org2.example.com | [050 11-19 05:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer0.org2.example.com | [051 11-19 05:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org2.example.com | [0e2 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org2.example.com | [0e3 11-19 05:21:35.50 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org2.example.com | [0e4 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org2.example.com | [0e5 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org2.example.com | [0e6 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org2.example.com | [0e7 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org2.example.com | [0e8 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org2.example.com | [0e9 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org2.example.com | [0ea 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org2.example.com | [0eb 11-19 05:21:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0ec 11-19 05:21:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [0ed 11-19 05:21:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7AA0F1F5408EC1B05D7F676DABD7513A3227590EF0E9C334A42D67669B6DAF49 +peer1.org2.example.com | [0ee 11-19 05:21:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0ef 11-19 05:21:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [0f0 11-19 05:21:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [0f1 11-19 05:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0f2 11-19 05:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [0f3 11-19 05:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37ACDBDCBB29E9873BCE96C95BAC05925D42F036BA8B313F11C3AAA98A9EA7DF +peer1.org2.example.com | [0f4 11-19 05:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0f5 11-19 05:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [0f6 11-19 05:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [0f7 11-19 05:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [0f8 11-19 05:21:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0f9 11-19 05:21:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [0fa 11-19 05:21:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1C715C61D215406ACD9F1D0A1650722268406F32AC586915C4194A47D10D1B7F +peer1.org2.example.com | [0fb 11-19 05:21:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0fc 11-19 05:21:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [0fd 11-19 05:21:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [0fe 11-19 05:21:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:35320 +peer1.org2.example.com | [0ff 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025cec30 +peer1.org2.example.com | [100 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [101 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [102 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [103 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer1.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer1.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer1.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer1.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [104 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer1.org2.example.com | [105 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [106 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [107 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [108 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d a6 b5 88 17 34 5c 04 c4 3b dd e0 0a b5 dd 68 |-....4\..;.....h| +peer1.org2.example.com | 00000010 eb 2d 43 8f 9d dd 70 36 91 5e 6b 10 a9 df 2e b1 |.-C...p6.^k.....| +peer1.org2.example.com | [109 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 4c 8c 8f 5f d2 1f 99 73 7a 56 |0E.!..L.._...szV| +peer1.org2.example.com | 00000010 50 1b 3f 4b d1 63 e9 4e 5c 19 1f 76 18 fc d4 3f |P.?K.c.N\..v...?| +peer1.org2.example.com | 00000020 37 29 4c de bc 02 20 34 2f f5 a8 22 02 56 eb 4b |7)L... 4/..".V.K| +peer1.org2.example.com | 00000030 9d f1 34 aa 9c 61 6b 2e e6 c4 ef 83 c6 05 2a 02 |..4..ak.......*.| +peer1.org2.example.com | 00000040 3a 46 52 63 05 b2 e9 |:FRc...| +peer1.org2.example.com | [10a 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [10b 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000237880, header 0xc0025cf540 +peer1.org2.example.com | [10c 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [10d 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU [][1de4e7f4] processing txid: 1de4e7f43d69f6706f57d0f8d12459707ec4e71883c4472d7a8f794253bcf725 +peer1.org2.example.com | [10e 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU [][1de4e7f4] Entry chaincode: name:"cscc" +peer1.org2.example.com | [10f 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> INFO [][1de4e7f4] Entry chaincode: name:"cscc" +peer1.org2.example.com | [110 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [111 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer1.org2.example.com | [112 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [113 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [114 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [052 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer0.org2.example.com | [053 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer0.org2.example.com | [054 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer0.org2.example.com | [055 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer0.org2.example.com | [056 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org2.example.com | [057 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org2.example.com | [058 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org2.example.com | [059 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.9:7051 +peer0.org2.example.com | [05a 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [05b 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.9:7051 +peer0.org2.example.com | [05c 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [05d 11-19 05:21:35.78 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org2.example.com | [05e 11-19 05:21:35.79 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com +peer0.org2.example.com | [05f 11-19 05:21:35.79 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org2.example.com:7052 +peer0.org2.example.com | [060 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.4 +orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer2.example.com | Debug.BroadcastTraceDir = "" +orderer2.example.com | Debug.DeliverTraceDir = "" +orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer2.example.com | Operations.TLS.Enabled = false +orderer2.example.com | Operations.TLS.PrivateKey = "" +orderer2.example.com | Operations.TLS.Certificate = "" +orderer2.example.com | Operations.TLS.RootCAs = [] +orderer2.example.com | Operations.TLS.ClientAuthRequired = false +orderer2.example.com | Operations.TLS.ClientRootCAs = [] +orderer2.example.com | Metrics.Provider = "prometheus" +orderer2.example.com | Metrics.Statsd.Network = "udp" +orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer2.example.com | Metrics.Statsd.WriteInterval = 30s +orderer2.example.com | Metrics.Statsd.Prefix = """ +orderer2.example.com | "2019-11-19 05:21:32.487 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer2.example.com | "2019-11-19 05:21:32.569 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer2.example.com | "2019-11-19 05:21:32.569 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2019-11-19 05:21:32.576 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer2.example.com | "2019-11-19 05:21:32.585 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-11-19 05:21:32.585 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.593 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 7ae40fb1ee3dd466a7fe3b6a5c89e821a4b87734ad526b49eef9d58f04bf6f08 and orderer type etcdraft" +orderer2.example.com | "2019-11-19 05:21:32.593 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.593 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer2.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer2.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer2.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer2.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer2.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer2.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer2.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer2.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +peer1.org2.example.com | [115 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [116 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [117 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [118 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d a6 b5 88 17 34 5c 04 c4 3b dd e0 0a b5 dd 68 |-....4\..;.....h| +peer1.org2.example.com | 00000010 eb 2d 43 8f 9d dd 70 36 91 5e 6b 10 a9 df 2e b1 |.-C...p6.^k.....| +peer1.org2.example.com | [119 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 4c 8c 8f 5f d2 1f 99 73 7a 56 |0E.!..L.._...szV| +peer1.org2.example.com | 00000010 50 1b 3f 4b d1 63 e9 4e 5c 19 1f 76 18 fc d4 3f |P.?K.c.N\..v...?| +peer1.org2.example.com | 00000020 37 29 4c de bc 02 20 34 2f f5 a8 22 02 56 eb 4b |7)L... 4/..".V.K| +peer1.org2.example.com | 00000030 9d f1 34 aa 9c 61 6b 2e e6 c4 ef 83 c6 05 2a 02 |..4..ak.......*.| +peer1.org2.example.com | 00000040 3a 46 52 63 05 b2 e9 |:FRc...| +peer1.org2.example.com | [11a 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer1.org2.example.com | [11b 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer1.org2.example.com | [11c 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer1.org2.example.com | [11d 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer1.org2.example.com | [11e 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer1.org2.example.com | [11f 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer1.org2.example.com | [120 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer1.org2.example.com | [121 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer1.org2.example.com | [122 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer1.org2.example.com | [123 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer1.org2.example.com | [124 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer1.org2.example.com | [125 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00272f6c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer1.org2.example.com | [126 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer1.org2.example.com | [127 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer1.org2.example.com | [128 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer1.org2.example.com | [129 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer1.org2.example.com | [12a 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer1.org2.example.com | [12b 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer1.org2.example.com | [12c 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org2.example.com | [12d 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer1.org2.example.com | [12e 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer1.org2.example.com | [12f 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org2.example.com | [130 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [131 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer1.org2.example.com | [132 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer1.org2.example.com | [133 11-19 05:21:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer1.org2.example.com | [134 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer1.org2.example.com | [135 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer1.org2.example.com | [136 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer1.org2.example.com | [137 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer1.org2.example.com | [138 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer1.org2.example.com | [139 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [13a 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [13b 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [13c 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer1.org2.example.com | [13d 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [13e 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [13f 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [140 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [141 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [142 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [143 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [001 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +orderer2.example.com | "2019-11-19 05:21:32.593 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-11-19 05:21:32.593 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-11-19 05:21:32.594 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-11-19 05:21:32.594 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 3 became follower at term 0" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 3 became follower at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: +orderer2.example.com | Version: 1.4.4 +orderer2.example.com | Commit SHA: development build +orderer2.example.com | Go version: go1.12.13 +orderer2.example.com | OS/Arch: linux/amd64" +orderer2.example.com | "2019-11-19 05:21:32.595 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" +orderer2.example.com | "2019-11-19 05:21:32.596 UTC [orderer.consensus.etcdraft] run -> INFO 019 This node is picked to start campaign" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.602 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.602 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:32.603 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.602 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 3 is starting a new election at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.603 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01e 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.604 UTC [orderer.consensus.etcdraft] poll -> INFO 01f 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.605 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.605 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.608 UTC [orderer.consensus.etcdraft] logSendFailure -> ERRO 022 Failed to send StepRequest to 1, because: connection to 1(orderer0.example.com:7050) is in state CONNECTING" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.639 UTC [orderer.consensus.etcdraft] poll -> INFO 023 3 received MsgPreVoteResp from 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.642 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 024 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.644 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 025 3 became candidate at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.645 UTC [orderer.consensus.etcdraft] poll -> INFO 026 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.645 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.658 UTC [orderer.consensus.etcdraft] campaign -> INFO 028 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.659 UTC [orderer.consensus.etcdraft] send -> INFO 029 Successfully sent StepRequest to 1 after failed attempt(s)" channel=testchainid node=3 +peer1.org2.example.com | [144 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [145 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [146 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [147 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [148 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002824800)} +peer1.org2.example.com | [149 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [14a 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [14b 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [14c 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer1.org2.example.com | [14d 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer1.org2.example.com | [14e 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer1.org2.example.com | [14f 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer1.org2.example.com | [150 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xeb, 0xcd, 0x1f, 0x7, 0xa0, 0x44, 0x7e, 0xdb, 0xb0, 0xc3, 0xd8, 0x38, 0xb2, 0x31, 0xa, 0x6d, 0xa6, 0x14, 0x14, 0x86, 0xef, 0x53, 0x16, 0x8b, 0x27, 0xf5, 0x83, 0xcc, 0x3e, 0xcb, 0xfd, 0x8c} txOffsets= +peer1.org2.example.com | txId=92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426 locPointer=offset=39, bytesLength=25761 +peer1.org2.example.com | ] +peer1.org2.example.com | [151 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to txid-index +peer1.org2.example.com | [152 11-19 05:21:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx number:[0] ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to blockNumTranNum index +peer1.org2.example.com | [153 11-19 05:21:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25807], isChainEmpty=[false], lastBlockNumber=[0] +peer1.org2.example.com | [154 11-19 05:21:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org2.example.com | [155 11-19 05:21:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer1.org2.example.com | [156 11-19 05:21:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer1.org2.example.com | [157 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [158 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer1.org2.example.com | [159 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer1.org2.example.com | [15a 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer1.org2.example.com | [15b 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [15c 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [15d 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [15e 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [15f 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer1.org2.example.com | [160 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer1.org2.example.com | [161 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer1.org2.example.com | [162 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer1.org2.example.com | [163 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [164 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer1.org2.example.com | [165 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer1.org2.example.com | [166 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer1.org2.example.com | [167 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [168 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer1.org2.example.com | [169 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer1.org2.example.com | [16a 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [16b 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer1.org2.example.com | [16c 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 24ms (state_validation=2ms block_and_pvtdata_commit=16ms state_commit=3ms) commitHash=[] +peer1.org2.example.com | [16d 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer1.org2.example.com | [16e 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [9a7da1b7-adfc-4fc5-bb8f-a9f0a2da5d37] +peer1.org2.example.com | [16f 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +orderer2.example.com | "2019-11-19 05:21:33.662 UTC [orderer.consensus.etcdraft] poll -> INFO 02a 3 received MsgVoteResp from 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.662 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 02b 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.662 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02c 3 became leader at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.662 UTC [orderer.consensus.etcdraft] run -> INFO 02d raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] run -> INFO 02e Leader 3 is present, quit campaign" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02f Raft leader changed: 0 -> 3" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:33.665 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 030 Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:41.323 UTC [orderer.consensus.etcdraft] propose -> INFO 031 Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:41.323 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 032 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:41.334 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 033 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +orderer2.example.com | "2019-11-19 05:21:41.337 UTC [fsblkstorage] newBlockfileMgr -> INFO 034 Getting block information from block storage" +orderer2.example.com | "2019-11-19 05:21:41.380 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 035 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-11-19 05:21:41.382 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 036 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:41.410 UTC [orderer.commmon.multichannel] newChain -> INFO 037 Created and starting new chain businesschannel" +orderer2.example.com | "2019-11-19 05:21:41.410 UTC [orderer.consensus.etcdraft] Start -> INFO 038 Starting Raft node" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:41.411 UTC [orderer.common.cluster] Configure -> INFO 039 Entering, channel: businesschannel, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer2.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer2.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer2.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer2.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | [002 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org1.example.com | [003 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer1.org1.example.com | [004 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer1.org1.example.com | [005 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org1.example.com | [006 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +orderer2.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer2.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer2.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer2.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer2.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2019-11-19 05:21:41.413 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03a Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-11-19 05:21:41.414 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-11-19 05:21:41.415 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03c Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-11-19 05:21:41.415 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03d Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-11-19 05:21:41.416 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03e 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-11-19 05:21:41.416 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03f 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-11-19 05:21:41.418 UTC [orderer.common.cluster] Configure -> INFO 040 Exiting" +orderer2.example.com | "2019-11-19 05:21:41.418 UTC [orderer.consensus.etcdraft] start -> INFO 041 Starting raft node as part of a new channel" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:41.419 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 042 3 became follower at term 0" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:41.420 UTC [orderer.consensus.etcdraft] newRaft -> INFO 043 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:41.421 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 044 3 became follower at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:41.430 UTC [orderer.consensus.etcdraft] apply -> INFO 045 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:41.431 UTC [orderer.consensus.etcdraft] apply -> INFO 046 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:41.432 UTC [orderer.consensus.etcdraft] apply -> INFO 047 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:42.488 UTC [orderer.consensus.etcdraft] Step -> INFO 048 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:42.487 UTC [orderer.consensus.etcdraft] Step -> INFO 049 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:42.487 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 04a 3 became follower at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:42.487 UTC [orderer.consensus.etcdraft] Step -> INFO 04b 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:42.497 UTC [orderer.consensus.etcdraft] run -> INFO 04c raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:42.499 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04d Raft leader changed: 0 -> 1" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:46.789 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04e Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:21:49.040 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:22:32.681 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:22:35.623 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:22:38.419 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 052 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:22:54.090 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 053 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-11-19 05:22:54.092 UTC [cauthdsl] deduplicate -> WARN 054 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer2.example.com | "2019-11-19 05:22:54.096 UTC [cauthdsl] deduplicate -> WARN 055 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer1.org1.example.com | [007 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer1.org1.example.com | [008 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer1.org1.example.com | [009 11-19 05:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer1.org1.example.com | [00a 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer1.org1.example.com | [00b 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer1.org1.example.com | [00c 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer1.org1.example.com | [00d 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [00e 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer1.org1.example.com | [00f 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer1.org1.example.com | [010 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [011 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer1.org1.example.com | [012 11-19 05:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [013 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer1.org1.example.com | [014 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [015 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer1.org1.example.com | [016 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [017 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer1.org1.example.com | [018 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [019 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer1.org1.example.com | [01a 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org1.example.com | [01b 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done +peer1.org1.example.com | [01c 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer1.org1.example.com | [01d 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer1.org1.example.com | [01e 11-19 05:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer1.org1.example.com-cert.pem +peer1.org1.example.com | [01f 11-19 05:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer1.org1.example.com | [020 11-19 05:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +peer1.org1.example.com | [021 11-19 05:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer1.org1.example.com | [022 11-19 05:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer1.org1.example.com | [023 11-19 05:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer1.org1.example.com | [024 11-19 05:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer1.org1.example.com | [025 11-19 05:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +peer1.org1.example.com | [026 11-19 05:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer1.org1.example.com | [027 11-19 05:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer1.org1.example.com | [028 11-19 05:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer1.org1.example.com | [029 11-19 05:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer1.org1.example.com | [02a 11-19 05:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer1.org1.example.com | [02b 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [02c 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [02d 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer1.org1.example.com | [02e 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [02f 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [030 11-19 05:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer1.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer1.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer1.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [031 11-19 05:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b] at [/etc/hyperledger/fabric/msp/keystore/be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b_sk]... +peer1.org1.example.com | [032 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer1.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer1.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer1.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [033 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2029-09-21 00:59:00 +0000 UTC +peer1.org1.example.com | [034 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org1.example.com | Version: 1.4.4 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.12.13 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Image Version: 0.4.18 +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger +peer1.org1.example.com | [035 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [036 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org1.example.com | [037 11-19 05:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org1.example.com | [038 11-19 05:21:35.52 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org1.example.com | [039 11-19 05:21:35.52 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org1.example.com | [03a 11-19 05:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer1.org1.example.com | [03b 11-19 05:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer1.org1.example.com | [03c 11-19 05:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer1.org1.example.com | [03d 11-19 05:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer1.org1.example.com | [03e 11-19 05:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer1.org1.example.com | [03f 11-19 05:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer1.org1.example.com | [040 11-19 05:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer1.org1.example.com | [041 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer1.org1.example.com | [042 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer1.org1.example.com | [043 11-19 05:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org1.example.com | [044 11-19 05:21:35.58 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org1.example.com | [045 11-19 05:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer1.org1.example.com | [046 11-19 05:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org1.example.com | [047 11-19 05:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer1.org1.example.com | [048 11-19 05:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer1.org1.example.com | [049 11-19 05:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer1.org1.example.com | [04a 11-19 05:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer1.org1.example.com | [04b 11-19 05:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer1.org1.example.com | [04c 11-19 05:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer1.org1.example.com | [04d 11-19 05:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org1.example.com | [04e 11-19 05:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer1.org1.example.com | [04f 11-19 05:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer1.org1.example.com | [050 11-19 05:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer1.org1.example.com | [051 11-19 05:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org1.example.com | [052 11-19 05:21:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer1.org1.example.com | [053 11-19 05:21:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer1.org1.example.com | [054 11-19 05:21:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer1.org1.example.com | [055 11-19 05:21:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org1.example.com | [056 11-19 05:21:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer1.org1.example.com | [057 11-19 05:21:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer1.org1.example.com | [058 11-19 05:21:35.70 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org1.example.com | [059 11-19 05:21:35.70 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.8:7051 +peer1.org1.example.com | [05a 11-19 05:21:35.70 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [05b 11-19 05:21:35.70 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.8:7051 +peer1.org1.example.com | [05c 11-19 05:21:35.70 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [05d 11-19 05:21:35.73 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org1.example.com | [05e 11-19 05:21:35.74 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com +peer1.org2.example.com | [170 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9a7da1b7-adfc-4fc5-bb8f-a9f0a2da5d37] +peer1.org2.example.com | [171 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [172 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [173 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [174 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [175 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [176 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [177 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [178 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [179 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [17a 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [17b 11-19 05:21:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [17c 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [17d 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [17e 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | [17f 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [180 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [181 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [182 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [183 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [184 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [185 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [186 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [187 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [188 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer1.org2.example.com | [189 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [18a 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [18b 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [18c 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [18d 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org2.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org2.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org2.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | [001 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org1.example.com | [002 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | [003 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer0.org1.example.com | [004 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer0.org1.example.com | [005 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer0.org1.example.com | [006 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer0.org1.example.com | [007 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer0.org1.example.com | [008 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | [009 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer0.org1.example.com | [00a 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer0.org1.example.com | [00b 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer0.org1.example.com | [00c 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer0.org1.example.com | [00d 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [00e 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer0.org1.example.com | [00f 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [010 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer0.org1.example.com | [011 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [012 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer0.org1.example.com | [013 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer0.org1.example.com | [014 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [015 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer0.org1.example.com | [016 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [017 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer0.org1.example.com | [018 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [019 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer0.org1.example.com | [01a 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer0.org1.example.com | [01b 11-19 05:21:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done +peer0.org1.example.com | [01c 11-19 05:21:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer0.org1.example.com | [01d 11-19 05:21:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer0.org1.example.com | [01e 11-19 05:21:34.51 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem +peer0.org1.example.com | [01f 11-19 05:21:34.51 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer0.org1.example.com | [020 11-19 05:21:34.51 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +peer0.org1.example.com | [021 11-19 05:21:34.52 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer0.org1.example.com | [022 11-19 05:21:34.52 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer0.org1.example.com | [023 11-19 05:21:34.52 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +orderer0.example.com | 2019-11-19 05:21:32.244 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for metrics +orderer0.example.com | 2019-11-19 05:21:32.244 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for metrics.Statsd +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for metrics.Statsd.Prefix setting to +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for metrics.Statsd.Network setting to string udp +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for metrics.Statsd.WriteInterval setting to string 30s +orderer0.example.com | 2019-11-19 05:21:32.251 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for metrics.Provider setting to string prometheus +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 00d Found map[interface{}]interface{} value for consensus +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[interface{}]interface{} value for general +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for general.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for general.TLS +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.TLS.ClientRootCAs setting to +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.TLS.Enabled setting to string true +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 022 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 023 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 024 Found map[string]interface{} value for general.Profile +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.Profile.Enabled setting to bool false +orderer0.example.com | 2019-11-19 05:21:32.254 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +orderer0.example.com | 2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 029 Found map[string]interface{} value for general.BCCSP +orderer0.example.com | 2019-11-19 05:21:32.254 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for general.BCCSP.Default setting to string SW +orderer0.example.com | 2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 02c Found map[string]interface{} value for general.BCCSP.SW +orderer0.example.com | 2019-11-19 05:21:32.254 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.BCCSP.SW.Hash setting to string SHA2 +orderer0.example.com | 2019-11-19 05:21:32.255 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value is not a string: 256 +orderer0.example.com | 2019-11-19 05:21:32.255 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.BCCSP.SW.Security setting to int 256 +orderer0.example.com | 2019-11-19 05:21:32.255 UTC [viperutil] getKeysRecursively -> DEBU 031 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +orderer0.example.com | 2019-11-19 05:21:32.256 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.256 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +orderer0.example.com | 2019-11-19 05:21:32.257 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.SystemChannel setting to +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.ListenPort setting to string 7050 +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.LedgerType setting to string file +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 03e Found map[string]interface{} value for general.Cluster +orderer0.example.com | 2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 03f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 040 Found real value for general.Cluster.ServerCertificate setting to +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 041 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 042 Found real value for general.Cluster.ServerPrivateKey setting to +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for general.Cluster.DialTimeout setting to +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for general.Cluster.TLSHandshakeTimeShift setting to +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 047 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 048 Found real value for general.Cluster.ListenPort setting to +orderer0.example.com | 2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 049 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 04a Found real value for general.Cluster.ListenAddress setting to +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value is not a string: +peer0.org2.example.com | [061 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org2.example.com | [062 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.4 +peer0.org2.example.com | [063 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org2.example.com | [064 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.4 +peer0.org2.example.com | [065 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org2.example.com | [066 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer0.org2.example.com | [067 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer0.org2.example.com | [068 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [069 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org2.example.com | [06a 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org2.example.com | [06b 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org2.example.com | [06c 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer0.org2.example.com | [06d 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer0.org2.example.com | [06e 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer0.org2.example.com | [06f 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer0.org2.example.com | [070 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [071 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer0.org2.example.com | [072 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [073 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer0.org2.example.com | [074 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer0.org2.example.com | [075 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer0.org2.example.com | [076 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [077 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer0.org2.example.com | [078 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [079 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer0.org2.example.com | [07a 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer0.org2.example.com | [07b 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] +peer0.org2.example.com | [07c 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [07d 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer0.org2.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org2.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org2.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [07e 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [07f 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [080 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [081 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [082 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2, Metadata: +peer0.org2.example.com | [083 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [084 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A202A67A69F6BD29A89...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [085 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 851004B5A32A101A4D5666C4F3700F31C8D0A3ABA5BA003667EB56A761C64BEA +peer0.org2.example.com | [086 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Added *g��kҚ�-���$6��[�@p�@�NP3��, total items: 1 +peer0.org2.example.com | [087 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org2.example.com:7051 started +peer0.org2.example.com | [088 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer0.org2.example.com | [089 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [08a 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [08b 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2E9E434F59D6FCED8CE326390E64F1CB93D6F19FB791E753014E6F15E89E3FD1 +peer0.org2.example.com | [08c 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [08d 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [08e 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [08f 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for general.Cluster.CertExpirationWarningThreshold setting to +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Cluster.ReplicationBufferSize setting to +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.Cluster.ReplicationPullTimeout setting to +orderer0.example.com | 2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.Cluster.ReplicationMaxRetries setting to +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.Cluster.RPCTimeout setting to +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.Cluster.ReplicationRetryTimeout setting to +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value is not a string: 10 +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for general.Cluster.SendBufferSize setting to int 10 +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for general.GenesisMethod setting to string file +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for general.LocalMSPID setting to string OrdererMSP +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 065 Found map[string]interface{} value for general.Keepalive +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for general.Keepalive.ServerTimeout setting to string 20s +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for general.ConnectionTimeout setting to +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 06e Found map[string]interface{} value for general.Authentication +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for general.Authentication.TimeWindow setting to string 15m +orderer0.example.com | 2019-11-19 05:21:32.267 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.267 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for general.Authentication.NoExpirationChecks setting to +orderer0.example.com | 2019-11-19 05:21:32.269 UTC [viperutil] getKeysRecursively -> DEBU 073 Found map[interface{}]interface{} value for fileledger +orderer0.example.com | 2019-11-19 05:21:32.270 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.271 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer0.example.com | 2019-11-19 05:21:32.271 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-11-19 05:21:32.271 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer0.example.com | 2019-11-19 05:21:32.272 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[interface{}]interface{} value for ramledger +orderer0.example.com | 2019-11-19 05:21:32.272 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value is not a string: 1000 +orderer0.example.com | 2019-11-19 05:21:32.272 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for ramledger.HistorySize setting to int 1000 +orderer0.example.com | 2019-11-19 05:21:32.272 UTC [viperutil] getKeysRecursively -> DEBU 07b Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2019-11-19 05:21:32.272 UTC [viperutil] getKeysRecursively -> DEBU 07c Found map[string]interface{} value for kafka.SASLPlain +orderer0.example.com | 2019-11-19 05:21:32.273 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-11-19 05:21:32.273 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for kafka.SASLPlain.Enabled setting to bool false +orderer0.example.com | 2019-11-19 05:21:32.273 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.277 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for kafka.SASLPlain.User setting to +orderer0.example.com | 2019-11-19 05:21:32.277 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.277 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.SASLPlain.Password setting to +orderer0.example.com | 2019-11-19 05:21:32.278 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.279 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Version setting to +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[string]interface{} value for kafka.Retry +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 086 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] unmarshalJSON -> DEBU 087 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 088 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] unmarshalJSON -> DEBU 089 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 08a Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] unmarshalJSON -> DEBU 08b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 08c Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer0.example.com | 2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 08d Found map[string]interface{} value for kafka.Retry.Metadata +orderer0.example.com | 2019-11-19 05:21:32.285 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.285 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer0.example.com | 2019-11-19 05:21:32.290 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-11-19 05:21:32.290 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +orderer0.example.com | 2019-11-19 05:21:32.292 UTC [viperutil] getKeysRecursively -> DEBU 092 Found map[string]interface{} value for kafka.Retry.Producer +orderer0.example.com | 2019-11-19 05:21:32.293 UTC [viperutil] unmarshalJSON -> DEBU 093 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.294 UTC [viperutil] getKeysRecursively -> DEBU 094 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +orderer0.example.com | 2019-11-19 05:21:32.296 UTC [viperutil] unmarshalJSON -> DEBU 095 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-11-19 05:21:32.297 UTC [viperutil] getKeysRecursively -> DEBU 096 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +orderer0.example.com | 2019-11-19 05:21:32.299 UTC [viperutil] getKeysRecursively -> DEBU 097 Found map[string]interface{} value for kafka.Retry.Consumer +orderer0.example.com | 2019-11-19 05:21:32.304 UTC [viperutil] unmarshalJSON -> DEBU 098 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.308 UTC [viperutil] getKeysRecursively -> DEBU 099 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 09a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 09b Found real value for kafka.Retry.ShortInterval setting to string 5s +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.Retry.LongInterval setting to string 5m +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.Retry.LongTotal setting to string 12h +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found map[string]interface{} value for kafka.Topic +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for kafka.Verbose setting to bool false +orderer0.example.com | 2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found map[string]interface{} value for kafka.TLS +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for kafka.TLS.ClientAuthRequired setting to +peer0.org1.example.com | [024 11-19 05:21:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer0.org1.example.com | [025 11-19 05:21:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +peer0.org1.example.com | [026 11-19 05:21:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org1.example.com | [027 11-19 05:21:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org1.example.com | [028 11-19 05:21:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org1.example.com | [029 11-19 05:21:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org1.example.com | [02a 11-19 05:21:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org1.example.com | [02b 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [02c 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [02d 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer0.org1.example.com | [02e 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [02f 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [030 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [031 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1] at [/etc/hyperledger/fabric/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk]... +peer0.org1.example.com | [032 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [033 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2029-09-21 00:59:00 +0000 UTC +peer0.org1.example.com | [034 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org1.example.com | Version: 1.4.4 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.12.13 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Image Version: 0.4.18 +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger +peer0.org1.example.com | [035 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [036 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org1.example.com | [037 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org1.example.com | [038 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org1.example.com | [039 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer0.org1.example.com | [03a 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer0.org1.example.com | [03b 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer0.org1.example.com | [03c 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer0.org1.example.com | [03d 11-19 05:21:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer0.org1.example.com | [03e 11-19 05:21:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer0.org1.example.com | [03f 11-19 05:21:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer0.org1.example.com | [040 11-19 05:21:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer0.org1.example.com | [041 11-19 05:21:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer0.org1.example.com | [042 11-19 05:21:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer0.org1.example.com | [043 11-19 05:21:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer0.org1.example.com | [044 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer0.org1.example.com | [045 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer0.org1.example.com | [046 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer0.org1.example.com | [047 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer0.org1.example.com | [048 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer0.org1.example.com | [049 11-19 05:21:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer0.org1.example.com | [04a 11-19 05:21:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer0.org1.example.com | [04b 11-19 05:21:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer0.org1.example.com | [04c 11-19 05:21:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer0.org1.example.com | [04d 11-19 05:21:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer0.org1.example.com | [04e 11-19 05:21:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer0.org1.example.com | [04f 11-19 05:21:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer0.org1.example.com | [050 11-19 05:21:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer0.org1.example.com | [051 11-19 05:21:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer0.org1.example.com | [052 11-19 05:21:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer0.org1.example.com | [053 11-19 05:21:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer0.org1.example.com | [054 11-19 05:21:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer0.org1.example.com | [055 11-19 05:21:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer0.org1.example.com | [056 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org1.example.com | [057 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org1.example.com | [058 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org1.example.com | [059 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +peer0.org1.example.com | [05a 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org1.example.com | [05b 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +peer0.org1.example.com | [05c 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org1.example.com | [05d 11-19 05:21:34.70 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org1.example.com | [05e 11-19 05:21:34.71 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +peer0.org1.example.com | [05f 11-19 05:21:34.71 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +peer0.org1.example.com | [060 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.4 +peer0.org1.example.com | [061 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org1.example.com | [062 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.4 +peer0.org1.example.com | [063 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org1.example.com | [064 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.4 +peer0.org1.example.com | [065 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org1.example.com | [066 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer0.org1.example.com | [067 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer0.org1.example.com | [068 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [069 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org1.example.com | [06a 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org1.example.com | [06b 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org1.example.com | [06c 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer0.org1.example.com | [06d 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer0.org1.example.com | [06e 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer0.org1.example.com | [06f 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer0.org1.example.com | [070 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org1.example.com | [071 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer0.org1.example.com | [072 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [073 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer0.org1.example.com | [074 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer0.org1.example.com | [075 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer0.org1.example.com | [076 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [077 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer0.org1.example.com | [078 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org1.example.com | [079 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer0.org1.example.com | [07a 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer0.org1.example.com | [07b 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +peer0.org1.example.com | [07c 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [07d 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [07e 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [07f 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [080 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: +peer0.org1.example.com | [081 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [082 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [083 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [084 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01D7060A20D925A8D65F6B3C84...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [085 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F0FB10D3C1457F727357F6D557E9312864F3FC1AE0BF8DD0E150BF246E3CC1E9 +peer0.org1.example.com | [086 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Added �%��_k<���\<���8 [:5AT�!�]�, total items: 1 +peer0.org1.example.com | [087 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [18e 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [18f 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [190 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [191 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [192 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [193 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [194 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [195 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [196 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [197 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [198 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [199 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [19a 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [19b 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [19c 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [19d 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org2.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org2.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org2.example.com | 1g== +peer0.org2.example.com | [090 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [091 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.4 +peer0.org2.example.com | [092 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [093 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.4 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [094 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +peer0.org2.example.com | [095 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +peer0.org2.example.com | [096 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.4 +peer0.org2.example.com | [097 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +peer0.org2.example.com | [098 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.4 +peer0.org2.example.com | [099 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.4 +peer0.org2.example.com | [09a 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [09b 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [09c 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.4 +peer0.org2.example.com | [09d 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.4" , sending back REGISTERED +peer0.org2.example.com | [09e 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.4" +peer0.org2.example.com | [09f 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.4" +peer0.org2.example.com | [0a0 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.4" +peer0.org2.example.com | [0a1 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0a2 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0a3 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [bbde39fb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [0a4 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [bbde39fb] notifying Txid:bbde39fb-fa30-4892-a4e9-56f4eb0a7856, channelID: +peer0.org2.example.com | [0a5 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0a6 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [0a7 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [0a8 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.4 +peer0.org2.example.com | [0a9 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [0aa 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.4 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [0ab 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +peer0.org2.example.com | [0ac 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +peer0.org2.example.com | [0ad 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.4 +peer0.org2.example.com | [0ae 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +peer0.org2.example.com | [0af 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +peer0.org2.example.com | [0b0 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +peer0.org2.example.com | [0b1 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +peer0.org2.example.com | [0b2 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.4 +peer0.org2.example.com | [0b3 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.4 +peer0.org2.example.com | [0b4 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [0b5 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [0b6 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.4 +peer0.org2.example.com | [0b7 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.4" , sending back REGISTERED +peer0.org2.example.com | [0b8 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.4" +peer0.org2.example.com | [0b9 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.4" +peer0.org2.example.com | [0ba 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.4" +peer0.org2.example.com | [0bb 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0bc 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for kafka.TLS.ClientRootCAs setting to +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for kafka.TLS.Enabled setting to bool false +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0ae Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0af Found real value for kafka.TLS.PrivateKey setting to +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0b0 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found real value for kafka.TLS.Certificate setting to +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for kafka.TLS.RootCAs setting to +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b4 Found map[interface{}]interface{} value for debug +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0b5 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b6 Found real value for debug.BroadcastTraceDir setting to +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0b7 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b8 Found real value for debug.DeliverTraceDir setting to +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found map[interface{}]interface{} value for operations +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +orderer0.example.com | 2019-11-19 05:21:32.311 UTC [viperutil] getKeysRecursively -> DEBU 0bc Found map[string]interface{} value for operations.TLS +orderer0.example.com | 2019-11-19 05:21:32.311 UTC [viperutil] unmarshalJSON -> DEBU 0bd Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-11-19 05:21:32.311 UTC [viperutil] getKeysRecursively -> DEBU 0be Found real value for operations.TLS.Enabled setting to bool false +orderer0.example.com | 2019-11-19 05:21:32.311 UTC [viperutil] unmarshalJSON -> DEBU 0bf Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.311 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found real value for operations.TLS.Certificate setting to +orderer0.example.com | 2019-11-19 05:21:32.316 UTC [viperutil] unmarshalJSON -> DEBU 0c1 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.317 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found real value for operations.TLS.PrivateKey setting to +orderer0.example.com | 2019-11-19 05:21:32.317 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-11-19 05:21:32.317 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for operations.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-11-19 05:21:32.317 UTC [viperutil] unmarshalJSON -> DEBU 0c5 Unmarshal JSON: value is not a string: [] +orderer0.example.com | 2019-11-19 05:21:32.317 UTC [viperutil] getKeysRecursively -> DEBU 0c6 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +orderer0.example.com | 2019-11-19 05:21:32.317 UTC [viperutil] unmarshalJSON -> DEBU 0c7 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-11-19 05:21:32.317 UTC [viperutil] getKeysRecursively -> DEBU 0c8 Found real value for operations.TLS.RootCAs setting to +orderer0.example.com | 2019-11-19 05:21:32.317 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey: TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +orderer0.example.com | 2019-11-19 05:21:32.319 UTC [localconfig] completeInitialization -> INFO 0ca Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-11-19 05:21:32.326 UTC [bccsp_sw] openKeyStore -> DEBU 0cb KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +orderer0.example.com | "2019-11-19 05:21:32.326 UTC [bccsp] initBCCSP -> DEBU 0cc Initialize BCCSP [SW]" +orderer0.example.com | "2019-11-19 05:21:32.328 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2019-11-19 05:21:32.336 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2019-11-19 05:21:32.344 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2019-11-19 05:21:32.355 UTC [msp] getPemMaterialFromDir -> DEBU 0d0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +orderer0.example.com | "2019-11-19 05:21:32.361 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2019-11-19 05:21:32.377 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +orderer0.example.com | "2019-11-19 05:21:32.409 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2019-11-19 05:21:32.414 UTC [msp] getMspConfig -> DEBU 0d4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2019-11-19 05:21:32.414 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2019-11-19 05:21:32.425 UTC [msp] getPemMaterialFromDir -> DEBU 0d6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2019-11-19 05:21:32.430 UTC [msp] getPemMaterialFromDir -> DEBU 0d7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2019-11-19 05:21:32.434 UTC [msp] getMspConfig -> DEBU 0d8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2019-11-19 05:21:32.435 UTC [msp] getPemMaterialFromDir -> DEBU 0d9 Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2019-11-19 05:21:32.436 UTC [msp] getMspConfig -> DEBU 0da crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2019-11-19 05:21:32.437 UTC [msp] getMspConfig -> DEBU 0db MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +orderer0.example.com | "2019-11-19 05:21:32.437 UTC [msp] newBccspMsp -> DEBU 0dc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.437 UTC [msp] New -> DEBU 0dd Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.437 UTC [msp] loadLocaMSP -> DEBU 0de Created new local MSP" +orderer0.example.com | "2019-11-19 05:21:32.438 UTC [msp] Setup -> DEBU 0df Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:32.438 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | [05f 11-19 05:21:35.74 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org1.example.com:7052 +peer1.org1.example.com | [060 11-19 05:21:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.4 +peer1.org1.example.com | [061 11-19 05:21:35.75 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org1.example.com | [062 11-19 05:21:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.4 +peer1.org1.example.com | [063 11-19 05:21:35.75 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org1.example.com | [064 11-19 05:21:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.4 +peer1.org1.example.com | [065 11-19 05:21:35.75 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org1.example.com | [066 11-19 05:21:35.75 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer1.org1.example.com | [067 11-19 05:21:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer1.org1.example.com | [068 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [069 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer1.org1.example.com | [06a 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [06b 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [06c 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer1.org1.example.com | [06d 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer1.org1.example.com | [06e 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org1.example.com | [06f 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer1.org1.example.com | [070 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [071 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer1.org1.example.com | [072 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [073 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer1.org1.example.com | [074 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer1.org1.example.com | [075 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer1.org1.example.com | [076 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [077 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer1.org1.example.com | [078 11-19 05:21:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [079 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer1.org1.example.com | [07a 11-19 05:21:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer1.org1.example.com | [07b 11-19 05:21:35.78 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051] +peer1.org1.example.com | [07c 11-19 05:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [07d 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer1.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer1.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer1.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [07e 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [07f 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [080 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [081 11-19 05:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [082 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da, Metadata: +peer0.org1.example.com | [088 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer0.org1.example.com | [089 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [08a 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [08b 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C7E7A64DD026611F1444C6BA3439835D73645C8E6A5EA8C67BA7DF090CF1FC0E +peer0.org1.example.com | [08c 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [08d 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [08e 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [08f 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer0.org1.example.com | [090 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [091 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.4 +peer0.org1.example.com | [092 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [093 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.4 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [094 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +peer0.org1.example.com | [095 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +peer0.org1.example.com | [096 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.4 +peer0.org1.example.com | [097 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +peer0.org1.example.com | [098 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +peer0.org1.example.com | [099 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +peer0.org1.example.com | [09a 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +peer0.org1.example.com | [09b 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.4 +peer0.org1.example.com | [09c 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.4 +peer0.org1.example.com | [09d 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org1.example.com | [09e 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org1.example.com | [09f 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.4 +peer0.org1.example.com | [0a0 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.4" , sending back REGISTERED +peer0.org1.example.com | [0a1 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.4" +peer0.org1.example.com | [0a2 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.4" +peer0.org1.example.com | [0a3 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.4" +peer0.org1.example.com | [0a4 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org1.example.com | [0a5 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [0a6 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [95db7c9f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [0a7 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [95db7c9f] notifying Txid:95db7c9f-8c6b-44f6-b5e3-e4fd2d26949e, channelID: +peer0.org1.example.com | [0a8 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [0a9 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [0aa 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [0ab 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.4 +peer0.org1.example.com | [0ac 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [0ad 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.4 +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [19e 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org2.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org2.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [19f 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [1a0 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [1a1 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [1a2 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [1a3 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [1a4 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [1a5 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer1.org2.example.com | [1a6 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [1a7 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [1a8 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org2.example.com | [1a9 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [1aa 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [1ab 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [1ac 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [1ad 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [1ae 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [1af 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1b0 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1b1 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1b2 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [1b3 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [1b4 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [1b5 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [1b6 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [1b7 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [1b8 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [1b9 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [1ba 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [1bb 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [1bc 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [1bd 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [1be 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1bf 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [1c0 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [1c1 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [1c2 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [1c3 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [1c4 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [1c5 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [1c6 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c7 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [1c8 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [1c9 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [1ca 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [1cb 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [1cc 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [1cd 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [1ce 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [1cf 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1d0 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [1d1 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [1d2 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [0bd 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [0be 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [12204a89] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [0bf 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [12204a89] notifying Txid:12204a89-808b-4daf-89a6-c0f70b499dd5, channelID: +peer0.org2.example.com | [0c0 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0c1 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [0c2 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [0c3 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.4 +peer0.org2.example.com | [0c4 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [0c5 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.4 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [0c6 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +peer0.org2.example.com | [0c7 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +peer0.org2.example.com | [0c8 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.4 +peer0.org2.example.com | [0c9 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +peer0.org2.example.com | [0ca 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +peer0.org2.example.com | [0cb 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +peer0.org2.example.com | [0cc 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +peer0.org2.example.com | [0cd 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.4 +peer0.org2.example.com | [0ce 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.4 +peer0.org2.example.com | [0cf 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [0d0 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [0d1 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.4 +peer0.org2.example.com | [0d2 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.4" , sending back REGISTERED +peer0.org2.example.com | [0d3 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.4" +peer0.org2.example.com | [0d4 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.4" +peer0.org2.example.com | [0d5 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.4" +peer0.org2.example.com | [0d6 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0d7 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0d8 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [0d9 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [aa497e3f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [0da 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [aa497e3f] notifying Txid:aa497e3f-1751-4892-8587-203b71976b9b, channelID: +peer0.org2.example.com | [0db 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0dc 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [0dd 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [0de 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer0.org2.example.com | [0df 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org2.example.com | [0e0 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer0.org2.example.com | [0e1 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer0.org2.example.com | [0e2 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +peer0.org2.example.com | [0e3 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +peer0.org2.example.com | [0e4 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer0.org2.example.com | [0e5 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer0.org2.example.com | [0e6 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer0.org2.example.com | [0e7 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer0.org2.example.com | [0e8 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +peer0.org2.example.com | [0e9 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +peer0.org2.example.com | [0ea 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +peer0.org2.example.com | [0eb 11-19 05:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [0ec 11-19 05:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [0ae 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +peer0.org1.example.com | [0af 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +peer0.org1.example.com | [0b0 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.4 +peer0.org1.example.com | [0b1 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +peer0.org1.example.com | [0b2 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +peer0.org1.example.com | [0b3 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +peer0.org1.example.com | [0b4 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +peer0.org1.example.com | [0b5 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.4 +peer0.org1.example.com | [0b6 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.4 +peer1.org2.example.com | [1d3 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [1d4 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [1d5 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [1d6 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [1d7 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [1d8 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [1d9 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [1da 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [1db 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [1dc 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [1dd 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [1de 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [1df 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [1e0 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [1e1 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [1e2 11-19 05:21:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [1e3 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [1e4 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [1e5 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [1e6 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [1e7 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [1e8 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [1e9 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [1ea 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [1eb 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [1ec 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [1ed 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [1ee 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [1ef 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [1f0 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [1f1 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [1f2 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [1f3 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [1f4 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [1f5 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [1f6 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [1f7 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [1f8 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [1f9 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [1fa 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [1fb 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [1fc 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [1fd 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org2.example.com | [1fe 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer1.org2.example.com | [1ff 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [200 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [201 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [202 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org2.example.com | [203 11-19 05:21:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [204 11-19 05:21:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [205 11-19 05:21:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [206 11-19 05:21:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [207 11-19 05:21:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [208 11-19 05:21:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer1.org2.example.com | [209 11-19 05:21:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer1.org2.example.com | [20a 11-19 05:21:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer1.org2.example.com | [20b 11-19 05:21:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [20c 11-19 05:21:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [20d 11-19 05:21:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org2.example.com | [20e 11-19 05:21:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org2.example.com | [0ed 11-19 05:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE0B8F62EE847E7071FF9D1B2E89F0C83418AEAD6B0961B65244153AA5698128 +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | [083 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [0b7 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [20f 11-19 05:21:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org2.example.com | [0ee 11-19 05:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | [084 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A209C6FC4E4580A3854...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [0b8 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [0ef 11-19 05:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [210 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +orderer0.example.com | 1g== +peer1.org1.example.com | [085 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 094A3D371D50547A09184CCA94E8C263FECE9759470E19D5326CE41D623FA6D3 +peer0.org1.example.com | [0b9 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.4 +peer0.org2.example.com | [0f0 11-19 05:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [211 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [086 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Added �o��X +peer0.org1.example.com | [0ba 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.4" , sending back REGISTERED +peer0.org2.example.com | [0f1 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [212 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:32.438 UTC [msp.identity] newIdentity -> DEBU 0e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 8T)�YR�^",�:��uO�.���, total items: 1 +peer0.org1.example.com | [0bb 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.4" +peer0.org2.example.com | [0f2 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [213 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408E49FD3F4FE999EEC15...BF6035CA6D53E581FB7C69FB2A020801 +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | [087 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org1.example.com:7051 started +peer0.org1.example.com | [0bc 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.4" +peer0.org2.example.com | [0f3 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B2ECBFE2BAF298EBE5145B65E652039B8F79A4E799A72D3BE5570FB78FCC6A0B +peer1.org2.example.com | [214 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 103D8BB1FA35DCD2D9734957831B82301D45C3769B44EE3DF59524D300978B2D +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [088 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer0.org1.example.com | [0bd 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.4" +peer0.org2.example.com | [0f4 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [215 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | [089 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [0be 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0f5 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [216 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer1.org1.example.com | [08a 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [0bf 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0f6 11-19 05:21:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [217 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | [08b 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2217C4C9C327A3E619A1CEA9E1D693BE4AF53E219721D35B313F51B8A5E19D57 +peer0.org1.example.com | [0c0 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [0f7 11-19 05:21:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [218 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer1.org1.example.com | [08c 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [0c1 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [65811df4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [0f8 11-19 05:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [219 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer1.org1.example.com | [08d 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [0c2 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [65811df4] notifying Txid:65811df4-07cd-42ad-940a-ade42efd2278, channelID: +peer0.org2.example.com | [0f9 11-19 05:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [21a 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b2d8311e-8f31-481f-915a-eac12c5cc202] +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer1.org1.example.com | [08e 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [0c3 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0fa 11-19 05:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 81ECEC6F9A52B447890BC393EC65E5B63004E1B176BF66008E1A98B92815F2B8 +peer1.org2.example.com | [21b 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer1.org1.example.com | [08f 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [0c4 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [0fb 11-19 05:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [21c 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer1.org1.example.com | [090 11-19 05:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [0c5 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [0fc 11-19 05:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [21d 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [b2d8311e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer1.org1.example.com | [091 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [0c6 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.4 +peer0.org2.example.com | [0fd 11-19 05:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [21e 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [b2d8311e] notifying Txid:b2d8311e-8f31-481f-915a-eac12c5cc202, channelID:businesschannel +orderer0.example.com | fQ== +peer1.org1.example.com | [092 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [0c7 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org2.example.com | [0fe 11-19 05:21:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:32932 +peer1.org2.example.com | [21f 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [093 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org1.example.com | [0c8 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | [0ff 11-19 05:21:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025bcaa0 +peer1.org2.example.com | [220 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +orderer0.example.com | "2019-11-19 05:21:32.477 UTC [bccsp_sw] loadPrivateKey -> DEBU 0e2 Loading private key [0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f] at [/var/hyperledger/orderer/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk]..." +peer1.org1.example.com | [094 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | [100 11-19 05:21:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [221 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b2d8311e-8f31-481f-915a-eac12c5cc202] +orderer0.example.com | "2019-11-19 05:21:32.488 UTC [msp.identity] newIdentity -> DEBU 0e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [095 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025f93a0, CONNECTING +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | [101 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [222 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | [096 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | [102 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [223 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [21b11923-8692-4ed6-b293-ad158e5853b9] +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [097 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.4 +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.4 +peer0.org2.example.com | [103 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [224 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | [098 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | [225 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer1.org1.example.com | [099 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [226 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [21b11923] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | [227 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [21b11923] notifying Txid:21b11923-8692-4ed6-b293-ad158e5853b9, channelID:businesschannel +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | [228 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org1.example.com | [0c9 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | [229 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.4 +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | [0ca 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | [22a 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [21b11923-8692-4ed6-b293-ad158e5853b9] +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org1.example.com | [0cb 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.4 +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer1.org2.example.com | [22b 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org1.example.com | [0cc 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +peer0.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer1.org2.example.com | [22c 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c5f1609b-7ece-46d9-8b43-fe9db5e6ce32] +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org1.example.com | [0cd 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +peer0.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | [22d 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +orderer0.example.com | fQ== +peer0.org1.example.com | [0ce 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.4 +peer0.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer1.org2.example.com | [22e 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [09a 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [0cf 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +peer0.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer1.org2.example.com | [22f 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [c5f1609b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [09b 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +orderer0.example.com | "2019-11-19 05:21:32.488 UTC [msp] setupSigningIdentity -> DEBU 0e4 Signing identity expires at 2029-09-21 00:59:00 +0000 UTC" +peer0.org1.example.com | [0d0 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +peer0.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer1.org2.example.com | [230 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [c5f1609b] notifying Txid:c5f1609b-7ece-46d9-8b43-fe9db5e6ce32, channelID:businesschannel +peer1.org1.example.com | [09c 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.4 +orderer0.example.com | "2019-11-19 05:21:32.488 UTC [msp.identity] newIdentity -> DEBU 0e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [0d1 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.4 +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [231 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [09d 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | [0d2 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [104 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer1.org2.example.com | [232 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [09e 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [0d3 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [105 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [233 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c5f1609b-7ece-46d9-8b43-fe9db5e6ce32] +peer1.org1.example.com | [09f 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | [0d4 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.4 +peer0.org2.example.com | [106 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [234 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org1.example.com | [0a0 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org1.example.com | [0d5 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.4" , sending back REGISTERED +peer0.org2.example.com | [107 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [235 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [9666060b-b23e-414b-9eca-462ced611bdd] +peer1.org1.example.com | [0a1 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.4 +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [0d6 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.4" +peer0.org2.example.com | [108 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 6c fa 12 38 ea 96 83 93 d1 d9 1d 0f 6d 70 f1 |.l..8........mp.| +peer1.org2.example.com | [236 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org1.example.com | [0a2 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.4 +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org1.example.com | [0d7 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.4" +peer0.org2.example.com | 00000010 92 9b 1d f4 fc 60 1e 54 87 5c 0a 79 78 66 b9 f6 |.....`.T.\.yxf..| +peer1.org2.example.com | [237 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9666060b-b23e-414b-9eca-462ced611bdd] +peer1.org1.example.com | [0a3 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org1.example.com | [0d8 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.4" +peer0.org2.example.com | [109 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 f6 c2 47 52 42 5e 09 8d cb 52 f5 |0D. ...GRB^...R.| +peer1.org2.example.com | [238 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [0a4 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org1.example.com | [0d9 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | 00000010 f3 80 04 32 5b 19 95 93 f4 a9 0b 17 2f 97 be e0 |...2[......./...| +peer1.org2.example.com | [239 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408E49FD3F4FE999EEC15...BF6035CA6D53E581FB7C69FB2A020801 +peer1.org1.example.com | [0a5 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.4 +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org1.example.com | [0da 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | 00000020 d7 ec de b5 02 20 35 64 9e a0 c1 0d 03 a8 18 14 |..... 5d........| +peer1.org2.example.com | [23a 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 514AB53B8E143A81A4AE947D372DE6254420CC303FEB936A1651A9589501F3D6 +peer1.org1.example.com | [0a6 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.4" , sending back REGISTERED +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | [0db 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | 00000030 19 b7 5f b6 a1 d2 4b d0 90 2f 9d 37 59 a8 7d 0b |.._...K../.7Y.}.| +peer1.org2.example.com | [23b 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org1.example.com | [0a7 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.4" +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | [0dc 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU [ae618441] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | 00000040 0b b7 fe 0d 78 c1 |....x.| +peer1.org2.example.com | [23c 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [1de4e7f4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0a8 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.4" +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [0dd 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU [ae618441] notifying Txid:ae618441-3256-4ed9-8672-6b8511e8963e, channelID: +peer0.org2.example.com | [10a 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [23d 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [1de4e7f4] notifying Txid:1de4e7f43d69f6706f57d0f8d12459707ec4e71883c4472d7a8f794253bcf725, channelID: +peer1.org1.example.com | [0a9 11-19 05:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.4" +orderer0.example.com | "2019-11-19 05:21:32.488 UTC [msp] Validate -> DEBU 0e6 MSP OrdererMSP validating identity" +peer0.org1.example.com | [0de 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [10b 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001576c0, header 0xc0025bd3b0 +peer1.org2.example.com | [23e 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0aa 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +orderer0.example.com | "2019-11-19 05:21:32.489 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e7 Orderer config values: +peer0.org1.example.com | [0df 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [10c 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [23f 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO [][1de4e7f4] Exit chaincode: name:"cscc" (83ms) +peer1.org1.example.com | [0ab 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | General.LedgerType = "file" +peer0.org1.example.com | [0e0 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [10d 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU [][a02655ea] processing txid: a02655ea0cef2800e54f21e96186e6176d0167e7cb87bbd1591921541d286125 +peer1.org2.example.com | [240 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU [][1de4e7f4] Exit +peer1.org1.example.com | [0ac 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU [0e644191] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | General.ListenAddress = "0.0.0.0" +peer0.org1.example.com | [0e1 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer0.org2.example.com | [10e 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU [][a02655ea] Entry chaincode: name:"cscc" +peer1.org2.example.com | [241 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:35320 +peer1.org1.example.com | [0ad 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU [0e644191] notifying Txid:0e644191-21f8-4526-beb5-f8ad1f437b20, channelID: +orderer0.example.com | General.ListenPort = 7050 +peer0.org1.example.com | [0e2 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org2.example.com | [10f 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> INFO [][a02655ea] Entry chaincode: name:"cscc" +peer1.org2.example.com | [242 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:35320 grpc.code=OK grpc.call_duration=86.3374ms +peer1.org1.example.com | [0ae 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | General.TLS.Enabled = true +peer0.org1.example.com | [0e3 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer0.org2.example.com | [110 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [243 11-19 05:21:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [0af 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +peer0.org1.example.com | [0e4 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer0.org2.example.com | [111 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer1.org2.example.com | [244 11-19 05:21:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:35328 +peer1.org1.example.com | [0b0 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +peer0.org1.example.com | [0e5 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer0.org2.example.com | [112 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [245 11-19 05:21:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0026c8aa0 +peer1.org1.example.com | [0b1 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.4 +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +peer0.org1.example.com | [0e6 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer0.org2.example.com | [113 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [246 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [0b2 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +orderer0.example.com | General.TLS.ClientAuthRequired = false +peer0.org1.example.com | [0e7 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer0.org2.example.com | [114 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [247 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [0b3 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +orderer0.example.com | General.TLS.ClientRootCAs = [] +peer0.org1.example.com | [0e8 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer0.org2.example.com | [115 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [248 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +orderer0.example.com | General.Cluster.ListenAddress = "" +peer0.org1.example.com | [0e9 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer0.org2.example.com | [116 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [249 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +orderer0.example.com | General.Cluster.ListenPort = 0 +peer0.org1.example.com | [0ea 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer0.org2.example.com | [117 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [24a 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 6d 3a 0d 1a d0 b6 59 d5 7d 45 6f 3c 6f a7 fc |.m:....Y.}Eo %{level:.4s} %{id:03x}%{color:reset} %{message} +orderer0.example.com | General.Cluster.ServerCertificate = "" +peer0.org1.example.com | [0eb 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:37.846Z grpc.peer_address=172.18.0.8:41262 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=109.6µs +peer0.org2.example.com | [118 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 6c fa 12 38 ea 96 83 93 d1 d9 1d 0f 6d 70 f1 |.l..8........mp.| +peer1.org2.example.com | 00000010 ff 71 aa 2c c2 73 9f 69 76 7f ff 3b 5d a9 f4 7f |.q.,.s.iv..;]...| +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.4 +orderer0.example.com | General.Cluster.ServerPrivateKey = "" +peer0.org1.example.com | [0ec 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 92 9b 1d f4 fc 60 1e 54 87 5c 0a 79 78 66 b9 f6 |.....`.T.\.yxf..| +peer1.org2.example.com | [24b 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c c5 0d 52 8a 8d c5 e3 bc 95 ba d2 |0D. l..R........| +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +peer0.org2.example.com | [119 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 f6 c2 47 52 42 5e 09 8d cb 52 f5 |0D. ...GRB^...R.| +peer0.org1.example.com | [0ed 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org2.example.com | 00000010 38 31 fb da 30 7f 05 8e 5e f3 2e 0a ea 95 0b d3 |81..0...^.......| +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +peer0.org2.example.com | 00000010 f3 80 04 32 5b 19 95 93 f4 a9 0b 17 2f 97 be e0 |...2[......./...| +peer0.org1.example.com | [0ee 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org2.example.com | 00000020 0e 60 48 18 02 20 4a 4c ac a9 a7 64 17 6e b9 b6 |.`H.. JL...d.n..| +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +orderer0.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +peer0.org2.example.com | 00000020 d7 ec de b5 02 20 35 64 9e a0 c1 0d 03 a8 18 14 |..... 5d........| +peer0.org1.example.com | [0ef 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:41262 +peer1.org2.example.com | 00000030 bb 03 10 d2 86 fb 6b 36 c3 ea 7d 5c d9 74 30 1c |......k6..}\.t0.| +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +orderer0.example.com | General.Cluster.DialTimeout = 5s +peer0.org2.example.com | 00000030 19 b7 5f b6 a1 d2 4b d0 90 2f 9d 37 59 a8 7d 0b |.._...K../.7Y.}.| +peer0.org1.example.com | [0f0 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41262 +peer1.org2.example.com | 00000040 54 a3 b2 f1 ce 00 |T.....| +peer1.org1.example.com | [0b4 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025f93a0, READY +orderer0.example.com | General.Cluster.RPCTimeout = 7s +peer0.org2.example.com | 00000040 0b b7 fe 0d 78 c1 |....x.| +peer0.org1.example.com | [0f1 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [0b5 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +peer0.org2.example.com | [11a 11-19 05:21:43.88 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [0f2 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [24d 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000169ab0, header 0xc0026c8eb0 +peer1.org1.example.com | [0b6 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +peer0.org2.example.com | [11b 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [24e 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [0b7 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.4 +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +peer0.org2.example.com | [11c 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [24f 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU [][36828313] processing txid: 36828313bfff959e49ccf6a3d8323941ce33deed109b1bddf8884682cf4cc3f4 +peer1.org1.example.com | [0b8 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +peer0.org2.example.com | [11d 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [250 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU [][36828313] Entry chaincode: name:"cscc" +peer1.org1.example.com | [0bc 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +peer0.org2.example.com | [11e 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [251 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> INFO [][36828313] Entry chaincode: name:"cscc" +peer1.org1.example.com | [0b9 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.4 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +peer0.org2.example.com | [11f 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [252 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0ba 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.4 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +peer0.org2.example.com | [120 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org2.example.com | [253 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +orderer1.example.com | 2019-11-19 05:21:32.274 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +peer1.org1.example.com | [0bb 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +peer0.org2.example.com | [121 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer1.org2.example.com | [254 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +orderer1.example.com | "2019-11-19 05:21:32.425 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +peer1.org1.example.com | [0bd 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +peer0.org2.example.com | [122 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer1.org2.example.com | [255 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +orderer1.example.com | General.LedgerType = "file" +peer1.org1.example.com | [0bf 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +peer0.org2.example.com | [123 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | [256 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +orderer1.example.com | General.ListenAddress = "0.0.0.0" +peer1.org1.example.com | [0c0 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +peer0.org2.example.com | [124 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org2.example.com | [257 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 6d 3a 0d 1a d0 b6 59 d5 7d 45 6f 3c 6f a7 fc |.m:....Y.}Eo DEBU Received REGISTER in state created +orderer0.example.com | General.ConnectionTimeout = 0s +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org2.example.com | [125 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0027372c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer1.org2.example.com | 00000010 ff 71 aa 2c c2 73 9f 69 76 7f ff 3b 5d a9 f4 7f |.q.,.s.iv..;]...| +orderer1.example.com | General.TLS.Enabled = true +peer1.org1.example.com | [0c2 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.4 +orderer0.example.com | General.GenesisMethod = "file" +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [258 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c c5 0d 52 8a 8d c5 e3 bc 95 ba d2 |0D. l..R........| +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +peer1.org1.example.com | [0c3 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.4" , sending back REGISTERED +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +peer0.org1.example.com | [0f3 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [126 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer1.org2.example.com | 00000010 38 31 fb da 30 7f 05 8e 5e f3 2e 0a ea 95 0b d3 |81..0...^.......| +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +peer1.org1.example.com | [0c4 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.4" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +peer0.org1.example.com | [0f4 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [0f5 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org2.example.com | [127 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +peer1.org1.example.com | [0c5 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.4" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org2.example.com | [128 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer1.org2.example.com | 00000020 0e 60 48 18 02 20 4a 4c ac a9 a7 64 17 6e b9 b6 |.`H.. JL...d.n..| +orderer1.example.com | General.TLS.ClientAuthRequired = false +peer1.org1.example.com | [0be 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +orderer0.example.com | General.Profile.Enabled = false +peer0.org1.example.com | [0f6 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 68 6a e3 c2 57 42 e0 dd f8 ea |0E.!..hj..WB....| +peer0.org2.example.com | [129 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer0.org2.example.com | [12a 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +orderer1.example.com | General.TLS.ClientRootCAs = [] +peer0.org2.example.com | [12b 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer0.org2.example.com | [12c 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +orderer1.example.com | General.Cluster.ListenAddress = "" +peer0.org2.example.com | [12d 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer1.org2.example.com | 00000030 bb 03 10 d2 86 fb 6b 36 c3 ea 7d 5c d9 74 30 1c |......k6..}\.t0.| +peer1.org1.example.com | [0c6 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +orderer1.example.com | General.Cluster.ListenPort = 0 +peer0.org1.example.com | 00000010 d7 75 58 77 0f e8 24 04 d2 17 f1 e1 34 8c 2b a7 |.uXw..$.....4.+.| +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +peer0.org2.example.com | [12e 11-19 05:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer1.org2.example.com | 00000040 54 a3 b2 f1 ce 00 |T.....| +peer1.org1.example.com | [0c7 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.4" +orderer1.example.com | General.Cluster.ServerCertificate = "" +peer0.org1.example.com | 00000020 f8 4b 7d 60 a7 02 20 31 fa 64 57 ff 9a 94 83 e4 |.K}`.. 1.dW.....| +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +peer0.org2.example.com | [12f 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer1.org2.example.com | [259 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU [36828313] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [25a 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU [36828313] notifying Txid:36828313bfff959e49ccf6a3d8323941ce33deed109b1bddf8884682cf4cc3f4, channelID: +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +peer0.org1.example.com | 00000030 5e 82 97 86 20 ac ef 59 68 70 39 54 ff da 48 40 |^... ..Yhp9T..H@| +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +peer0.org2.example.com | [130 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org1.example.com | [0c8 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [25b 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +peer0.org1.example.com | 00000040 88 7c 89 6e 00 96 a2 |.|.n...| +orderer0.example.com | General.BCCSP.ProviderName = "SW" +peer0.org2.example.com | [131 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer1.org1.example.com | [0c9 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [25c 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> INFO [][36828313] Exit chaincode: name:"cscc" (1ms) +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +peer0.org1.example.com | [0f7 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41262 +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +peer0.org2.example.com | [132 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer1.org1.example.com | [0ca 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | [25d 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU [][36828313] Exit +orderer1.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +peer0.org1.example.com | [0f8 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41262 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +peer0.org2.example.com | [133 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org1.example.com | [0cb 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU [b9dd61c6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [25e 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:35328 +orderer1.example.com | General.Cluster.DialTimeout = 5s +peer0.org1.example.com | [0f9 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +peer0.org2.example.com | [134 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [0cc 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [25f 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:35328 grpc.code=OK grpc.call_duration=5.9728ms +orderer1.example.com | General.Cluster.RPCTimeout = 7s +peer0.org1.example.com | [0fa 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +peer0.org2.example.com | [135 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer1.org1.example.com | [0cd 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org2.example.com | [260 11-19 05:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +peer0.org1.example.com | [0fb 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41262 disconnected +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +peer0.org2.example.com | [136 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer1.org1.example.com | [0ce 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [0cf 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +peer0.org2.example.com | [137 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [0fc 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:21:45.849Z grpc.peer_address=172.18.0.8:41262 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.6351ms +peer1.org2.example.com | [261 11-19 05:21:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting, peers found 0 +orderer0.example.com | General.BCCSP.PluginOpts = +peer0.org2.example.com | [138 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [0fd 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [262 11-19 05:21:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +peer0.org2.example.com | [139 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [0fe 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:37.894Z grpc.peer_address=172.18.0.8:41264 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=130.4µs +peer1.org2.example.com | [263 11-19 05:21:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +orderer0.example.com | General.Authentication.NoExpirationChecks = false +peer0.org2.example.com | [13a 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +orderer1.example.com | General.Cluster.SendBufferSize = 10 +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [0ff 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [264 11-19 05:21:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +peer0.org2.example.com | [13b 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | [100 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org2.example.com | [265 11-19 05:21:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +peer0.org2.example.com | [13c 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +orderer1.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | [101 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org2.example.com | [266 11-19 05:21:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...18F7120C08D8F6B782FF999EEC151001 +orderer0.example.com | RAMLedger.HistorySize = 1000 +peer0.org2.example.com | [13d 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +peer1.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | [102 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:41264 +peer1.org2.example.com | [267 11-19 05:21:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC5D5164E622D8BE5E924D61F6699DF4BFC8ACEFEDAF84D188BD0D942AB171CE +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +peer0.org2.example.com | [13e 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +peer1.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | [103 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41264 +peer1.org2.example.com | [268 11-19 05:21:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +peer0.org2.example.com | [13f 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +peer1.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | [104 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer1.org2.example.com | [269 11-19 05:21:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [26a 11-19 05:21:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151006 +peer1.org2.example.com | [26b 11-19 05:21:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 40D81DF9A8DBF6F32C83FC495892F85D1709FC71705E2387680935A9B6569AF5 +orderer1.example.com | General.ConnectionTimeout = 0s +peer1.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer1.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +orderer1.example.com | General.GenesisMethod = "file" +peer0.org2.example.com | [140 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [105 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b6 26 d4 d7 13 58 25 6e ef 93 |0E.!...&...X%n..| +peer1.org2.example.com | [26c 11-19 05:21:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +peer0.org2.example.com | [141 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +peer1.org1.example.com | [0d0 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU [b9dd61c6] notifying Txid:b9dd61c6-9812-4f87-aeca-666dabd8d415, channelID: +peer0.org1.example.com | 00000010 fb 77 41 c7 60 36 f8 d5 29 77 71 78 bb f3 55 9e |.wA.`6..)wqx..U.| +peer1.org2.example.com | [26d 11-19 05:21:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +peer0.org2.example.com | [142 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +peer1.org1.example.com | [0d1 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | 00000020 cb ef d5 a8 47 02 20 02 5e 6a 26 05 8c 5c 88 ac |....G. .^j&..\..| +peer1.org2.example.com | [26e 11-19 05:21:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +peer0.org2.example.com | [143 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +peer1.org1.example.com | [0d3 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [0d4 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +peer0.org2.example.com | [144 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [0d5 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 7c a9 0c e0 08 a7 b7 46 0f 83 |0E.!..|......F..| +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +peer1.org1.example.com | 00000010 3b fc e0 3d 73 06 10 f2 56 58 0d 57 b5 b0 a1 6b |;..=s...VX.W...k| +peer1.org1.example.com | 00000020 30 10 ed 62 1e 02 20 67 6d 6d 4b b4 e5 33 1b 7e |0..b.. gmmK..3.~| +peer1.org1.example.com | 00000030 b8 22 0f 86 48 13 0f b8 0d 3e f5 f3 8c 09 e3 7f |."..H....>......| +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +peer0.org1.example.com | 00000030 7c 41 e4 0d be 40 d6 41 06 6a 11 4d 8a 12 a2 2f ||A...@.A.j.M.../| +peer0.org1.example.com | 00000040 dc e0 79 bc 74 88 04 |..y.t..| +orderer1.example.com | General.BCCSP.ProviderName = "SW" +peer0.org1.example.com | [106 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41264 +peer0.org2.example.com | [145 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +peer0.org2.example.com | [146 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | 00000040 88 5f 2f ab b8 b5 c9 |._/....| +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +peer0.org1.example.com | [107 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41264 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +peer0.org2.example.com | [147 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [26f 11-19 05:21:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [0d2 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +peer0.org1.example.com | [108 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:12006965676759780174 tag:EMPTY mem_req: > > , Envelope: 1108 bytes, Signature: 0 bytes +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +peer0.org2.example.com | [148 11-19 05:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00280c200)} +peer1.org2.example.com | [270 11-19 05:21:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:35336 +peer1.org1.example.com | [0d6 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +peer0.org1.example.com | [109 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +peer0.org2.example.com | [149 11-19 05:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [271 11-19 05:21:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0026c9630 +peer1.org1.example.com | [0d7 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +peer0.org1.example.com | [10a 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12006965676759780174 tag:EMPTY mem_req: > > , Envelope: 1108 bytes, Signature: 0 bytes +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +peer0.org2.example.com | [14a 11-19 05:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [272 11-19 05:21:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [0d8 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.4 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +peer0.org1.example.com | [10b 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 13 1f 7b 5f d0 28 af 41 8b 4c 0e 3a 27 c7 d8 |...{_.(.A.L.:'..| +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +peer0.org2.example.com | [14b 11-19 05:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [273 11-19 05:21:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [274 11-19 05:21:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer1.org1.example.com | [0d9 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer0.org1.example.com | 00000010 c2 e1 67 17 2d 97 cf 4f 82 b5 ed 09 65 c7 b5 69 |..g.-..O....e..i| +orderer1.example.com | General.BCCSP.PluginOpts = +peer0.org2.example.com | [14c 11-19 05:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer1.org2.example.com | [275 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [276 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 6f d3 55 dc aa 20 eb e7 83 f8 88 c5 33 1a df |.o.U.. ......3..| +peer1.org1.example.com | [0da 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [10c 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f e9 b9 e0 01 be 95 01 7a eb 38 55 |0D. /.......z.8U| +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +peer0.org2.example.com | [14d 11-19 05:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer1.org2.example.com | 00000010 71 d4 63 85 2e 89 86 5d 2b 9c 66 d6 65 ff c5 c2 |q.c....]+.f.e...| +peer0.org1.example.com | 00000010 1b 60 cb 8c da ef bc bb aa d8 1d 7c a6 34 65 0e |.`.........|.4e.| +orderer1.example.com | General.Authentication.NoExpirationChecks = false +peer0.org2.example.com | [14e 11-19 05:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer1.org2.example.com | [277 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 b1 60 12 1d 6b b6 53 56 2a e6 e0 |0D. ".`..k.SV*..| +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +peer1.org1.example.com | [0db 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [0dc 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +peer0.org2.example.com | [14f 11-19 05:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer1.org2.example.com | 00000010 e4 69 d0 a5 eb ef 49 47 4b 71 a9 af be 52 53 0e |.i....IGKq...RS.| +orderer0.example.com | Kafka.Verbose = false +peer1.org1.example.com | [0dd 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D6131F7B5FD028AF418B4C0E3A27C7D8C2E167172D97CF4F82B5ED0965C7B569 +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +peer0.org2.example.com | [150 11-19 05:21:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xeb, 0xcd, 0x1f, 0x7, 0xa0, 0x44, 0x7e, 0xdb, 0xb0, 0xc3, 0xd8, 0x38, 0xb2, 0x31, 0xa, 0x6d, 0xa6, 0x14, 0x14, 0x86, 0xef, 0x53, 0x16, 0x8b, 0x27, 0xf5, 0x83, 0xcc, 0x3e, 0xcb, 0xfd, 0x8c} txOffsets= +peer1.org2.example.com | 00000020 57 56 63 f8 02 20 30 a0 3e e2 b3 84 62 39 87 f6 |WVc.. 0.>...b9..| +orderer0.example.com | Kafka.Version = 0.10.2.0 +peer1.org1.example.com | [0de 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer1.example.com | RAMLedger.HistorySize = 1000 +peer0.org1.example.com | 00000020 61 be 96 d9 02 20 72 7e 73 49 2d 1e 07 ad a8 a6 |a.... r~sI-.....| +peer0.org2.example.com | txId=92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426 locPointer=offset=39, bytesLength=25761 +peer1.org2.example.com | 00000030 95 1f cd 5d ad 09 39 db fd bc 18 26 85 1a cc c8 |...]..9....&....| +orderer0.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +peer1.org1.example.com | [0e0 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [0e1 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000030 b8 ca 59 17 36 f9 d0 16 f8 85 82 e2 5f 10 23 04 |..Y.6......._.#.| +peer1.org2.example.com | 00000040 6d 38 ba e0 50 40 |m8..P@| +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +peer1.org1.example.com | [0e2 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12006965676759780174 tag:EMPTY mem_req: > > , Envelope: 1108 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [0e3 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | 00000040 c6 30 bc 83 c2 db |.0....| +peer1.org2.example.com | [278 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +peer1.org1.example.com | [0df 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | [10d 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [10e 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 73 57 fc 66 1b b2 28 17 33 ee c2 |0D. !sW.f..(.3..| +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | 00000010 0b 41 f9 05 5c e7 31 6f 87 03 d3 99 21 9d d0 55 |.A..\.1o....!..U| +peer1.org2.example.com | [279 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002f8a230, header 0xc0026c9a40 +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +peer0.org1.example.com | 00000020 b0 1f dd f9 02 20 27 a7 8f 5d 10 32 f8 dc bf af |..... '..].2....| +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | 00000030 cb 38 c4 76 f9 2b 5e af d9 29 21 90 16 6e 32 32 |.8.v.+^..)!..n22| +peer0.org1.example.com | 00000040 bb bc 6f 2d 7f e0 |..o-..| +peer0.org2.example.com | ] +orderer1.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.SASLPlain.Enabled = false +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +orderer1.example.com | Kafka.TLS.PrivateKey = "" +peer0.org1.example.com | [10f 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [27a 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.4 +peer0.org2.example.com | [151 11-19 05:21:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to txid-index +orderer1.example.com | Kafka.TLS.Certificate = "" +peer0.org1.example.com | [110 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]} +peer0.org1.example.com | [111 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [112 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [113 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [114 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +peer1.org2.example.com | [27b 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU [][c9b504ee] processing txid: c9b504ee07733b4ee2f308e688a1ac6592a07d7d8a99db38d09bbd6d8b190435 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +peer0.org2.example.com | [152 11-19 05:21:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx number:[0] ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to blockNumTranNum index +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2019-11-19 05:21:32.479 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer1.example.com | "2019-11-19 05:21:32.523 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer1.example.com | "2019-11-19 05:21:32.525 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2019-11-19 05:21:32.537 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer1.example.com | "2019-11-19 05:21:32.554 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-11-19 05:21:32.555 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:32.578 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 7ae40fb1ee3dd466a7fe3b6a5c89e821a4b87734ad526b49eef9d58f04bf6f08 and orderer type etcdraft" +orderer1.example.com | "2019-11-19 05:21:32.582 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:32.583 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer1.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer1.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer1.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer1.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer1.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer1.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer1.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer1.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-11-19 05:21:32.584 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-11-19 05:21:32.584 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-11-19 05:21:32.586 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-11-19 05:21:32.586 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-11-19 05:21:32.588 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-11-19 05:21:32.589 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-11-19 05:21:32.589 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer1.example.com | "2019-11-19 05:21:32.589 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:32.589 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:32.593 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:32.593 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:32.597 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: +orderer1.example.com | Version: 1.4.4 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.12.13 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2019-11-19 05:21:32.597 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" +orderer1.example.com | "2019-11-19 05:21:32.597 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:32.597 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:32.597 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:33.634 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:33.660 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:33.660 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01e 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:33.660 UTC [orderer.consensus.etcdraft] Step -> INFO 01f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] run -> INFO 020 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:33.664 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 021 Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:41.338 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 022 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2019-11-19 05:21:41.342 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +orderer1.example.com | "2019-11-19 05:21:41.350 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 024 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-11-19 05:21:41.351 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 025 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:41.357 UTC [orderer.commmon.multichannel] newChain -> INFO 026 Created and starting new chain businesschannel" +orderer1.example.com | "2019-11-19 05:21:41.358 UTC [orderer.consensus.etcdraft] Start -> INFO 027 Starting Raft node" channel=businesschannel node=2 +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [0e4 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +peer1.org1.example.com | [0e5 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +peer1.org1.example.com | [0e7 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:12006965676759780174 tag:EMPTY mem_req: > > , Envelope: 1108 bytes, Signature: 0 bytes +peer1.org1.example.com | [0e6 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.4 +peer1.org1.example.com | [0e8 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +peer1.org1.example.com | [0e9 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +peer1.org1.example.com | [0ea 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +peer1.org1.example.com | [0eb 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +peer1.org1.example.com | [0ec 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.4 +peer1.org1.example.com | [0ed 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.4 +peer1.org1.example.com | [0ee 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0ef 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0f0 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.4 +peer1.org1.example.com | [0f1 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.4" , sending back REGISTERED +peer1.org1.example.com | [0f2 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.4" +peer1.org1.example.com | [0f3 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.4" +peer1.org1.example.com | [0f4 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.4" +peer1.org1.example.com | [0f5 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0f6 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0f7 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [0f8 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [464d1919] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0f9 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU [464d1919] notifying Txid:464d1919-cfed-48bb-8666-1c24329d886f, channelID: +peer1.org1.example.com | [0fa 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0fb 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [0fc 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org1.example.com | [0fd 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org1.example.com | [0fe 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org1.example.com | [0ff 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [100 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [27c 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU [][c9b504ee] Entry chaincode: name:"qscc" +orderer1.example.com | "2019-11-19 05:21:41.358 UTC [orderer.common.cluster] Configure -> INFO 028 Entering, channel: businesschannel, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer1.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer1.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer1.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer1.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer1.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer1.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer1.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer1.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-11-19 05:21:41.358 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-11-19 05:21:41.358 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-11-19 05:21:41.359 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-11-19 05:21:41.359 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-11-19 05:21:41.359 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-11-19 05:21:41.360 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-11-19 05:21:41.361 UTC [orderer.common.cluster] Configure -> INFO 02f Exiting" +orderer1.example.com | "2019-11-19 05:21:41.361 UTC [orderer.consensus.etcdraft] start -> INFO 030 Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:41.362 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 031 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:41.363 UTC [orderer.consensus.etcdraft] newRaft -> INFO 032 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:41.363 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 033 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:41.366 UTC [orderer.consensus.etcdraft] apply -> INFO 034 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:41.366 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:41.367 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:42.457 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:42.468 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:42.468 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 039 2 became follower at term 2" channel=businesschannel node=2 +peer0.org1.example.com | [115 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [116 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [117 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [118 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7E1BB2E3BE998A09D543009B35AF51D6477036AAC5DCDDD822FB18DCCC04C8E7 +peer0.org1.example.com | [119 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [11a 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [11b 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [11c 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12006965676759780174, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2196 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [11d 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer0.org1.example.com | [11e 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12006965676759780174, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2196 bytes, Signature: 0 bytes +peer0.org1.example.com | [11f 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [120 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [121 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [122 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [124 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [123 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [125 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [126 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6265CB072B40698B7DDF852C699EDEC234BE4DEA9DCC434EDEAAB32D59C9CBF5 +peer0.org1.example.com | [128 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [129 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [12a 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [127 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [12b 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [12c 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [12d 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [12e 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes +peer0.org1.example.com | [12f 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [130 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +peer0.org1.example.com | [131 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [132 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +peer0.org1.example.com | [133 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 65 cb 07 2b 40 69 8b 7d df 85 2c 69 9e de c2 |be..+@i.}..,i...| +peer0.org1.example.com | 00000010 34 be 4d ea 9d cc 43 4e de aa b3 2d 59 c9 cb f5 |4.M...CN...-Y...| +peer0.org1.example.com | [134 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 4a 52 25 4d 81 28 a4 d5 9d 00 |0E.!..JR%M.(....| +peer0.org1.example.com | 00000010 70 22 de 70 2c 1f a7 58 62 a2 00 85 39 84 9d da |p".p,..Xb...9...| +peer0.org1.example.com | 00000020 63 be 05 11 b0 02 20 17 bf a1 83 d3 02 1d b5 c9 |c..... .........| +peer0.org1.example.com | 00000030 ca c1 98 16 fb 10 29 da c5 cd 60 36 b2 e3 fb fc |......)...`6....| +peer0.org1.example.com | 00000040 26 56 d0 9c fb b7 8d |&V.....| +peer0.org1.example.com | [135 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [136 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 38 64 bc d3 0b cf b0 db 9d 28 |0E.!..8d.......(| +peer0.org1.example.com | 00000010 cb 70 de 54 c6 3c 2c 17 a4 6c 94 b1 d7 39 55 02 |.p.T.<,..l...9U.| +peer0.org1.example.com | 00000020 1d be 50 70 01 02 20 44 36 fa a7 26 29 03 a8 1c |..Pp.. D6..&)...| +peer0.org1.example.com | 00000030 ec 82 cb dc 06 57 1f 2a 26 50 ec e0 de 1c ab f7 |.....W.*&P......| +peer0.org1.example.com | 00000040 72 d8 82 0f 13 e4 57 |r.....W| +peer1.org2.example.com | [27d 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> INFO [][c9b504ee] Entry chaincode: name:"qscc" +peer1.org2.example.com | [27e 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [27f 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org2.example.com | [280 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org2.example.com | [281 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [282 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [283 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [284 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [285 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [286 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer1.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer1.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer1.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer1.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [287 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67910 gate 1574140906186818300 evaluation starts +peer1.org2.example.com | [288 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [289 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67910 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [28a 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [28b 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67910 principal evaluation fails +peer1.org2.example.com | [28c 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67910 gate 1574140906186818300 evaluation fails +peer1.org2.example.com | [28d 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28e 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28f 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [290 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa720 gate 1574140906187986700 evaluation starts +peer1.org2.example.com | [291 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [292 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa720 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [293 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [294 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [295 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [296 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa720 principal matched by identity 0 +peer1.org2.example.com | [297 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 6f d3 55 dc aa 20 eb e7 83 f8 88 c5 33 1a df |.o.U.. ......3..| +peer1.org2.example.com | 00000010 71 d4 63 85 2e 89 86 5d 2b 9c 66 d6 65 ff c5 c2 |q.c....]+.f.e...| +peer1.org2.example.com | [298 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 b1 60 12 1d 6b b6 53 56 2a e6 e0 |0D. ".`..k.SV*..| +peer1.org2.example.com | 00000010 e4 69 d0 a5 eb ef 49 47 4b 71 a9 af be 52 53 0e |.i....IGKq...RS.| +peer1.org2.example.com | 00000020 57 56 63 f8 02 20 30 a0 3e e2 b3 84 62 39 87 f6 |WVc.. 0.>...b9..| +peer1.org2.example.com | 00000030 95 1f cd 5d ad 09 39 db fd bc 18 26 85 1a cc c8 |...]..9....&....| +peer1.org2.example.com | 00000040 6d 38 ba e0 50 40 |m8..P@| +peer1.org2.example.com | [299 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29a 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa720 gate 1574140906187986700 evaluation succeeds +peer1.org2.example.com | [29b 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29c 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29d 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29e 11-19 05:21:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [29f 11-19 05:21:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU [c9b504ee] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [2a0 11-19 05:21:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU [c9b504ee] notifying Txid:c9b504ee07733b4ee2f308e688a1ac6592a07d7d8a99db38d09bbd6d8b190435, channelID: +peer1.org2.example.com | [2a1 11-19 05:21:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [2a2 11-19 05:21:46.19 UTC] [%{longpkg}] %{callpath} -> INFO [][c9b504ee] Exit chaincode: name:"qscc" (8ms) +peer1.org2.example.com | [2a3 11-19 05:21:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU [][c9b504ee] Exit +peer1.org2.example.com | [2a4 11-19 05:21:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:35336 +peer1.org2.example.com | [2a5 11-19 05:21:46.19 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:35336 grpc.code=OK grpc.call_duration=13.3122ms +peer1.org2.example.com | [2a6 11-19 05:21:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2a7 11-19 05:21:47.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2a8 11-19 05:21:47.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151007 +peer1.org2.example.com | [2a9 11-19 05:21:47.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 857F4866C94C4094F3860A249C0FDC5C0966AB7038AE130050DA6E4561DA187A +peer1.org2.example.com | [2aa 11-19 05:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2ab 11-19 05:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2ac 11-19 05:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [137 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [138 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [139 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13a 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 4f 46 e6 38 a5 25 d6 2a e2 8c 84 7c 2c 2e 92 |.OF.8.%.*...|,..| +peer0.org1.example.com | 00000010 6e c9 ff 6d 7a 75 11 c1 6e b2 50 a3 cc b8 7e b3 |n..mzu..n.P...~.| +peer0.org1.example.com | [13b 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c a2 d7 5c f1 d9 a7 0d e6 09 81 4d |0D. L..\.......M| +peer0.org1.example.com | 00000010 1b f4 84 24 0e b7 52 6b 65 c5 c0 16 f4 6b a2 83 |...$..Rke....k..| +peer0.org1.example.com | 00000020 1c b2 ce 9f 02 20 08 66 6b 5d 30 c2 42 22 07 7d |..... .fk]0.B".}| +peer0.org1.example.com | 00000030 2d b6 ce 89 83 6a 5b 06 6a a2 23 2d d9 2d 16 83 |-....j[.j.#-.-..| +peer0.org1.example.com | 00000040 02 44 d1 80 14 59 |.D...Y| +peer0.org1.example.com | [13c 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [13d 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 1a 5d 2b 82 e6 4c 9a 25 8b 4f |0E.!...]+..L.%.O| +peer0.org1.example.com | 00000010 76 ca 8e 6b 96 54 5d b0 50 5d 8a 7c 6d 4b 7b fa |v..k.T].P].|mK{.| +peer0.org1.example.com | 00000020 f7 3a 29 cd 39 02 20 33 6a 8e f1 03 f2 29 cb 65 |.:).9. 3j....).e| +peer0.org1.example.com | 00000030 74 89 8c 60 03 e9 c1 63 f3 fd 9c 14 0a 2d eb c6 |t..`...c.....-..| +peer0.org1.example.com | 00000040 47 e9 9d 92 66 ca 93 |G...f..| +peer0.org1.example.com | [13e 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [13f 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [140 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [141 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [142 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [143 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [144 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [145 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [146 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [147 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [148 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 105AA20CD95A0A633547397D42081D8C941AF0B23B282E1242D27C8B7E0E84AC +peer0.org1.example.com | [149 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [14a 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [14b 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [14c 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [14d 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to peer1.org1.example.com:7051 +peer0.org1.example.com | [14e 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [14f 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [150 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [151 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [152 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [153 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [154 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8701889258896347820, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [155 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 4a 3d 37 1d 50 54 7a 09 18 4c ca 94 e8 c2 63 |.J=7.PTz..L....c| +peer0.org1.example.com | 00000010 fe ce 97 59 47 0e 19 d5 32 6c e4 1d 62 3f a6 d3 |...YG...2l..b?..| +peer0.org1.example.com | [156 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 42 0b 6e 3e 75 b8 b3 6b b2 f7 |0E.!..B.n>u..k..| +peer0.org1.example.com | 00000010 0f 22 ca 07 ef dd b1 ad fe fc 5a 34 e7 7f cf 3c |."........Z4...<| +peer0.org1.example.com | 00000020 e9 18 b5 53 8d 02 20 50 02 00 da e9 ef b0 c3 48 |...S.. P.......H| +peer0.org1.example.com | 00000030 f7 5d af ea 61 02 c9 4d 29 72 fe e2 6f 42 6f 71 |.]..a..M)r..oBoq| +peer0.org1.example.com | 00000040 83 80 a6 3e ea cc 77 |...>..w| +peer0.org1.example.com | [157 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8701889258896347820, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [158 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 69 116 74 120 69 56 69 56 48 101 56 103 51 104 103 47 118 49 73 88 99 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 80 102 111 117 43 101 66 81 80 122 113 10 51 78 70 87 83 68 43 101 119 75 121 102 77 100 75 79 75 75 112 102 99 104 52 47 104 76 68 47 48 113 52 48 87 53 49 98 82 108 68 84 75 111 76 119 52 73 67 104 121 111 76 79 51 69 90 117 118 90 57 55 100 98 112 119 10 105 113 99 97 66 101 90 68 55 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 76 53 52 122 43 102 79 74 76 54 51 75 110 105 69 120 72 109 98 77 115 48 100 115 107 69 53 102 43 77 106 111 66 79 52 90 78 122 106 89 57 65 50 65 105 65 109 103 70 81 50 10 81 112 81 85 69 114 48 104 49 108 43 75 117 76 55 73 118 84 85 107 98 73 118 79 122 116 113 113 48 99 76 111 54 105 112 114 53 81 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [159 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Added �o��X +peer0.org1.example.com | 8T)�YR�^",�:��uO�.��� to the in memory item map, total items: 2 +peer0.org1.example.com | [15a 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15b 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [15c 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [15d 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [15e 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15f 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\\:\003\320Z\000\260\346\373c\317\251*\023\374\016\270_^\235\367\002 m\332bOW\010\305\270g\016x\017\252vQS\372\346\216\007\354\330H\272\354#\246\255Q\230\310\033" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [160 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [161 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\\:\003\320Z\000\260\346\373c\317\251*\023\374\016\270_^\235\367\002 m\332bOW\010\305\270g\016x\017\252vQS\372\346\216\007\354\330H\272\354#\246\255Q\230\310\033" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [162 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c df 81 44 98 25 65 56 6c be 79 2e 07 ec 3c 02 |...D.%eVl.y...<.| +peer0.org1.example.com | 00000010 d6 23 af 9a 2b 44 45 d7 01 87 c3 28 95 64 10 3e |.#..+DE....(.d.>| +peer1.org1.example.com | [101 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org1.example.com | [102 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [103 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [104 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org1.example.com | [105 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [106 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0001ef080, CONNECTING +peer1.org1.example.com | [107 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [108 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [109 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org1.example.com | [10a 11-19 05:21:35.87 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org1.example.com | [10b 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org1.example.com | [10c 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org1.example.com | [10d 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0001ef080, READY +peer1.org1.example.com | [10e 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [10f 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org1.example.com | [110 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org1.example.com | [111 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [112 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org1.example.com | [113 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org1.example.com | [114 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 06 f2 c2 33 1f 84 36 a2 6f 07 c0 |0D. p...3..6.o..| +peer1.org1.example.com | 00000010 0e 8b f8 2e ae d6 aa 89 ea 0b 97 4a 6d fe 88 5d |...........Jm..]| +peer1.org1.example.com | 00000020 63 5e cd f3 02 20 7a 6b e7 99 10 33 97 20 b2 9c |c^... zk...3. ..| +peer1.org1.example.com | 00000030 87 b1 15 c0 88 0a 26 73 b6 b3 12 27 84 41 dc 15 |......&s...'.A..| +peer1.org1.example.com | 00000040 8c 90 16 17 88 d0 |......| +peer1.org1.example.com | [115 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org1.example.com | [116 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [117 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [118 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [119 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12006965676759780174, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2196 bytes, Signature: 0 bytes +peer1.org1.example.com | [11a 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 12006965676759780174, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2196 bytes, Signature: 0 bytes +peer1.org1.example.com | [11b 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11c 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12006965676759780174, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2196 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 13 1f 7b 5f d0 28 af 41 8b 4c 0e 3a 27 c7 d8 |...{_.(.A.L.:'..| +peer1.org1.example.com | 00000010 c2 e1 67 17 2d 97 cf 4f 82 b5 ed 09 65 c7 b5 69 |..g.-..O....e..i| +peer1.org1.example.com | [11e 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f e9 b9 e0 01 be 95 01 7a eb 38 55 |0D. /.......z.8U| +peer1.org1.example.com | 00000010 1b 60 cb 8c da ef bc bb aa d8 1d 7c a6 34 65 0e |.`.........|.4e.| +peer1.org1.example.com | 00000020 61 be 96 d9 02 20 72 7e 73 49 2d 1e 07 ad a8 a6 |a.... r~sI-.....| +peer1.org1.example.com | 00000030 b8 ca 59 17 36 f9 d0 16 f8 85 82 e2 5f 10 23 04 |..Y.6......._.#.| +peer1.org1.example.com | 00000040 c6 30 bc 83 c2 db |.0....| +peer1.org1.example.com | [11f 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [120 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 73 57 fc 66 1b b2 28 17 33 ee c2 |0D. !sW.f..(.3..| +peer1.org1.example.com | 00000010 0b 41 f9 05 5c e7 31 6f 87 03 d3 99 21 9d d0 55 |.A..\.1o....!..U| +peer1.org1.example.com | 00000020 b0 1f dd f9 02 20 27 a7 8f 5d 10 32 f8 dc bf af |..... '..].2....| +peer1.org1.example.com | 00000030 cb 38 c4 76 f9 2b 5e af d9 29 21 90 16 6e 32 32 |.8.v.+^..)!..n22| +peer1.org1.example.com | 00000040 bb bc 6f 2d 7f e0 |..o-..| +peer1.org1.example.com | [121 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [122 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [123 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [124 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 1b b2 e3 be 99 8a 09 d5 43 00 9b 35 af 51 d6 |~........C..5.Q.| +peer1.org1.example.com | 00000010 47 70 36 aa c5 dc dd d8 22 fb 18 dc cc 04 c8 e7 |Gp6.....".......| +peer1.org1.example.com | [125 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 ea 52 38 00 0b 11 bc 27 3c a9 f6 |0D. ..R8....'<..| +peer1.org1.example.com | 00000010 cd e9 9f 50 a0 dc 60 b0 4c ca 9e d7 09 64 67 25 |...P..`.L....dg%| +peer1.org1.example.com | 00000020 6b 7c 2e 4b 02 20 7d 27 f2 ff 4f fe f1 ff 6a a2 |k|.K. }'..O...j.| +peer1.org1.example.com | 00000030 92 9e 69 74 9e 80 ba 3f b0 11 f2 aa 22 48 66 3d |..it...?...."Hf=| +peer1.org1.example.com | 00000040 9a 53 d6 50 75 4a |.S.PuJ| +peer1.org1.example.com | [126 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [127 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 5d 7f a9 22 70 07 3c 66 2f 5e d2 |0D. 0].."p. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [129 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]} +peer0.org1.example.com | [163 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be f9 f9 cb 43 0c b9 67 81 8f 3e |0E.!.....C..g..>| +peer0.org1.example.com | 00000010 5c 3a 03 d0 5a 00 b0 e6 fb 63 cf a9 2a 13 fc 0e |\:..Z....c..*...| +peer0.org1.example.com | 00000020 b8 5f 5e 9d f7 02 20 6d da 62 4f 57 08 c5 b8 67 |._^... m.bOW...g| +peer0.org1.example.com | 00000030 0e 78 0f aa 76 51 53 fa e6 8e 07 ec d8 48 ba ec |.x..vQS......H..| +peer0.org1.example.com | 00000040 23 a6 ad 51 98 c8 1b |#..Q...| +peer0.org1.example.com | [164 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [165 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 45 cb f7 31 47 cd f1 3d 53 f0 |0E.!..E..1G..=S.| +peer0.org1.example.com | 00000010 5b c6 a7 2a 76 7a f9 99 71 84 f2 d2 98 57 9f 1f |[..*vz..q....W..| +peer0.org1.example.com | 00000020 4a ee 4a 1b 90 02 20 66 bd cd a4 6a ee bb 18 18 |J.J... f...j....| +peer0.org1.example.com | 00000030 b3 29 66 be bf b6 67 02 d2 d8 98 7d 4a 31 88 c1 |.)f...g....}J1..| +peer0.org1.example.com | 00000040 2c 97 36 9f cf 60 55 |,.6..`U| +peer0.org1.example.com | [166 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [167 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [168 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [169 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [16a 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [16b 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16c 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16d 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [16f 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2ad 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer1.org2.example.com | [2ae 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> INFO 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Becoming a leader +peer1.org2.example.com | [2af 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer1.org2.example.com | [2b0 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer1.org2.example.com | [2b1 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer1.org2.example.com | [2b2 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning true +peer1.org2.example.com | [2b3 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer1.org2.example.com | [2b4 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [2b5 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [2b6 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }] +peer1.org2.example.com | [2b7 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2b8 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D8F6B782FF999EEC1510021801 +peer1.org2.example.com | [2b9 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7416095FDE29C7C1CCE4963B9D12EE348CDED4BBA64FAC74DC11E09D65E19F0F +peer1.org2.example.com | [2ba 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +peer1.org2.example.com | [2bb 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [2bc 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002fe4450, CONNECTING +peer1.org2.example.com | [2bd 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002fe4450, READY +peer1.org2.example.com | [2be 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer1.example.com:7050 [OrdererMSP]} +peer1.org2.example.com | [2bf 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer1.example.com:7050 +peer1.org2.example.com | [2c0 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer1.example.com:7050 ... +peer1.org2.example.com | [2c1 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer1.org2.example.com | [2c2 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer1.org2.example.com | [2c3 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c4 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c5 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608EEF7CDEE0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer1.org2.example.com | [2c6 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 00C76EA10547D3EF4ABD753756FE927D741EDB611FEE53F3D6EC94698AE6E1F7 +peer1.org2.example.com | [2c7 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c8 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c9 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ca 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [2cb 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2cc 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2cd 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ce 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer1.org2.example.com | CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 +peer1.org2.example.com | +Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +peer1.org2.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +peer1.org2.example.com | LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +peer1.org2.example.com | rkc= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [2cf 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082230 gate 1574140910283806300 evaluation starts +peer1.org2.example.com | [2d0 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d1 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082230 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d2 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org2.example.com | [2d3 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [2d4 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082230 principal matched by identity 0 +peer1.org2.example.com | [2d5 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 0d 67 29 f2 dd c4 44 52 b4 64 a8 1f 10 48 f2 |..g)...DR.d...H.| +peer1.org2.example.com | 00000010 b8 ca 62 79 aa 7d b8 fd 4f c3 59 ec ca f2 d4 c0 |..by.}..O.Y.....| +peer1.org2.example.com | [2d6 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5e 71 4d 29 b8 62 52 b5 8f 10 |0E.!..^qM).bR...| +peer1.org2.example.com | 00000010 08 d1 28 d7 4e 48 91 21 b9 2d 62 76 1a 21 f5 c7 |..(.NH.!.-bv.!..| +peer1.org2.example.com | 00000020 6a 6f db 01 da 02 20 69 62 fa a9 16 65 97 6f 50 |jo.... ib...e.oP| +peer1.org2.example.com | 00000030 e3 26 90 3c e8 a4 da 6c e5 32 60 77 95 cd 48 c9 |.&.<...l.2`w..H.| +peer1.org2.example.com | 00000040 d4 ee d2 5a 59 63 26 |...ZYc&| +peer1.org2.example.com | [2d7 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082230 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d8 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082230 gate 1574140910283806300 evaluation succeeds +peer1.org2.example.com | [2d9 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2da 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2db 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2dc 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2dd 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [170 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\\:\003\320Z\000\260\346\373c\317\251*\023\374\016\270_^\235\367\002 m\332bOW\010\305\270g\016x\017\252vQS\372\346\216\007\354\330H\272\354#\246\255Q\230\310\033" secret_envelope: > alive: > +peer0.org1.example.com | [171 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +peer0.org1.example.com | [172 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [173 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [174 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [175 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [176 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [177 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [178 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [179 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [17a 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e9 d0 db f4 22 7f 72 d1 bd 61 22 94 a5 06 bf |.....".r..a"....| +peer0.org1.example.com | 00000010 23 cd d2 39 7c d9 a5 49 13 8b ab e0 60 f3 5c e2 |#..9|..I....`.\.| +peer0.org1.example.com | [17b 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 20 34 a5 da 8b 2c 83 98 20 b8 |0E.!.. 4...,.. .| +peer0.org1.example.com | 00000010 a0 aa 0a 57 9a 71 93 ab 78 22 f4 3e 13 76 1a 91 |...W.q..x".>.v..| +peer0.org1.example.com | 00000020 86 71 bf 1d 09 02 20 2b e8 e3 3e 17 d1 a4 ea 5d |.q.... +..>....]| +peer0.org1.example.com | 00000030 f3 d9 8d 3d 48 e5 51 6a 39 63 0d 7e ae f8 62 29 |...=H.Qj9c.~..b)| +peer0.org1.example.com | 00000040 a9 70 0e 6f e1 b7 62 |.p.o..b| +peer0.org1.example.com | [17c 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [153 11-19 05:21:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25807], isChainEmpty=[false], lastBlockNumber=[0] +peer0.org2.example.com | [154 11-19 05:21:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer0.org2.example.com | [155 11-19 05:21:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org2.example.com | [157 11-19 05:21:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-11-19 05:21:32.494 UTC [common.channelconfig] NewStandardValues -> DEBU 0e8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:32.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:32.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ea Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] NewStandardValues -> DEBU 0ee Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] NewStandardValues -> DEBU 0f0 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f1 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] validateMSP -> DEBU 0f2 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [msp] newBccspMsp -> DEBU 0f3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [msp] New -> DEBU 0f4 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [msp] Setup -> DEBU 0f5 Setting up MSP instance Org2MSP" +peer1.org2.example.com | [2de 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org2.example.com | [2df 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2e0 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [0] +peer1.org2.example.com | [2e1 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [2e2 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer1.org2.example.com | [2e3 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e4 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e5 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [2e6 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2e7 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2e8 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083ba0 gate 1574140910295222600 evaluation starts +peer1.org2.example.com | [2e9 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ea 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083ba0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2eb 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083ba0 principal matched by identity 0 +peer1.org2.example.com | [2ec 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 91 7f 7d a7 af 3c 87 a6 35 17 24 8d af 90 a3 |...}..<..5.$....| +peer1.org2.example.com | 00000010 9c 3f e8 16 83 d2 11 ae 07 62 88 c0 41 a0 bc 76 |.?.......b..A..v| +peer1.org2.example.com | [2ed 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 89 59 37 ed 6c ef 46 99 77 07 88 |0D. B.Y7.l.F.w..| +peer1.org2.example.com | 00000010 25 71 00 7a ca 4f fc d5 07 4b 3c 91 59 93 9c 26 |%q.z.O...K<.Y..&| +peer1.org2.example.com | 00000020 9d a1 c1 78 02 20 1a ad 4d ed 38 4f f6 87 77 4e |...x. ..M.8O..wN| +peer1.org2.example.com | 00000030 06 62 fc 50 54 7c b9 e6 b1 6e 8c 80 a3 be be 72 |.b.PT|...n.....r| +peer1.org2.example.com | 00000040 96 dc 8b 79 6a f8 |...yj.| +peer1.org2.example.com | [2ee 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083ba0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ef 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083ba0 gate 1574140910295222600 evaluation succeeds +peer1.org2.example.com | [2f0 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2f1 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2f2 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2f3 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2f4 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org2.example.com | [2f5 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org2.example.com | [2f6 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 2 blocks +peer1.org2.example.com | [2f7 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [0] +peer1.org2.example.com | [2f8 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [2f9 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer1.org2.example.com | [2fa 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer1.org2.example.com | [2fb 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2fc 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer1.org2.example.com | [2fd 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer1.org2.example.com | [2fe 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer1.org2.example.com | [2ff 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [300 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002f1f580 env 0xc00308e500 txn 0 +peer1.org2.example.com | [301 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00308e500 +peer1.org2.example.com | [302 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +peer1.org2.example.com | [303 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [304 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [305 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [306 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [307 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org2.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer1.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer1.org2.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer1.org2.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer1.org2.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer1.org2.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer1.org1.example.com | [12a 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [12b 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12c 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12d 11-19 05:21:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [12f 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [130 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [131 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [132 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [133 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes +peer1.org1.example.com | [134 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes +peer1.org1.example.com | [135 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [136 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes +peer1.org1.example.com | [137 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 65 cb 07 2b 40 69 8b 7d df 85 2c 69 9e de c2 |be..+@i.}..,i...| +peer1.org1.example.com | 00000010 34 be 4d ea 9d cc 43 4e de aa b3 2d 59 c9 cb f5 |4.M...CN...-Y...| +peer1.org1.example.com | [138 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 4a 52 25 4d 81 28 a4 d5 9d 00 |0E.!..JR%M.(....| +peer1.org1.example.com | 00000010 70 22 de 70 2c 1f a7 58 62 a2 00 85 39 84 9d da |p".p,..Xb...9...| +peer1.org1.example.com | 00000020 63 be 05 11 b0 02 20 17 bf a1 83 d3 02 1d b5 c9 |c..... .........| +peer1.org1.example.com | 00000030 ca c1 98 16 fb 10 29 da c5 cd 60 36 b2 e3 fb fc |......)...`6....| +peer1.org1.example.com | 00000040 26 56 d0 9c fb b7 8d |&V.....| +peer1.org1.example.com | [139 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +orderer1.example.com | "2019-11-19 05:21:42.468 UTC [orderer.consensus.etcdraft] Step -> INFO 03a 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:42.500 UTC [orderer.consensus.etcdraft] run -> INFO 03b raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:42.501 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03c Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:46.784 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:49.047 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:21:55.040 UTC [comm.grpc.server] 1 -> INFO 03f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.7:44438 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.7713723s +orderer1.example.com | "2019-11-19 05:22:32.675 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:22:35.624 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:22:38.420 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:22:54.090 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-11-19 05:22:54.093 UTC [cauthdsl] deduplicate -> WARN 044 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer1.example.com | "2019-11-19 05:22:54.097 UTC [cauthdsl] deduplicate -> WARN 045 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer0.org2.example.com | [158 11-19 05:21:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org2.example.com | [159 11-19 05:21:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [15a 11-19 05:21:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer0.org2.example.com | [156 11-19 05:21:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer0.org2.example.com | [15b 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [15c 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer0.org2.example.com | [15e 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [15f 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org2.example.com | [15d 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [160 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [161 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [162 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [163 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [164 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [165 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer0.org2.example.com | [166 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer0.org2.example.com | [167 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [168 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer0.org2.example.com | [169 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer0.org2.example.com | [16a 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org2.example.com | [16b 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer0.org2.example.com | [16c 11-19 05:21:43.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 44ms (state_validation=7ms block_and_pvtdata_commit=27ms state_commit=6ms) commitHash=[] +peer0.org2.example.com | [16d 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org2.example.com | [16e 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1e3a6ec8-ca08-43ec-840e-75577cee1d8b] +peer0.org2.example.com | [16f 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer0.org2.example.com | [170 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1e3a6ec8-ca08-43ec-840e-75577cee1d8b] +peer0.org2.example.com | [171 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [172 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [173 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [174 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [175 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [176 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [177 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [178 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [179 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [17a 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [17b 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [17c 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [17d 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [17e 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [17f 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [180 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [181 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [182 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [183 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [184 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [185 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [186 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org2.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org2.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org2.example.com | 1g== +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [13a 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 38 64 bc d3 0b cf b0 db 9d 28 |0E.!..8d.......(| +peer1.org1.example.com | 00000010 cb 70 de 54 c6 3c 2c 17 a4 6c 94 b1 d7 39 55 02 |.p.T.<,..l...9U.| +peer1.org1.example.com | 00000020 1d be 50 70 01 02 20 44 36 fa a7 26 29 03 a8 1c |..Pp.. D6..&)...| +peer1.org1.example.com | 00000030 ec 82 cb dc 06 57 1f 2a 26 50 ec e0 de 1c ab f7 |.....W.*&P......| +peer1.org1.example.com | 00000040 72 d8 82 0f 13 e4 57 |r.....W| +peer1.org1.example.com | [13b 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [13c 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [13d 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [13e 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [13f 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [140 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [141 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [142 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [143 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [144 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [145 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [146 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF4F46E638A525D62AE28C847C2C2E926EC9FF6D7A7511C16EB250A3CCB87EB3 +peer1.org1.example.com | [147 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [148 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [149 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [14a 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [17d 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 90 73 ff 3a 9d 34 52 50 b3 72 |0E.!...s.:.4RP.r| +peer0.org1.example.com | 00000010 a4 1f 67 47 fb c6 7d d8 24 a0 07 00 f8 28 bf 37 |..gG..}.$....(.7| +peer0.org1.example.com | 00000020 43 97 44 bf 55 02 20 12 b7 9d 69 1f c4 5a 96 35 |C.D.U. ...i..Z.5| +peer0.org1.example.com | 00000030 b3 28 2f 94 00 70 5e 0f 18 50 c5 16 ad a3 70 43 |.(/..p^..P....pC| +peer0.org1.example.com | 00000040 77 3d 57 bf 4a 44 16 |w=W.JD.| +peer0.org1.example.com | [17e 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [17f 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [180 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [181 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [182 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [183 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [184 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [185 11-19 05:21:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [186 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [187 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [188 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [189 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18a 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org2.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer1.org2.example.com | fQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [308 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer1.org2.example.com | [309 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [30a 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [30b 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 24 ac 10 46 16 fe ce bb 6e 57 f7 c2 1e a1 d7 |.$..F....nW.....| +peer1.org2.example.com | 00000010 ca f6 e7 e8 44 8c cd d1 bf f4 d7 40 94 11 a4 79 |....D......@...y| +peer1.org2.example.com | [30c 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 c4 5b a3 d3 2b 64 c0 35 61 d6 |0E.!...[..+d.5a.| +peer1.org2.example.com | 00000010 95 cb 42 f3 53 ed ef ed 72 82 6d 75 eb c7 a6 cf |..B.S...r.mu....| +peer1.org2.example.com | 00000020 f1 06 36 11 63 02 20 1c 0c c7 c4 d6 6e e7 f0 43 |..6.c. .....n..C| +peer1.org2.example.com | 00000030 67 71 a7 fd 4f 11 0f ce c9 86 9f 83 ad a4 58 be |gq..O.........X.| +peer1.org2.example.com | 00000040 b3 5c 64 f4 e2 dd 4d |.\d...M| +peer1.org2.example.com | [30d 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [30e 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0030e8000, header channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +peer1.org2.example.com | [30f 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [310 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [311 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [312 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [313 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [314 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [315 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [316 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [317 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [318 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [319 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [31a 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [31b 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [31c 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31d 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [31e 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [31f 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [320 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer1.org2.example.com | [321 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [322 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [323 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [324 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [325 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [326 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [327 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer1.org2.example.com | [328 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [329 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [32a 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer1.org2.example.com | [32b 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org2.example.com | [32c 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32d 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org2.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer1.org2.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer1.org2.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [32e 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310d390 gate 1574140910321777300 evaluation starts +peer1.org2.example.com | [32f 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310d390 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [330 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310d390 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [331 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org2.example.com | [332 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [18b 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [18c 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18d 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [18e 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [18f 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 90F0135A7B04F96E8F9A8A398155140581224961659F6B7A377BF9647A84E2D9 +peer0.org1.example.com | [190 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [191 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [192 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [193 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [194 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes +peer0.org1.example.com | [195 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [196 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +peer0.org1.example.com | [197 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [198 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +peer0.org1.example.com | [199 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 f0 13 5a 7b 04 f9 6e 8f 9a 8a 39 81 55 14 05 |...Z{..n...9.U..| +peer0.org1.example.com | 00000010 81 22 49 61 65 9f 6b 7a 37 7b f9 64 7a 84 e2 d9 |."Iae.kz7{.dz...| +peer0.org1.example.com | [19a 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 e3 3a 5a ab 86 b1 fd c8 d0 39 |0E.!...:Z......9| +peer0.org1.example.com | 00000010 2e 48 38 ad 8c 5d 55 70 7d 01 4e cc 4c c9 7a bc |.H8..]Up}.N.L.z.| +peer0.org1.example.com | 00000020 66 31 79 f1 46 02 20 75 6f 92 53 fd d2 ff 40 a1 |f1y.F. uo.S...@.| +peer0.org1.example.com | 00000030 22 a5 f3 22 b5 5c fa 34 08 b0 b6 e0 f9 67 6b cc |"..".\.4.....gk.| +peer0.org1.example.com | 00000040 fd 17 9c 6b 01 b2 1d |...k...| +peer0.org1.example.com | [19b 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [19c 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c1 21 f5 7b 0d 1e 97 ec c0 a1 37 |0D. =.!.{......7| +peer0.org1.example.com | 00000010 48 f3 94 38 32 14 24 d1 20 d4 74 2e bc 9c f2 53 |H..82.$. .t....S| +peer0.org1.example.com | 00000020 e9 e5 b4 39 02 20 02 83 4d 8b 42 9f d4 62 71 b2 |...9. ..M.B..bq.| +peer0.org1.example.com | 00000030 88 f9 09 eb 81 20 ee ee 18 ce 75 84 22 e4 fd 16 |..... ....u."...| +peer0.org1.example.com | 00000040 5f bf ca 87 01 f2 |_.....| +peer1.org2.example.com | [333 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [334 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [335 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org2.example.com | [336 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [337 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310d390 principal matched by identity 0 +peer1.org2.example.com | [338 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +peer1.org2.example.com | 00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.| +peer1.org2.example.com | [339 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +peer1.org2.example.com | 00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +peer1.org2.example.com | 00000020 9d 53 74 88 4b 02 20 0b f6 9b f4 5d 00 74 ee 9d |.St.K. ....].t..| +peer1.org2.example.com | 00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +peer1.org2.example.com | 00000040 4d ed a9 9c dd 40 ef |M....@.| +peer1.org2.example.com | [33a 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310d390 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [33b 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310d390 gate 1574140910321777300 evaluation succeeds +peer1.org2.example.com | [33c 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [33d 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [33e 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [33f 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [340 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [341 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [342 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [343 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [344 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [345 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [346 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [347 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [348 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [349 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [34a 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [34b 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [34c 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [34d 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [34e 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [34f 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [350 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [351 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [352 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [353 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [354 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [355 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [356 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [357 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [358 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [359 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [35a 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [35b 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [35c 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [35d 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [35e 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [35f 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [360 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [361 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [362 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [363 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [364 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [365 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [19d 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [19e 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [19f 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a0 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a1 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45510 +peer0.org1.example.com | [1a2 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003d7d60 +peer0.org1.example.com | [1a3 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [1a4 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [1a5 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a6 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [1a7 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [1a8 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [1a9 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1aa 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [1ab 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 cb 23 14 5e d3 36 37 12 a3 53 49 2a 0a ad 69 |d.#.^.67..SI*..i| +peer0.org1.example.com | 00000010 cc ba 45 05 e6 90 b8 05 5c f0 df 00 80 52 72 ee |..E.....\....Rr.| +peer0.org1.example.com | [1ac 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 30 6d 48 ec 10 25 72 3c d1 ab 46 |0D. z0mH..%r<..F| +peer0.org1.example.com | 00000010 9e 9d 51 a7 aa 52 2e 54 1a 8d 6d 37 5f 23 52 da |..Q..R.T..m7_#R.| +peer0.org1.example.com | 00000020 54 c7 5a ec 02 20 43 b6 40 7a 75 88 74 24 0c da |T.Z.. C.@zu.t$..| +peer0.org1.example.com | 00000030 f4 6d 85 74 03 74 6c b4 4c 3d d8 7a 40 a3 b5 e8 |.m.t.tl.L=.z@...| +peer0.org1.example.com | 00000040 80 40 c0 b6 4a 0a |.@..J.| +peer0.org1.example.com | [1ad 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [1ae 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002d4bd0, header 0xc0004e66e0 +peer0.org1.example.com | [1af 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [1b0 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU [][be1244ac] processing txid: be1244acf911906f8b806b6291a8f298e20c46e9b60e3fcd32a10299e7379308 +peer0.org1.example.com | [1b1 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU [][be1244ac] Entry chaincode: name:"cscc" +peer0.org1.example.com | [1b2 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> INFO [][be1244ac] Entry chaincode: name:"cscc" +peer0.org1.example.com | [1b3 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [1b4 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer0.org1.example.com | [1b5 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [1b6 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [1b7 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [1b8 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1b9 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [1ba 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1bb 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 cb 23 14 5e d3 36 37 12 a3 53 49 2a 0a ad 69 |d.#.^.67..SI*..i| +peer0.org1.example.com | 00000010 cc ba 45 05 e6 90 b8 05 5c f0 df 00 80 52 72 ee |..E.....\....Rr.| +peer0.org1.example.com | [1bc 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 30 6d 48 ec 10 25 72 3c d1 ab 46 |0D. z0mH..%r<..F| +peer0.org1.example.com | 00000010 9e 9d 51 a7 aa 52 2e 54 1a 8d 6d 37 5f 23 52 da |..Q..R.T..m7_#R.| +peer0.org1.example.com | 00000020 54 c7 5a ec 02 20 43 b6 40 7a 75 88 74 24 0c da |T.Z.. C.@zu.t$..| +peer0.org1.example.com | 00000030 f4 6d 85 74 03 74 6c b4 4c 3d d8 7a 40 a3 b5 e8 |.m.t.tl.L=.z@...| +peer0.org1.example.com | 00000040 80 40 c0 b6 4a 0a |.@..J.| +peer0.org1.example.com | [1bd 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [1be 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org1.example.com | [1bf 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org1.example.com | [1c0 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer0.org1.example.com | [1c1 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer0.org1.example.com | [1c2 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org1.example.com | [1c3 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org1.example.com | [1c4 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer0.org1.example.com | [1c5 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org1.example.com | [1c6 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org1.example.com | [1c7 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org1.example.com | [1c8 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000505aa0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer0.org1.example.com | [1c9 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org1.example.com | [1ca 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org1.example.com | [1cc 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer0.org1.example.com | [1cd 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer0.org1.example.com | [1ce 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer0.org1.example.com | [1cb 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer0.org1.example.com | [1d0 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer0.org1.example.com | [1d1 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer0.org1.example.com | [1d2 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer0.org1.example.com | [1cf 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer0.org1.example.com | [1d3 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer0.org1.example.com | [1d4 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer0.org1.example.com | [1d5 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer0.org1.example.com | [1d6 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer0.org1.example.com | [1d7 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [1d8 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org1.example.com | [1d9 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org1.example.com | [1da 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org1.example.com | [1db 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org1.example.com | [1dc 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [1dd 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [1de 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [1df 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer0.org1.example.com | [1e0 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [1e1 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [1e2 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [1e3 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [1e4 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [187 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [14b 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e5 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [366 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [14c 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e6 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [367 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [368 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [14d 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [369 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [14e 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e7 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [36a 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [14f 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e8 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org1.example.com | [1e9 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [1ea 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [150 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [151 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eb 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0026f0600)} +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [152 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [153 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org1.example.com | [154 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org1.example.com | [1ec 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [155 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [1ed 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org1.example.com | [156 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | [157 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5a a2 0c d9 5a 0a 63 35 47 39 7d 42 08 1d 8c |.Z...Z.c5G9}B...| +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org1.example.com | [1ee 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | 00000010 94 1a f0 b2 3b 28 2e 12 42 d2 7c 8b 7e 0e 84 ac |....;(..B.|.~...| +peer1.org2.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org1.example.com | [1ef 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer0.org2.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org1.example.com | [158 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 7d 0b cb 89 eb 4a 45 5c 9a 2e |0E.!..}....JE\..| +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [1f0 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer0.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | 00000010 9e 43 19 7e 3f b9 de 2f 24 e2 b6 6b 96 e0 79 22 |.C.~?../$..k..y"| +peer1.org1.example.com | 00000020 c3 ec 17 5e 3d 02 20 4f 59 65 00 88 c1 a8 42 3c |...^=. OYe....B<| +peer0.org1.example.com | [1f1 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer0.org2.example.com | [188 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org1.example.com | 00000030 c8 1d e6 90 19 44 a1 53 c4 75 4c 23 ac ab 82 8f |.....D.S.uL#....| +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | [1f2 11-19 05:21:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer0.org2.example.com | [189 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | 00000040 05 b1 31 ff 3a 60 2a |..1.:`*| +peer1.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org1.example.com | [1f3 11-19 05:21:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xeb, 0xcd, 0x1f, 0x7, 0xa0, 0x44, 0x7e, 0xdb, 0xb0, 0xc3, 0xd8, 0x38, 0xb2, 0x31, 0xa, 0x6d, 0xa6, 0x14, 0x14, 0x86, 0xef, 0x53, 0x16, 0x8b, 0x27, 0xf5, 0x83, 0xcc, 0x3e, 0xcb, 0xfd, 0x8c} txOffsets= +peer0.org2.example.com | [18a 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org1.example.com | [159 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org1.example.com | txId=92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426 locPointer=offset=39, bytesLength=25761 +peer0.org2.example.com | [18b 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | 1g== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [36b 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org2.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org2.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [36c 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [36d 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [36e 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [36f 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [370 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [371 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [372 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [373 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [374 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [375 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [376 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [377 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [378 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [379 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org2.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org2.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org2.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [37a 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [37b 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [37c 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [37d 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [37e 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | [37f 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [380 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [381 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [382 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [383 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [384 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [385 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [386 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [387 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [388 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [389 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [38a 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [38b 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [15a 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 6e d3 42 66 f5 cc 83 0f f3 0d |0E.!..n.Bf......| +peer1.org1.example.com | 00000010 78 a9 69 ec 7d 79 d2 a3 1d 20 cd 76 ec 8c f2 0e |x.i.}y... .v....| +peer1.org1.example.com | 00000020 53 a8 70 37 e7 02 20 04 73 26 9c bb 88 b1 a8 66 |S.p7.. .s&.....f| +peer1.org1.example.com | 00000030 57 a5 ef 0c 78 ef ff 9e 13 59 d6 1f c6 4d 6e 86 |W...x....Y...Mn.| +peer1.org1.example.com | 00000040 2f ef de 12 53 ae 09 |/...S..| +peer1.org1.example.com | [15b 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [15c 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [15d 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [15e 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [15f 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [160 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [161 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [162 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [163 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [164 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [165 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [166 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [167 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [168 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [169 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [16a 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16c 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [16d 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CDF8144982565566CBE792E07EC3C02D623AF9A2B4445D70187C3289564103E +peer1.org1.example.com | [16e 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16f 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [170 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [171 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\\:\003\320Z\000\260\346\373c\317\251*\023\374\016\270_^\235\367\002 m\332bOW\010\305\270g\016x\017\252vQS\372\346\216\007\354\330H\272\354#\246\255Q\230\310\033" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [172 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\\:\003\320Z\000\260\346\373c\317\251*\023\374\016\270_^\235\367\002 m\332bOW\010\305\270g\016x\017\252vQS\372\346\216\007\354\330H\272\354#\246\255Q\230\310\033" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer1.org1.example.com | [173 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [174 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +peer1.org1.example.com | [175 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +peer1.org1.example.com | [176 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [177 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +peer1.org1.example.com | [178 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c df 81 44 98 25 65 56 6c be 79 2e 07 ec 3c 02 |...D.%eVl.y...<.| +peer1.org1.example.com | 00000010 d6 23 af 9a 2b 44 45 d7 01 87 c3 28 95 64 10 3e |.#..+DE....(.d.>| +peer0.org1.example.com | ] +peer0.org1.example.com | [1f4 11-19 05:21:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to txid-index +peer0.org1.example.com | [1f5 11-19 05:21:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx number:[0] ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to blockNumTranNum index +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] NewStandardValues -> DEBU 0f7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f8 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.495 UTC [common.channelconfig] validateMSP -> DEBU 0f9 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [msp] newBccspMsp -> DEBU 0fa Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [msp] New -> DEBU 0fb Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [msp] Setup -> DEBU 0fc Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [msp.identity] newIdentity -> DEBU 0fd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [common.channelconfig] NewStandardValues -> DEBU 0fe Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ff Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 100 Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 101 Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 102 Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 104 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [common.channelconfig] NewStandardValues -> DEBU 105 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [common.channelconfig] initializeProtosStruct -> DEBU 106 Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [common.channelconfig] NewStandardValues -> DEBU 107 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [common.channelconfig] initializeProtosStruct -> DEBU 108 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [common.channelconfig] validateMSP -> DEBU 109 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [msp] newBccspMsp -> DEBU 10a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [msp] New -> DEBU 10b Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [msp] Setup -> DEBU 10c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [msp.identity] newIdentity -> DEBU 10d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [msp.identity] newIdentity -> DEBU 10e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [msp] Validate -> DEBU 10f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [msp] Setup -> DEBU 110 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:32.497 UTC [msp] Setup -> DEBU 111 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 113 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 114 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 115 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 116 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 117 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org2.example.com | [38c 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [38d 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [38e 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [38f 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [390 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org2.example.com | [391 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [392 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [393 11-19 05:21:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [394 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [395 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [396 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [397 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [398 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [399 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [39a 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [39b 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [39c 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [39d 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [39e 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [39f 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [3a0 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3a1 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [3a2 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [3a3 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [3a4 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [3a5 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [3a6 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [3a7 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [3a8 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [3a9 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [3aa 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [3ab 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [3ac 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [3ad 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [3ae 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [3af 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [3b0 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [3b1 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [3b2 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [3b3 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b4 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [3b5 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [3b6 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [3b7 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [3b8 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b9 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [3ba 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [3bb 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [3bc 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [3bd 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [3be 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [3bf 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [3c0 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [3c1 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [3c2 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [3c3 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [3c4 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [3c5 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 118 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 119 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] GetPolicy -> DEBU 122 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] GetPolicy -> DEBU 125 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:32.498 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [orderer.common.server] createLedgerFactory -> DEBU 14e Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2019-11-19 05:21:32.500 UTC [kvledger.util] CreateDirIfMissing -> DEBU 14f CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2019-11-19 05:21:32.501 UTC [kvledger.util] logDirStatus -> DEBU 150 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2019-11-19 05:21:32.501 UTC [kvledger.util] logDirStatus -> DEBU 151 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 152 Bootstrapping because no existing channels" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 153 Selected bootstrap block, because system channel last config block is nil" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] NewStandardValues -> DEBU 154 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157 Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 158 Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [common.channelconfig] NewStandardValues -> DEBU 161 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [common.channelconfig] NewStandardValues -> DEBU 163 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [common.channelconfig] validateMSP -> DEBU 165 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [msp] newBccspMsp -> DEBU 166 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [msp] New -> DEBU 167 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.516 UTC [msp] Setup -> DEBU 168 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:32.518 UTC [msp.identity] newIdentity -> DEBU 169 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.518 UTC [msp.identity] newIdentity -> DEBU 16a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.519 UTC [msp] Validate -> DEBU 16b MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:32.521 UTC [common.channelconfig] NewStandardValues -> DEBU 16c Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-11-19 05:21:32.521 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-11-19 05:21:32.521 UTC [common.channelconfig] NewStandardValues -> DEBU 16e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.521 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.522 UTC [common.channelconfig] validateMSP -> DEBU 170 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.522 UTC [msp] newBccspMsp -> DEBU 171 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.522 UTC [msp] New -> DEBU 172 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.522 UTC [msp] Setup -> DEBU 173 Setting up MSP instance Org2MSP" +peer0.org2.example.com | [18c 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [18d 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [18e 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [18f 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [190 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org2.example.com | [191 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [192 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [193 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [194 11-19 05:21:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [195 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [196 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [197 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [198 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [199 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [19a 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer0.org2.example.com | [19b 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [19c 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [19d 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [19e 11-19 05:21:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [19f 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org2.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org2.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org2.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [1a0 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [1a1 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [1a2 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [1a3 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | [1a4 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [1a5 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [1a6 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [1a7 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [1a8 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [1a9 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org2.example.com | [1aa 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [1ab 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [1ac 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [1ad 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [1ae 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [1af 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1b0 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1b1 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1b2 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [1b3 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [1b4 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [1b5 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [1b6 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [1b7 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [1b8 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [1b9 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [1ba 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [1bb 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1bc 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [1bd 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [1be 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [1bf 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [1c0 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [1c1 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [1c2 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [1c3 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [1c4 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [1c5 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [1c6 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [1c7 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [1c8 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [1c9 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [1ca 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [1cb 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [1cc 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1cd 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [1ce 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [1cf 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [1d0 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [1d1 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [1d2 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d3 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [1d4 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [1d5 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [1d6 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [1d7 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [1d8 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [1d9 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [1da 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [1db 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [1dc 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [1dd 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [1de 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [1df 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [1e0 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [1e1 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [1e2 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [1e3 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [1e4 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [1e5 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [1e6 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [1e7 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [1e8 11-19 05:21:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [1e9 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [1ea 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [1eb 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [1ec 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [1ed 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [1ee 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [3c6 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [3c7 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [3c8 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [3c9 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [3ca 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [3cb 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [3cc 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [3cd 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3ce 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3cf 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [3d0 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [3d1 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [3d2 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [3d3 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [3d4 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [3d5 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [3d6 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3d7 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3d8 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [3d9 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [3da 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [3db 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [3dc 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [3dd 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [3de 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [3df 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [3e0 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [3e1 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [3e2 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [3e3 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org2.example.com | [3e4 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [3e5 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [3e6 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [3e7 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [3e8 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e9 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [3ea 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [3eb 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [3ec 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [3ed 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [3ee 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [3ef 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [3f0 11-19 05:21:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003228d40, CONNECTING +peer1.org2.example.com | [3f1 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003228d40, READY +peer1.org2.example.com | [3f2 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3f3 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer1.org2.example.com | [3f4 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer1.org2.example.com | [3f5 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [3f6 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org2.example.com | [3f7 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f8 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f9 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer1.org2.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer1.org2.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer1.org2.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3fa 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [3fb 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [3fc 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3fd 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fe 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ff 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [400 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [401 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [402 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [403 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [404 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [405 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [406 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [407 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be150 gate 1574140910367411300 evaluation starts +peer1.org2.example.com | [408 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [409 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be150 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [40a 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [40b 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [40c 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [40d 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be150 principal matched by identity 0 +peer1.org2.example.com | [40e 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org2.example.com | [40f 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 24 ca 3d c3 22 33 c4 45 4c 5f c9 |0D. E$.=."3.EL_.| +peer1.org2.example.com | 00000010 5a 8b fa d4 3b 0b 5a 8b 0f e9 16 52 64 ca 24 e1 |Z...;.Z....Rd.$.| +peer1.org2.example.com | 00000020 b3 a9 0c 9a 02 20 08 a0 a7 1a 3d 09 5c c2 e3 43 |..... ....=.\..C| +peer1.org2.example.com | 00000030 24 95 c4 ad 1d 78 20 85 10 3d 99 02 f3 fa 71 39 |$....x ..=....q9| +peer1.org2.example.com | 00000040 f3 ec 1a 8c d4 2a |.....*| +peer1.org2.example.com | [410 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be150 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [411 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be150 gate 1574140910367411300 evaluation succeeds +peer1.org2.example.com | [412 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [413 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [414 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [415 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [416 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org2.example.com | [417 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [418 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [419 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15100B +peer1.org2.example.com | [41a 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 27412291E2AF317447BB7F06CDE662A6C07D7B1F8D862B443F75DCD993D15CAE +peer1.org2.example.com | [41c 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [41d 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [41e 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [41f 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [41b 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [420 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [421 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [422 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [423 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [424 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [425 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [426 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002f1f580 env 0xc00308e500 txn 0 +peer1.org2.example.com | [427 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [428 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 80ms +peer1.org2.example.com | [429 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [42a 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [42b 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [42c 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer1.org2.example.com | [42d 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [42e 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [42f 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [430 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer1.org2.example.com | [431 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [432 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [433 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [434 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [435 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [436 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [437 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [1f6 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25807], isChainEmpty=[false], lastBlockNumber=[0] +peer0.org1.example.com | [1f7 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer0.org1.example.com | [1f8 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org1.example.com | [1fa 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org1.example.com | [1fb 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org1.example.com | [1fc 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org1.example.com | [1fd 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer0.org1.example.com | [1f9 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer0.org1.example.com | [1fe 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [1ff 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [200 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer0.org1.example.com | [201 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org1.example.com | [202 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org1.example.com | [203 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [204 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [205 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [206 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [207 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer0.org1.example.com | [208 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [20a 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer0.org1.example.com | [20b 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer0.org1.example.com | [20c 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [209 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer0.org1.example.com | [20d 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org1.example.com | [20e 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer0.org1.example.com | [20f 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 28ms (state_validation=4ms block_and_pvtdata_commit=14ms state_commit=7ms) commitHash=[] +peer0.org1.example.com | [210 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org1.example.com | [211 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [cbe0e0a1-d6f1-41ea-b9ad-c1c9bcb013b9] +peer0.org1.example.com | [212 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer0.org1.example.com | [213 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cbe0e0a1-d6f1-41ea-b9ad-c1c9bcb013b9] +peer0.org1.example.com | [214 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [215 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [216 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [217 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [218 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [219 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [21a 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [21b 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [21c 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [21d 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [21e 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [21f 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [220 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [221 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org1.example.com | [222 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [223 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [224 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [225 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [226 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [227 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [228 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [229 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [22a 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [22b 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer0.org1.example.com | [22c 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [22d 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [22e 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [22f 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [230 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [231 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [232 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [233 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [234 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [235 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [236 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [237 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [238 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [239 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [23a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [23b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [23c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [23d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [23e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [23f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [240 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org1.example.com | 1g== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [241 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [242 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [243 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [244 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [245 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [246 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [247 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org1.example.com | [248 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [249 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org1.example.com | [24a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [24b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [24c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [24d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [24e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [24f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [250 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [1ef 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [1f0 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [1f1 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [1f2 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [1f3 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [1f4 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [1f5 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [1f6 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [1f7 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [1f8 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [1f9 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [1fa 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [1fb 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [1fc 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [1fd 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [1fe 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org2.example.com | [1ff 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [200 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [201 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [202 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org2.example.com | [203 11-19 05:21:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [204 11-19 05:21:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [205 11-19 05:21:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [206 11-19 05:21:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [207 11-19 05:21:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [208 11-19 05:21:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org2.example.com | [209 11-19 05:21:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org2.example.com | [20a 11-19 05:21:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org2.example.com | [20b 11-19 05:21:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [20c 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [20d 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org2.example.com | [20e 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org2.example.com | [20f 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org2.example.com | [210 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org2.example.com | [211 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org2.example.com | [212 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [213 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E12140898B48782FE999EEC15...3FF04E590AF5F9A12CFD445B2A020801 +peer0.org2.example.com | [214 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 073109E089E7E57348761A03F1F32220896880006805C4825F2E38A75A042B28 +peer0.org2.example.com | [215 11-19 05:21:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org2.example.com | [216 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org2.example.com | [219 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org2.example.com | [217 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [218 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [21a 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [21b 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [a977175b-b6da-4e92-a92d-0cf8fe696d28] +peer0.org2.example.com | [21c 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [21d 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU [a977175b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [21e 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU [a977175b] notifying Txid:a977175b-b6da-4e92-a92d-0cf8fe696d28, channelID:businesschannel +peer0.org2.example.com | [21f 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [220 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [221 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a977175b-b6da-4e92-a92d-0cf8fe696d28] +peer0.org2.example.com | [222 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [223 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [adda4de9-cd55-4df5-86a3-c4b5d3a8380a] +peer0.org2.example.com | [224 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [225 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [226 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU [adda4de9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [227 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU [adda4de9] notifying Txid:adda4de9-cd55-4df5-86a3-c4b5d3a8380a, channelID:businesschannel +peer0.org2.example.com | [228 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [229 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org1.example.com | [179 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be f9 f9 cb 43 0c b9 67 81 8f 3e |0E.!.....C..g..>| +peer1.org1.example.com | 00000010 5c 3a 03 d0 5a 00 b0 e6 fb 63 cf a9 2a 13 fc 0e |\:..Z....c..*...| +peer1.org1.example.com | 00000020 b8 5f 5e 9d f7 02 20 6d da 62 4f 57 08 c5 b8 67 |._^... m.bOW...g| +peer1.org1.example.com | 00000030 0e 78 0f aa 76 51 53 fa e6 8e 07 ec d8 48 ba ec |.x..vQS......H..| +peer1.org1.example.com | 00000040 23 a6 ad 51 98 c8 1b |#..Q...| +peer1.org1.example.com | [17a 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [17b 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 45 cb f7 31 47 cd f1 3d 53 f0 |0E.!..E..1G..=S.| +peer1.org1.example.com | 00000010 5b c6 a7 2a 76 7a f9 99 71 84 f2 d2 98 57 9f 1f |[..*vz..q....W..| +peer1.org1.example.com | 00000020 4a ee 4a 1b 90 02 20 66 bd cd a4 6a ee bb 18 18 |J.J... f...j....| +peer1.org1.example.com | 00000030 b3 29 66 be bf b6 67 02 d2 d8 98 7d 4a 31 88 c1 |.)f...g....}J1..| +peer1.org1.example.com | 00000040 2c 97 36 9f cf 60 55 |,.6..`U| +peer1.org1.example.com | [17c 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [17d 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [17e 11-19 05:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17f 11-19 05:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [180 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [181 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [182 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B8E9D0DBF4227F72D1BD612294A506BF23CDD2397CD9A549138BABE060F35CE2 +peer1.org1.example.com | [183 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [184 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [185 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [186 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [187 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to peer0.org1.example.com:7051 +peer1.org1.example.com | [188 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [189 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [18a 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18b 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 335521828874569540, Envelope: 956 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 335521828874569540, Envelope: 956 bytes, Signature: 0 bytes +peer1.org1.example.com | [18d 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 fb 10 d3 c1 45 7f 72 73 57 f6 d5 57 e9 31 28 |.....E.rsW..W.1(| +peer1.org1.example.com | 00000010 64 f3 fc 1a e0 bf 8d d0 e1 50 bf 24 6e 3c c1 e9 |d........P.$n<..| +peer1.org1.example.com | [18e 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d e8 15 00 90 fc 0d 45 af de a9 f4 |0D. .......E....| +peer1.org1.example.com | 00000010 25 cc 00 39 97 25 76 48 a5 8a 62 48 4d ee 08 04 |%..9.%vH..bHM...| +peer1.org1.example.com | 00000020 c4 93 d5 fc 02 20 5f 50 02 65 6c 97 9e 4f 71 99 |..... _P.el..Oq.| +peer1.org1.example.com | 00000030 87 da fd b3 b3 7c dc 00 e4 10 89 cd d4 6f 76 b0 |.....|.......ov.| +peer1.org1.example.com | 00000040 ed 31 25 ac 1a eb |.1%...| +peer1.org1.example.com | [18f 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 335521828874569540, Envelope: 956 bytes, Signature: 0 bytes +peer1.org1.example.com | [190 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 74 53 85 89 111 88 108 49 90 120 79 106 50 69 54 54 74 87 67 107 49 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 80 49 117 51 118 74 69 71 113 89 89 50 10 54 103 47 56 112 84 98 57 48 122 77 71 56 56 83 47 67 85 121 71 106 74 102 43 80 65 68 82 48 112 111 111 107 51 74 79 85 119 98 118 111 113 82 115 87 67 85 107 79 103 69 113 112 101 78 116 113 67 120 80 110 72 77 81 10 80 98 118 73 71 112 55 90 65 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 98 112 65 97 110 108 101 122 111 51 121 119 49 113 113 76 48 50 122 102 105 114 107 87 108 47 89 101 84 100 81 120 101 114 56 77 52 121 105 98 72 98 107 67 73 66 57 73 71 85 85 79 10 100 111 71 54 121 81 110 66 88 102 121 97 67 116 102 78 89 100 112 101 105 51 69 76 43 116 50 97 78 113 43 106 68 104 110 79 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [191 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Added �%��_k<���\<���8 [:5AT�!�]� to the in memory item map, total items: 2 +peer1.org1.example.com | [192 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [193 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [194 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [195 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [196 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [197 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [198 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [199 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [19a 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19b 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes +peer1.org1.example.com | [19c 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes +peer1.org1.example.com | [19d 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19e 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes +peer1.org1.example.com | [19f 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 f0 13 5a 7b 04 f9 6e 8f 9a 8a 39 81 55 14 05 |...Z{..n...9.U..| +peer1.org1.example.com | 00000010 81 22 49 61 65 9f 6b 7a 37 7b f9 64 7a 84 e2 d9 |."Iae.kz7{.dz...| +peer1.org1.example.com | [1a0 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 e3 3a 5a ab 86 b1 fd c8 d0 39 |0E.!...:Z......9| +peer1.org1.example.com | 00000010 2e 48 38 ad 8c 5d 55 70 7d 01 4e cc 4c c9 7a bc |.H8..]Up}.N.L.z.| +peer1.org1.example.com | 00000020 66 31 79 f1 46 02 20 75 6f 92 53 fd d2 ff 40 a1 |f1y.F. uo.S...@.| +peer1.org1.example.com | 00000030 22 a5 f3 22 b5 5c fa 34 08 b0 b6 e0 f9 67 6b cc |"..".\.4.....gk.| +peer1.org1.example.com | 00000040 fd 17 9c 6b 01 b2 1d |...k...| +peer1.org1.example.com | [1a1 11-19 05:21:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1a2 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c1 21 f5 7b 0d 1e 97 ec c0 a1 37 |0D. =.!.{......7| +peer1.org1.example.com | 00000010 48 f3 94 38 32 14 24 d1 20 d4 74 2e bc 9c f2 53 |H..82.$. .t....S| +peer1.org1.example.com | 00000020 e9 e5 b4 39 02 20 02 83 4d 8b 42 9f d4 62 71 b2 |...9. ..M.B..bq.| +peer1.org1.example.com | 00000030 88 f9 09 eb 81 20 ee ee 18 ce 75 84 22 e4 fd 16 |..... ....u."...| +peer1.org1.example.com | 00000040 5f bf ca 87 01 f2 |_.....| +peer1.org1.example.com | [1a3 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1a4 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [438 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [439 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [43a 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [43b 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [43c 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0031d5b40)} +peer1.org2.example.com | [43d 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [43e 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [43f 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [440 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org2.example.com | [441 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org2.example.com | [442 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org2.example.com | [443 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [444 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15100C +peer1.org2.example.com | [445 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D6198B85597D694C240DEBF96E6E195D563F425A39657F10B43DEFA3B91A2314 +peer1.org2.example.com | [446 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [447 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [448 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [44a 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [449 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org2.example.com | [44b 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer1.org2.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer1.org2.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer1.org2.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [44c 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:7233013353250887132 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [44d 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:7233013353250887132 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org2.example.com | [44e 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [44f 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x60, 0x1e, 0xe1, 0xb7, 0xa1, 0x19, 0x69, 0xc3, 0xf3, 0xb5, 0x51, 0x11, 0x52, 0x94, 0x60, 0xd, 0x7b, 0xd0, 0x3f, 0x9f, 0xa0, 0x2a, 0x24, 0xa6, 0x25, 0xf8, 0xdd, 0x54, 0x3d, 0xb9, 0xca, 0x84} txOffsets= +peer1.org2.example.com | txId=994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727 locPointer=offset=71, bytesLength=24470 +peer1.org2.example.com | ] +peer1.org2.example.com | [450 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to txid-index +peer1.org2.example.com | [451 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx number:[0] ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to blockNumTranNum index +peer1.org2.example.com | [452 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [453 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [454 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [455 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [456 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51321], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org2.example.com | [457 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0033b95b0, CONNECTING +peer1.org2.example.com | [458 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org2.example.com | [459 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org2.example.com | [45a 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org2.example.com | [45b 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [45c 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [45d 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [45e 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [45f 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [1a5 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [1a6 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [1a7 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1a8 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a9 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aa 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ab 11-19 05:21:42.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [1ac 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ad 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ae 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\023v\032\221\206q\277\035\t\002 +\350\343>\027\321\244\352]\363\331\215=H\345Qj9c\r~\256\370b)\251p\016o\341\267b" secret_envelope: > +peer1.org1.example.com | [1af 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b0 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:57364 +peer1.org1.example.com | [1b1 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025a85a0 +peer1.org1.example.com | [1b2 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [1b3 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [1b4 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b5 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | [22a 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [adda4de9-cd55-4df5-86a3-c4b5d3a8380a] +peer0.org2.example.com | [22b 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [22c 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [4028b460-4d24-4132-92da-e736840e5d8f] +peer0.org2.example.com | [22d 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [22e 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [22f 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU [4028b460] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [230 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU [4028b460] notifying Txid:4028b460-4d24-4132-92da-e736840e5d8f, channelID:businesschannel +peer0.org2.example.com | [231 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [232 11-19 05:21:44.02 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [233 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4028b460-4d24-4132-92da-e736840e5d8f] +peer0.org2.example.com | [234 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [235 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6709a892-369c-42c2-971f-f3ab80e29bbb] +peer0.org2.example.com | [236 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org2.example.com | [237 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6709a892-369c-42c2-971f-f3ab80e29bbb] +peer0.org2.example.com | [238 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [239 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E12140898B48782FE999EEC15...3FF04E590AF5F9A12CFD445B2A020801 +peer0.org2.example.com | [23a 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DDF208760E13EC5EA61770840F98E4A7F00C8922D82C4BF7B6649A7BF5B57288 +peer0.org2.example.com | [23b 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org2.example.com | [23c 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU [a02655ea] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [23d 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU [a02655ea] notifying Txid:a02655ea0cef2800e54f21e96186e6176d0167e7cb87bbd1591921541d286125, channelID: +peer0.org2.example.com | [23e 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [23f 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> INFO [][a02655ea] Exit chaincode: name:"cscc" (146ms) +peer0.org2.example.com | [240 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU [][a02655ea] Exit +peer0.org2.example.com | [241 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:32932 +peer0.org2.example.com | [242 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:32932 grpc.code=OK grpc.call_duration=154.201ms +peer0.org2.example.com | [243 11-19 05:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [244 11-19 05:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting, peers found 0 +peer0.org2.example.com | [245 11-19 05:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [246 11-19 05:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [247 11-19 05:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [248 11-19 05:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [249 11-19 05:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...1DF2120C08E0BC8994FE999EEC151001 +peer0.org2.example.com | [24a 11-19 05:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A90AEFC76EB5C7AD81064E1CA535F76D8EC8D864D28F9F87871931F24CEB98A9 +peer0.org2.example.com | [24b 11-19 05:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [24c 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:32940 +peer0.org2.example.com | [24d 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00286ac80 +peer0.org2.example.com | [24e 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [24f 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [250 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org2.example.com | [251 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [252 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 10 64 d8 34 11 1f 7c 3e 68 d9 9f 3b d8 9d 12 |..d.4..|>h..;...| +peer0.org2.example.com | 00000010 5b 5f 48 c8 4c f5 05 15 78 02 3b 45 eb 3c 9d 30 |[_H.L...x.;E.<.0| +peer0.org2.example.com | [253 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 82 a8 c7 be dc c0 02 26 83 c5 c6 |0D. ........&...| +peer0.org2.example.com | 00000010 eb 42 bc 24 f7 d8 ee 5d c5 0f 68 9e 26 ef 6b c6 |.B.$...]..h.&.k.| +peer0.org2.example.com | 00000020 bb f5 8d b9 02 20 0f 23 4c 64 59 7e 9e 72 45 e1 |..... .#LdY~.rE.| +peer0.org2.example.com | 00000030 43 48 f2 5c d6 13 1e 84 4f 08 5d 78 88 64 d1 0b |CH.\....O.]x.d..| +peer0.org2.example.com | 00000040 6a f6 fa b9 fd 54 |j....T| +peer0.org2.example.com | [254 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [255 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000130850, header 0xc00286b090 +peer0.org2.example.com | [256 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [257 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU [][fcaf329e] processing txid: fcaf329e715860bfd25b8a5750d1a5fafc4e47b6d8747a7bef5f3a6ef84bd8a4 +peer0.org2.example.com | [258 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU [][fcaf329e] Entry chaincode: name:"cscc" +peer0.org2.example.com | [259 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> INFO [][fcaf329e] Entry chaincode: name:"cscc" +peer0.org2.example.com | [25a 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [25b 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org2.example.com | [25c 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [25d 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [25e 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [25f 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 10 64 d8 34 11 1f 7c 3e 68 d9 9f 3b d8 9d 12 |..d.4..|>h..;...| +peer0.org2.example.com | 00000010 5b 5f 48 c8 4c f5 05 15 78 02 3b 45 eb 3c 9d 30 |[_H.L...x.;E.<.0| +peer0.org2.example.com | [260 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 82 a8 c7 be dc c0 02 26 83 c5 c6 |0D. ........&...| +peer0.org2.example.com | 00000010 eb 42 bc 24 f7 d8 ee 5d c5 0f 68 9e 26 ef 6b c6 |.B.$...]..h.&.k.| +peer0.org2.example.com | 00000020 bb f5 8d b9 02 20 0f 23 4c 64 59 7e 9e 72 45 e1 |..... .#LdY~.rE.| +peer0.org2.example.com | 00000030 43 48 f2 5c d6 13 1e 84 4f 08 5d 78 88 64 d1 0b |CH.\....O.]x.d..| +peer0.org2.example.com | 00000040 6a f6 fa b9 fd 54 |j....T| +peer0.org2.example.com | [261 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU [fcaf329e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [262 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU [fcaf329e] notifying Txid:fcaf329e715860bfd25b8a5750d1a5fafc4e47b6d8747a7bef5f3a6ef84bd8a4, channelID: +peer0.org2.example.com | [263 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [264 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> INFO [][fcaf329e] Exit chaincode: name:"cscc" (1ms) +orderer0.example.com | "2019-11-19 05:21:32.524 UTC [msp.identity] newIdentity -> DEBU 174 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [460 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [461 11-19 05:21:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org2.example.com | [462 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org2.example.com | [463 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org2.example.com | [464 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [465 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org2.example.com | [466 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org2.example.com | [467 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [468 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0033b95b0, READY +peer1.org2.example.com | [469 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org2.example.com | [46a 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 24ms (state_validation=5ms block_and_pvtdata_commit=10ms state_commit=5ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org2.example.com | [46b 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [46c 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408E49FD3F4FE999EEC15...BF6035CA6D53E581FB7C69FB2A020802 +peer1.org2.example.com | [46d 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1EE72E0CB9C826DCDCADC4D28BA049A1D10EFA24B3120E35C72E6D9F5663D848 +peer1.org2.example.com | [46e 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org2.example.com | [46f 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer1.org2.example.com | [470 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org2.example.com | [471 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer1.org2.example.com | [472 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [473 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer1.org2.example.com | [474 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [475 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00327f080 env 0xc0032bb360 txn 0 +peer1.org2.example.com | [477 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0032bb360 +peer1.org2.example.com | [478 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +peer1.org2.example.com | [479 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [47a 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [47b 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [47c 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [476 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer1.org2.example.com | [47d 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer1.org2.example.com | [47e 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org2.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer1.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer1.org2.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer1.org2.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer1.org2.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer1.org2.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer1.org2.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer1.org2.example.com | fQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [47f 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [480 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer1.org2.example.com | [481 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [482 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [483 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org2.example.com | [484 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5c 3f 1b d8 4a da c3 4b 67 20 49 d8 48 ce 53 | \?..J..Kg I.H.S| +peer1.org2.example.com | 00000010 e1 89 fc 50 b4 b1 5e c3 a1 04 2d 2b 2a a2 53 c9 |...P..^...-+*.S.| +peer1.org2.example.com | [485 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c da 5b 7f f8 0b 78 dd 56 60 07 6f |0D. <.[...x.V`.o| +peer1.org2.example.com | 00000010 55 50 96 78 11 13 49 28 89 52 93 b7 b2 9d bb 4d |UP.x..I(.R.....M| +peer1.org2.example.com | 00000020 1c 1a 01 32 02 20 63 c4 7c ca a7 d6 48 c5 10 9b |...2. c.|...H...| +peer1.org2.example.com | 00000030 00 2d 4d 59 a6 7a c2 62 62 b5 9b 3a ce f0 9e e7 |.-MY.z.bb..:....| +peer1.org2.example.com | 00000040 61 25 fa 66 d3 6c |a%.f.l| +peer1.org2.example.com | [486 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [487 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00344a000, header channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +peer1.org2.example.com | [488 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [489 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [48a 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [48b 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [48c 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [48d 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [48e 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [48f 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [490 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [491 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [492 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [493 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [494 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [495 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [496 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [497 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [498 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [499 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [49b 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [49c 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer1.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer1.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [1b6 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org1.example.com | [1b7 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [1b8 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [1b9 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [1ba 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 96 0b 0b 3d 4c cc b3 a7 aa 10 56 11 df 4f 55 |....=L.....V..OU| +peer1.org1.example.com | 00000010 a8 0e cb 5a 15 31 a8 23 bb b6 f1 53 f7 73 fd a2 |...Z.1.#...S.s..| +peer1.org1.example.com | [1bb 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 0d 71 27 d9 f0 11 a6 8d 59 ee 71 |0D. Q.q'.....Y.q| +peer1.org1.example.com | 00000010 c0 f9 c9 18 7f 86 97 d6 10 ea 88 55 fc 23 89 22 |...........U.#."| +peer1.org1.example.com | 00000020 99 bf 5f 68 02 20 63 f7 6f 84 6f 1a 4e cf 5b b5 |.._h. c.o.o.N.[.| +peer1.org1.example.com | 00000030 0c 84 e8 63 7a 8f eb 0d 89 9d e5 fd 14 b8 93 48 |...cz..........H| +peer1.org1.example.com | 00000040 4e 6e 9b 51 cb 71 |Nn.Q.q| +peer1.org1.example.com | [1bc 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [1bd 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001cfb90, header 0xc0025a9040 +peer1.org1.example.com | [1be 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [1bf 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU [][cade26e8] processing txid: cade26e800f606babce399bd2fd366ca2c630a5063e7481ef9e9fe04883f20b9 +peer1.org1.example.com | [1c0 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU [][cade26e8] Entry chaincode: name:"cscc" +peer1.org1.example.com | [1c1 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> INFO [][cade26e8] Entry chaincode: name:"cscc" +peer1.org1.example.com | [1c2 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [1c3 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer1.org1.example.com | [1c4 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [1c5 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [1c6 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [1c7 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [1c8 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [1c9 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [1ca 11-19 05:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 96 0b 0b 3d 4c cc b3 a7 aa 10 56 11 df 4f 55 |....=L.....V..OU| +peer1.org1.example.com | 00000010 a8 0e cb 5a 15 31 a8 23 bb b6 f1 53 f7 73 fd a2 |...Z.1.#...S.s..| +peer1.org1.example.com | [1cb 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 0d 71 27 d9 f0 11 a6 8d 59 ee 71 |0D. Q.q'.....Y.q| +peer1.org1.example.com | 00000010 c0 f9 c9 18 7f 86 97 d6 10 ea 88 55 fc 23 89 22 |...........U.#."| +peer1.org1.example.com | 00000020 99 bf 5f 68 02 20 63 f7 6f 84 6f 1a 4e cf 5b b5 |.._h. c.o.o.N.[.| +peer1.org1.example.com | 00000030 0c 84 e8 63 7a 8f eb 0d 89 9d e5 fd 14 b8 93 48 |...cz..........H| +peer1.org1.example.com | 00000040 4e 6e 9b 51 cb 71 |Nn.Q.q| +peer1.org1.example.com | [1cc 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer1.org1.example.com | [1cd 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer1.org1.example.com | [1ce 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer1.org1.example.com | [1cf 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer1.org1.example.com | [1d0 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer1.org1.example.com | [1d1 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer1.org1.example.com | [1d2 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer1.org1.example.com | [1d3 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer1.org1.example.com | [1d4 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer1.org1.example.com | [1d5 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer1.org1.example.com | [1d6 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer1.org1.example.com | [1d7 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0027c0580)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer1.org1.example.com | [1d8 11-19 05:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer1.org1.example.com | [1d9 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer1.org1.example.com | [1da 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer1.org1.example.com | [1db 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer1.org1.example.com | [1dc 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer1.org1.example.com | [1dd 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer1.org1.example.com | [1de 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer1.org1.example.com | [1df 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer1.org1.example.com | [1e0 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer0.org2.example.com | [265 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU [][fcaf329e] Exit +peer0.org2.example.com | [266 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:32940 +peer0.org2.example.com | [267 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:32940 grpc.code=OK grpc.call_duration=1.8395ms +peer0.org2.example.com | [268 11-19 05:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [269 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [26a 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151006 +peer0.org2.example.com | [26b 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A5A85EE14DBF8997FBCFD0290E67FD42F5E2F5FA4AE9352D0FFD6A975C05DB08 +peer0.org2.example.com | [26c 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [26d 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [26e 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [26f 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [270 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:32948 +peer0.org2.example.com | [271 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002f30370 +peer0.org2.example.com | [272 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [273 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [274 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org2.example.com | [275 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [276 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 cc 86 71 98 18 f6 7c 37 33 a6 2a 18 69 27 7e |f..q...|73.*.i'~| +peer0.org2.example.com | 00000010 8a 9e 0a 68 3e ce 58 0d 70 ac ea 78 69 4e 7d 32 |...h>.X.p..xiN}2| +peer0.org2.example.com | [277 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 30 be 3a ad 40 56 e3 4f 9d a0 |0E.!..0.:.@V.O..| +peer0.org2.example.com | 00000010 15 31 10 e0 ae df 21 c3 40 d1 ce db 3e d0 97 bc |.1....!.@...>...| +peer0.org2.example.com | 00000020 de 23 50 0e 65 02 20 04 c5 86 df 81 46 32 b6 10 |.#P.e. .....F2..| +peer0.org2.example.com | 00000030 22 cb cf cc 13 73 eb 8b 25 ba af 28 14 4c 84 6e |"....s..%..(.L.n| +peer0.org2.example.com | 00000040 50 08 5c d6 82 ce bc |P.\....| +peer0.org2.example.com | [278 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [279 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002ed15e0, header 0xc002f30780 +peer0.org2.example.com | [27a 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | [27b 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU [][21f8adb7] processing txid: 21f8adb799c4371508d0624a18b0e67edcae806b90625a000dfbfc67457b274c +peer0.org2.example.com | [27c 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU [][21f8adb7] Entry chaincode: name:"qscc" +peer0.org2.example.com | [27d 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> INFO [][21f8adb7] Entry chaincode: name:"qscc" +peer0.org2.example.com | [27e 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [27f 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org2.example.com | [280 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org2.example.com | [281 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [282 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [283 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [284 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [285 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [286 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer0.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer0.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer0.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer0.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [287 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84f10 gate 1574140905987919600 evaluation starts +peer0.org2.example.com | [288 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84f10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [289 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84f10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [28a 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [28b 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [28c 11-19 05:21:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [28d 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84f10 principal matched by identity 0 +peer0.org2.example.com | [28e 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 cc 86 71 98 18 f6 7c 37 33 a6 2a 18 69 27 7e |f..q...|73.*.i'~| +peer0.org2.example.com | 00000010 8a 9e 0a 68 3e ce 58 0d 70 ac ea 78 69 4e 7d 32 |...h>.X.p..xiN}2| +peer0.org2.example.com | [28f 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 30 be 3a ad 40 56 e3 4f 9d a0 |0E.!..0.:.@V.O..| +peer0.org2.example.com | 00000010 15 31 10 e0 ae df 21 c3 40 d1 ce db 3e d0 97 bc |.1....!.@...>...| +peer0.org1.example.com | [251 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [252 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [253 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [254 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [255 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [256 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [257 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [258 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [259 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [25a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [25b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [25c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [25d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [25e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [25f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [260 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [261 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [262 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [263 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [264 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [265 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [266 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [267 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [268 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [269 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [26a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [26b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [26c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [26d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [26e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [26f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [270 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [271 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [272 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [273 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [274 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [275 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [276 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [277 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [278 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [279 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [27a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [27b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [27c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [27d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [27e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [27f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [280 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [281 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [282 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [283 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [284 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [285 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [286 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [287 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [288 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [289 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [28a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [28b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [28c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +orderer0.example.com | "2019-11-19 05:21:32.525 UTC [common.channelconfig] NewStandardValues -> DEBU 175 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.525 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.525 UTC [common.channelconfig] validateMSP -> DEBU 177 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.525 UTC [msp] newBccspMsp -> DEBU 178 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.525 UTC [msp] New -> DEBU 179 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.525 UTC [msp] Setup -> DEBU 17a Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.525 UTC [msp.identity] newIdentity -> DEBU 17b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [msp] Setup -> DEBU 17c Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [msp] Setup -> DEBU 17d MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 18b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.528 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.528 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.528 UTC [policies] GetPolicy -> DEBU 18e Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-11-19 05:21:32.528 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:32.528 UTC [policies] NewManagerImpl -> DEBU 190 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:32.528 UTC [policies] GetPolicy -> DEBU 191 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-11-19 05:21:32.530 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org2.example.com | 00000020 de 23 50 0e 65 02 20 04 c5 86 df 81 46 32 b6 10 |.#P.e. .....F2..| +peer0.org2.example.com | 00000030 22 cb cf cc 13 73 eb 8b 25 ba af 28 14 4c 84 6e |"....s..%..(.L.n| +peer0.org2.example.com | 00000040 50 08 5c d6 82 ce bc |P.\....| +peer0.org2.example.com | [290 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84f10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [291 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84f10 gate 1574140905987919600 evaluation succeeds +peer0.org2.example.com | [292 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [293 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [294 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [295 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [296 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU [21f8adb7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [297 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU [21f8adb7] notifying Txid:21f8adb799c4371508d0624a18b0e67edcae806b90625a000dfbfc67457b274c, channelID: +peer0.org2.example.com | [298 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [299 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> INFO [][21f8adb7] Exit chaincode: name:"qscc" (8ms) +peer0.org2.example.com | [29a 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU [][21f8adb7] Exit +peer0.org2.example.com | [29b 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:32948 +peer0.org2.example.com | [29c 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:32948 grpc.code=OK grpc.call_duration=12.0719ms +peer0.org2.example.com | [29d 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.9:7051->172.18.0.5:32948: read: connection reset by peer +peer0.org2.example.com | [29e 11-19 05:21:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [29f 11-19 05:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2a0 11-19 05:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151007 +peer0.org2.example.com | [2a1 11-19 05:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 03D5FB6EAC75D148EFCD714B9600238B10ACAD6A131A1CF9E444FF80483A45A4 +peer0.org2.example.com | [2a2 11-19 05:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2a3 11-19 05:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2a4 11-19 05:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2a5 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.604Z grpc.peer_address=172.18.0.6:37206 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=109.9µs +peer0.org2.example.com | [2a6 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.612Z grpc.peer_address=172.18.0.8:46172 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=107.7µs +peer0.org2.example.com | [2a7 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2a8 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [2a9 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [2aa 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:46172 +peer0.org2.example.com | [2ab 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:46172 +peer0.org2.example.com | [2ac 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ad 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ae 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org2.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org2.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org2.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [1e1 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer1.org1.example.com | [1e2 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org1.example.com | [1e3 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer1.org1.example.com | [1e4 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer1.org1.example.com | [1e5 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org1.example.com | [1e6 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [1e7 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer1.org1.example.com | [1e8 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer1.org1.example.com | [1e9 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer1.org1.example.com | [1ea 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer1.org1.example.com | [1eb 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [1ec 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [1ed 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [1ee 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer1.org1.example.com | [1ef 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [1f0 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [1f1 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [1f2 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [1f3 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [1f4 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [1f5 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:32.598 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ba Booted with a genesis block, replication isn't an option" +orderer0.example.com | "2019-11-19 05:21:32.625 UTC [orderer.common.server] initializeServerConfig -> INFO 1bb Starting orderer with TLS enabled" +orderer0.example.com | "2019-11-19 05:21:32.633 UTC [orderer.common.server] configureClusterListener -> INFO 1bc Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer0.example.com | "2019-11-19 05:21:32.634 UTC [msp] GetDefaultSigningIdentity -> DEBU 1bd Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1be newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1bf CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [kvledger.util] logDirStatus -> DEBU 1c0 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [kvledger.util] logDirStatus -> DEBU 1c1 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [fsblkstorage] newBlockfileMgr -> INFO 1c2 Getting block information from block storage" +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c3 Retrieving checkpoint info from block files" +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1c4 retrieveLastFileSuffix()" +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1c5 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-11-19 05:21:32.636 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c6 Last file number found = -1" +orderer0.example.com | "2019-11-19 05:21:32.637 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c7 No block file found" +orderer0.example.com | "2019-11-19 05:21:32.637 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c8 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00032cf60)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-11-19 05:21:32.638 UTC [fsblkstorage] newBlockIndex -> DEBU 1c9 newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-11-19 05:21:32.640 UTC [fsblkstorage] indexBlock -> DEBU 1ca Indexing block [blockNum=0, blockHash=[]byte{0x7a, 0xe4, 0xf, 0xb1, 0xee, 0x3d, 0xd4, 0x66, 0xa7, 0xfe, 0x3b, 0x6a, 0x5c, 0x89, 0xe8, 0x21, 0xa4, 0xb8, 0x77, 0x34, 0xad, 0x52, 0x6b, 0x49, 0xee, 0xf9, 0xd5, 0x8f, 0x4, 0xbf, 0x6f, 0x8} txOffsets= +orderer0.example.com | txId=91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520 locPointer=offset=39, bytesLength=20242 +orderer0.example.com | ]" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [fsblkstorage] updateCheckpoint -> DEBU 1cb Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[20287], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] NewStandardValues -> DEBU 1cc Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] NewStandardValues -> DEBU 1d2 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d3 Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d5 Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6 Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d8 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] NewStandardValues -> DEBU 1d9 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] NewStandardValues -> DEBU 1db Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dc Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [common.channelconfig] validateMSP -> DEBU 1dd Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [msp] newBccspMsp -> DEBU 1de Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [msp] New -> DEBU 1df Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [msp] Setup -> DEBU 1e0 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [msp.identity] newIdentity -> DEBU 1e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.643 UTC [msp.identity] newIdentity -> DEBU 1e2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [msp] Validate -> DEBU 1e3 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [common.channelconfig] NewStandardValues -> DEBU 1e4 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e5 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [common.channelconfig] NewStandardValues -> DEBU 1e6 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e7 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [common.channelconfig] validateMSP -> DEBU 1e8 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [msp] newBccspMsp -> DEBU 1e9 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [msp] New -> DEBU 1ea Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [msp] Setup -> DEBU 1eb Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.644 UTC [msp.identity] newIdentity -> DEBU 1ec Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.645 UTC [common.channelconfig] NewStandardValues -> DEBU 1ed Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.645 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ee Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.645 UTC [common.channelconfig] validateMSP -> DEBU 1ef Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.645 UTC [msp] newBccspMsp -> DEBU 1f0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.645 UTC [msp] New -> DEBU 1f1 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.645 UTC [msp] Setup -> DEBU 1f2 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.645 UTC [msp.identity] newIdentity -> DEBU 1f3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.645 UTC [msp] Setup -> DEBU 1f4 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [msp] Setup -> DEBU 1f5 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Readers for Channel/Orderer" +peer0.org2.example.com | [2af 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2b0 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2b1 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b2 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b3 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b4 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b5 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49d 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [49e 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49f 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4a0 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4a1 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4a2 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [49a 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4a3 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4a5 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4a6 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461250 gate 1574140910423183300 evaluation starts +peer1.org2.example.com | [4a7 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4a4 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [4a8 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org2.example.com | [4a9 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461250 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [4aa 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [4ac 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [4ad 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [4ab 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [4ae 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [4af 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [4b0 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [4b1 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [4b2 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org2.example.com | [4b3 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [4b4 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [4b5 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [4b6 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org2.example.com | [4b7 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org2.example.com | [4b8 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461250 principal matched by identity 0 +peer1.org2.example.com | [4ba 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org2.example.com | [4bb 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 e4 48 33 e4 ae 88 85 93 ab 03 89 |0D. 9.H3........| +peer1.org2.example.com | 00000010 c1 84 69 bc 5e 1a f9 50 f7 70 06 6f 2a bd fb ad |..i.^..P.p.o*...| +peer1.org2.example.com | 00000020 71 97 0c e3 02 20 1b 93 1f 80 35 0d 16 87 77 f3 |q.... ....5...w.| +peer1.org2.example.com | 00000030 92 ef a7 d2 f5 ae 99 92 6c a7 65 b5 e4 1f 60 e2 |........l.e...`.| +peer1.org2.example.com | 00000040 6b ad d4 d4 ec 41 |k....A| +peer1.org2.example.com | [4b9 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4bc 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461250 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4bd 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461250 gate 1574140910423183300 evaluation succeeds +peer1.org2.example.com | [4be 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer1.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer1.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer1.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer1.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4bf 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c0 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c1 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349e890 gate 1574140910429766400 evaluation starts +peer1.org2.example.com | [4c2 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349e890 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c3 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4c4 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4c5 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org2.example.com | [4c6 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349e890 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [4c7 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [4c8 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4c9 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [4ca 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [4cc 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [4cd 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4ce 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [4cf 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4d0 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349e890 principal matched by identity 0 +peer1.org2.example.com | [4d1 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +peer1.org2.example.com | 00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.| +peer1.org2.example.com | [4d2 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +peer1.org2.example.com | 00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +peer1.org2.example.com | 00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +peer1.org2.example.com | 00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +peer1.org2.example.com | 00000040 56 71 ab 2e 37 58 4a |Vq..7XJ| +peer1.org2.example.com | [4d3 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349e890 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4d4 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349e890 gate 1574140910429766400 evaluation succeeds +peer1.org2.example.com | [4d5 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4d6 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4d7 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [4cb 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d8 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 7233013353250887132, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d9 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 7233013353250887132, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [4da 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4db 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 7233013353250887132, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [4dc 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [4dd 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [4de 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [4df 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 41 22 91 e2 af 31 74 47 bb 7f 06 cd e6 62 a6 |'A"...1tG.....b.| +peer1.org2.example.com | 00000010 c0 7d 7b 1f 8d 86 2b 44 3f 75 dc d9 93 d1 5c ae |.}{...+D?u....\.| +peer1.org2.example.com | [4e0 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e1 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e2 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e3 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e4 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e5 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e6 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e7 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e8 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e9 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ea 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [4eb 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [4ec 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [4ed 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ee 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ef 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f0 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f1 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f2 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f3 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 0d 60 5e 40 c4 6b d1 59 2f 0e |0E.!...`^@.k.Y/.| +peer1.org2.example.com | 00000010 f4 df c9 60 92 25 b4 6b ab 82 1d 0f ec da 94 0f |...`.%.k........| +peer1.org2.example.com | 00000020 34 99 57 91 0c 02 20 6c 3a 8a ab 42 14 9e 38 fe |4.W... l:..B..8.| +peer1.org2.example.com | 00000030 a0 ea f5 e2 1f 08 2e 2d 40 bb 40 98 dd 47 3c 01 |.......-@.@..G<.| +peer1.org2.example.com | 00000040 d1 e0 4a 03 0b c0 63 |..J...c| +peer1.org2.example.com | [4f4 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4f5 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4f7 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f8 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [4f9 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4fa 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4fb 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4fc 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4fd 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4fe 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4ff 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [500 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16c0 gate 1574140910444272100 evaluation starts +peer1.org2.example.com | [501 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [502 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [503 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16c0 principal matched by identity 0 +peer1.org2.example.com | [504 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 55 cb b3 34 39 d6 e8 a7 3a c9 55 d8 ef 50 17 |.U..49...:.U..P.| +peer1.org2.example.com | 00000010 12 63 1d 7b 04 0e 36 43 eb b0 e9 77 42 ef 9a 1c |.c.{..6C...wB...| +peer1.org2.example.com | [505 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d c8 c3 99 a2 69 02 ac 4d af 7c |0E.!......i..M.|| +peer1.org2.example.com | 00000010 8f e4 a0 cd d2 a3 05 47 c2 ca 7f 82 e4 03 7c c0 |.......G......|.| +peer1.org2.example.com | 00000020 f9 a5 d7 9a 0b 02 20 4a 78 c4 c5 fc 6a 4a b4 6d |...... Jx...jJ.m| +peer1.org2.example.com | 00000030 5e c0 89 63 9a 2b 02 27 67 fd 16 c0 8b fa b4 b7 |^..c.+.'g.......| +peer1.org2.example.com | 00000040 52 91 6c 4a f1 e5 40 |R.lJ..@| +peer1.org2.example.com | [506 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [507 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16c0 gate 1574140910444272100 evaluation succeeds +peer1.org2.example.com | [508 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [509 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [50a 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [50b 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [50c 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [50d 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer1.org2.example.com | [50e 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [50f 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [510 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [511 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f6 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [512 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [513 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [514 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [515 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [516 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [517 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [518 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [519 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [51a 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [51b 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [51c 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [51d 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [51e 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [51f 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [520 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [521 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [522 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [523 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [524 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [525 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [526 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [527 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [528 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | [28d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [28e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [28f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [290 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [291 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [292 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [293 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [294 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [295 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [296 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [297 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [298 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [299 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [29a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [29b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [29c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [29d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [29e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [29f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [2a0 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org1.example.com | [2a1 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org1.example.com | [2a2 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [2a3 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [2a4 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [2a5 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org1.example.com | [2a6 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [2a7 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [2a8 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [2a9 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [2aa 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [2ab 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org1.example.com | [2ac 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org1.example.com | [2ad 11-19 05:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org1.example.com | [2ae 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [2af 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2b0 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org1.example.com | [2b1 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org1.example.com | [2b2 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org1.example.com | [2b3 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org1.example.com | [2b4 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org1.example.com | [2b5 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2b6 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408BCAFBBCFFB999EEC15...EA55014EA68C22F9710D59632A020801 +peer0.org1.example.com | [2b7 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82708237BF8448EF3E3DDAB1FF4414DAFEDCD91FEB432DEE135B48440624C268 +peer0.org1.example.com | [2b8 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org1.example.com | [2b9 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org1.example.com | [2bc 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org1.example.com | [2ba 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [2bb 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [2bd 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2be 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [d1a8f283-4881-4c70-b01e-6ca93ad6a8f4] +peer0.org1.example.com | [2bf 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2c0 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU [d1a8f283] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2c1 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU [d1a8f283] notifying Txid:d1a8f283-4881-4c70-b01e-6ca93ad6a8f4, channelID:businesschannel +peer0.org1.example.com | [2c2 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2c3 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [2c4 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d1a8f283-4881-4c70-b01e-6ca93ad6a8f4] +peer0.org1.example.com | [2c5 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2c6 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b0e96708-4831-49b4-bc2e-e7ca39c1969d] +peer0.org1.example.com | [2c7 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2c8 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | [2c9 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU [b0e96708] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [2b6 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b7 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b8 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b9 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ba 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2bb 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2bc 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046120 gate 1574140909619198400 evaluation starts +peer0.org2.example.com | [2bd 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2be 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046120 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2bf 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c0 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046120 principal evaluation fails +peer0.org2.example.com | [2c1 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046120 gate 1574140909619198400 evaluation fails +peer0.org2.example.com | [2c2 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c3 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c4 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2c5 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030466b0 gate 1574140909619466200 evaluation starts +peer0.org2.example.com | [2c6 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030466b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c7 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030466b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2c8 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [2c9 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2ca 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2cb 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030466b0 principal matched by identity 0 +peer0.org2.example.com | [2cc 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org2.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org2.example.com | [2cd 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 81 c8 4f c2 e8 25 6a b7 da 25 |0E.!....O..%j..%| +peer0.org2.example.com | 00000010 75 c0 99 8b 7e 86 7d 41 f2 26 0c fb ab 1b 03 c9 |u...~.}A.&......| +peer0.org2.example.com | 00000020 99 87 ac d3 84 02 20 0a 99 d7 c4 8d 84 19 8e e3 |...... .........| +peer0.org2.example.com | 00000030 e9 e4 ff 15 c5 62 1a f7 b2 6e 45 3e c6 f9 da 54 |.....b...nE>...T| +peer0.org2.example.com | 00000040 00 3e d2 20 8f 3d cd |.>. .=.| +peer0.org2.example.com | [2ce 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030466b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2cf 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030466b0 gate 1574140909619466200 evaluation succeeds +peer0.org2.example.com | [2d0 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d1 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d2 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d3 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d4 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:46172 +peer0.org2.example.com | [2d5 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:46172 +peer0.org2.example.com | [2d6 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2d7 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [2d8 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [2d9 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:37206 +peer0.org2.example.com | [2da 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:37206 +peer0.org2.example.com | [2db 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dc 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dd 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [2ca 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU [b0e96708] notifying Txid:b0e96708-4831-49b4-bc2e-e7ca39c1969d, channelID:businesschannel +peer0.org1.example.com | [2cb 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2cc 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [2cd 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b0e96708-4831-49b4-bc2e-e7ca39c1969d] +peer0.org1.example.com | [2ce 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2cf 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [a089a368-2ea0-414c-b349-19df1337986c] +peer0.org1.example.com | [2d0 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2d1 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [2d2 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [a089a368] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2d3 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [a089a368] notifying Txid:a089a368-2ea0-414c-b349-19df1337986c, channelID:businesschannel +peer0.org1.example.com | [2d4 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2d5 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [2d6 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a089a368-2ea0-414c-b349-19df1337986c] +peer0.org1.example.com | [2d7 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org1.example.com | [2d8 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4170a1a6-82d3-41f0-bbd2-cc5080a7ba56] +peer0.org1.example.com | [2d9 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org1.example.com | [2da 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4170a1a6-82d3-41f0-bbd2-cc5080a7ba56] +peer0.org1.example.com | [2db 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2dc 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408BCAFBBCFFB999EEC15...EA55014EA68C22F9710D59632A020801 +peer0.org1.example.com | [2dd 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 26C5B22C3EAFB8F78F8C2A44EF9E8A87C40130AA3D34F0BF16814FA04419DFE5 +peer0.org1.example.com | [2de 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [2df 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [be1244ac] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2e0 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [be1244ac] notifying Txid:be1244acf911906f8b806b6291a8f298e20c46e9b60e3fcd32a10299e7379308, channelID: +peer0.org1.example.com | [2e1 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2e2 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO [][be1244ac] Exit chaincode: name:"cscc" (121ms) +peer0.org1.example.com | [2e3 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][be1244ac] Exit +peer0.org1.example.com | [2e4 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45510 +peer0.org1.example.com | [2e5 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45510 grpc.code=OK grpc.call_duration=130.9195ms +peer0.org1.example.com | [2e6 11-19 05:21:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2e7 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e8 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e9 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [2ea 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eb 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\213\020\275\265\314\325\002 UP\220]+9P\004-\244>ZC\305\025G\252V\013E\222\273\351r\346BS\242\315\357\266\237" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ec 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org2.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org2.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org2.example.com | 1g== +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org2.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org2.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org2.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2de 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2df 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2e0 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e1 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e2 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e3 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e4 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [policies] GetPolicy -> DEBU 206 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [policies] GetPolicy -> DEBU 209 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 20a Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org1.example.com | [1f6 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [2ed 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\213\020\275\265\314\325\002 UP\220]+9P\004-\244>ZC\305\025G\252V\013E\222\273\351r\346BS\242\315\357\266\237" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ee 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 ad 46 b8 41 80 d6 e6 e0 69 71 ff 6c aa 2f dd |..F.A....iq.l./.| +peer0.org1.example.com | 00000010 ed db 55 1e 26 f3 e1 f1 f7 01 9a 79 c5 8d 48 23 |..U.&......y..H#| +peer0.org1.example.com | [2ef 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 0d 96 89 28 66 db d0 62 81 99 |0E.!.....(f..b..| +peer0.org1.example.com | 00000010 09 ef ad 58 ea d9 d0 2f d8 b1 c6 d6 4d 1b 3e 8b |...X.../....M.>.| +peer0.org1.example.com | 00000020 10 bd b5 cc d5 02 20 55 50 90 5d 2b 39 50 04 2d |...... UP.]+9P.-| +peer0.org1.example.com | 00000030 a4 3e 5a 43 c5 15 47 aa 56 0b 45 92 bb e9 72 e6 |.>ZC..G.V.E...r.| +peer0.org1.example.com | 00000040 42 53 a2 cd ef b6 9f |BS.....| +peer0.org1.example.com | [2f0 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2f1 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 b5 8b 89 02 aa fc 76 1a 62 ba |0E.!........v.b.| +peer0.org1.example.com | 00000010 ba 77 37 8e b9 37 d7 9f 6d 40 6d 92 d4 e2 76 f6 |.w7..7..m@m...v.| +peer0.org1.example.com | 00000020 c9 12 43 59 7c 02 20 38 c9 99 af aa 45 cf 81 26 |..CY|. 8....E..&| +peer0.org1.example.com | 00000030 d8 9f 5b 5e 50 44 a8 84 b9 f5 6c e2 9e 62 a1 70 |..[^PD....l..b.p| +peer0.org1.example.com | 00000040 5c 36 e6 cb 5a 88 c7 |\6..Z..| +peer0.org1.example.com | [2f2 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2f3 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2f4 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [2f5 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [2f6 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2f7 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f8 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f9 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fa 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [2fb 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2fc 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\213\020\275\265\314\325\002 UP\220]+9P\004-\244>ZC\305\025G\252V\013E\222\273\351r\346BS\242\315\357\266\237" secret_envelope: > alive: > +peer0.org1.example.com | [2fd 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fe 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ff 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting, peers found 1 +peer0.org1.example.com | [300 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [301 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [302 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [303 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [304 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...E31F120C08F893EEE3FB999EEC151001 +peer0.org1.example.com | [305 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E635AFD3D909C4C14BC6B2614E7B1E06009281BF354F3B2FB0DCBB58079A1CDA +peer0.org1.example.com | [306 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [307 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45518 +peer0.org1.example.com | [308 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002e59130 +peer0.org1.example.com | [309 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [30a 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [30b 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [30c 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [30d 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e b9 ba 20 b4 5f 1f 77 94 29 89 ca 65 cb f4 a3 |~.. ._.w.)..e...| +peer0.org1.example.com | 00000010 4f 17 15 a2 ff d3 80 f1 d5 44 07 ac 5f 24 6e f0 |O........D.._$n.| +peer0.org1.example.com | [30e 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 4f 42 bc 9a 7a 18 f1 e7 37 00 |0E.!..OB..z...7.| +peer0.org1.example.com | 00000010 c8 00 9b 45 17 63 01 79 db 56 39 4a d0 95 df 5e |...E.c.y.V9J...^| +peer0.org1.example.com | 00000020 60 ac 7a d7 80 02 20 53 7b 0e 97 0d b9 64 58 df |`.z... S{....dX.| +peer0.org1.example.com | 00000030 84 01 cf 06 0a 68 95 21 27 4a 94 e9 50 c1 b7 83 |.....h.!'J..P...| +peer0.org1.example.com | 00000040 de b3 f4 61 6e 81 26 |...an.&| +peer0.org1.example.com | [30f 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [310 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00282ebd0, header 0xc002e59540 +peer0.org1.example.com | [311 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [312 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [][1f85d19e] processing txid: 1f85d19e1ceaea8c78165fee77755078b045d7a316a5728359de8f923d73e487 +peer0.org1.example.com | [313 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [][1f85d19e] Entry chaincode: name:"cscc" +peer0.org1.example.com | [314 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> INFO [][1f85d19e] Entry chaincode: name:"cscc" +peer0.org1.example.com | [315 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [316 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [317 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [2e5 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e6 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e7 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e8 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e9 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ea 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2eb 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306d630 gate 1574140909653210000 evaluation starts +peer0.org2.example.com | [2ec 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306d630 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ed 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306d630 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2ee 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306d630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ef 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306d630 principal evaluation fails +peer0.org2.example.com | [2f0 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306d630 gate 1574140909653210000 evaluation fails +peer0.org2.example.com | [2f1 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f2 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f3 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f4 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306dbc0 gate 1574140909655303600 evaluation starts +peer0.org2.example.com | [2f5 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306dbc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f6 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306dbc0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2f7 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [2f8 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:46172 disconnected +peer0.org2.example.com | [2f9 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:21:59.617Z grpc.peer_address=172.18.0.8:46172 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.8201ms +peer0.org2.example.com | [2fa 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2fb 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [2fc 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [2fd 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2fe 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2ff 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306dbc0 principal matched by identity 0 +peer0.org2.example.com | [300 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org2.example.com | [301 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 34 98 c3 a0 32 43 cc a2 99 ee 52 |0D. 14...2C....R| +peer0.org2.example.com | 00000010 6d 3d 33 7f dd cc 67 39 e2 eb 71 d7 de b2 35 38 |m=3...g9..q...58| +peer0.org2.example.com | 00000020 a5 42 eb be 02 20 4d b3 27 fd 98 69 2c f7 56 d6 |.B... M.'..i,.V.| +peer0.org2.example.com | 00000030 99 8d 66 9e 46 c1 45 a3 e5 d8 06 60 08 67 5c 37 |..f.F.E....`.g\7| +peer0.org2.example.com | 00000040 d8 47 51 17 8a 27 |.GQ..'| +peer0.org2.example.com | [302 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306dbc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [303 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306dbc0 gate 1574140909655303600 evaluation succeeds +peer0.org2.example.com | [304 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [305 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [306 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [307 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [308 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:37206 +peer0.org2.example.com | [309 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:37206 +peer0.org2.example.com | [30a 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [30b 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:37206 disconnected +peer0.org2.example.com | [30c 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:21:59.631Z grpc.peer_address=172.18.0.6:37206 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.9217ms +peer0.org2.example.com | [30d 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [30e 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [30f 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.681Z grpc.peer_address=172.18.0.8:46178 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=207.7µs +peer0.org2.example.com | [310 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [529 11-19 05:21:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org2.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org2.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [52a 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [52b 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [52c 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [52d 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [52e 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [52f 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [530 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [531 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [532 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org2.example.com | [533 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [534 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [535 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [536 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [537 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [538 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [539 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [53a 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [53b 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [53c 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [53d 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [53e 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [53f 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [540 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [541 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org2.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org2.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org2.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [542 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [543 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [544 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [545 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [546 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [547 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [548 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [549 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [54a 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [54b 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [54c 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [54d 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [54e 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [54f 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [550 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [551 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [552 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [553 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [311 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [312 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [313 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:46178 +peer0.org2.example.com | [314 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:46178 +peer0.org2.example.com | [315 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [316 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [317 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [318 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [319 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31c 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31d 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31b 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.692Z grpc.peer_address=172.18.0.6:37212 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=173.7µs +peer0.org2.example.com | [31e 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [31f 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [320 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [321 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030559d0 gate 1574140909697237200 evaluation starts +peer0.org2.example.com | [322 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030559d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [323 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030559d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [324 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030559d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [325 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030559d0 principal evaluation fails +peer0.org2.example.com | [326 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030559d0 gate 1574140909697237200 evaluation fails +peer0.org2.example.com | [327 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [328 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [329 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [32a 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003055f40 gate 1574140909698090900 evaluation starts +peer0.org2.example.com | [32b 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003055f40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32c 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003055f40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [32d 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003055f40 principal matched by identity 0 +peer0.org2.example.com | [32e 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org2.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org2.example.com | [32f 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 56 0e cf a7 b9 3a fb e2 45 4e |0E.!..V....:..EN| +peer0.org2.example.com | 00000010 bd 59 84 cf b3 1f eb db 2c aa d0 e2 a0 1b 35 fa |.Y......,.....5.| +peer0.org2.example.com | 00000020 4a 7c dc d6 e2 02 20 72 65 71 05 50 ce 9c a3 c2 |J|.... req.P....| +peer0.org2.example.com | 00000030 b3 2e 29 80 be 94 aa 90 64 f1 55 7b 89 82 b5 76 |..).....d.U{...v| +peer0.org2.example.com | 00000040 9b d7 45 77 17 ab 70 |..Ew..p| +peer0.org2.example.com | [330 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003055f40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [331 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003055f40 gate 1574140909698090900 evaluation succeeds +peer0.org2.example.com | [332 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [333 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [334 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [335 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [336 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:46178 +peer0.org2.example.com | [337 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:46178 +peer0.org2.example.com | [338 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:2830936016594819812 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f7 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [1f8 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [1f9 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [1fa 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002785d80)} +peer1.org1.example.com | [1fb 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [1fc 11-19 05:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [1fd 11-19 05:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [1fe 11-19 05:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer1.org1.example.com | [1ff 11-19 05:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer1.org1.example.com | [200 11-19 05:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer1.org1.example.com | [201 11-19 05:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer1.org1.example.com | [202 11-19 05:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xeb, 0xcd, 0x1f, 0x7, 0xa0, 0x44, 0x7e, 0xdb, 0xb0, 0xc3, 0xd8, 0x38, 0xb2, 0x31, 0xa, 0x6d, 0xa6, 0x14, 0x14, 0x86, 0xef, 0x53, 0x16, 0x8b, 0x27, 0xf5, 0x83, 0xcc, 0x3e, 0xcb, 0xfd, 0x8c} txOffsets= +peer1.org1.example.com | txId=92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426 locPointer=offset=39, bytesLength=25761 +peer1.org1.example.com | ] +peer1.org1.example.com | [203 11-19 05:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to txid-index +peer1.org1.example.com | [204 11-19 05:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx number:[0] ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to blockNumTranNum index +peer1.org1.example.com | [205 11-19 05:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25807], isChainEmpty=[false], lastBlockNumber=[0] +peer1.org1.example.com | [206 11-19 05:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org1.example.com | [207 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer1.org1.example.com | [208 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer1.org1.example.com | [20a 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [209 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer1.org1.example.com | [20b 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer1.org1.example.com | [20c 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer1.org1.example.com | [20d 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer1.org1.example.com | [20e 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer1.org1.example.com | [20f 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [210 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer1.org1.example.com | [211 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer1.org1.example.com | [212 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [213 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [214 11-19 05:21:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [215 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [216 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [217 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer1.org1.example.com | [218 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer1.org1.example.com | [219 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [21a 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer1.org1.example.com | [21b 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer1.org1.example.com | [21c 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer1.org1.example.com | [21d 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer1.org1.example.com | [21e 11-19 05:21:43.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 41ms (state_validation=4ms block_and_pvtdata_commit=23ms state_commit=7ms) commitHash=[] +peer1.org1.example.com | [21f 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer1.org1.example.com | [220 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [52f0bc14-171d-4c6c-8482-9b8f6fbc3d23] +peer1.org1.example.com | [221 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer1.org1.example.com | [222 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [52f0bc14-171d-4c6c-8482-9b8f6fbc3d23] +peer1.org1.example.com | [223 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [224 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [225 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [318 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [319 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [31a 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e b9 ba 20 b4 5f 1f 77 94 29 89 ca 65 cb f4 a3 |~.. ._.w.)..e...| +peer0.org1.example.com | 00000010 4f 17 15 a2 ff d3 80 f1 d5 44 07 ac 5f 24 6e f0 |O........D.._$n.| +peer0.org1.example.com | [31b 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 4f 42 bc 9a 7a 18 f1 e7 37 00 |0E.!..OB..z...7.| +peer0.org1.example.com | 00000010 c8 00 9b 45 17 63 01 79 db 56 39 4a d0 95 df 5e |...E.c.y.V9J...^| +peer0.org1.example.com | 00000020 60 ac 7a d7 80 02 20 53 7b 0e 97 0d b9 64 58 df |`.z... S{....dX.| +peer0.org1.example.com | 00000030 84 01 cf 06 0a 68 95 21 27 4a 94 e9 50 c1 b7 83 |.....h.!'J..P...| +peer0.org1.example.com | 00000040 de b3 f4 61 6e 81 26 |...an.&| +peer0.org1.example.com | [31c 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [1f85d19e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [31d 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [1f85d19e] notifying Txid:1f85d19e1ceaea8c78165fee77755078b045d7a316a5728359de8f923d73e487, channelID: +peer0.org1.example.com | [31e 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [31f 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> INFO [][1f85d19e] Exit chaincode: name:"cscc" (1ms) +peer0.org1.example.com | [320 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [][1f85d19e] Exit +peer0.org1.example.com | [321 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45518 +peer0.org1.example.com | [322 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45518 grpc.code=OK grpc.call_duration=1.7867ms +peer0.org1.example.com | [323 11-19 05:21:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [324 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [325 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151007 +peer0.org1.example.com | [326 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7505D113D28F73A91BCD13E27B9867C1F5B1E28DF8A59D1EF4B6FF253E4C084B +peer0.org1.example.com | [327 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [328 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [329 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [32a 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [32b 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [32c 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [32d 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32e 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45526 +peer0.org1.example.com | [32f 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002ee2370 +peer0.org1.example.com | [330 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [331 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [332 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [333 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [334 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 09 cd 27 85 0b 76 c1 9d 46 c2 17 30 fd 10 da |S..'..v..F..0...| +peer0.org1.example.com | 00000010 13 39 7c 50 ea 57 5f e6 64 d9 b5 bc b4 d2 88 31 |.9|P.W_.d......1| +peer0.org1.example.com | [335 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 6a bd 80 60 14 7d e1 1d 32 d1 |0E.!..j..`.}..2.| +peer0.org1.example.com | 00000010 dd 1c e5 2b 38 78 59 c6 f1 41 e0 f2 c7 13 55 a5 |...+8xY..A....U.| +peer0.org1.example.com | 00000020 91 30 54 a6 d5 02 20 41 e9 53 1a 85 11 ae 7b 14 |.0T... A.S....{.| +peer0.org1.example.com | 00000030 ff 68 43 73 fe 3f 47 8e 6e 53 c3 ec ca 0f cc 2f |.hCs.?G.nS...../| +peer0.org1.example.com | 00000040 43 49 97 50 53 00 1f |CI.PS..| +peer0.org1.example.com | [336 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [337 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00282f490, header 0xc002ee2780 +peer0.org1.example.com | [338 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [339 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU [][1429e68e] processing txid: 1429e68ed61c214ae866b33a0ef06ca91e8d7b9b565342c06f06aa4547272963 +peer0.org1.example.com | [33a 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU [][1429e68e] Entry chaincode: name:"qscc" +peer0.org1.example.com | [33b 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> INFO [][1429e68e] Entry chaincode: name:"qscc" +peer0.org1.example.com | [33c 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [33d 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [33e 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [33f 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [340 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [341 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [342 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [343 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [344 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org1.example.com | [226 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [227 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [228 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [229 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [22a 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [22b 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [22c 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [22d 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [22e 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [22f 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [230 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer1.org1.example.com | [231 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [232 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [233 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [234 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [235 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [236 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [237 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [238 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [239 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [23a 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [23b 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [23c 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [23d 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [23e 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [23f 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [240 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [241 11-19 05:21:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [242 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [243 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [244 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [245 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [246 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [247 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [248 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [249 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [24a 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [24b 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [24c 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [24d 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [24e 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [24f 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | 1g== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [250 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:32.650 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:32.650 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:32.650 UTC [fsblkstorage] Next -> DEBU 232 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [345 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 gate 1574140905654515500 evaluation starts +peer0.org1.example.com | [346 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [347 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [348 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [349 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [34a 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [34b 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 principal matched by identity 0 +peer0.org1.example.com | [34c 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 09 cd 27 85 0b 76 c1 9d 46 c2 17 30 fd 10 da |S..'..v..F..0...| +peer0.org1.example.com | 00000010 13 39 7c 50 ea 57 5f e6 64 d9 b5 bc b4 d2 88 31 |.9|P.W_.d......1| +peer0.org1.example.com | [34d 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 6a bd 80 60 14 7d e1 1d 32 d1 |0E.!..j..`.}..2.| +peer0.org1.example.com | 00000010 dd 1c e5 2b 38 78 59 c6 f1 41 e0 f2 c7 13 55 a5 |...+8xY..A....U.| +peer0.org1.example.com | 00000020 91 30 54 a6 d5 02 20 41 e9 53 1a 85 11 ae 7b 14 |.0T... A.S....{.| +peer0.org1.example.com | 00000030 ff 68 43 73 fe 3f 47 8e 6e 53 c3 ec ca 0f cc 2f |.hCs.?G.nS...../| +peer0.org1.example.com | 00000040 43 49 97 50 53 00 1f |CI.PS..| +peer0.org1.example.com | [34e 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [34f 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 gate 1574140905654515500 evaluation succeeds +peer0.org1.example.com | [350 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [351 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [352 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [353 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [354 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU [1429e68e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [355 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU [1429e68e] notifying Txid:1429e68ed61c214ae866b33a0ef06ca91e8d7b9b565342c06f06aa4547272963, channelID: +peer0.org1.example.com | [356 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [357 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> INFO [][1429e68e] Exit chaincode: name:"qscc" (9ms) +peer0.org1.example.com | [358 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU [][1429e68e] Exit +peer0.org1.example.com | [359 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45526 +peer0.org1.example.com | [35a 11-19 05:21:45.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45526 grpc.code=OK grpc.call_duration=15.7042ms +peer0.org1.example.com | [35b 11-19 05:21:45.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [35c 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [35d 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35e 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [35f 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [360 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 c1 74 4e a9 40 05 54 55 88 f9 dc 12 b2 8b 6f |D.tN.@.TU......o| +peer0.org1.example.com | 00000010 a8 32 62 e2 aa 70 d7 8e 2f e4 23 02 47 84 83 4e |.2b..p../.#.G..N| +peer0.org1.example.com | [361 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 04 6d ec 34 56 e4 7a df 21 8b 04 |0D. a.m.4V.z.!..| +peer0.org1.example.com | 00000010 d2 b1 b5 1f 71 de 65 46 1e 67 79 fd 83 20 b6 8e |....q.eF.gy.. ..| +peer0.org1.example.com | 00000020 0e 96 6d 60 02 20 1d d3 dd d5 fe 9a aa c2 57 0f |..m`. ........W.| +peer0.org1.example.com | 00000030 c1 09 8f 26 64 ab 98 ae cc c8 6b 62 f7 52 05 82 |...&d.....kb.R..| +peer0.org1.example.com | 00000040 5f 32 11 27 78 14 |_2.'x.| +peer0.org1.example.com | [362 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [363 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 af 5b 1c 88 3f 1d 8c d9 0a f2 b2 |0D. ..[..?......| +peer0.org1.example.com | 00000010 97 24 bf 78 e6 6a 95 e9 0e 1d 9a 37 f9 f4 bd 59 |.$.x.j.....7...Y| +peer0.org1.example.com | 00000020 c7 63 2f 41 02 20 15 92 ab d2 56 e8 09 f1 44 78 |.c/A. ....V...Dx| +peer0.org1.example.com | 00000030 07 46 df c1 5b a8 c9 ca 03 8e c3 56 1d d4 1a 7e |.F..[......V...~| +peer0.org1.example.com | 00000040 15 c3 fd a9 ff 4a |.....J| +peer0.org1.example.com | [364 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [365 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [366 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [339 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33a 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:2830936016594819812 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [33b 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [33c 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33e 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33f 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [340 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [341 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [342 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [343 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119450 gate 1574140909707179100 evaluation starts +peer0.org2.example.com | [344 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119450 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [345 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119450 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [346 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [347 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119450 principal evaluation fails +peer0.org2.example.com | [348 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119450 gate 1574140909707179100 evaluation fails +peer0.org2.example.com | [349 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34a 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34b 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34c 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031199c0 gate 1574140909707518400 evaluation starts +peer0.org2.example.com | [34d 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031199c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34e 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031199c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [34f 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031199c0 principal matched by identity 0 +peer0.org2.example.com | [350 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 8e 4a 56 ff 77 9e 34 e9 6c 45 32 ff 9b 4a 59 |..JV.w.4.lE2..JY| +peer0.org2.example.com | 00000010 d6 72 0c a4 5e df 2c 67 0e 0d b0 48 93 65 6b 88 |.r..^.,g...H.ek.| +peer0.org2.example.com | [351 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 8d 1f 03 fe 0e 3b 31 28 87 48 c5 |0D. U.....;1(.H.| +peer0.org2.example.com | 00000010 9e d8 00 d5 fb 8d a9 59 b1 82 d3 bc 1b e9 dc 92 |.......Y........| +peer0.org2.example.com | 00000020 08 76 7a c9 02 20 5b f2 53 c2 83 2e c7 ed 42 b9 |.vz.. [.S.....B.| +peer0.org2.example.com | 00000030 94 c9 61 1b f1 fd f7 ff 0d b1 88 4b b6 bd 33 3d |..a........K..3=| +peer0.org2.example.com | 00000040 88 0c 75 f3 98 8f |..u...| +peer0.org2.example.com | [352 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031199c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [353 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031199c0 gate 1574140909707518400 evaluation succeeds +peer0.org2.example.com | [354 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [355 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [356 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [357 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [367 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [368 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [369 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36a 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36c 11-19 05:21:46.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [36d 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [36e 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [36f 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [370 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [371 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151008 +peer0.org1.example.com | [372 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A024F55AABDD9626ED1146E8723A4D5A32BDA84B9FFEAAF1A708BA3F29CD5166 +peer0.org1.example.com | [373 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [374 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [375 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [376 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\340\352\334\255r<\002 Dfb\3649|VuL\364\276H9\267\316\265R\2167\243\177\320\303D\004v\021Mu\\h\256" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [377 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\340\352\334\255r<\002 Dfb\3649|VuL\364\276H9\267\316\265R\2167\243\177\320\303D\004v\021Mu\\h\256" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [378 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [379 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [37a 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [37b 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37c 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer0.org1.example.com | [37d 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37e 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer0.org1.example.com | [37f 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [380 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 24 f5 5a ab dd 96 26 ed 11 46 e8 72 3a 4d 5a |.$.Z...&..F.r:MZ| +peer0.org1.example.com | 00000010 32 bd a8 4b 9f fe aa f1 a7 08 ba 3f 29 cd 51 66 |2..K.......?).Qf| +peer0.org1.example.com | [381 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed f3 5e d2 54 92 99 c5 17 0b 2a |0D. #..^.T.....*| +peer0.org1.example.com | 00000010 c3 b8 c3 c6 f4 a5 2c 59 5b c7 fa be 3e 0a e0 ea |......,Y[...>...| +peer0.org1.example.com | 00000020 dc ad 72 3c 02 20 44 66 62 f4 39 7c 56 75 4c f4 |..r<. Dfb.9|VuL.| +peer0.org1.example.com | 00000030 be 48 39 b7 ce b5 52 8e 37 a3 7f d0 c3 44 04 76 |.H9...R.7....D.v| +peer0.org1.example.com | 00000040 11 4d 75 5c 68 ae |.Mu\h.| +peer0.org1.example.com | [382 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [383 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 03 06 c0 d5 22 08 d1 6c 89 2a b5 |0D. t...."..l.*.| +peer0.org1.example.com | 00000010 22 2c 25 73 56 e5 79 09 b1 48 f5 51 73 be 8b 65 |",%sV.y..H.Qs..e| +peer1.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [251 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [252 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [253 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [254 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer1.org1.example.com | [255 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [256 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [257 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [258 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [259 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org1.example.com | [25a 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [25b 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [25c 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [25d 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [25e 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [25f 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [260 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [261 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [262 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [263 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [264 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [265 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [266 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [267 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [268 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [269 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [26a 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [26b 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [26c 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [26d 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [26e 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [26f 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [270 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [271 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [272 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [273 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [274 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [275 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [276 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [277 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [278 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [279 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [27a 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [27b 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [27c 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [27d 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [27e 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [27f 11-19 05:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [280 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [281 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [282 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [283 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [284 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [285 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [286 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [287 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [288 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [289 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [358 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [359 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer0.org2.example.com | [35a 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [35b 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35c 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35d 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35e 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [35f 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [360 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [361 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [362 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [363 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [364 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 2830936016594819812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [365 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\213\213\335\017D\334\021\255v}\212o\017\030\257\\\204K\t\341g\365\212\225\002 %\372I[\306\022G\301\346\001\311\366\3659\350t\330\355\2072\362\234\220\352Y\256,'\001\353e\334" > +peer0.org2.example.com | [366 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 2830936016594819812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org2.example.com | [367 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [368 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:37212 +peer0.org2.example.com | [369 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:37212 +peer0.org2.example.com | [36a 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36b 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36c 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36d 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36e 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36f 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [370 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [372 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [373 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [374 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [375 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111c20 gate 1574140909718047500 evaluation starts +peer0.org2.example.com | [376 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111c20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [377 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111c20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [378 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [379 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111c20 principal evaluation fails +peer0.org2.example.com | [37a 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111c20 gate 1574140909718047500 evaluation fails +peer0.org2.example.com | [37b 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [37c 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [37d 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [37e 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003166190 gate 1574140909718372700 evaluation starts +peer0.org2.example.com | [37f 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003166190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [380 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003166190 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [381 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003166190 principal matched by identity 0 +peer0.org2.example.com | [382 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org2.example.com | [383 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 ea 90 3e 97 eb 0b 53 d5 67 f0 2f |0D. 3..>...S.g./| +peer0.org2.example.com | 00000010 17 e1 69 28 ee e0 74 3d a7 7e ac af 11 4e 32 51 |..i(..t=.~...N2Q| +peer0.org2.example.com | 00000020 99 4a 2c 14 02 20 09 8c 32 6d 1b b7 5a ec 59 de |.J,.. ..2m..Z.Y.| +peer0.org2.example.com | 00000030 c6 6a 89 2b d1 27 7a 7a 17 1d b4 d2 5e a3 7a 6a |.j.+.'zz....^.zj| +peer0.org2.example.com | 00000040 e1 fc 53 5f b9 8a |..S_..| +peer0.org2.example.com | [384 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003166190 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [385 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003166190 gate 1574140909718372700 evaluation succeeds +peer0.org2.example.com | [386 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [387 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [388 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [389 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [38a 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:37212 +peer0.org2.example.com | [38b 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:37212 +peer0.org2.example.com | [38c 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37212 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: nonce:14982435750489679862 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [38d 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38e 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:14982435750489679862 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [38f 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [390 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [391 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [392 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [393 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [394 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [395 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [396 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [397 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031676a0 gate 1574140909734996600 evaluation starts +peer0.org2.example.com | [398 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031676a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [399 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031676a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [39a 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031676a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [39b 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031676a0 principal evaluation fails +peer0.org2.example.com | [39c 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031676a0 gate 1574140909734996600 evaluation fails +peer1.org1.example.com | [28a 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [28b 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [28c 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [28d 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [28e 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [28f 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [290 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [291 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [292 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [293 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [294 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [295 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [296 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [297 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [298 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [299 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [29a 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [29b 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [29c 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [29d 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [29e 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [29f 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [2a0 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [2a1 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [2a2 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [2a3 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [2a4 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [2a5 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [2a6 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2a7 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [2a8 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [2a9 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [2aa 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [2ab 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [2ac 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [2ad 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [2ae 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [2af 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer1.org1.example.com | [2b0 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org1.example.com | [2b1 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [2b2 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [2b3 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org1.example.com | [2b4 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [2b5 11-19 05:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [2b6 11-19 05:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [2b7 11-19 05:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [2b8 11-19 05:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [2b9 11-19 05:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [2ba 11-19 05:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer1.org1.example.com | [2bb 11-19 05:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer1.org1.example.com | [2bc 11-19 05:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer1.org1.example.com | [2bd 11-19 05:21:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [2be 11-19 05:21:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2bf 11-19 05:21:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org1.example.com | [2c0 11-19 05:21:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org1.example.com | [2c1 11-19 05:21:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer1.org1.example.com | [2c2 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer1.org1.example.com | [2c3 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer1.org1.example.com | [2c4 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2c5 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F0B3D5E6FC999EEC15...05172BB05543DDAEAECD899A2A020801 +peer0.org2.example.com | [39d 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [39e 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [39f 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a0 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167c10 gate 1574140909735271800 evaluation starts +peer0.org2.example.com | [3a1 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167c10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a2 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167c10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3a3 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167c10 principal matched by identity 0 +peer0.org2.example.com | [3a4 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 08 db e6 e6 60 1d 9a 29 8b 5b 65 68 c7 42 52 |.....`..).[eh.BR| +peer0.org2.example.com | 00000010 6e ad 90 31 f7 26 f4 b2 af ad 08 a3 c5 fa 0f 54 |n..1.&.........T| +peer0.org2.example.com | [3a5 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 97 ca 8f 47 3c c1 df 9a ca 18 44 |0D. k...G<.....D| +peer0.org2.example.com | 00000010 12 a0 45 c1 58 f4 5e 41 58 97 6d 4e f3 29 4d e0 |..E.X.^AX.mN.)M.| +peer0.org2.example.com | 00000020 ae 26 b0 39 02 20 69 31 4f c6 c0 c5 52 c9 8d 3c |.&.9. i1O...R..<| +peer0.org2.example.com | 00000030 15 f0 e9 ce 7d a9 ad 6b 17 f2 6b cc dd b1 c0 08 |....}..k..k.....| +peer0.org2.example.com | 00000040 55 b0 84 1f 05 72 |U....r| +peer0.org2.example.com | [3a6 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167c10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a7 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167c10 gate 1574140909735271800 evaluation succeeds +peer0.org2.example.com | [3a8 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a9 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3aa 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ab 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ac 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ad 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer0.org2.example.com | [3ae 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3af 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b0 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b1 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b2 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [3b3 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b4 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b5 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b6 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 14982435750489679862, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b7 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\213\213\335\017D\334\021\255v}\212o\017\030\257\\\204K\t\341g\365\212\225\002 %\372I[\306\022G\301\346\001\311\366\3659\350t\330\355\2072\362\234\220\352Y\256,'\001\353e\334" > +peer0.org2.example.com | [3b8 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 14982435750489679862, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b9 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ba 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37212 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3bb 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bc 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3bd 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3be 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [554 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [555 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [556 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [557 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [558 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [559 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [55a 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [55b 11-19 05:21:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [55c 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [55d 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [55e 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [55f 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [560 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [561 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [562 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [563 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [564 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [565 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [566 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [567 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [568 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [569 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [56a 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [56b 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [56c 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [56d 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [56e 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [56f 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [570 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [571 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [572 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [573 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [574 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [575 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [576 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [577 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [578 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [579 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [57a 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [57b 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [57c 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [57d 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [57e 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [57f 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [580 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [581 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [582 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [583 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [584 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [585 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [586 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [587 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [588 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [589 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [58a 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [58b 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [58c 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [58d 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [58e 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +orderer0.example.com | "2019-11-19 05:21:32.650 UTC [fsblkstorage] newBlockfileStream -> DEBU 233 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-11-19 05:21:32.650 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 234 Remaining bytes=[20287], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:21:32.650 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 235 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-11-19 05:21:32.650 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 236 blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [fsblkstorage] Next -> DEBU 237 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [fsblkstorage] newBlockfileStream -> DEBU 238 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Remaining bytes=[20287], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23b blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [common.channelconfig] NewStandardValues -> DEBU 23c Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:32.651 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:32.652 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:21:32.652 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.652 UTC [common.channelconfig] NewStandardValues -> DEBU 242 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:32.652 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:32.652 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] NewStandardValues -> DEBU 249 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] NewStandardValues -> DEBU 24b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [common.channelconfig] validateMSP -> DEBU 24d Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [msp] newBccspMsp -> DEBU 24e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [msp] New -> DEBU 24f Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [msp] Setup -> DEBU 250 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:32.653 UTC [msp.identity] newIdentity -> DEBU 251 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.654 UTC [msp.identity] newIdentity -> DEBU 252 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.654 UTC [msp] Validate -> DEBU 253 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:32.654 UTC [common.channelconfig] NewStandardValues -> DEBU 254 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-11-19 05:21:32.654 UTC [common.channelconfig] initializeProtosStruct -> DEBU 255 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-11-19 05:21:32.654 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.655 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.655 UTC [common.channelconfig] validateMSP -> DEBU 258 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.655 UTC [msp] newBccspMsp -> DEBU 259 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.655 UTC [msp] New -> DEBU 25a Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.655 UTC [msp] Setup -> DEBU 25b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.655 UTC [msp.identity] newIdentity -> DEBU 25c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [3bf 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c0 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c1 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c2 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c3 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c4 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3c5 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313b6d0 gate 1574140909776477000 evaluation starts +peer0.org2.example.com | [3c6 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313b6d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c7 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313b6d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3c8 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313b6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3c9 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313b6d0 principal evaluation fails +peer0.org2.example.com | [3ca 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313b6d0 gate 1574140909776477000 evaluation fails +peer0.org2.example.com | [3cb 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3cc 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3cd 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ce 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313bc40 gate 1574140909780499400 evaluation starts +peer0.org2.example.com | [3cf 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313bc40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d0 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313bc40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d1 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313bc40 principal matched by identity 0 +peer0.org2.example.com | [3d2 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 55 cb b3 34 39 d6 e8 a7 3a c9 55 d8 ef 50 17 |.U..49...:.U..P.| +peer0.org2.example.com | 00000010 12 63 1d 7b 04 0e 36 43 eb b0 e9 77 42 ef 9a 1c |.c.{..6C...wB...| +peer0.org2.example.com | [3d3 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d c8 c3 99 a2 69 02 ac 4d af 7c |0E.!......i..M.|| +peer0.org2.example.com | 00000010 8f e4 a0 cd d2 a3 05 47 c2 ca 7f 82 e4 03 7c c0 |.......G......|.| +peer0.org2.example.com | 00000020 f9 a5 d7 9a 0b 02 20 4a 78 c4 c5 fc 6a 4a b4 6d |...... Jx...jJ.m| +peer0.org2.example.com | 00000030 5e c0 89 63 9a 2b 02 27 67 fd 16 c0 8b fa b4 b7 |^..c.+.'g.......| +peer0.org2.example.com | 00000040 52 91 6c 4a f1 e5 40 |R.lJ..@| +peer0.org2.example.com | [3d4 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313bc40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d5 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313bc40 gate 1574140909780499400 evaluation succeeds +peer0.org2.example.com | [3d6 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d7 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d8 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d9 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3da 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3db 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3dc 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3dd 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3de 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3df 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e0 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e1 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e2 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e3 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e4 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e5 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e6 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e7 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e8 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e9 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3ea 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3eb 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ec 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [3ed 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> INFO 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Becoming a leader +peer0.org2.example.com | [3ee 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer0.org2.example.com | [3ef 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer0.org2.example.com | [3f0 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [3f1 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [3f2 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3f3 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510021801 +peer0.org2.example.com | [3f4 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A88107AA7A9C105BBEC9F5C9952D29F7DBF90DE55234BCCA38723955411DC3FE +peer0.org2.example.com | [3f5 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [3f6 11-19 05:21:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer0.org2.example.com | [3f7 11-19 05:21:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f8 11-19 05:21:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f9 11-19 05:21:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3fa 11-19 05:21:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3fb 11-19 05:21:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }] +peer0.org2.example.com | [3fc 11-19 05:21:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3fd 11-19 05:21:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0031f1b20, CONNECTING +peer0.org2.example.com | [3fe 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0031f1b20, READY +peer0.org2.example.com | [3ff 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer2.example.com:7050 [OrdererMSP]} +peer0.org2.example.com | [400 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer2.example.com:7050 +peer0.org2.example.com | [401 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer2.example.com:7050 ... +peer0.org2.example.com | [402 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [403 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer0.org2.example.com | [404 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [405 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [406 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608EEF7CDEE0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer0.org2.example.com | [407 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DC5B67F0DB1C106BDB05FDBE48ECF838BFFC2F0991027DB5378CBC538FA99448 +peer0.org2.example.com | [408 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [409 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40a 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40b 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [40c 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [40d 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [40e 11-19 05:21:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40f 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICDjCCAbSgAwIBAgIRAN+s1O7GI0UOMZvmoXtLQ1YwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org2.example.com | CCqGSM49AwEHA0IABLwiaJeJ09sTdw1MBVFS4IREZVAH8wN2uMKkrIa8umfpr/In +peer0.org2.example.com | RebO70d5f9RXjMamMvpVELq15f/FJggdIovxyjijTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org2.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQCaK9TwZhkZlKcM6m+SNiI0 +peer0.org2.example.com | E0GWKJ8reffQGfFs/3HOTwIgagYUi0kZAQPl5hFBQns2vt2nCPA+hmOrUD0pfqND +peer0.org2.example.com | 93Q= +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [58f 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [590 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [591 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [592 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [593 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [594 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [595 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [596 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [597 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [598 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [599 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [59a 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [59b 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [59c 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [59d 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [59e 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [59f 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [5a0 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [5a1 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [5a2 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [5a3 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [5a4 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [5a5 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [5a6 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [5a7 11-19 05:21:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5a9 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [5aa 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [5ab 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5ad 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [5a8 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [5ac 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [5af 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [5b0 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [5b1 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [5b2 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035dd820, CONNECTING +peer1.org2.example.com | [5ae 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [5b3 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [5b4 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [5b5 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035dda70, CONNECTING +peer1.org2.example.com | [5b6 11-19 05:21:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5b7 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 ff e7 a3 3b 02 20 5c da 29 43 7b e8 60 f8 1a 1b |...;. \.)C{.`...| +peer0.org1.example.com | 00000030 a1 26 2e 78 1c fa ea c4 7f 6a 22 e3 cf 47 d7 09 |.&.x.....j"..G..| +peer0.org1.example.com | 00000040 d5 c7 90 52 62 2d |...Rb-| +peer0.org1.example.com | [384 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [385 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [386 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [387 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [388 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [389 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [38a 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38b 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +peer0.org1.example.com | 00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +peer0.org1.example.com | [38d 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +peer0.org1.example.com | 00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +peer0.org1.example.com | 00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +peer0.org1.example.com | 00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +peer0.org1.example.com | 00000040 30 b2 7f b8 62 2d 65 |0...b-e| +peer0.org1.example.com | [38e 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38f 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [390 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [391 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [392 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [393 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [394 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [395 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 gate 1574140907346562700 evaluation starts +peer0.org1.example.com | [396 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [397 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [398 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [399 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [39a 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [39b 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 principal matched by identity 0 +peer0.org1.example.com | [39c 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +peer0.org1.example.com | 00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +peer0.org1.example.com | [39d 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +peer0.org1.example.com | 00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +peer0.org1.example.com | 00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +peer0.org1.example.com | 00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +peer0.org1.example.com | 00000040 30 b2 7f b8 62 2d 65 |0...b-e| +peer0.org1.example.com | [39e 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [39f 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 gate 1574140907346562700 evaluation succeeds +peer0.org1.example.com | [3a0 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a1 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a2 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a3 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a4 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a5 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [5b8 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [5b9 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035dd820, READY +peer1.org2.example.com | [5ba 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5bb 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer1.org2.example.com | [5bc 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer1.org2.example.com | [5bd 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.9:7051 +peer1.org2.example.com | [5be 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer1.org2.example.com | [5bf 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5c0 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer1.org2.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer1.org2.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer1.org2.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer1.org2.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [5c1 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [5c2 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [5c3 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 44 02 20 70 17 65 16 e1 f9 87 e9 f5 fd 00 f5 |0D. p.e.........| +peer1.org2.example.com | 00000010 cc a4 8f 46 39 b8 0c bb 96 ef b8 0b 02 fa 51 7b |...F9.........Q{| +peer1.org2.example.com | 00000020 00 b3 e5 6d 02 20 5e ec cf ad cc e3 59 3f c3 f1 |...m. ^.....Y?..| +peer1.org2.example.com | 00000030 8d bb f7 43 44 8a ed d3 54 ce 5c 65 bb 4e 00 96 |...CD...T.\e.N..| +peer1.org2.example.com | 00000040 85 50 41 50 6f a9 |.PAPo.| +peer1.org2.example.com | [5c5 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +peer1.org2.example.com | [5c6 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5c7 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151012 +peer1.org2.example.com | [5c8 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1EF880A5E3286D181C9DBAFEC341E3B211849075BA4F5D147329842BE89DFCEF +peer1.org2.example.com | [5c9 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5ca 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [5cb 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [5cc 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12228799154479252007 tag:EMPTY mem_req:\002 \037\276\230\263\\\027Y\251\234~\303\365\005\232\264\312\267'\247\034\363\222#\377f\376b=5\006th9\0162\215U\364\265\326p\014}\255\317\002 \001\325\316\272S\336\305\330\021\226w\327u\233\335#\337\033\336\030~\341q\022\207,\266\267o\275\004\327" > > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5cd 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:12228799154479252007 tag:EMPTY mem_req:\002 \037\276\230\263\\\027Y\251\234~\303\365\005\232\264\312\267'\247\034\363\222#\377f\376b=5\006th9\0162\215U\364\265\326p\014}\255\317\002 \001\325\316\272S\336\305\330\021\226w\327u\233\335#\337\033\336\030~\341q\022\207,\266\267o\275\004\327" > > > , Envelope: 282 bytes, Signature: 0 bytes +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.656 UTC [common.channelconfig] NewStandardValues -> DEBU 25d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:32.656 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:32.656 UTC [common.channelconfig] validateMSP -> DEBU 25f Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.656 UTC [msp] newBccspMsp -> DEBU 260 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.656 UTC [msp] New -> DEBU 261 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:32.656 UTC [msp] Setup -> DEBU 262 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.656 UTC [msp.identity] newIdentity -> DEBU 263 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:32.658 UTC [msp] Setup -> DEBU 264 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:32.658 UTC [msp] Setup -> DEBU 265 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:32.658 UTC [policies] NewManagerImpl -> DEBU 266 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.658 UTC [policies] NewManagerImpl -> DEBU 267 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.658 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] GetPolicy -> DEBU 276 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:32.659 UTC [policies] GetPolicy -> DEBU 279 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-11-19 05:21:32.667 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:32.668 UTC [common.configtx] addToMap -> DEBU 27b Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 27c Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:32.671 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.671 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:32.671 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel/Consortiums" +peer0.org1.example.com | [3a6 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a7 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a8 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a9 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3aa 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ab 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +peer0.org1.example.com | 00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +peer0.org1.example.com | [3ac 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +peer0.org1.example.com | 00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +peer0.org1.example.com | 00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +peer0.org1.example.com | 00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +peer0.org1.example.com | 00000040 30 b2 7f b8 62 2d 65 |0...b-e| +peer0.org1.example.com | [3ad 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ae 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3af 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b0 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b1 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b2 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b3 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [3b4 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b5 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b6 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b7 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b8 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3b9 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 7e fb 38 90 4f 41 80 2d 00 3f 4f a4 59 8d 1c |.~.8.OA.-.?O.Y..| +peer0.org1.example.com | 00000010 8d e2 b1 c2 ff f6 0c ff 0c 6a 0d 49 73 98 00 b2 |.........j.Is...| +peer0.org1.example.com | [3ba 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 c3 cd 1f 4e 53 34 2e d4 92 99 92 |0D. d...NS4.....| +peer0.org1.example.com | 00000010 99 90 c0 2f 7f 09 d3 39 27 d0 7f fe 0f 31 66 dd |.../...9'....1f.| +peer0.org1.example.com | 00000020 68 d0 db 10 02 20 1a 26 ba ba bc e1 4f c4 91 59 |h.... .&....O..Y| +peer0.org1.example.com | 00000030 24 25 9d 0c 36 26 5f 29 ad 46 14 d8 5c af 77 13 |$%..6&_).F..\.w.| +peer0.org1.example.com | 00000040 42 d3 bb 53 7b 50 |B..S{P| +peer0.org1.example.com | [3bb 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3bc 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 66 f4 d4 f8 b8 84 b6 79 4c 4d 6c |0D. .f......yLMl| +peer0.org1.example.com | 00000010 a6 57 89 f6 d9 b9 e3 79 ca 9f 3c 84 13 a4 04 8d |.W.....y..<.....| +peer0.org1.example.com | 00000020 3f 0d f6 24 02 20 12 21 85 97 db 3f a8 b1 0d d4 |?..$. .!...?....| +peer0.org1.example.com | 00000030 d6 47 1f 40 13 6c 05 0d 6e 6d 68 78 b5 16 34 43 |.G.@.l..nmhx..4C| +peer0.org1.example.com | 00000040 28 85 8c f0 b9 ac |(.....| +peer0.org1.example.com | [3bd 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [410 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183db0 gate 1574140910050726200 evaluation starts +peer0.org2.example.com | [411 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183db0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [412 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183db0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:32.673 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:32.673 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:32.673 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2a2 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2a3 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a4 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a5 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a6 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a7 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a8 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a9 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2aa Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2ab Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ac As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ad As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ae As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2af As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-11-19 05:21:32.674 UTC [common.capabilities] Supported -> DEBU 2b0 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:32.675 UTC [common.capabilities] Supported -> DEBU 2b1 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:32.675 UTC [orderer.common.server] func1 -> DEBU 2b2 Executing callback to update root CAs" +orderer0.example.com | "2019-11-19 05:21:32.675 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b3 updating root CAs for channel [testchainid]" +orderer0.example.com | "2019-11-19 05:21:32.675 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b4 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-11-19 05:21:32.675 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b5 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-11-19 05:21:32.675 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b6 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [fsblkstorage] Next -> DEBU 2b7 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [fsblkstorage] newBlockfileStream -> DEBU 2b8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2b9 Remaining bytes=[20287], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ba Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2bb blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2bc [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2bd EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2be No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +orderer0.example.com | "2019-11-19 05:21:32.676 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2bf No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +peer0.org1.example.com | [3be 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3bf 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3c0 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3c1 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3c2 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c3 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c4 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c5 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [3c6 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3c7 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\273\014\220ktO\306" secret_envelope: > +peer0.org1.example.com | [3c8 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c9 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ca 11-19 05:21:48.34 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] +peer0.org1.example.com | [3cb 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [3cc 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> INFO d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Becoming a leader +peer0.org1.example.com | [3cd 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer0.org1.example.com | [3ce 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer0.org1.example.com | [3cf 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [3d1 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [3d2 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3d3 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510021801 +peer0.org1.example.com | [3d0 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer0.org1.example.com | [3d4 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BC9E08E17D1CFD4597A9696E5B568A5D269363A63E643072C4758DE1EF8D5CDE +peer0.org1.example.com | [3d5 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3d6 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [3d7 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }] +peer0.org1.example.com | [3d8 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3d9 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002f43dd0, CONNECTING +peer0.org1.example.com | [3da 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [3db 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002f43dd0, READY +peer0.org1.example.com | [3dc 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer1.example.com:7050 [OrdererMSP]} +peer0.org1.example.com | [3dd 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer1.example.com:7050 +peer0.org1.example.com | [3de 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer1.example.com:7050 ... +peer0.org1.example.com | [3df 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org1.example.com | [3e0 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer0.org1.example.com | [3e1 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e2 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e3 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A91070A3D08051A0608EDF7CDEE0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer0.org1.example.com | [3e4 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C9262BF29C4FD45CFA3031949814B03315D661165B0EC83AF623546D4DDC3E15 +peer0.org1.example.com | [3e5 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e6 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e7 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e8 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [3e9 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ea 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [3eb 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ec 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 +peer0.org1.example.com | +Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +peer0.org1.example.com | LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +peer0.org1.example.com | rkc= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3ed 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3ee 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 gate 1574140909413768100 evaluation starts +peer0.org1.example.com | [3ef 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f0 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3f1 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [3f2 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [3f3 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 principal matched by identity 0 +peer0.org1.example.com | [3f4 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 0d 67 29 f2 dd c4 44 52 b4 64 a8 1f 10 48 f2 |..g)...DR.d...H.| +peer0.org1.example.com | 00000010 b8 ca 62 79 aa 7d b8 fd 4f c3 59 ec ca f2 d4 c0 |..by.}..O.Y.....| +peer0.org1.example.com | [3f5 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5e 71 4d 29 b8 62 52 b5 8f 10 |0E.!..^qM).bR...| +peer0.org1.example.com | 00000010 08 d1 28 d7 4e 48 91 21 b9 2d 62 76 1a 21 f5 c7 |..(.NH.!.-bv.!..| +peer0.org1.example.com | 00000020 6a 6f db 01 da 02 20 69 62 fa a9 16 65 97 6f 50 |jo.... ib...e.oP| +peer0.org1.example.com | 00000030 e3 26 90 3c e8 a4 da 6c e5 32 60 77 95 cd 48 c9 |.&.<...l.2`w..H.| +peer0.org1.example.com | 00000040 d4 ee d2 5a 59 63 26 |...ZYc&| +peer0.org1.example.com | [3f6 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f7 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 gate 1574140909413768100 evaluation succeeds +peer0.org1.example.com | [3f8 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3f9 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3fa 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3fb 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3fc 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [3fd 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [3fe 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [3ff 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [1] +peer0.org1.example.com | [400 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [401 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org1.example.com | [402 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer0.org1.example.com | [403 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer0.org1.example.com | [404 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org1.example.com | [405 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer0.org2.example.com | [413 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org2.example.com | [414 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [415 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183db0 principal matched by identity 0 +peer0.org2.example.com | [416 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 47 1b dc c7 e2 6d a6 04 af 2e 32 6c 6c 41 9c |.G....m....2llA.| +peer0.org2.example.com | 00000010 29 bb 8a 5a 78 df df e4 f0 82 5e 39 8f e0 c7 bb |)..Zx.....^9....| +peer0.org2.example.com | [417 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 a3 a0 92 2c fc 46 10 1e f7 f7 b3 |0D.!....,.F.....| +peer0.org2.example.com | 00000010 44 03 61 f8 31 f3 1d 3d 37 b5 4a 42 47 07 4d e3 |D.a.1..=7.JBG.M.| +peer0.org2.example.com | 00000020 65 ce e9 d2 55 02 1f 11 ba ad e3 e6 3c 57 f3 e2 |e...U....... DEBU 0xc003183db0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [419 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183db0 gate 1574140910050726200 evaluation succeeds +peer0.org2.example.com | [41a 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [41b 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [41c 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [41d 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [41e 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org2.example.com | [41f 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org2.example.com | [420 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [421 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer0.org2.example.com | [422 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer0.org2.example.com | [423 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [0] +peer0.org2.example.com | [424 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org2.example.com | [425 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer0.org2.example.com | [426 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer0.org2.example.com | [427 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [428 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00314ca00 env 0xc003238910 txn 0 +peer0.org2.example.com | [429 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003238910 +peer0.org2.example.com | [42a 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +peer0.org2.example.com | [42b 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [42d 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [42e 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [42c 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25491 bytes, seq: 1}, Envelope: 25524 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [430 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org2.example.com | [42f 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [431 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org2.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer0.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org2.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org2.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org2.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org2.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org2.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org2.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org2.example.com | fQ== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [432 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer0.org2.example.com | [433 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [434 11-19 05:21:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [435 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 24 ac 10 46 16 fe ce bb 6e 57 f7 c2 1e a1 d7 |.$..F....nW.....| +peer0.org2.example.com | 00000010 ca f6 e7 e8 44 8c cd d1 bf f4 d7 40 94 11 a4 79 |....D......@...y| +peer0.org2.example.com | [436 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 c4 5b a3 d3 2b 64 c0 35 61 d6 |0E.!...[..+d.5a.| +peer0.org2.example.com | 00000010 95 cb 42 f3 53 ed ef ed 72 82 6d 75 eb c7 a6 cf |..B.S...r.mu....| +peer0.org2.example.com | 00000020 f1 06 36 11 63 02 20 1c 0c c7 c4 d6 6e e7 f0 43 |..6.c. .....n..C| +peer0.org2.example.com | 00000030 67 71 a7 fd 4f 11 0f ce c9 86 9f 83 ad a4 58 be |gq..O.........X.| +peer0.org2.example.com | 00000040 b3 5c 64 f4 e2 dd 4d |.\d...M| +peer0.org2.example.com | [437 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [438 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0032da000, header channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +peer0.org2.example.com | [439 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [43a 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [43c 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [43b 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [43d 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [43f 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [440 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [441 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f8b30 gate 1574140910065597100 evaluation starts +peer0.org2.example.com | [442 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f8b30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [443 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f8b30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [444 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f8b30 principal matched by identity 0 +peer0.org2.example.com | [445 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 ed 41 02 cc 5f 2a 6f e5 1e 76 be 20 c9 6d ca |..A.._*o..v. .m.| +peer0.org2.example.com | 00000010 0f 2e 48 27 5a 1d 2e ab f5 f7 08 d0 0a bd 75 a6 |..H'Z.........u.| +peer0.org2.example.com | [446 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 2d 59 21 d8 2c 3b 77 de 06 99 |0E.!..-Y!.,;w...| +peer0.org2.example.com | 00000010 3b 87 82 cc 2b d4 81 6c f1 23 2e 41 fa 8b 2b a1 |;...+..l.#.A..+.| +peer0.org2.example.com | 00000020 a7 4a 26 a3 a1 02 20 4a 45 58 ae 74 e7 86 1b 8c |.J&... JEX.t....| +peer0.org2.example.com | 00000030 b6 de fa d6 f0 52 0f 48 20 b1 ec 39 f9 f4 ae 8a |.....R.H ..9....| +peer0.org2.example.com | 00000040 39 90 39 ac 0f f5 ff |9.9....| +peer0.org2.example.com | [447 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [448 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f8b30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [449 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f8b30 gate 1574140910065597100 evaluation succeeds +peer0.org2.example.com | [44a 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [44b 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [44c 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [44e 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [44d 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44f 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org2.example.com | [450 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org2.example.com | [43e 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [451 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [453 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [0] +peer0.org2.example.com | [452 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [454 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [455 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [456 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [457 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [458 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [459 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [45a 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25496 bytes, seq: 2}, Envelope: 25529 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [45c 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer0.org2.example.com | [45b 11-19 05:21:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [45d 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [45e 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [45f 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [460 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [461 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [462 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [463 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [464 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org2.example.com | [465 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [466 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [467 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [468 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [469 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [5ce 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [5cf 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [5d0 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [5d1 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [5d2 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [5d3 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [5d4 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00327f080 env 0xc0032bb360 txn 0 +peer1.org2.example.com | [5d5 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [5d6 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 91ms +peer1.org2.example.com | [5d7 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [5d8 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [5d9 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [5da 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer1.org2.example.com | [5db 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [5dc 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [5dd 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [5de 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer1.org2.example.com | [5df 11-19 05:21:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [5e0 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [5e1 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [5e2 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [5e3 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [5e4 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [5e5 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [406 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer0.org1.example.com | [407 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [408 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002f8cf40 env 0xc00307c7d0 txn 0 +peer0.org1.example.com | [409 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00307c7d0 +peer0.org1.example.com | [40a 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +peer0.org1.example.com | [40b 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [40c 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [40d 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [410 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [411 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [40e 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [40f 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [412 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [414 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [415 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 gate 1574140909425847500 evaluation starts +peer0.org1.example.com | [416 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [417 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [418 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 principal matched by identity 0 +peer0.org1.example.com | [419 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 91 7f 7d a7 af 3c 87 a6 35 17 24 8d af 90 a3 |...}..<..5.$....| +peer0.org1.example.com | 00000010 9c 3f e8 16 83 d2 11 ae 07 62 88 c0 41 a0 bc 76 |.?.......b..A..v| +peer0.org1.example.com | [41a 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 89 59 37 ed 6c ef 46 99 77 07 88 |0D. B.Y7.l.F.w..| +peer0.org1.example.com | 00000010 25 71 00 7a ca 4f fc d5 07 4b 3c 91 59 93 9c 26 |%q.z.O...K<.Y..&| +peer0.org1.example.com | 00000020 9d a1 c1 78 02 20 1a ad 4d ed 38 4f f6 87 77 4e |...x. ..M.8O..wN| +peer0.org1.example.com | 00000030 06 62 fc 50 54 7c b9 e6 b1 6e 8c 80 a3 be be 72 |.b.PT|...n.....r| +peer0.org1.example.com | 00000040 96 dc 8b 79 6a f8 |...yj.| +peer0.org1.example.com | [41b 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [41c 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 gate 1574140909425847500 evaluation succeeds +peer0.org1.example.com | [41d 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [41e 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [41f 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [420 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [421 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [422 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [423 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [424 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [1] +peer0.org1.example.com | [425 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [426 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer0.org1.example.com | [413 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [427 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org1.example.com | fQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [428 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer0.org1.example.com | [429 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [42a 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [42b 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 24 ac 10 46 16 fe ce bb 6e 57 f7 c2 1e a1 d7 |.$..F....nW.....| +peer0.org1.example.com | 00000010 ca f6 e7 e8 44 8c cd d1 bf f4 d7 40 94 11 a4 79 |....D......@...y| +peer0.org1.example.com | [42c 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 c4 5b a3 d3 2b 64 c0 35 61 d6 |0E.!...[..+d.5a.| +peer0.org1.example.com | 00000010 95 cb 42 f3 53 ed ef ed 72 82 6d 75 eb c7 a6 cf |..B.S...r.mu....| +peer0.org1.example.com | 00000020 f1 06 36 11 63 02 20 1c 0c c7 c4 d6 6e e7 f0 43 |..6.c. .....n..C| +peer0.org1.example.com | 00000030 67 71 a7 fd 4f 11 0f ce c9 86 9f 83 ad a4 58 be |gq..O.........X.| +peer0.org1.example.com | 00000040 b3 5c 64 f4 e2 dd 4d |.\d...M| +peer0.org1.example.com | [42d 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [42e 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0030a6000, header channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +peer0.org1.example.com | [42f 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [430 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [431 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [432 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [433 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [434 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [435 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [436 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [437 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [438 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [439 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [43a 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [43b 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [43c 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [43d 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [43e 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [43f 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [440 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org1.example.com | [441 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [442 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [443 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [444 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [445 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [446 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [447 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org1.example.com | [448 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [449 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [44a 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org1.example.com | [44b 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [44c 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 gate 1574140909430596600 evaluation starts +peer0.org1.example.com | [44d 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44e 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [44f 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [450 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [451 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [452 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [453 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [454 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [455 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 principal matched by identity 0 +peer0.org1.example.com | [456 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +peer0.org1.example.com | 00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.| +peer0.org1.example.com | [457 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +peer0.org1.example.com | 00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +peer0.org1.example.com | 00000020 9d 53 74 88 4b 02 20 0b f6 9b f4 5d 00 74 ee 9d |.St.K. ....].t..| +peer0.org1.example.com | 00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +peer0.org1.example.com | 00000040 4d ed a9 9c dd 40 ef |M....@.| +peer0.org1.example.com | [458 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [459 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 gate 1574140909430596600 evaluation succeeds +peer0.org1.example.com | [45a 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [45b 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [45c 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [45d 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [45e 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [45f 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [460 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [461 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [462 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +orderer0.example.com | "2019-11-19 05:21:32.682 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2c0 Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +peer0.org2.example.com | [46a 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [2c6 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AA104E0FD1D15DF0AF77C4891DF0BEBA59D04D98885EF537B13D4834A26F64E4 +peer1.org2.example.com | [5e6 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [463 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +orderer0.example.com | "2019-11-19 05:21:32.683 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c1 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +peer0.org2.example.com | [46b 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer1.org1.example.com | [2c7 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer1.org2.example.com | [5e7 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [464 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +orderer0.example.com | "2019-11-19 05:21:32.683 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c2 Appending 0 entries to memory storage" channel=testchainid node=1 +peer0.org2.example.com | [46c 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [2c8 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer1.org2.example.com | [5e8 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [465 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | "2019-11-19 05:21:32.683 UTC [fsblkstorage] Next -> DEBU 2c3 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org2.example.com | [46d 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [2c9 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer1.org2.example.com | [5e9 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [466 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +orderer0.example.com | "2019-11-19 05:21:32.683 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [46e 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer1.org1.example.com | [2ca 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer1.org2.example.com | [5ea 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [467 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | "2019-11-19 05:21:32.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c5 Remaining bytes=[20287], Going to peek [8] bytes" +peer0.org2.example.com | [46f 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org1.example.com | [2cb 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer1.org2.example.com | [5eb 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [468 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +orderer0.example.com | "2019-11-19 05:21:32.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [470 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cc 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [5ec 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +orderer0.example.com | "2019-11-19 05:21:32.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c7 blockbytes [20284] read from file [0]" +peer0.org1.example.com | [469 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [471 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [2cd 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [6d754dad-d636-425c-ad93-9819d3672512] +peer1.org2.example.com | [5ed 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +orderer0.example.com | "2019-11-19 05:21:32.684 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2c8 [channel: testchainid] Done creating channel support resources" +peer0.org1.example.com | [46a 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [2ce 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [5ef 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +orderer0.example.com | "2019-11-19 05:21:32.684 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2c9 Creating system channel msg processor for channel testchainid" +peer0.org1.example.com | [46b 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [2cf 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [6d754dad] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [5ee 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0035a7180)} +orderer0.example.com | "2019-11-19 05:21:32.684 UTC [fsblkstorage] Next -> DEBU 2ca Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org1.example.com | [46c 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [2d0 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [6d754dad] notifying Txid:6d754dad-d636-425c-ad93-9819d3672512, channelID:businesschannel +peer1.org2.example.com | [5f0 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +orderer0.example.com | "2019-11-19 05:21:32.684 UTC [fsblkstorage] newBlockfileStream -> DEBU 2cb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org1.example.com | [46d 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [46e 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [5f2 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003787150, CONNECTING +orderer0.example.com | "2019-11-19 05:21:32.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cc Remaining bytes=[20287], Going to peek [8] bytes" +peer0.org1.example.com | [46f 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [2d1 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [5f1 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +orderer0.example.com | "2019-11-19 05:21:32.685 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cd Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | [470 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | [2d2 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [5f3 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +orderer0.example.com | "2019-11-19 05:21:32.685 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ce blockbytes [20284] read from file [0]" +peer0.org1.example.com | [471 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org1.example.com | [2d3 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6d754dad-d636-425c-ad93-9819d3672512] +peer1.org2.example.com | [5f4 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer1.org2.example.com | [5f5 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +orderer0.example.com | "2019-11-19 05:21:32.685 UTC [orderer.commmon.multichannel] Initialize -> INFO 2cf Starting system channel 'testchainid' with genesis block hash 7ae40fb1ee3dd466a7fe3b6a5c89e821a4b87734ad526b49eef9d58f04bf6f08 and orderer type etcdraft" +peer0.org2.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer1.org1.example.com | [2d4 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [5f6 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +orderer0.example.com | "2019-11-19 05:21:32.685 UTC [orderer.consensus.etcdraft] Start -> INFO 2d0 Starting Raft node" channel=testchainid node=1 +peer0.org1.example.com | [472 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [2d5 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [0ea0c9f5-6f47-48d3-8a0f-ab51d5fb88f2] +peer1.org2.example.com | [5f7 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035dda70, READY +orderer0.example.com | "2019-11-19 05:21:32.686 UTC [orderer.common.cluster] Configure -> INFO 2d1 Entering, channel: testchainid, nodes: [ID: 2, +peer0.org1.example.com | [473 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer1.org1.example.com | [2d6 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [5f8 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | Endpoint: orderer1.example.com:7050, +peer0.org1.example.com | [474 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes +peer0.org2.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer1.org1.example.com | [2d7 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | [5fa 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer0.org1.example.com | [475 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer1.org1.example.com | [2d8 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [0ea0c9f5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [5fb 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +peer0.org1.example.com | [476 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2d9 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [0ea0c9f5] notifying Txid:0ea0c9f5-6f47-48d3-8a0f-ab51d5fb88f2, channelID:businesschannel +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [5fc 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer0.org1.example.com | [477 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [472 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e540 gate 1574140910072180100 evaluation starts +peer1.org1.example.com | [2da 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org2.example.com | [5f9 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org1.example.com | [478 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [473 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2db 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +peer1.org2.example.com | [5fd 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x39, 0x34, 0x96, 0xee, 0x50, 0x5e, 0xad, 0x78, 0xfc, 0x3, 0xa3, 0xac, 0x21, 0xe9, 0xfb, 0x52, 0x19, 0x4e, 0xd1, 0x91, 0xc2, 0x3c, 0xb8, 0xb, 0x70, 0x9b, 0xb2, 0x3d, 0xdd, 0xb4, 0xc8, 0xd8} txOffsets= +peer0.org1.example.com | [479 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [474 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e540 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2dc 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0ea0c9f5-6f47-48d3-8a0f-ab51d5fb88f2] +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org2.example.com | txId=02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732 locPointer=offset=71, bytesLength=24474 +peer0.org1.example.com | [47a 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [475 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [2dd 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org2.example.com | ] +peer0.org1.example.com | [47b 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [476 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [2de 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [01652971-d5b1-4a70-9b40-24d3976b53e3] +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +peer1.org2.example.com | [5fe 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to txid-index +peer0.org1.example.com | [47c 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [477 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [2df 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +peer1.org2.example.com | [5ff 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx number:[0] ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to blockNumTranNum index +peer0.org1.example.com | [47d 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [478 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [2e0 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org2.example.com | [600 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer0.org1.example.com | [47e 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [479 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [2e1 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [01652971] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +peer1.org2.example.com | [601 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47f 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [47a 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [2e2 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [01652971] notifying Txid:01652971-d5b1-4a70-9b40-24d3976b53e3, channelID:businesschannel +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +peer1.org2.example.com | [602 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [480 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [47b 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e540 principal matched by identity 0 +peer1.org1.example.com | [2e3 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +peer1.org2.example.com | [603 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76838], isChainEmpty=[false], lastBlockNumber=[2] +peer0.org1.example.com | [481 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [47c 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +peer1.org1.example.com | [2e4 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +peer1.org2.example.com | [604 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer0.org1.example.com | [482 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | 00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.| +peer1.org1.example.com | [2e5 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [01652971-d5b1-4a70-9b40-24d3976b53e3] +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [605 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [483 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [47d 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +peer1.org1.example.com | [2e6 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [484 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | 00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +peer1.org1.example.com | [2e7 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [85c29882-1d6c-42c7-8a78-f4b76e24f234] +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [485 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | 00000020 9d 53 74 88 4b 02 20 0b f6 9b f4 5d 00 74 ee 9d |.St.K. ....].t..| +peer1.org1.example.com | [2e8 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [486 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | 00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +peer1.org1.example.com | [2e9 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [85c29882-1d6c-42c7-8a78-f4b76e24f234] +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [487 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | 00000040 4d ed a9 9c dd 40 ef |M....@.| +peer1.org1.example.com | [2ea 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [488 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [47e 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e540 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2eb 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F0B3D5E6FC999EEC15...05172BB05543DDAEAECD899A2A020801 +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | [489 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [47f 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e540 gate 1574140910072180100 evaluation succeeds +peer1.org1.example.com | [2ec 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A4B26350823514D6EE778F1A93423A17EDA794036E086A70D81A090E283E107E +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | [48a 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [480 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [2ed 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +peer1.org2.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | [48b 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [481 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [2ee 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [cade26e8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +peer1.org2.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | [48c 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [482 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [2ef 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [cade26e8] notifying Txid:cade26e800f606babce399bd2fd366ca2c630a5063e7481ef9e9fe04883f20b9, channelID: +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | [48d 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [483 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [2f0 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +peer1.org2.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | [48e 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [484 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [2f1 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO [][cade26e8] Exit chaincode: name:"cscc" (132ms) +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +peer1.org2.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | [48f 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [485 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f2 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU [][cade26e8] Exit +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [486 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f3 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:57364 +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +peer1.org2.example.com | [606 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [487 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f4 11-19 05:21:43.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:57364 grpc.code=OK grpc.call_duration=137.8834ms +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [607 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [488 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f5 11-19 05:21:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.8:7051->172.18.0.5:57364: read: connection reset by peer +orderer0.example.com | ID: 3, +peer1.org2.example.com | [608 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org2.example.com | [489 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f6 11-19 05:21:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | Endpoint: orderer2.example.com:7050, +peer1.org2.example.com | [609 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [48a 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f7 11-19 05:21:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | [48b 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [60a 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2f8 11-19 05:21:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org2.example.com | [48c 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [60b 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f9 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org2.example.com | [48d 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [60c 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2fa 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | [48e 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [60d 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer1.org1.example.com | [2fb 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org2.example.com | [48f 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [60e 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org1.example.com | [2fc 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org2.example.com | [490 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [60f 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org1.example.com | [2fd 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org2.example.com | [491 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [610 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +peer1.org1.example.com | [2fe 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 1g== +peer0.org2.example.com | [492 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [611 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer1.org1.example.com | [2ff 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [493 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [494 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [300 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [490 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [495 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [612 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org1.example.com | [301 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 10AD46B84180D6E6E06971FF6CAA2FDDEDDB551E26F3E1F1F7019A79C58D4823 +peer0.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [496 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [613 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +peer1.org1.example.com | [302 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [497 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [614 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer1.org1.example.com | [303 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [498 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [615 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +peer1.org1.example.com | [304 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org2.example.com | [499 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [616 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +peer1.org1.example.com | [305 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\213\020\275\265\314\325\002 UP\220]+9P\004-\244>ZC\305\025G\252V\013E\222\273\351r\346BS\242\315\357\266\237" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [49a 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [617 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [306 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\213\020\275\265\314\325\002 UP\220]+9P\004-\244>ZC\305\025G\252V\013E\222\273\351r\346BS\242\315\357\266\237" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org2.example.com | [49b 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [618 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | [307 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org2.example.com | [49c 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [619 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer1.org1.example.com | [308 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +peer0.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org2.example.com | [49d 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [61a 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [309 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +peer0.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org2.example.com | [49e 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [61b 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer1.org1.example.com | [30a 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org2.example.com | [49f 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [61c 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +peer1.org1.example.com | [30b 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +peer0.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org2.example.com | [4a0 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [61d 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org1.example.com | [30c 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 ad 46 b8 41 80 d6 e6 e0 69 71 ff 6c aa 2f dd |..F.A....iq.l./.| +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [4a1 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [61e 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org1.example.com | 00000010 ed db 55 1e 26 f3 e1 f1 f7 01 9a 79 c5 8d 48 23 |..U.&......y..H#| +peer0.org1.example.com | [491 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [4a2 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [61f 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +peer1.org1.example.com | [30d 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 0d 96 89 28 66 db d0 62 81 99 |0E.!.....(f..b..| +peer0.org1.example.com | [492 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [4a3 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [620 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer1.org1.example.com | 00000010 09 ef ad 58 ea d9 d0 2f d8 b1 c6 d6 4d 1b 3e 8b |...X.../....M.>.| +peer0.org1.example.com | [493 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [4a4 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [621 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001122a0 gate 1574140910536820600 evaluation starts +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org1.example.com | 00000020 10 bd b5 cc d5 02 20 55 50 90 5d 2b 39 50 04 2d |...... UP.]+9P.-| +peer0.org1.example.com | [494 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [4a5 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [622 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001122a0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +peer1.org1.example.com | 00000030 a4 3e 5a 43 c5 15 47 aa 56 0b 45 92 bb e9 72 e6 |.>ZC..G.V.E...r.| +peer0.org2.example.com | [4a6 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [495 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [623 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001122a0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer1.org1.example.com | 00000040 42 53 a2 cd ef b6 9f |BS.....| +peer0.org2.example.com | [4a7 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [496 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +peer1.org2.example.com | [624 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001122a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [30e 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [4a8 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [497 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +peer1.org2.example.com | [625 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001122a0 principal evaluation fails +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [4a9 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [498 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [626 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001122a0 gate 1574140910536820600 evaluation fails +peer1.org1.example.com | [30f 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 b5 8b 89 02 aa fc 76 1a 62 ba |0E.!........v.b.| +peer0.org2.example.com | [4aa 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [499 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +orderer0.example.com | ]" +peer1.org2.example.com | [627 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 ba 77 37 8e b9 37 d7 9f 6d 40 6d 92 d4 e2 76 f6 |.w7..7..m@m...v.| +peer0.org2.example.com | [4ab 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [49a 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +orderer0.example.com | "2019-11-19 05:21:32.686 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d2 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +peer1.org2.example.com | [628 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 c9 12 43 59 7c 02 20 38 c9 99 af aa 45 cf 81 26 |..CY|. 8....E..&| +peer0.org2.example.com | [4ac 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [49b 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | "2019-11-19 05:21:32.686 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d3 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +peer1.org2.example.com | [629 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 d8 9f 5b 5e 50 44 a8 84 b9 f5 6c e2 9e 62 a1 70 |..[^PD....l..b.p| +peer0.org2.example.com | [4ad 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [49c 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | "2019-11-19 05:21:32.686 UTC [orderer.common.cluster] func1 -> DEBU 2d4 Connecting to ID: 2, +peer1.org2.example.com | [62a 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000112bb0 gate 1574140910541437900 evaluation starts +peer1.org1.example.com | 00000040 5c 36 e6 cb 5a 88 c7 |\6..Z..| +peer0.org2.example.com | [4ae 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [49d 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +orderer0.example.com | Endpoint: orderer1.example.com:7050, +peer1.org2.example.com | [62b 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000112bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4af 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [310 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [49e 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [62c 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000112bb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [311 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +peer1.org2.example.com | [62d 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [312 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [62e 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 42ms (state_validation=9ms block_and_pvtdata_commit=23ms state_commit=5ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [313 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org2.example.com | [62f 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org1.example.com | [314 11-19 05:21:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting, peers found 1 +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +peer1.org2.example.com | [630 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408E49FD3F4FE999EEC15...BF6035CA6D53E581FB7C69FB2A020803 +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [315 11-19 05:21:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org2.example.com | [631 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 881D0CB6E0AE67137030C62A7674ECC2FEFA9FEED69959589306E5472B899AE2 +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | [316 11-19 05:21:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [632 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org1.example.com | [317 11-19 05:21:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [633 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003787150, READY +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +peer0.org2.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org1.example.com | [318 11-19 05:21:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org2.example.com | [634 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | [319 11-19 05:21:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...B8DA120C08DCC1C9F8FC999EEC151001 +peer1.org1.example.com | [31a 11-19 05:21:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3B1C4CB6C0EEB972CCF3D6129A288F6172A84A1C59C0FCFC32AC426F45A84EB4 +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | [31b 11-19 05:21:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org2.example.com | [635 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +peer0.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | [31c 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [636 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +peer0.org2.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | [31d 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org2.example.com | [637 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +peer0.org2.example.com | 1g== +peer1.org1.example.com | [31e 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org2.example.com | [638 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.9:7051 +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [31f 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [639 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +orderer0.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [4b0 11-19 05:21:50.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [320 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [49f 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [63a 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: digest = 00000000 75 05 d1 13 d2 8f 73 a9 1b cd 13 e2 7b 98 67 c1 |u.....s.....{.g.| +peer0.org1.example.com | [4a0 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | 00000010 f5 b1 e2 8d f8 a5 9d 1e f4 b6 ff 25 3e 4c 08 4b |...........%>L.K| +peer0.org1.example.com | [4a1 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [63b 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 a8 33 27 29 be 2b 66 5c 73 dd |0E.!...3').+f\s.| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [322 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 58 5d 8d 6e 67 5d a5 15 38 64 6e |0D. .X].ng]..8dn| +peer0.org1.example.com | [4a2 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | 00000010 75 4c 7c ac 97 91 7a 41 36 fc 7d 5a 90 b8 0b 9a |uL|...zA6.}Z....| +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org1.example.com | 00000010 ea 18 a3 2c 0c 53 be 3b e2 06 2a 9d 63 64 75 dc |...,.S.;..*.cdu.| +peer0.org1.example.com | [4a3 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | 00000020 ad 0e 8e 29 67 02 20 7e 5d c0 7e c9 ac 04 06 b3 |...)g. ~].~.....| +peer1.org2.example.com | 00000030 af 8e 6a e9 cf 7e c1 8f 77 00 b3 92 da 7f 5b b6 |..j..~..w.....[.| +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | 00000020 96 f1 35 a0 02 20 11 a9 99 95 e0 74 7f 25 db bb |..5.. .....t.%..| +peer0.org1.example.com | [4a4 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | 00000040 ba 21 54 46 52 ed bd |.!TFR..| +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer0.org2.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org1.example.com | 00000030 ff 9b a3 86 4f a5 4d 49 c9 70 65 eb b4 9e 3e bb |....O.MI.pe...>.| +peer0.org1.example.com | [4a5 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [63c 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer0.org2.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org1.example.com | 00000040 0c 90 6b 74 4f c6 |..ktO.| +peer0.org1.example.com | [4a6 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [63d 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +peer0.org2.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org1.example.com | [323 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | [4a7 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [63e 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +peer0.org2.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [63f 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer0.org2.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org1.example.com | [324 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 75 f5 5d 81 ab 2d 47 ed b4 57 |0E.!..u.]..-G..W| +peer0.org1.example.com | [4a8 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [640 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +peer0.org2.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org1.example.com | 00000010 af 3f fc 1f 11 06 ac cc be db 12 29 fd c2 16 ac |.?.........)....| +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [641 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | 00000020 01 f7 18 88 4d 02 20 7e 4a 15 f9 98 87 5f a4 92 |....M. ~J...._..| +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [642 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +peer0.org2.example.com | [4b1 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | 00000030 65 32 39 44 d0 00 3f 96 df 71 71 28 02 84 ae 89 |e29D..?..qq(....| +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [643 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12228799154479252007, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +peer0.org2.example.com | [4b2 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | 00000040 5b 6d 68 b9 98 01 d7 |[mh....| +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [644 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 12228799154479252007, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes +orderer0.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [4b3 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [325 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [645 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | for channel testchainid" +peer0.org2.example.com | [4b4 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [326 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [646 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12228799154479252007, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:32.688 UTC [grpc] DialContext -> DEBU 2d5 parsed scheme: """ +peer0.org2.example.com | [4b5 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [327 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [647 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | "2019-11-19 05:21:32.688 UTC [grpc] DialContext -> DEBU 2d6 scheme "" not registered, fallback to default scheme" +peer0.org2.example.com | [4b6 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [328 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | [648 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e f8 80 a5 e3 28 6d 18 1c 9d ba fe c3 41 e3 b2 |.....(m......A..| +orderer0.example.com | "2019-11-19 05:21:32.688 UTC [grpc] watcher -> DEBU 2d7 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +peer0.org2.example.com | [4b7 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [329 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000010 11 84 90 75 ba 4f 5d 14 73 29 84 2b e8 9d fc ef |...u.O].s).+....| +orderer0.example.com | "2019-11-19 05:21:32.688 UTC [grpc] switchBalancer -> DEBU 2d8 ClientConn switching balancer to "pick_first"" +peer0.org2.example.com | [4b8 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org1.example.com | [32a 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [649 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 05 7b 17 02 f3 b8 53 af 34 8c fb |0D. 8.{....S.4..| +orderer0.example.com | "2019-11-19 05:21:32.689 UTC [grpc] HandleSubConnStateChange -> DEBU 2d9 pickfirstBalancer: HandleSubConnStateChange: 0xc000227c80, CONNECTING" +peer0.org2.example.com | [4b9 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | [32b 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 a2 0a 60 9d 35 e8 73 f4 17 f8 2f 9c db e2 ca 91 |..`.5.s.../.....| +orderer0.example.com | "2019-11-19 05:21:32.690 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2da Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +peer0.org2.example.com | [4ba 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org1.example.com | [32c 11-19 05:21:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 57 ce f5 3e 02 20 1f be 98 b3 5c 17 59 a9 9c 7e |W..>. ....\.Y..~| +orderer0.example.com | "2019-11-19 05:21:32.690 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2db Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +peer0.org2.example.com | [4bb 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org1.example.com | [32d 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:57372 +peer1.org2.example.com | 00000030 c3 f5 05 9a b4 ca b7 27 a7 1c 3c 50 fa 40 3a d4 |.......'.. DEBU 2dc Connecting to ID: 3, +peer0.org2.example.com | [4bc 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [32e 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002f0b9a0 +peer1.org2.example.com | 00000040 d9 e3 0b 09 25 da |....%.| +orderer0.example.com | Endpoint: orderer2.example.com:7050, +peer0.org2.example.com | [4bd 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [4a9 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [32f 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [64a 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer0.org2.example.com | [4be 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [4aa 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [330 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [4ab 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [331 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org2.example.com | [64b 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba f4 14 6a ea c8 3e f3 92 23 ff |0E.!....j..>..#.| +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [4ac 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [332 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | 00000010 66 fe 62 3d 35 06 74 68 39 0e 32 8d 55 f4 b5 d6 |f.b=5.th9.2.U...| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [4ad 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [333 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 45 62 52 2c 16 e1 95 e7 d3 cc ca 24 b6 9a b4 |.EbR,.......$...| +peer1.org2.example.com | 00000020 70 0c 7d ad cf 02 20 01 d5 ce ba 53 de c5 d8 11 |p.}... ....S....| +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [4ae 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | 00000010 57 55 6d cf 08 25 a2 20 e3 c8 f6 d1 34 79 dd 6b |WUm..%. ....4y.k| +peer1.org2.example.com | 00000030 96 77 d7 75 9b dd 23 df 1b de 18 7e e1 71 12 87 |.w.u..#....~.q..| +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [4af 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [334 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a e1 b6 7c b5 27 bf bc ba 6c 73 a6 |0D. z..|.'...ls.| +peer1.org2.example.com | 00000040 2c b6 b7 6f bd 04 d7 |,..o...| +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [4b0 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | 00000010 97 30 bc 78 a3 64 b9 6b cb 8e 1f 1c f4 09 e7 ef |.0.x.d.k........| +peer1.org2.example.com | [64c 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [4b1 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | 00000020 91 36 59 a2 02 20 3c c6 e1 5f f2 d8 a2 bf 94 61 |.6Y.. <.._.....a| +peer1.org2.example.com | [64d 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer0.org2.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | [4b2 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | 00000030 c4 c6 10 2a bb 9b e3 a9 41 7f 6c 98 30 c5 6d 9e |...*....A.l.0.m.| +peer1.org2.example.com | [64e 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer0.org2.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [4b3 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | 00000040 e3 26 71 2f e6 ed |.&q/..| +peer1.org2.example.com | [64f 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | [4b4 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [335 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [650 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 a8 5e e1 4d bf 89 97 fb cf d0 29 0e 67 fd 42 |..^.M......).g.B| +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer0.org2.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [4b5 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org1.example.com | [336 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002f075e0, header 0xc002f0bdb0 +peer1.org2.example.com | 00000010 f5 e2 f5 fa 4a e9 35 2d 0f fd 6a 97 5c 05 db 08 |....J.5-..j.\...| +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +peer0.org2.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | [4b6 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [337 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [651 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 29 d4 2b 63 e9 58 3e 8b 8b dd |0E.!..).+c.X>...| +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +peer0.org2.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | [4b7 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [338 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][ffd75d31] processing txid: ffd75d317ea0f7632b5bc86be4a01c9da283f1ca87ca873ec768fa54ce089737 +peer1.org2.example.com | 00000010 0f 44 dc 11 ad 76 7d 8a 6f 0f 18 af 5c 84 4b 09 |.D...v}.o...\.K.| +orderer0.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4b8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [339 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][ffd75d31] Entry chaincode: name:"cscc" +peer1.org2.example.com | 00000020 e1 67 f5 8a 95 02 20 25 fa 49 5b c6 12 47 c1 e6 |.g.... %.I[..G..| +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer0.org2.example.com | [4bf 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4b9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [33a 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> INFO [][ffd75d31] Entry chaincode: name:"cscc" +peer1.org2.example.com | 00000030 01 c9 f6 f5 39 e8 74 d8 ed 87 32 f2 9c 90 ea 59 |....9.t...2....Y| +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer0.org2.example.com | [4c0 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4ba 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [33b 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | 00000040 ae 2c 27 01 eb 65 dc |.,'..e.| +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [4c1 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4bb 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [33c 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [652 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer0.org2.example.com | [4c2 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4bc 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [33d 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +peer0.org1.example.com | [4bd 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [4c3 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [33e 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [653 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 24 94 f7 80 76 a7 d8 3f 44 c6 f3 |0D. U$...v..?D..| +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer0.org1.example.com | [4be 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [4c4 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [33f 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | 00000010 fa fa cc 6e 59 60 e6 d8 50 fd 34 2a 71 54 18 2b |...nY`..P.4*qT.+| +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer0.org1.example.com | [4bf 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [4c5 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [340 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 45 62 52 2c 16 e1 95 e7 d3 cc ca 24 b6 9a b4 |.EbR,.......$...| +peer1.org2.example.com | 00000020 d4 5f d5 d5 02 20 14 de 92 97 1d 85 87 c5 8c 6f |._... .........o| +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +peer0.org1.example.com | [4c0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [4c6 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | 00000010 57 55 6d cf 08 25 a2 20 e3 c8 f6 d1 34 79 dd 6b |WUm..%. ....4y.k| +peer1.org2.example.com | 00000030 3e cf 08 f7 76 a2 70 be 72 ba b6 09 36 8f 70 fe |>...v.p.r...6.p.| +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer0.org1.example.com | [4c1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [4c7 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [341 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a e1 b6 7c b5 27 bf bc ba 6c 73 a6 |0D. z..|.'...ls.| +peer1.org2.example.com | 00000040 b4 9b c7 a8 5c 12 |....\.| +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer0.org1.example.com | [4c2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [4c8 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000010 97 30 bc 78 a3 64 b9 6b cb 8e 1f 1c f4 09 e7 ef |.0.x.d.k........| +peer1.org2.example.com | [654 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +peer0.org1.example.com | [4c3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | 00000020 91 36 59 a2 02 20 3c c6 e1 5f f2 d8 a2 bf 94 61 |.6Y.. <.._.....a| +peer1.org2.example.com | [655 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]} +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer0.org1.example.com | [4c4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | 00000030 c4 c6 10 2a bb 9b e3 a9 41 7f 6c 98 30 c5 6d 9e |...*....A.l.0.m.| +peer1.org2.example.com | [656 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +peer0.org1.example.com | [4c5 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | 00000040 e3 26 71 2f e6 ed |.&q/..| +peer1.org2.example.com | [657 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [4c6 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [342 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU [ffd75d31] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [658 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [4c7 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [343 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU [ffd75d31] notifying Txid:ffd75d317ea0f7632b5bc86be4a01c9da283f1ca87ca873ec768fa54ce089737, channelID: +peer1.org2.example.com | [659 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | for channel testchainid" +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [4c8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [344 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [65a 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000112bb0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:32.691 UTC [grpc] DialContext -> DEBU 2dd parsed scheme: """ +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [4c9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [345 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> INFO [][ffd75d31] Exit chaincode: name:"cscc" (2ms) +peer1.org2.example.com | [65b 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +orderer0.example.com | "2019-11-19 05:21:32.692 UTC [grpc] DialContext -> DEBU 2de scheme "" not registered, fallback to default scheme" +peer0.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org1.example.com | [4ca 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [346 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][ffd75d31] Exit +peer1.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +orderer0.example.com | "2019-11-19 05:21:32.699 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2df 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +peer0.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [4cb 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [347 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:57372 +peer1.org2.example.com | [65c 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 92 df b7 7d 33 30 3d 39 9e 37 18 |0D. d...}30=9.7.| +orderer0.example.com | "2019-11-19 05:21:32.699 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2e0 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org1.example.com | [4cc 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [348 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:57372 grpc.code=OK grpc.call_duration=6.1577ms +peer1.org2.example.com | 00000010 68 b5 fd 6a 7c a6 40 5c 02 d3 91 f6 fa e0 c0 c0 |h..j|.@\........| +orderer0.example.com | "2019-11-19 05:21:32.699 UTC [orderer.common.cluster] Configure -> INFO 2e1 Exiting" +peer0.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [4cd 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [349 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.8:7051->172.18.0.5:57372: read: connection reset by peer +peer1.org2.example.com | 00000020 f1 e2 ee 19 02 20 7d e6 cd 1d a0 14 94 bb cb 4c |..... }........L| +orderer0.example.com | "2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] start -> DEBU 2e2 Starting raft node: #peers: 3" channel=testchainid node=1 +peer0.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org1.example.com | [4ce 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [34a 11-19 05:21:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | 00000030 7a f5 ba 40 95 c5 7d 46 49 c1 10 70 c6 50 f5 19 |z..@..}FI..p.P..| +orderer0.example.com | "2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] start -> INFO 2e3 Starting raft node as part of a new channel" channel=testchainid node=1 +peer0.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org1.example.com | [4cf 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [34b 11-19 05:21:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000040 04 9a 0d c5 19 ca |......| +orderer0.example.com | "2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2e4 1 became follower at term 0" channel=testchainid node=1 +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4d0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [34c 11-19 05:21:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151008 +peer1.org2.example.com | [65d 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000112bb0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2e5 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +peer0.org2.example.com | [4c9 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [4d1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [34d 11-19 05:21:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 44C1744EA94005545588F9DC12B28B6FA83262E2AA70D78E2FE423024784834E +peer1.org2.example.com | [65e 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000112bb0 gate 1574140910541437900 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2e6 1 became follower at term 1" channel=testchainid node=1 +peer0.org2.example.com | [4ca 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [4d2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [34e 11-19 05:21:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [65f 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:32.700 UTC [grpc] HandleSubConnStateChange -> DEBU 2e7 pickfirstBalancer: HandleSubConnStateChange: 0xc000227c80, READY" +peer0.org2.example.com | [4cb 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [4d3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [34f 11-19 05:21:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [660 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:32.700 UTC [grpc] watcher -> DEBU 2e8 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +peer0.org2.example.com | [4cc 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [4d4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [350 11-19 05:21:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [661 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:32.700 UTC [grpc] switchBalancer -> DEBU 2e9 ClientConn switching balancer to "pick_first"" +peer0.org2.example.com | [4cd 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [4d5 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [351 11-19 05:21:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [662 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:32.700 UTC [grpc] HandleSubConnStateChange -> DEBU 2ea pickfirstBalancer: HandleSubConnStateChange: 0xc0001aaf70, CONNECTING" +peer0.org2.example.com | [4ce 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [4d6 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [352 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:57380 +peer1.org2.example.com | [663 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +orderer0.example.com | "2019-11-19 05:21:32.702 UTC [orderer.common.server] Start -> INFO 2eb Starting orderer: +peer0.org2.example.com | [4cf 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [4d7 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [353 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002f8cc30 +peer1.org2.example.com | [664 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | Version: 1.4.4 +peer0.org2.example.com | [4d0 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [4d8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [354 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [665 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | Commit SHA: development build +peer0.org2.example.com | [4d1 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [4d9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [355 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [666 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | Go version: go1.12.13 +peer0.org2.example.com | [4d2 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [4da 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [356 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org2.example.com | [667 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151013 +orderer0.example.com | OS/Arch: linux/amd64" +peer0.org2.example.com | [4d3 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [4db 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [357 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +orderer0.example.com | "2019-11-19 05:21:32.702 UTC [orderer.common.server] Start -> INFO 2ec Beginning to serve requests" +peer1.org2.example.com | [668 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2139CA757F5AF0F273505034ABDAB740872D4C9682062211409F7D59557A67AE +peer0.org2.example.com | [4d4 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [4dc 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +orderer0.example.com | "2019-11-19 05:21:32.705 UTC [orderer.consensus.etcdraft] apply -> INFO 2ed Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +peer1.org1.example.com | [358 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c d0 15 80 5a 2e b4 23 d3 e0 eb 08 be 24 a9 a1 |<...Z..#.....$..| +peer1.org2.example.com | [669 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4d5 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org1.example.com | [4dd 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +orderer0.example.com | "2019-11-19 05:21:32.705 UTC [orderer.consensus.etcdraft] apply -> INFO 2ee Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +peer1.org1.example.com | 00000010 5e aa 39 cb 64 fa 82 bf 71 70 f4 a8 46 6f 19 91 |^.9.d...qp..Fo..| +peer1.org2.example.com | [66a 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4d6 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [4de 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +orderer0.example.com | "2019-11-19 05:21:32.705 UTC [orderer.consensus.etcdraft] apply -> INFO 2ef Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +peer1.org1.example.com | [359 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 14 ac bd aa 59 89 ec 32 f7 ab de |0D. .....Y..2...| +peer1.org2.example.com | [66b 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [4d7 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [4df 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:32.710 UTC [grpc] HandleSubConnStateChange -> DEBU 2f0 pickfirstBalancer: HandleSubConnStateChange: 0xc0001aaf70, READY" +peer1.org1.example.com | 00000010 0e e8 b0 a0 bc e0 95 62 cb e7 f4 4a e5 f9 61 b4 |.......b...J..a.| +peer1.org2.example.com | [66c 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d8 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [4e0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | 00000020 0e a2 2a 7b 02 20 22 d1 9c fb c9 6f 0f 0b 54 28 |..*{. "....o..T(| +orderer0.example.com | "2019-11-19 05:21:33.662 UTC [orderer.common.cluster] Step -> DEBU 2f1 Connection from orderer2.example.com(172.18.0.4:44088)" +peer1.org2.example.com | [66d 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4d9 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [4e1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | 00000030 10 84 4e 3d 4d 48 57 25 8b 99 60 0f b7 e5 b0 3f |..N=MHW%..`....?| +orderer0.example.com | "2019-11-19 05:21:33.662 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2f2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [66e 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [4da 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [4e2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | 00000040 97 64 4f 79 2b 57 |.dOy+W| +orderer0.example.com | "2019-11-19 05:21:33.662 UTC [orderer.consensus.etcdraft] Step -> INFO 2f3 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +peer1.org2.example.com | [66f 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4db 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [4e3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [35a 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer0.example.com | "2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f4 1 became follower at term 2" channel=testchainid node=1 +peer1.org2.example.com | [670 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f isn't responsive: EOF +peer0.org2.example.com | [4dc 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [4e4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [35b 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002f07dc0, header 0xc002f8d040 +orderer0.example.com | "2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] Step -> INFO 2f5 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +peer1.org2.example.com | [671 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> WARN Entering [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] +peer0.org2.example.com | [4dd 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [4e5 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [35c 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +orderer0.example.com | "2019-11-19 05:21:33.663 UTC [orderer.common.cluster] NewStream -> DEBU 2f6 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +peer1.org2.example.com | [672 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: +peer0.org2.example.com | [4de 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [4e6 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [35d 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU [][91317b54] processing txid: 91317b5412dead1cb0e662fe7ae0027cf2fcafc2a9aa90277a06ea13bb8cfc2c +orderer0.example.com | "2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2f7 Sending msg of 28 bytes to 3 on channel testchainid took 91.6µs" +peer1.org2.example.com | [673 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [4df 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [4e7 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [35e 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU [][91317b54] Entry chaincode: name:"qscc" +orderer0.example.com | "2019-11-19 05:21:33.664 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.6µs " +peer1.org2.example.com | [674 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org2.example.com | [4e0 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [4e8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [35f 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> INFO [][91317b54] Entry chaincode: name:"qscc" +orderer0.example.com | "2019-11-19 05:21:33.664 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2f9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 36" +peer1.org2.example.com | [675 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [4e1 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [4e9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [360 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | "2019-11-19 05:21:33.664 UTC [orderer.consensus.etcdraft] run -> INFO 2fa raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +peer1.org2.example.com | [676 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.788Z grpc.peer_address=172.18.0.6:40884 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=152.2µs +peer0.org2.example.com | [4e2 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [4ea 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [361 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +orderer0.example.com | "2019-11-19 05:21:33.666 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 2fb Raft leader changed: 0 -> 3" channel=testchainid node=1 +peer1.org2.example.com | [677 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4e3 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [4eb 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [362 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +orderer0.example.com | "2019-11-19 05:21:33.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +peer1.org2.example.com | [678 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer0.org2.example.com | [4e4 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [4ec 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [363 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +orderer0.example.com | "2019-11-19 05:21:33.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2fd Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +peer1.org2.example.com | [679 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer0.org2.example.com | [4e5 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [4ed 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [364 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:33.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2fe Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [67a 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:40884 +peer0.org2.example.com | [4e6 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [4ee 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [365 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:33.668 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2ff Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +peer1.org2.example.com | [67b 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:40884 +peer0.org2.example.com | [4e7 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [4ef 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [366 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:33.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU 300 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +peer1.org2.example.com | [67c 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e8 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [4f0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [367 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:34.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 301 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [4e9 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [67d 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4f1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [368 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:34.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 302 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.8285ms " +peer0.org2.example.com | [4ea 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [67e 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2019-11-19 05:21:34.127 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 303 Sending msg of 28 bytes to 3 on channel testchainid took 69.7µs" +peer0.org2.example.com | [4eb 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [67f 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4f3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2019-11-19 05:21:34.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 304 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [4ec 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [680 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2019-11-19 05:21:34.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 305 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +peer0.org2.example.com | [4ed 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [681 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4f5 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | "2019-11-19 05:21:34.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +peer0.org2.example.com | [4ee 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [682 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4f6 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2019-11-19 05:21:35.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 307 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [4ef 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [683 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4f7 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | "2019-11-19 05:21:35.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 308 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +peer0.org2.example.com | [4f0 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [684 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4f8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +orderer0.example.com | "2019-11-19 05:21:35.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 285.4µs " +peer0.org2.example.com | [4f1 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [685 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4f9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +orderer0.example.com | "2019-11-19 05:21:35.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [4f2 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [686 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4fa 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | "2019-11-19 05:21:35.600 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30b Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +peer0.org2.example.com | [4f3 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [687 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a6f80 gate 1574140910804898200 evaluation starts +peer0.org1.example.com | [4fb 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +orderer0.example.com | "2019-11-19 05:21:35.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 501.5µs " +peer0.org2.example.com | [4f4 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [688 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a6f80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4fc 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +orderer0.example.com | "2019-11-19 05:21:36.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [4f5 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [4fd 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +orderer0.example.com | "2019-11-19 05:21:36.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30e Sending msg of 28 bytes to 3 on channel testchainid took 449.8µs" +peer0.org2.example.com | [4f6 11-19 05:21:50.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [689 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a6f80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4fe 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:36.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.8µs " +peer0.org2.example.com | [4f7 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [68a 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a6f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [4ff 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [369 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc3050 gate 1574140905795776600 evaluation starts +orderer0.example.com | "2019-11-19 05:21:36.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 310 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [4f8 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [68b 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a6f80 principal evaluation fails +peer0.org1.example.com | [500 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [36a 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc3050 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:36.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 311 Sending msg of 28 bytes to 3 on channel testchainid took 57.8µs" +peer0.org2.example.com | [4f9 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [68c 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a6f80 gate 1574140910804898200 evaluation fails +peer1.org1.example.com | [36b 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc3050 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [501 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +orderer0.example.com | "2019-11-19 05:21:36.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 312 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " +peer0.org2.example.com | [4fa 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [68d 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36c 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [502 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +orderer0.example.com | "2019-11-19 05:21:37.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 313 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [4fb 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [68e 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36d 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [503 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +orderer0.example.com | "2019-11-19 05:21:37.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 314 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +peer0.org2.example.com | [4fc 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [36e 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [68f 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [504 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +orderer0.example.com | "2019-11-19 05:21:37.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 315 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 786.9µs " +peer0.org2.example.com | [4fd 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36f 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [690 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a74f0 gate 1574140910806068800 evaluation starts +peer0.org1.example.com | [505 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +orderer0.example.com | "2019-11-19 05:21:37.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 316 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [4fe 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [370 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [691 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a74f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [506 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +orderer0.example.com | "2019-11-19 05:21:37.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 317 Sending msg of 28 bytes to 3 on channel testchainid took 36.9µs" +peer0.org2.example.com | [4ff 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [371 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [692 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a74f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [507 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +orderer0.example.com | "2019-11-19 05:21:37.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.9µs " +peer0.org2.example.com | [500 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [372 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc3050 principal matched by identity 0 +peer1.org2.example.com | [693 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a74f0 principal matched by identity 0 +peer0.org1.example.com | [508 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [501 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +orderer0.example.com | "2019-11-19 05:21:38.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 319 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [373 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c d0 15 80 5a 2e b4 23 d3 e0 eb 08 be 24 a9 a1 |<...Z..#.....$..| +peer1.org2.example.com | [694 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org1.example.com | [509 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [502 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +orderer0.example.com | "2019-11-19 05:21:38.100 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31a Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +peer1.org1.example.com | 00000010 5e aa 39 cb 64 fa 82 bf 71 70 f4 a8 46 6f 19 91 |^.9.d...qp..Fo..| +peer1.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org1.example.com | [50a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [503 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +orderer0.example.com | "2019-11-19 05:21:38.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " +peer1.org1.example.com | [374 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 14 ac bd aa 59 89 ec 32 f7 ab de |0D. .....Y..2...| +peer1.org2.example.com | [696 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 24 18 92 f3 73 0b 1f b4 79 6e f4 |0D. m$...s...yn.| +peer0.org1.example.com | [50b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [504 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +orderer0.example.com | "2019-11-19 05:21:38.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000010 0e e8 b0 a0 bc e0 95 62 cb e7 f4 4a e5 f9 61 b4 |.......b...J..a.| +peer1.org2.example.com | 00000010 ad c8 fb 07 c2 5c 25 cf 18 dd 64 e7 52 6d 29 32 |.....\%...d.Rm)2| +peer0.org1.example.com | [50c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [505 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +orderer0.example.com | "2019-11-19 05:21:38.600 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31d Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +peer1.org1.example.com | 00000020 0e a2 2a 7b 02 20 22 d1 9c fb c9 6f 0f 0b 54 28 |..*{. "....o..T(| +peer1.org2.example.com | 00000020 d0 9c d3 68 02 20 7d 1d 6a fe 24 7a dd 2d 3c 96 |...h. }.j.$z.-<.| +peer0.org1.example.com | [50d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [506 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:38.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 550.7µs " +peer1.org1.example.com | 00000030 10 84 4e 3d 4d 48 57 25 8b 99 60 0f b7 e5 b0 3f |..N=MHW%..`....?| +peer1.org2.example.com | 00000030 bc 63 13 7a a2 46 ae 34 5b 65 af ba dc 35 ed 08 |.c.z.F.4[e...5..| +peer0.org1.example.com | [50e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [507 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +orderer0.example.com | "2019-11-19 05:21:39.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000040 97 64 4f 79 2b 57 |.dOy+W| +peer1.org2.example.com | 00000040 5d 9e 7b 09 8e 1b |].{...| +peer0.org1.example.com | [50f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 gate 1574140909495882800 evaluation starts +peer0.org2.example.com | [508 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +orderer0.example.com | "2019-11-19 05:21:39.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 35.3µs" +peer1.org1.example.com | [375 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc3050 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [697 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a74f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [510 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [509 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +orderer0.example.com | "2019-11-19 05:21:39.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.1µs " +peer1.org1.example.com | [376 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc3050 gate 1574140905795776600 evaluation succeeds +peer1.org2.example.com | [698 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a74f0 gate 1574140910806068800 evaluation succeeds +peer0.org1.example.com | [511 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [50a 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +orderer0.example.com | "2019-11-19 05:21:39.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [377 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [699 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [512 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 principal matched by identity 0 +peer0.org2.example.com | [50b 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +orderer0.example.com | "2019-11-19 05:21:39.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 323 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +peer1.org1.example.com | [378 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [69a 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [513 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +peer0.org2.example.com | [50c 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +orderer0.example.com | "2019-11-19 05:21:39.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 324 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 416.2µs " +peer1.org1.example.com | [379 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [695 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +peer0.org2.example.com | [50d 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +orderer0.example.com | "2019-11-19 05:21:40.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 325 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [37a 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [69b 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [514 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +peer0.org2.example.com | [50e 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +orderer0.example.com | "2019-11-19 05:21:40.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 135.4µs" +peer1.org1.example.com | [37b 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU [91317b54] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [69d 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +peer0.org2.example.com | [50f 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +orderer0.example.com | "2019-11-19 05:21:40.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.9µs " +peer1.org1.example.com | [37c 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU [91317b54] notifying Txid:91317b5412dead1cb0e662fe7ae0027cf2fcafc2a9aa90277a06ea13bb8cfc2c, channelID: +peer1.org2.example.com | [69e 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:40884 +peer0.org1.example.com | 00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +peer0.org2.example.com | [510 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +orderer0.example.com | "2019-11-19 05:21:40.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [37d 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [69f 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:40884 +peer0.org1.example.com | 00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +peer0.org2.example.com | [511 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +orderer0.example.com | "2019-11-19 05:21:40.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 329 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +peer1.org1.example.com | [37e 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> INFO [][91317b54] Exit chaincode: name:"qscc" (14ms) +peer1.org2.example.com | [69c 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 30 b2 7f b8 62 2d 65 |0...b-e| +orderer0.example.com | "2019-11-19 05:21:40.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.7µs " +peer1.org1.example.com | [37f 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][91317b54] Exit +peer1.org2.example.com | [6a0 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [515 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [512 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +orderer0.example.com | "2019-11-19 05:21:41.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [380 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:57380 +peer1.org2.example.com | [6a1 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [516 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 gate 1574140909495882800 evaluation succeeds +peer0.org2.example.com | [513 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +orderer0.example.com | "2019-11-19 05:21:41.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32c Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +peer1.org1.example.com | [381 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:57380 grpc.code=OK grpc.call_duration=17.5245ms +peer1.org2.example.com | [6a2 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer0.org1.example.com | [517 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [514 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +orderer0.example.com | "2019-11-19 05:21:41.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.8µs " +peer1.org2.example.com | [6a3 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [382 11-19 05:21:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [518 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [515 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.241 UTC [orderer.common.server] Deliver -> DEBU 32e Starting new Deliver handler" +peer1.org2.example.com | [6a4 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [383 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [519 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [516 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +orderer0.example.com | "2019-11-19 05:21:41.241 UTC [common.deliver] Handle -> DEBU 32f Starting new deliver loop for 172.18.0.5:51412" +peer1.org2.example.com | [6a5 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [384 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [51a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [517 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +orderer0.example.com | "2019-11-19 05:21:41.241 UTC [common.deliver] Handle -> DEBU 330 Attempting to read seek info message from 172.18.0.5:51412" +peer1.org2.example.com | [6a6 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [385 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [51b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [518 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +orderer0.example.com | "2019-11-19 05:21:41.261 UTC [orderer.common.server] Broadcast -> DEBU 331 Starting new Broadcast handler" +peer1.org2.example.com | [6a7 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [386 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [51c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [519 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +orderer0.example.com | "2019-11-19 05:21:41.261 UTC [orderer.common.broadcast] Handle -> DEBU 332 Starting new broadcast loop for 172.18.0.5:51414" +peer1.org2.example.com | [6a8 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [387 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org2.example.com | [51a 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +orderer0.example.com | "2019-11-19 05:21:41.262 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 333 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:51414" +peer1.org2.example.com | [6a9 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 4d 5f 51 e3 32 7f 75 f0 d9 fb d4 7a 6b a5 c9 |lM_Q.2.u....zk..| +peer1.org1.example.com | [388 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\n\340\352\334\255r<\002 Dfb\3649|VuL\364\276H9\267\316\265R\2167\243\177\320\303D\004v\021Mu\\h\256" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [51e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [51b 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +orderer0.example.com | "2019-11-19 05:21:41.262 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 334 Processing config update tx with system channel message processor for channel ID businesschannel" +peer1.org2.example.com | 00000010 61 23 20 41 20 8b f2 83 d0 a6 18 a0 35 ca 76 56 |a# A .......5.vV| +peer1.org1.example.com | [389 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\n\340\352\334\255r<\002 Dfb\3649|VuL\364\276H9\267\316\265R\2167\243\177\320\303D\004v\021Mu\\h\256" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [51f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [51c 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +orderer0.example.com | "2019-11-19 05:21:41.263 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 335 Processing channel create tx for channel businesschannel on system channel testchainid" +peer1.org2.example.com | [6aa 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 1a 97 6b aa 3e 8e e8 c9 d9 19 80 |0D. ;..k.>......| +peer1.org1.example.com | [38a 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [520 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [51d 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +orderer0.example.com | "2019-11-19 05:21:41.263 UTC [common.channelconfig] NewStandardValues -> DEBU 336 Initializing protos for *channelconfig.ChannelProtos" +peer1.org2.example.com | 00000010 f9 25 b7 a2 69 14 d6 d1 94 81 aa 7f 74 a6 d0 02 |.%..i.......t...| +peer1.org1.example.com | [38b 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\n\340\352\334\255r<\002 Dfb\3649|VuL\364\276H9\267\316\265R\2167\243\177\320\303D\004v\021Mu\\h\256" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [521 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [51e 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +orderer0.example.com | "2019-11-19 05:21:41.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 337 Processing field: HashingAlgorithm" +peer1.org2.example.com | 00000020 5a 76 7b e6 02 20 7b ef 62 7e 53 83 79 e2 81 f0 |Zv{.. {.b~S.y...| +peer1.org1.example.com | [38c 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [522 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [51f 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +orderer0.example.com | "2019-11-19 05:21:41.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 338 Processing field: BlockDataHashingStructure" +peer1.org2.example.com | 00000030 06 d7 36 2e e2 05 24 fc 84 65 29 23 de 75 9f 0d |..6...$..e)#.u..| +peer1.org1.example.com | [38d 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 24 f5 5a ab dd 96 26 ed 11 46 e8 72 3a 4d 5a |.$.Z...&..F.r:MZ| +peer0.org1.example.com | [523 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [520 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +orderer0.example.com | "2019-11-19 05:21:41.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 339 Processing field: OrdererAddresses" +peer1.org2.example.com | 00000040 25 87 85 0b f4 a0 |%.....| +peer1.org1.example.com | 00000010 32 bd a8 4b 9f fe aa f1 a7 08 ba 3f 29 cd 51 66 |2..K.......?).Qf| +peer0.org1.example.com | [524 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [521 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +orderer0.example.com | "2019-11-19 05:21:41.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33a Processing field: Consortium" +peer1.org2.example.com | [6ab 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38e 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed f3 5e d2 54 92 99 c5 17 0b 2a |0D. #..^.T.....*| +peer0.org1.example.com | [525 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [522 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33b Processing field: Capabilities" +peer1.org2.example.com | [6ac 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000010 c3 b8 c3 c6 f4 a5 2c 59 5b c7 fa be 3e 0a e0 ea |......,Y[...>...| +peer0.org1.example.com | [526 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002f8cf40 env 0xc00307c7d0 txn 0 +peer0.org2.example.com | [523 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] NewStandardValues -> DEBU 33c Initializing protos for *channelconfig.OrdererProtos" +peer1.org2.example.com | [6ad 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000020 dc ad 72 3c 02 20 44 66 62 f4 39 7c 56 75 4c f4 |..r<. Dfb.9|VuL.| +peer0.org1.example.com | [527 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [524 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d Processing field: ConsensusType" +peer1.org2.example.com | [6ae 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000030 be 48 39 b7 ce b5 52 8e 37 a3 7f d0 c3 44 04 76 |.H9...R.7....D.v| +peer0.org1.example.com | [528 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 96ms +peer0.org2.example.com | [525 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33e Processing field: BatchSize" +peer1.org1.example.com | 00000040 11 4d 75 5c 68 ae |.Mu\h.| +peer1.org2.example.com | [6af 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [529 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [526 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f Processing field: BatchTimeout" +peer1.org1.example.com | [38f 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [6b0 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52a 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [527 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 340 Processing field: KafkaBrokers" +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [6b1 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52b 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [528 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 341 Processing field: ChannelRestrictions" +peer1.org1.example.com | [390 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 03 06 c0 d5 22 08 d1 6c 89 2a b5 |0D. t...."..l.*.| +peer1.org2.example.com | [6b2 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52c 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer0.org2.example.com | [529 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 342 Processing field: Capabilities" +peer1.org1.example.com | 00000010 22 2c 25 73 56 e5 79 09 b1 48 f5 51 73 be 8b 65 |",%sV.y..H.Qs..e| +peer1.org2.example.com | [6b3 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [52d 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [52a 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +orderer0.example.com | "2019-11-19 05:21:41.264 UTC [common.channelconfig] NewStandardValues -> DEBU 343 Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org1.example.com | 00000020 ff e7 a3 3b 02 20 5c da 29 43 7b e8 60 f8 1a 1b |...;. \.)C{.`...| +peer1.org2.example.com | [6b4 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [52e 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [52b 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +orderer0.example.com | "2019-11-19 05:21:41.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU 344 Processing field: Endpoints" +peer1.org1.example.com | 00000030 a1 26 2e 78 1c fa ea c4 7f 6a 22 e3 cf 47 d7 09 |.&.x.....j"..G..| +peer1.org2.example.com | [6b5 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52f 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [52c 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +orderer0.example.com | "2019-11-19 05:21:41.265 UTC [common.channelconfig] NewStandardValues -> DEBU 345 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | 00000040 d5 c7 90 52 62 2d |...Rb-| +peer1.org2.example.com | [6b6 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [530 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org2.example.com | [52d 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU 346 Processing field: MSP" +peer1.org1.example.com | [391 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [6b7 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [531 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [52e 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [392 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +orderer0.example.com | "2019-11-19 05:21:41.265 UTC [common.channelconfig] validateMSP -> DEBU 347 Setting up MSP for org OrdererOrg" +peer1.org2.example.com | [6b8 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [532 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [52f 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [393 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:21:41.265 UTC [msp] newBccspMsp -> DEBU 348 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [6b9 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [533 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [530 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [394 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:21:41.265 UTC [msp] New -> DEBU 349 Creating Cache-MSP instance" +peer1.org2.example.com | [6ba 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [534 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [531 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [395 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:21:41.265 UTC [msp] Setup -> DEBU 34a Setting up MSP instance OrdererMSP" +peer1.org2.example.com | [6bb 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [535 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [532 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [396 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.266 UTC [msp.identity] newIdentity -> DEBU 34b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [6bc 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [536 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [533 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [397 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [6bd 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [537 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [534 11-19 05:21:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [398 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [6be 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [535 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [399 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [538 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [6bf 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [536 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org1.example.com | [39a 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\n\340\352\334\255r<\002 Dfb\3649|VuL\364\276H9\267\316\265R\2167\243\177\320\303D\004v\021Mu\\h\256" secret_envelope: > alive: > +peer0.org1.example.com | [539 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [6c0 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [537 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [39b 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer0.org1.example.com | [53a 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [6c1 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [538 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | [39c 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53b 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [6c2 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [539 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025864e0, CONNECTING +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org1.example.com | [39d 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53c 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003211480)} +peer1.org2.example.com | [6c3 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000384ca0 gate 1574140910868507800 evaluation starts +peer0.org2.example.com | [53a 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org1.example.com | [39e 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [53d 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [6c4 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [53b 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | [39f 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [53e 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [6c5 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000384ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [53c 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | [3a0 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53f 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [6c6 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000384ca0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [53d 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | [3a1 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [540 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org2.example.com | [6c7 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000384ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [53e 11-19 05:21:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | [3a2 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [541 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org2.example.com | [6c8 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000384ca0 principal evaluation fails +orderer0.example.com | 1g== +peer0.org2.example.com | [53f 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00314ca00 env 0xc003238910 txn 0 +peer1.org1.example.com | [3a3 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 c5 b2 2c 3e af b8 f7 8f 8c 2a 44 ef 9e 8a 87 |&..,>.....*D....| +peer0.org1.example.com | [542 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org2.example.com | [6c9 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000384ca0 gate 1574140910868507800 evaluation fails +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [540 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | 00000010 c4 01 30 aa 3d 34 f0 bf 16 81 4f a0 44 19 df e5 |..0.=4....O.D...| +peer0.org1.example.com | [543 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org2.example.com | [6ca 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.266 UTC [msp.identity] newIdentity -> DEBU 34c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [541 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 53ms +peer1.org1.example.com | [3a4 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 92 fb 35 13 3f 29 99 4d 95 47 ff |0D. "..5.?).M.G.| +peer0.org1.example.com | [544 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x60, 0x1e, 0xe1, 0xb7, 0xa1, 0x19, 0x69, 0xc3, 0xf3, 0xb5, 0x51, 0x11, 0x52, 0x94, 0x60, 0xd, 0x7b, 0xd0, 0x3f, 0x9f, 0xa0, 0x2a, 0x24, 0xa6, 0x25, 0xf8, 0xdd, 0x54, 0x3d, 0xb9, 0xca, 0x84} txOffsets= +peer1.org2.example.com | [6cb 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [542 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | 00000010 1b 92 6b 1a c2 34 2e 78 03 f0 8a 7c 07 fb 53 30 |..k..4.x...|..S0| +peer0.org1.example.com | txId=994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727 locPointer=offset=71, bytesLength=24470 +peer1.org2.example.com | [6cc 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [543 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | 00000020 1c 7e 48 f2 02 20 10 7c 9f 70 52 85 f2 3c eb fb |.~H.. .|.pR..<..| +peer0.org1.example.com | ] +peer1.org2.example.com | [6cd 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385550 gate 1574140910868760200 evaluation starts +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [544 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | 00000030 ef f4 a5 28 0d d1 46 54 f6 62 3d bf 6a d9 2d d4 |...(..FT.b=.j.-.| +peer0.org1.example.com | [545 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to txid-index +peer1.org2.example.com | [6ce 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385550 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org2.example.com | [545 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer1.org1.example.com | 00000040 18 8b 11 50 9a 69 |...P.i| +peer0.org1.example.com | [546 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx number:[0] ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to blockNumTranNum index +peer1.org2.example.com | [6cf 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385550 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [546 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [3a5 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [547 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51321], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org2.example.com | [6d0 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385550 principal matched by identity 0 +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org1.example.com | [3a6 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [548 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org2.example.com | [6d1 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org1.example.com | [3a7 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [547 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [549 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org2.example.com | 00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org1.example.com | [3a8 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [548 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [54a 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org2.example.com | [6d2 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org1.example.com | [3a9 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [549 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org1.example.com | [54b 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | 00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org1.example.com | [3aa 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54a 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [54c 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | 00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org1.example.com | [3ab 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [54b 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [54d 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | 00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [54d 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [54e 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | 00000040 c0 54 b2 99 1b 95 3e |.T....>| +orderer0.example.com | "2019-11-19 05:21:41.266 UTC [msp] Validate -> DEBU 34d MSP OrdererMSP validating identity" +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [54e 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [54f 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [6d3 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385550 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] NewStandardValues -> DEBU 34e Initializing protos for *channelconfig.ApplicationProtos" +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [54f 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [550 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [6d4 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385550 gate 1574140910868760200 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34f Processing field: ACLs" +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | [550 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [551 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org2.example.com | [6d5 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 350 Processing field: Capabilities" +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [551 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [552 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [6d6 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] NewStandardValues -> DEBU 351 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org2.example.com | [54c 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025864e0, READY +peer0.org1.example.com | [553 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org2.example.com | [6d7 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 352 Processing field: AnchorPeers" +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | [554 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org2.example.com | [6d8 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] NewStandardValues -> DEBU 353 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | [552 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | [555 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [6d9 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 354 Processing field: MSP" +peer0.org2.example.com | [553 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | [556 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org2.example.com | [6da 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1574140894789402700 16 {} [] 0} +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] Validate -> DEBU 355 Anchor peers for org Org1MSP are " +peer0.org2.example.com | [554 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | [557 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org2.example.com | [6db 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [common.channelconfig] validateMSP -> DEBU 356 Setting up MSP for org Org1MSP" +peer0.org2.example.com | [555 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | [558 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org2.example.com | [6dc 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [msp] newBccspMsp -> DEBU 357 Creating BCCSP-based MSP instance" +peer0.org2.example.com | [556 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0000c1200)} +peer1.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | [559 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 12ms (state_validation=1ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org2.example.com | [6dd 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [msp] New -> DEBU 358 Creating Cache-MSP instance" +peer0.org2.example.com | [557 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [55a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [6de 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.267 UTC [msp] Setup -> DEBU 359 Setting up MSP instance Org1MSP" +peer0.org2.example.com | [558 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [3ac 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030168b0 gate 1574140907354548200 evaluation starts +peer0.org1.example.com | [55b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408BCAFBBCFFB999EEC15...EA55014EA68C22F9710D59632A020802 +peer1.org2.example.com | [6df 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +orderer0.example.com | "2019-11-19 05:21:41.268 UTC [msp.identity] newIdentity -> DEBU 35a Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [559 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [3ad 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030168b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [55c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E46508EC6B042CE78C4B4079FB9E00CC9DFA8EB95BC6CEFA4CA91C395F829B12 +peer1.org2.example.com | [6e0 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [55a 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org1.example.com | [3ae 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030168b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [55d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org2.example.com | [6e1 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [55b 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org1.example.com | [3af 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [55e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer1.org2.example.com | [6e2 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [55c 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org1.example.com | [3b0 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [55f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org2.example.com | [6e3 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | [55d 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3b1 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [560 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer1.org2.example.com | [6e4 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [55e 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer1.org1.example.com | [3b2 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030168b0 principal matched by identity 0 +peer0.org1.example.com | [561 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer1.org2.example.com | [6e5 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [55f 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer1.org1.example.com | [3b3 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 c5 b2 2c 3e af b8 f7 8f 8c 2a 44 ef 9e 8a 87 |&..,>.....*D....| +peer0.org1.example.com | [562 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [6e6 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" > alive:\216\350\311\331\031\200\371%\267\242i\024\326\321\224\201\252\177t\246\320\002Zv{\346\002 {\357b~S\203y\342\201\360\006\3276.\342\005$\374\204e)#\336u\237\r%\207\205\013\364\240" > alive: +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [560 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org1.example.com | 00000010 c4 01 30 aa 3d 34 f0 bf 16 81 4f a0 44 19 df e5 |..0.=4....O.D...| +peer0.org1.example.com | [563 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0028eff40 env 0xc002f41810 txn 0 +peer1.org2.example.com | [6e7 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org2.example.com | [561 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org1.example.com | [3b4 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 92 fb 35 13 3f 29 99 4d 95 47 ff |0D. "..5.?).M.G.| +peer0.org1.example.com | [564 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002f41810 +peer1.org2.example.com | [6e8 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | 00000010 1b 92 6b 1a c2 34 2e 78 03 f0 8a 7c 07 fb 53 30 |..k..4.x...|..S0| +peer0.org2.example.com | [562 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org2.example.com | [6e9 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [565 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org1.example.com | 00000020 1c 7e 48 f2 02 20 10 7c 9f 70 52 85 f2 3c eb fb |.~H.. .|.pR..<..| +peer0.org2.example.com | [563 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6ea 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [566 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | 00000030 ef f4 a5 28 0d d1 46 54 f6 62 3d bf 6a d9 2d d4 |...(..FT.b=.j.-.| +peer0.org2.example.com | [564 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6eb 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [567 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU begin +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org1.example.com | 00000040 18 8b 11 50 9a 69 |...P.i| +peer0.org2.example.com | [565 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [6ec 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [568 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [3b5 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030168b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [6ed 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [569 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [3b6 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030168b0 gate 1574140907354548200 evaluation succeeds +peer1.org2.example.com | [6ee 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [56a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.268 UTC [common.channelconfig] NewStandardValues -> DEBU 35b Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [3b7 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6ef 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | "2019-11-19 05:21:41.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35c Processing field: AnchorPeers" +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [3b8 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [6f0 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.268 UTC [common.channelconfig] NewStandardValues -> DEBU 35d Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [3b9 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org2.example.com | [6f1 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35e Processing field: MSP" +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer1.org1.example.com | [3ba 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer1.org2.example.com | [6f2 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.268 UTC [common.channelconfig] Validate -> DEBU 35f Anchor peers for org Org2MSP are " +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer1.org1.example.com | [3bb 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | [6f3 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.269 UTC [common.channelconfig] validateMSP -> DEBU 360 Setting up MSP for org Org2MSP" +peer0.org2.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer1.org1.example.com | [3bc 11-19 05:21:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer1.org2.example.com | [6f4 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.269 UTC [msp] newBccspMsp -> DEBU 361 Creating BCCSP-based MSP instance" +peer0.org2.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | [3bd 11-19 05:21:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer1.org2.example.com | [6f5 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.269 UTC [msp] New -> DEBU 362 Creating Cache-MSP instance" +peer0.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | [3be 11-19 05:21:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer1.org2.example.com | [6f6 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.269 UTC [msp] Setup -> DEBU 363 Setting up MSP instance Org2MSP" +peer0.org2.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer1.org1.example.com | [3bf 11-19 05:21:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer1.org2.example.com | [6f7 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:41.269 UTC [msp.identity] newIdentity -> DEBU 364 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer1.org1.example.com | [3c0 11-19 05:21:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer1.org2.example.com | [6f8 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3c1 11-19 05:21:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer1.org2.example.com | [6f9 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b350 gate 1574140911369196100 evaluation starts +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [566 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3c2 11-19 05:21:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | fQ== +peer1.org2.example.com | [6fa 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b350 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [567 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3c3 11-19 05:21:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [6fb 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b350 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | [568 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c4 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [56b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer1.org2.example.com | [6fc 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [569 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c5 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [56c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [6fd 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b350 principal evaluation fails +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [56a 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c6 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer0.org1.example.com | [56d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [6fe 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b350 gate 1574140911369196100 evaluation fails +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [56c 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3c7 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer0.org1.example.com | [56e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5c 3f 1b d8 4a da c3 4b 67 20 49 d8 48 ce 53 | \?..J..Kg I.H.S| +peer1.org2.example.com | [6ff 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org2.example.com | [56d 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c8 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 c5 b2 2c 3e af b8 f7 8f 8c 2a 44 ef 9e 8a 87 |&..,>.....*D....| +peer0.org1.example.com | 00000010 e1 89 fc 50 b4 b1 5e c3 a1 04 2d 2b 2a a2 53 c9 |...P..^...-+*.S.| +peer1.org2.example.com | [700 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [56f 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:37212 disconnected +peer1.org1.example.com | 00000010 c4 01 30 aa 3d 34 f0 bf 16 81 4f a0 44 19 df e5 |..0.=4....O.D...| +peer0.org1.example.com | [56f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c da 5b 7f f8 0b 78 dd 56 60 07 6f |0D. <.[...x.V`.o| +peer1.org2.example.com | [701 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org2.example.com | [570 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:37212 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=417.634ms +peer1.org1.example.com | [3c9 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 92 fb 35 13 3f 29 99 4d 95 47 ff |0D. "..5.?).M.G.| +peer0.org1.example.com | 00000010 55 50 96 78 11 13 49 28 89 52 93 b7 b2 9d bb 4d |UP.x..I(.R.....M| +peer1.org2.example.com | [702 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b8c0 gate 1574140911369571000 evaluation starts +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | [571 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | 00000010 1b 92 6b 1a c2 34 2e 78 03 f0 8a 7c 07 fb 53 30 |..k..4.x...|..S0| +peer0.org1.example.com | 00000020 1c 1a 01 32 02 20 63 c4 7c ca a7 d6 48 c5 10 9b |...2. c.|...H...| +peer1.org2.example.com | [703 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b8c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org2.example.com | [56b 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x60, 0x1e, 0xe1, 0xb7, 0xa1, 0x19, 0x69, 0xc3, 0xf3, 0xb5, 0x51, 0x11, 0x52, 0x94, 0x60, 0xd, 0x7b, 0xd0, 0x3f, 0x9f, 0xa0, 0x2a, 0x24, 0xa6, 0x25, 0xf8, 0xdd, 0x54, 0x3d, 0xb9, 0xca, 0x84} txOffsets= +peer1.org1.example.com | 00000020 1c 7e 48 f2 02 20 10 7c 9f 70 52 85 f2 3c eb fb |.~H.. .|.pR..<..| +peer0.org1.example.com | 00000030 00 2d 4d 59 a6 7a c2 62 62 b5 9b 3a ce f0 9e e7 |.-MY.z.bb..:....| +peer1.org2.example.com | [704 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b8c0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | txId=994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727 locPointer=offset=71, bytesLength=24470 +peer1.org1.example.com | 00000030 ef f4 a5 28 0d d1 46 54 f6 62 3d bf 6a d9 2d d4 |...(..FT.b=.j.-.| +peer0.org1.example.com | 00000040 61 25 fa 66 d3 6c |a%.f.l| +peer1.org2.example.com | [705 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b8c0 principal matched by identity 0 +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | ] +peer1.org1.example.com | 00000040 18 8b 11 50 9a 69 |...P.i| +peer0.org1.example.com | [570 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [706 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [msp] Setup -> DEBU 365 Setting up the MSP manager (3 msps)" +peer1.org1.example.com | [3ca 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +peer0.org2.example.com | [572 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to txid-index +peer0.org1.example.com | [571 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00334a000, header channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [msp] Setup -> DEBU 366 MSP manager setup complete, setup 3 msps" +peer1.org1.example.com | 00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +peer0.org2.example.com | [573 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx number:[0] ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to blockNumTranNum index +peer0.org1.example.com | [572 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [707 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 367 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [3cb 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +peer0.org2.example.com | [574 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [573 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 368 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | 00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +peer0.org2.example.com | [575 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [574 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 369 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | 00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +peer0.org2.example.com | [576 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [575 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36a Proposed new policy Writers for Channel/Orderer" +peer0.org2.example.com | [56e 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org1.example.com | [576 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | 00000040 30 b2 7f b8 62 2d 65 |0...b-e| +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36b Proposed new policy Admins for Channel/Orderer" +peer0.org2.example.com | [578 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [577 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [708 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b8c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3cc 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36c Proposed new policy BlockValidation for Channel/Orderer" +peer0.org2.example.com | [579 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [578 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [709 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b8c0 gate 1574140911369571000 evaluation succeeds +peer1.org1.example.com | [3cd 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36d Proposed new policy Readers for Channel/Orderer" +peer0.org2.example.com | [57a 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [579 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [70a 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ce 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36e Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org2.example.com | [57b 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b7c0 gate 1574140910136338300 evaluation starts +peer0.org1.example.com | [57a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [70b 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cf 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36f Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org2.example.com | [57c 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b7c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [57b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [70c 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d0 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 370 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org2.example.com | [57d 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b7c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [57c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [70d 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d1 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 371 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org2.example.com | [57e 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [57d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [70e 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d2 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 372 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org2.example.com | [57f 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [57e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [70f 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d3 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 373 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org2.example.com | [580 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [57f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [710 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d4 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 374 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org2.example.com | [581 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b7c0 principal matched by identity 0 +peer0.org1.example.com | [580 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [3d5 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [711 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 375 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org2.example.com | [582 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org1.example.com | [581 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [3d6 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151009 +peer1.org2.example.com | [712 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 376 Proposed new policy ChannelCreationPolicy for Channel/Application" +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org1.example.com | [582 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [3d7 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 057EFB38904F41802D003F4FA4598D1C8DE2B1C2FFF60CFF0C6A0D49739800B2 +peer1.org2.example.com | [713 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] GetPolicy -> DEBU 377 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +peer0.org2.example.com | [583 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 7d b4 4a 95 96 b6 7a e6 23 1a 99 |0D. N}.J...z.#..| +peer0.org1.example.com | [583 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org2.example.com | [714 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550510 gate 1574140911370740700 evaluation starts +peer1.org1.example.com | [3d8 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 378 Proposed new policy Writers for Channel" +peer0.org2.example.com | 00000010 fd 48 0d 7c 13 a3 c5 b0 cb 98 b0 b5 e3 61 7a 3f |.H.|.........az?| +peer0.org1.example.com | [584 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [715 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d9 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] GetPolicy -> DEBU 379 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +peer0.org2.example.com | 00000020 e2 24 c1 4b 02 20 70 94 4d d7 11 f4 c2 62 86 8c |.$.K. p.M....b..| +peer0.org1.example.com | [585 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [716 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550510 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3da 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 37a Proposed new policy Admins for Channel" +peer0.org2.example.com | 00000030 80 a8 80 7b 27 5a a9 09 5c c9 3a d4 75 3e a8 ca |...{'Z..\.:.u>..| +peer0.org1.example.com | [586 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [717 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3db 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] GetPolicy -> DEBU 37b Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +peer0.org2.example.com | 00000040 9a 40 2a 01 12 2c |.@*..,| +peer0.org1.example.com | [587 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [718 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550510 principal evaluation fails +peer1.org1.example.com | [3dc 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 37c Proposed new policy Readers for Channel" +peer0.org2.example.com | [584 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b7c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [588 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [719 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550510 gate 1574140911370740700 evaluation fails +peer1.org1.example.com | [3dd 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 37d Adding to config map: [Group] /Channel" +peer0.org2.example.com | [585 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b7c0 gate 1574140910136338300 evaluation succeeds +peer0.org1.example.com | [589 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [71a 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3de 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 37e Adding to config map: [Group] /Channel/Application" +peer0.org2.example.com | [586 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [58a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org2.example.com | [71b 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3df 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 37f Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org2.example.com | [587 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [58b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [71c 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3e0 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 380 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 381 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [588 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [58c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [71d 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550a80 gate 1574140911371246900 evaluation starts +peer1.org1.example.com | [3e1 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 382 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [589 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [58d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org2.example.com | [71e 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550a80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e2 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 383 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org2.example.com | [58a 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [58e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org2.example.com | [71f 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550a80 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3e3 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 7e fb 38 90 4f 41 80 2d 00 3f 4f a4 59 8d 1c |.~.8.OA.-.?O.Y..| +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 384 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [58b 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [58f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [720 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550a80 principal matched by identity 0 +peer1.org1.example.com | 00000010 8d e2 b1 c2 ff f6 0c ff 0c 6a 0d 49 73 98 00 b2 |.........j.Is...| +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 385 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org2.example.com | [58c 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [590 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [721 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [3e4 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 c3 cd 1f 4e 53 34 2e d4 92 99 92 |0D. d...NS4.....| +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 386 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org2.example.com | [577 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51320], isChainEmpty=[false], lastBlockNumber=[1] +peer0.org1.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | 00000010 99 90 c0 2f 7f 09 d3 39 27 d0 7f fe 0f 31 66 dd |.../...9'....1f.| +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 387 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org2.example.com | [58d 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [722 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000020 68 d0 db 10 02 20 1a 26 ba ba bc e1 4f c4 91 59 |h.... .&....O..Y| +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 388 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org2.example.com | [58e 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15100B +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000030 24 25 9d 0c 36 26 5f 29 ad 46 14 d8 5c af 77 13 |$%..6&_).F..\.w.| +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 389 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org2.example.com | [590 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6934FD7E77CCDF4C77FAE00A4C855B8DFA6CF4807D02B91A5585EFD10BFD5EE2 +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000040 42 d3 bb 53 7b 50 |B..S{P| +orderer0.example.com | "2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 38a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [591 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [3e5 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38b Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +peer0.org2.example.com | [592 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38c Adding to config map: [Group] /Channel/Orderer" +peer0.org2.example.com | [58f 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer1.org2.example.com | [723 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550a80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3e6 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 66 f4 d4 f8 b8 84 b6 79 4c 4d 6c |0D. .f......yLMl| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer0.org2.example.com | [593 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org2.example.com | [724 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550a80 gate 1574140911371246900 evaluation succeeds +peer1.org1.example.com | 00000010 a6 57 89 f6 d9 b9 e3 79 ca 9f 3c 84 13 a4 04 8d |.W.....y..<.....| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | [595 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [725 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 3f 0d f6 24 02 20 12 21 85 97 db 3f a8 b1 0d d4 |?..$. .!...?....| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer0.org2.example.com | [594 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | 00000030 d6 47 1f 40 13 6c 05 0d 6e 6d 68 78 b5 16 34 43 |.G.@.l..nmhx..4C| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 390 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer0.org2.example.com | [596 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [726 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 28 85 8c f0 b9 ac |(.....| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 391 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer0.org2.example.com | [598 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [727 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3e7 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 392 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [599 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [728 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3e8 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 393 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | [591 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 gate 1574140909537274700 evaluation starts +peer0.org2.example.com | [59a 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [729 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e9 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 394 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | [592 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [597 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [72a 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ea 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 395 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | [593 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [59b 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [72b 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3eb 11-19 05:21:48.65 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]] +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 396 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | [594 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org2.example.com | [59c 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:11007432676051748334 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [72c 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ec 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [595 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org2.example.com | [59d 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:11007432676051748334 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | [72d 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ed 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | [596 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [59e 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [72e 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ee 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 9e 08 e1 7d 1c fd 45 97 a9 69 6e 5b 56 8a 5d |....}..E..in[V.]| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | [597 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [59f 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [72f 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 26 93 63 a6 3e 64 30 72 c4 75 8d e1 ef 8d 5c de |&.c.>d0r.u....\.| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | [598 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org2.example.com | [5a0 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org2.example.com | [730 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ef 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 9a 1c ab ad d8 d4 16 af 6c 7c |0E.!..........l|| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | [599 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [5a1 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org2.example.com | [731 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 7f e6 a7 25 2f 7a b5 c8 35 45 02 b6 b7 72 ea 8d |...%/z..5E...r..| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | [59a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 principal matched by identity 0 +peer0.org2.example.com | [5a2 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org2.example.com | [732 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 5f e7 58 a7 ac 02 20 19 79 5f 6d 0c 51 2d 81 3a |_.X... .y_m.Q-.:| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | [59b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +peer0.org2.example.com | [5a3 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [733 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 91 df 7d 77 db 5e 97 a4 1c 82 4a a2 5c 87 af 79 |..}w.^....J.\..y| +orderer0.example.com | "2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | 00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.| +peer0.org2.example.com | [5a4 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [734 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000040 88 42 d7 78 c6 09 dc |.B.x...| +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | [59c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +peer0.org2.example.com | [5a5 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [735 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f0 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | 00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +peer0.org2.example.com | [5a6 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [736 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f1 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | 00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +peer0.org2.example.com | [5a8 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [737 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544100 gate 1574140911389049200 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Policy] /Channel/Admins" +peer1.org1.example.com | [3f2 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer0.org1.example.com | 00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +peer0.org2.example.com | [5a9 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0003f38f0, CONNECTING +peer1.org2.example.com | [738 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544100 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Policy] /Channel/Readers" +peer1.org1.example.com | [3f3 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> INFO 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Some peer is already a leader +peer0.org1.example.com | 00000040 56 71 ab 2e 37 58 4a |Vq..7XJ| +peer0.org2.example.com | [5a7 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org2.example.com | [739 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544100 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Group] /Channel" +peer1.org1.example.com | [3f4 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer0.org1.example.com | [59d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5aa 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org2.example.com | [73a 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Group] /Channel/Application" +peer1.org1.example.com | [3f5 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer0.org1.example.com | [59e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 gate 1574140909537274700 evaluation succeeds +peer0.org2.example.com | [5ab 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [73b 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544100 principal evaluation fails +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org1.example.com | [3f6 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer0.org1.example.com | [59f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [5ac 11-19 05:21:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org2.example.com | [73c 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544100 gate 1574140911389049200 evaluation fails +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org1.example.com | [3f7 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes +peer0.org1.example.com | [5a0 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [5ad 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 47ms (state_validation=6ms block_and_pvtdata_commit=27ms state_commit=7ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org2.example.com | [73d 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Value] /Channel/Consortium" +peer1.org1.example.com | [3f8 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes +peer0.org1.example.com | [5a1 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [5ae 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [73e 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel" +peer1.org1.example.com | [3f9 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5a2 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [73f 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Group] /Channel/Application" +peer1.org1.example.com | [3fa 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5a3 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5af 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E12140898B48782FE999EEC15...3FF04E590AF5F9A12CFD445B2A020802 +peer1.org2.example.com | [740 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544760 gate 1574140911389315100 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org1.example.com | [3fb 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [5a4 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b0 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5D1634666B8E3506B304FDE22C1B108F71D354C2590ACDFEE10CBF1EFEE6F664 +peer1.org2.example.com | [741 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544760 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org1.example.com | [3fc 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5a5 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b1 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org2.example.com | [742 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544760 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org1.example.com | [3fd 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [5a6 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b2 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer1.org2.example.com | [743 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544760 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org1.example.com | [3fe 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5a7 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b3 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org2.example.com | [744 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org1.example.com | [3ff 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [5a8 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b4 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org1.example.com | MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | [5a9 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b5 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer1.org2.example.com | [745 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [5aa 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b6 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | [5ab 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b7 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00280cb00 env 0xc0004c2410 txn 0 +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +peer0.org1.example.com | [5ac 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [5b8 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0003f38f0, READY +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Value] /Channel/Consortium" +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [5ad 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [5b9 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0004c2410 +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b4 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | [5ae 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [746 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544760 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5ba 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b5 Processing change to key: [Policy] /Channel/Application/Writers" +peer1.org1.example.com | CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 +peer0.org1.example.com | [5af 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [747 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000544760 gate 1574140911389315100 evaluation succeeds +peer0.org2.example.com | [5bb 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b6 Processing change to key: [Value] /Channel/Application/Capabilities" +peer1.org1.example.com | +Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | [5b0 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [748 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5bc 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU begin +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b7 Processing change to key: [Value] /Channel/Application/ACLs" +peer1.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | [5b1 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [749 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5be 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b8 Processing change to key: [Policy] /Channel/Application/Endorsement" +peer1.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +peer0.org1.example.com | [5b2 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [74a 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5bf 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b9 Processing change to key: [Policy] /Channel/Application/Readers" +peer1.org1.example.com | LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +peer0.org1.example.com | [5b3 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [74b 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5bd 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3ba Processing change to key: [Group] /Channel/Application" +peer1.org1.example.com | rkc= +peer0.org1.example.com | [5b4 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [74c 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5c0 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [common.configtx] policyForItem -> DEBU 3bb Getting policy for item Application with mod_policy ChannelCreationPolicy" +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [74d 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5c1 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3bc Manager Channel looking up path []" +peer1.org1.example.com | [400 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072690 gate 1574140909446125300 evaluation starts +peer0.org1.example.com | [5b5 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [74e 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [5c2 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3bd Manager Channel has managers Orderer" +peer1.org1.example.com | [401 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5b6 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [74f 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5c3 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3be Manager Channel has managers Application" +peer1.org1.example.com | [402 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072690 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [750 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [5b7 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3bf Manager Channel looking up path [Application]" +peer1.org1.example.com | [403 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org2.example.com | [751 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [5b8 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c0 Manager Channel has managers Orderer" +peer1.org2.example.com | [752 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [5b9 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c1 Manager Channel has managers Application" +peer1.org2.example.com | [754 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [404 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [5ba 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c2 Manager Channel/Application looking up path []" +peer1.org2.example.com | [753 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [405 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072690 principal matched by identity 0 +peer0.org1.example.com | [5bb 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c3 Manager Channel/Application has managers Org1MSP" +peer1.org2.example.com | [755 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [406 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 91 7f 7d a7 af 3c 87 a6 35 17 24 8d af 90 a3 |...}..<..5.$....| +peer0.org1.example.com | [5bc 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c4 Manager Channel/Application has managers Org2MSP" +peer1.org1.example.com | 00000010 9c 3f e8 16 83 d2 11 ae 07 62 88 c0 41 a0 bc 76 |.?.......b..A..v| +peer1.org2.example.com | [756 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [5bd 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Evaluate -> DEBU 3c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +peer1.org1.example.com | [407 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 89 59 37 ed 6c ef 46 99 77 07 88 |0D. B.Y7.l.F.w..| +peer1.org2.example.com | [757 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [5be 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Evaluate -> DEBU 3c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | 00000010 25 71 00 7a ca 4f fc d5 07 4b 3c 91 59 93 9c 26 |%q.z.O...K<.Y..&| +peer1.org1.example.com | 00000020 9d a1 c1 78 02 20 1a ad 4d ed 38 4f f6 87 77 4e |...x. ..M.8O..wN| +peer0.org1.example.com | [5bf 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [policies] Evaluate -> DEBU 3c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer1.org2.example.com | [758 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [5c0 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org2.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | "2019-11-19 05:21:41.275 UTC [msp] DeserializeIdentity -> DEBU 3c8 Obtaining identity" +peer1.org2.example.com | [759 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 06 62 fc 50 54 7c b9 e6 b1 6e 8c 80 a3 be be 72 |.b.PT|...n.....r| +peer1.org1.example.com | 00000040 96 dc 8b 79 6a f8 |...yj.| +peer0.org2.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [msp.identity] newIdentity -> DEBU 3c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [75a 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [408 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072690 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5c1 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | fQ== +orderer0.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [75b 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [409 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072690 gate 1574140909446125300 evaluation succeeds +peer0.org1.example.com | [5c2 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [75c 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40a 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [5c3 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [5c4 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [75d 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [40b 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [5c4 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [5c6 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [75e 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151014 +peer1.org1.example.com | [40c 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [5c5 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [5c5 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [75f 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3622534EE778EADD97FA4FAFCC9D7BC828BD432E474C60E29F251DC0746FA0F0 +peer1.org1.example.com | [40d 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [5c6 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [5c7 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | [760 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [40e 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [5c7 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [5c8 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org2.example.com | [761 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [40f 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 1 +peer0.org1.example.com | [5c8 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [5c9 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer1.org2.example.com | [762 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [410 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [5c9 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [5ca 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +orderer0.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | [763 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [411 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [5ca 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [5cb 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer1.org2.example.com | [764 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [412 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [5cb 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.544Z grpc.peer_address=172.18.0.8:41314 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=281.2µs +peer0.org2.example.com | [5cc 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer1.org2.example.com | [765 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [413 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5cc 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [5cd 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer1.org2.example.com | [766 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [414 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes +peer0.org1.example.com | [5cd 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [5ce 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [767 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [415 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [5cf 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [cauthdsl] func1 -> DEBU 3ca 0xc000925200 gate 1574140901276305700 evaluation starts" +peer1.org2.example.com | [768 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [416 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [5d0 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [cauthdsl] func2 -> DEBU 3cb 0xc000925200 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [769 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [417 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [5d1 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [cauthdsl] func2 -> DEBU 3cc 0xc000925200 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [76a 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [418 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org2.example.com | [5d3 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3cd Checking if identity has been named explicitly as an admin for Org1MSP" +peer1.org2.example.com | [76b 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [419 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [5d4 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025de10 gate 1574140910178348500 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3ce Checking if identity carries the admin ou for Org1MSP" +peer1.org2.example.com | [76c 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41a 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | [5d5 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025de10 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [msp] Validate -> DEBU 3cf MSP Org1MSP validating identity" +peer1.org2.example.com | [76d 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [41b 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030498d0 gate 1574140909454031600 evaluation starts +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org2.example.com | [5d2 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5c 3f 1b d8 4a da c3 4b 67 20 49 d8 48 ce 53 | \?..J..Kg I.H.S| +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [msp] getCertificationChain -> DEBU 3d0 MSP Org1MSP getting certification chain" +peer1.org2.example.com | [76e 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [41c 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030498d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org2.example.com | 00000010 e1 89 fc 50 b4 b1 5e c3 a1 04 2d 2b 2a a2 53 c9 |...P..^...-+*.S.| +orderer0.example.com | "2019-11-19 05:21:41.276 UTC [msp] hasOURole -> DEBU 3d1 MSP Org1MSP checking if the identity is a client" +peer1.org2.example.com | [76f 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 22 53 4e e7 78 ea dd 97 fa 4f af cc 9d 7b c8 |6"SN.x....O...{.| +peer1.org1.example.com | [41d 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030498d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | [5d7 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c da 5b 7f f8 0b 78 dd 56 60 07 6f |0D. <.[...x.V`.o| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [msp] getCertificationChain -> DEBU 3d2 MSP Org1MSP getting certification chain" +peer1.org2.example.com | 00000010 28 bd 43 2e 47 4c 60 e2 9f 25 1d c0 74 6f a0 f0 |(.C.GL`..%..to..| +peer1.org1.example.com | [41e 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030498d0 principal matched by identity 0 +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org2.example.com | 00000010 55 50 96 78 11 13 49 28 89 52 93 b7 b2 9d bb 4d |UP.x..I(.R.....M| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [cauthdsl] func2 -> DEBU 3d3 0xc000925200 principal matched by identity 0" +peer1.org2.example.com | [770 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 96 22 d0 d6 eb e9 2f 69 a7 3d 7f |0D. l."..../i.=.| +peer1.org1.example.com | [41f 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 0d 67 29 f2 dd c4 44 52 b4 64 a8 1f 10 48 f2 |..g)...DR.d...H.| +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org2.example.com | 00000020 1c 1a 01 32 02 20 63 c4 7c ca a7 d6 48 c5 10 9b |...2. c.|...H...| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [msp.identity] Verify -> DEBU 3d4 Verify: digest = 00000000 f9 6f 4d ca e1 d0 95 1d 1d 09 87 f1 47 35 33 91 |.oM.........G53.| +peer1.org2.example.com | 00000010 2a dd 7c ef 18 30 37 08 71 0d 78 e0 7a 7f de 91 |*.|..07.q.x.z...| +peer1.org1.example.com | 00000010 b8 ca 62 79 aa 7d b8 fd 4f c3 59 ec ca f2 d4 c0 |..by.}..O.Y.....| +peer0.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org2.example.com | 00000030 00 2d 4d 59 a6 7a c2 62 62 b5 9b 3a ce f0 9e e7 |.-MY.z.bb..:....| +orderer0.example.com | 00000010 09 ac fd d6 12 40 bb 66 ea 49 fa 7b 6f 84 b7 72 |.....@.f.I.{o..r|" +peer1.org2.example.com | 00000020 a5 77 4c 14 02 20 38 21 cb e3 6a 1d 42 85 16 9e |.wL.. 8!..j.B...| +peer1.org1.example.com | [420 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5e 71 4d 29 b8 62 52 b5 8f 10 |0E.!..^qM).bR...| +peer0.org1.example.com | 1g== +peer0.org2.example.com | 00000040 61 25 fa 66 d3 6c |a%.f.l| +peer1.org2.example.com | 00000030 bc da 5f 34 0e 3d 2d da 2d 73 92 6d 4d 46 99 22 |.._4.=-.-s.mMF."| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [msp.identity] Verify -> DEBU 3d5 Verify: sig = 00000000 30 45 02 21 00 f5 b3 1c f4 c4 bb 3f d2 03 0c 6f |0E.!.......?...o| +peer1.org1.example.com | 00000010 08 d1 28 d7 4e 48 91 21 b9 2d 62 76 1a 21 f5 c7 |..(.NH.!.-bv.!..| +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [5d6 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025de10 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 54 df bf 03 9e c9 |T.....| +orderer0.example.com | 00000010 15 d9 68 59 0a 69 49 a1 63 9d 07 14 52 80 db a4 |..hY.iI.c...R...| +peer1.org1.example.com | 00000020 6a 6f db 01 da 02 20 69 62 fa a9 16 65 97 6f 50 |jo.... ib...e.oP| +peer0.org1.example.com | [5ce 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [5d8 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025de10 principal matched by identity 0 +orderer0.example.com | 00000020 e5 27 2c 7b 3e 02 20 0a eb 04 74 31 4b 3b e1 1c |.',{>. ...t1K;..| +peer1.org2.example.com | [771 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | 00000030 e3 26 90 3c e8 a4 da 6c e5 32 60 77 95 cd 48 c9 |.&.<...l.2`w..H.| +peer0.org1.example.com | [5cf 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org2.example.com | [5d9 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +orderer0.example.com | 00000030 9f 78 a7 ea f2 c6 d9 3c ee ff 97 d6 37 13 a8 78 |.x.....<....7..x| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | 00000040 d4 ee d2 5a 59 63 26 |...ZYc&| +peer0.org1.example.com | [5d0 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +orderer0.example.com | 00000040 32 7a 3f 6b c5 e7 f9 |2z?k...|" +peer1.org2.example.com | [772 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 89 a7 75 4f 56 7e f9 f2 03 75 |0E.!....uOV~...u| +peer1.org1.example.com | [421 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030498d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5d1 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:41314 +peer0.org2.example.com | [5da 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 28 bf 8c 76 a4 36 91 69 05 e3 cf |0D. <(..v.6.i...| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [cauthdsl] func2 -> DEBU 3d6 0xc000925200 principal evaluation succeeds for identity 0" +peer1.org2.example.com | 00000010 db 29 48 a6 d8 87 78 9e 46 8a 93 52 20 67 23 8f |.)H...x.F..R g#.| +peer1.org1.example.com | [422 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030498d0 gate 1574140909454031600 evaluation succeeds +peer0.org1.example.com | [5d2 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41314 +peer0.org2.example.com | 00000010 aa 60 7b ef fa 96 c6 db 58 34 a2 49 15 b0 f9 89 |.`{.....X4.I....| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [cauthdsl] func1 -> DEBU 3d7 0xc000925200 gate 1574140901276305700 evaluation succeeds" +peer1.org2.example.com | 00000020 d8 16 44 4a 4f 02 20 3c b8 d3 f2 07 8c 36 3b 11 |..DJO. <.....6;.| +peer1.org1.example.com | [423 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [5d3 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org2.example.com | 00000020 e1 18 04 11 02 20 34 75 69 49 15 f9 38 32 de 8b |..... 4uiI..82..| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [policies] Evaluate -> DEBU 3d8 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer1.org2.example.com | 00000030 9f 70 ae ae 80 29 53 6e 11 fd fc dc 5d 12 84 bd |.p...)Sn....]...| +peer1.org1.example.com | [424 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org2.example.com | 00000030 d2 13 a5 ae 10 93 6b 18 77 57 74 7d 4e f7 3e a3 |......k.wWt}N.>.| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [policies] Evaluate -> DEBU 3d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer1.org2.example.com | 00000040 a1 fb 95 de 9e f5 81 |.......| +peer1.org1.example.com | [425 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [5d4 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 e4 ad 25 13 4b ec 70 c8 5a 29 |0E.!....%.K.p.Z)| +peer0.org2.example.com | 00000040 c2 d4 27 57 1f 36 |..'W.6| +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [policies] Evaluate -> DEBU 3da Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +peer1.org2.example.com | [773 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [426 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | 00000010 23 f7 64 65 9b 9a 0c de a7 0f 4a d1 72 bb 20 e6 |#.de......J.r. .| +peer0.org2.example.com | [5db 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025de10 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [policies] Evaluate -> DEBU 3db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +peer1.org2.example.com | [774 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [427 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | 00000020 40 ee cc 34 db 02 20 0d 15 1f 3e 94 75 79 46 37 |@..4.. ...>.uyF7| +peer0.org2.example.com | [5dc 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025de10 gate 1574140910178348500 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [common.configtx] verifyDeltaSet -> DEBU 3dc Processing change to key: [Policy] /Channel/Application/Admins" +peer1.org2.example.com | [775 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [428 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 2 +peer0.org1.example.com | 00000030 65 25 83 99 88 e4 54 92 15 25 76 1d 8f 57 6e ff |e%....T..%v..Wn.| +peer0.org2.example.com | [5dd 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [common.configtx] recurseConfigMap -> DEBU 3dd Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [776 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [429 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 2c 3b 64 d1 cd 1a 61 |,;d...a| +peer0.org2.example.com | [5de 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.277 UTC [common.configtx] recurseConfigMap -> DEBU 3de Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [777 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [5d5 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41314 +peer0.org2.example.com | [5df 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3df Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org2.example.com | [778 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42b 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [5d6 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41314 +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [5e0 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [779 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [42c 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5d7 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org2.example.com | [5e1 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [77a 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [42d 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e2 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5d8 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41264 disconnected +peer0.org2.example.com | [5e3 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003350000, header channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +peer1.org2.example.com | [77b 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 22 53 4e e7 78 ea dd 97 fa 4f af cc 9d 7b c8 |6"SN.x....O...{.| +peer1.org1.example.com | [42e 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e3 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5d9 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:41264 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=13.6921774s +peer0.org2.example.com | [5e2 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org2.example.com | 00000010 28 bd 43 2e 47 4c 60 e2 9f 25 1d c0 74 6f a0 f0 |(.C.GL`..%..to..| +peer1.org1.example.com | [42f 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5da 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [5e5 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [77c 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 96 22 d0 d6 eb e9 2f 69 a7 3d 7f |0D. l."..../i.=.| +peer1.org1.example.com | [430 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e5 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5db 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org2.example.com | [5e6 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | 00000010 2a dd 7c ef 18 30 37 08 71 0d 78 e0 7a 7f de 91 |*.|..07.q.x.z...| +peer1.org1.example.com | [431 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e6 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5dc 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41314 disconnected +peer0.org2.example.com | [5e7 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 a5 77 4c 14 02 20 38 21 cb e3 6a 1d 42 85 16 9e |.wL.. 8!..j.B...| +peer1.org1.example.com | [432 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 2 blocks +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e7 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5dd 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:21:59.549Z grpc.peer_address=172.18.0.8:41314 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.9523ms +peer0.org2.example.com | [5e4 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | 00000030 bc da 5f 34 0e 3d 2d da 2d 73 92 6d 4d 46 99 22 |.._4.=-.-s.mMF."| +peer1.org1.example.com | [433 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002f0ef40 env 0xc0030bc320 txn 0 +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e8 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5de 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing +peer0.org2.example.com | [5e8 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | 00000040 54 df bf 03 9e c9 |T.....| +peer1.org1.example.com | [434 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0030bc320 +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e9 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5df 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [5e9 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [77d 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [435 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3ea Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5e0 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [5ea 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [77e 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [436 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +orderer0.example.com | "2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3eb Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | [5e1 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [5eb 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [77f 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [437 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU begin +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3ec Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [5ec 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [780 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [438 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [5ed 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [781 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [439 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3ee Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [5ee 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [782 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43a 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3ef Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org2.example.com | [5ef 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [783 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [5f0 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [784 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3f1 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org2.example.com | [5f1 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [785 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3f2 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org2.example.com | [5f2 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [786 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3f3 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org2.example.com | [5f3 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [787 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f4 Obtaining default signing identity" +peer0.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org2.example.com | [5f4 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [788 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | "2019-11-19 05:21:41.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f5 Obtaining default signing identity" +peer0.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org2.example.com | [5f5 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer1.org2.example.com | [789 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a90 gate 1574140911472966600 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.280 UTC [msp.identity] Sign -> DEBU 3f6 Sign: plaintext: 0AD2060A1B08011A0608E5F7CDEE0522...1A7066823D13BD641343311233347296 " +peer0.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org2.example.com | [5f6 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer1.org2.example.com | [78a 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a90 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.280 UTC [msp.identity] Sign -> DEBU 3f7 Sign: digest: 5E8794C27BE6F608BABD00831B4CF18AFBC257AE3DB063A9271D0D0C4CB4537B " +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [5f7 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer1.org2.example.com | [78b 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a90 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f8 Obtaining default signing identity" +peer0.org1.example.com | [5e2 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [5f8 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer1.org2.example.com | [78c 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:21:41.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f9 Obtaining default signing identity" +peer0.org1.example.com | [5e3 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [5f9 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer1.org2.example.com | [78d 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a90 principal evaluation fails +orderer0.example.com | "2019-11-19 05:21:41.280 UTC [msp.identity] Sign -> DEBU 3fa Sign: plaintext: 0ACE060A1708041A0608E5F7CDEE0522...7EC18B4E5D154B731367901066214577 " +peer0.org1.example.com | [5e4 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [5fa 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | fQ== +peer1.org2.example.com | [78e 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a90 gate 1574140911472966600 evaluation fails +orderer0.example.com | "2019-11-19 05:21:41.280 UTC [msp.identity] Sign -> DEBU 3fb Sign: digest: 83EC0D9DC48D82002ABDEB52955820EB8F0D7CF4ECA53BDF6309D0B150C7B2ED " +peer0.org1.example.com | [5e5 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [5fb 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [78f 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.281 UTC [policies] Evaluate -> DEBU 3fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer0.org1.example.com | [5e6 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [5fc 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [43b 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer1.org2.example.com | [790 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.281 UTC [policies] Evaluate -> DEBU 3fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [5e7 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [5fd 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [43c 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [791 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.282 UTC [policies] Evaluate -> DEBU 3fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer0.org1.example.com | [5e8 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [5fe 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [43d 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [792 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b0000 gate 1574140911477469300 evaluation starts +peer0.org1.example.com | [5e9 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | "2019-11-19 05:21:41.282 UTC [policies] Evaluate -> DEBU 3ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [5ff 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org1.example.com | [43e 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 24 ac 10 46 16 fe ce bb 6e 57 f7 c2 1e a1 d7 |.$..F....nW.....| +peer1.org2.example.com | [793 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b0000 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5ea 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +orderer0.example.com | "2019-11-19 05:21:41.282 UTC [policies] Evaluate -> DEBU 400 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org2.example.com | [600 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | 00000010 ca f6 e7 e8 44 8c cd d1 bf f4 d7 40 94 11 a4 79 |....D......@...y| +peer1.org2.example.com | [794 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b0000 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [5eb 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +orderer0.example.com | "2019-11-19 05:21:41.282 UTC [msp] DeserializeIdentity -> DEBU 401 Obtaining identity" +peer0.org2.example.com | [601 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [43f 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 c4 5b a3 d3 2b 64 c0 35 61 d6 |0E.!...[..+d.5a.| +peer1.org2.example.com | [795 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b0000 principal matched by identity 0 +peer0.org1.example.com | [5ec 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | "2019-11-19 05:21:41.282 UTC [msp.identity] newIdentity -> DEBU 402 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [602 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org1.example.com | 00000010 95 cb 42 f3 53 ed ef ed 72 82 6d 75 eb c7 a6 cf |..B.S...r.mu....| +peer1.org2.example.com | [796 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 55 cb b3 34 39 d6 e8 a7 3a c9 55 d8 ef 50 17 |.U..49...:.U..P.| +peer0.org1.example.com | [5ed 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer0.org2.example.com | [603 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | 00000020 f1 06 36 11 63 02 20 1c 0c c7 c4 d6 6e e7 f0 43 |..6.c. .....n..C| +peer1.org2.example.com | 00000010 12 63 1d 7b 04 0e 36 43 eb b0 e9 77 42 ef 9a 1c |.c.{..6C...wB...| +peer0.org1.example.com | [5ee 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [604 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 67 71 a7 fd 4f 11 0f ce c9 86 9f 83 ad a4 58 be |gq..O.........X.| +peer1.org2.example.com | [797 11-19 05:21:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d c8 c3 99 a2 69 02 ac 4d af 7c |0E.!......i..M.|| +peer0.org1.example.com | [5ef 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org2.example.com | [605 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000040 b3 5c 64 f4 e2 dd 4d |.\d...M| +peer1.org2.example.com | 00000010 8f e4 a0 cd d2 a3 05 47 c2 ca 7f 82 e4 03 7c c0 |.......G......|.| +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | [440 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | 00000020 f9 a5 d7 9a 0b 02 20 4a 78 c4 c5 fc 6a 4a b4 6d |...... Jx...jJ.m| +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | 00000030 5e c0 89 63 9a 2b 02 27 67 fd 16 c0 8b fa b4 b7 |^..c.+.'g.......| +peer1.org1.example.com | [441 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003122000, header channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | 00000040 52 91 6c 4a f1 e5 40 |R.lJ..@| +peer1.org1.example.com | [442 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | [798 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b0000 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [443 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | [799 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b0000 gate 1574140911477469300 evaluation succeeds +peer1.org1.example.com | [444 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | [79a 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [445 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer1.org2.example.com | [79b 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [446 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer1.org2.example.com | [79c 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [447 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | [79d 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [448 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | fQ== +peer0.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer1.org2.example.com | [79e 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [449 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer1.org2.example.com | [79f 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" lastAliveTS: 1574140894789402700, 16 but got ts: inc_num:1574140894789402700 seq_num:15 +peer1.org1.example.com | [44a 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer1.org2.example.com | [7a0 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [44b 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.283 UTC [cauthdsl] func1 -> DEBU 403 0xc00097eb10 gate 1574140901283477200 evaluation starts" +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [7a1 11-19 05:21:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [44c 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [5f0 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +orderer0.example.com | "2019-11-19 05:21:41.283 UTC [cauthdsl] func2 -> DEBU 404 0xc00097eb10 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [606 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043ee20 gate 1574140910197012400 evaluation starts +peer1.org2.example.com | [7a2 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [44d 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [5f1 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +orderer0.example.com | "2019-11-19 05:21:41.283 UTC [cauthdsl] func2 -> DEBU 405 0xc00097eb10 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [607 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043ee20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7a3 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [44e 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [5f2 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +orderer0.example.com | "2019-11-19 05:21:41.283 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 406 Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org2.example.com | [608 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043ee20 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [7a4 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> WARN StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found +peer1.org1.example.com | [44f 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5f3 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | "2019-11-19 05:21:41.283 UTC [msp] Validate -> DEBU 407 MSP OrdererMSP validating identity" +peer0.org2.example.com | [609 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [7a5 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> WARN Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes isn't valid +peer1.org1.example.com | [450 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [5f4 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +orderer0.example.com | "2019-11-19 05:21:41.284 UTC [cauthdsl] func2 -> DEBU 408 0xc00097eb10 principal matched by identity 0" +peer0.org2.example.com | [60a 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [7a6 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [451 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [5f5 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.284 UTC [msp.identity] Verify -> DEBU 409 Verify: digest = 00000000 83 ec 0d 9d c4 8d 82 00 2a bd eb 52 95 58 20 eb |........*..R.X .| +peer0.org2.example.com | [60b 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [7a7 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [452 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [5f6 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | 00000010 8f 0d 7c f4 ec a5 3b df 63 09 d0 b1 50 c7 b2 ed |..|...;.c...P...|" +peer0.org2.example.com | [60c 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [7a8 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [453 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [5f7 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | "2019-11-19 05:21:41.284 UTC [msp.identity] Verify -> DEBU 40a Verify: sig = 00000000 30 44 02 20 54 be 3e ca 44 4f 64 9a d2 29 ed ba |0D. T.>.DOd..)..| +peer0.org2.example.com | [60d 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [7a9 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [454 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org1.example.com | [5f8 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +orderer0.example.com | 00000010 0a 0b e9 ec 93 97 98 88 b6 6d 0b 07 c4 d1 62 0d |.........m....b.| +peer0.org2.example.com | [60e 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [7aa 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [455 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [5f9 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | 00000020 ef 80 14 91 02 20 11 c1 30 0d 4c 37 37 68 a9 86 |..... ..0.L77h..| +peer0.org2.example.com | [60f 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043ee20 principal matched by identity 0 +peer1.org2.example.com | [7ab 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [456 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | 00000030 01 2a 9d ff 76 f5 d7 44 66 f8 fc 2d 9f e2 8a 66 |.*..v..Df..-...f| +peer1.org2.example.com | [7ac 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [610 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +peer1.org1.example.com | [457 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | 00000040 a0 38 1d 51 d7 73 |.8.Q.s|" +peer1.org2.example.com | [7ad 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.| +peer1.org1.example.com | [458 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2019-11-19 05:21:41.284 UTC [cauthdsl] func2 -> DEBU 40b 0xc00097eb10 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [7ae 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [611 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +peer1.org1.example.com | [459 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | "2019-11-19 05:21:41.284 UTC [cauthdsl] func1 -> DEBU 40c 0xc00097eb10 gate 1574140901283477200 evaluation succeeds" +peer1.org2.example.com | [7af 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | 00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +peer1.org1.example.com | [45a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 40d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer1.org2.example.com | [7b0 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +peer1.org1.example.com | [45b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | "2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 40e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer1.org2.example.com | [7b1 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +peer1.org1.example.com | [45c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | "2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 40f Signature set satisfies policy /Channel/Orderer/Writers" +peer1.org2.example.com | [7b2 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 56 71 ab 2e 37 58 4a |Vq..7XJ| +peer1.org1.example.com | [45d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | "2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 410 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer1.org2.example.com | [7b3 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [612 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043ee20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [45e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | "2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 411 Signature set satisfies policy /Channel/Writers" +peer1.org2.example.com | [7b4 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [613 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043ee20 gate 1574140910197012400 evaluation succeeds +peer1.org1.example.com | [45f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | "2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer1.org2.example.com | [7b5 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [614 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [460 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146730 gate 1574140909493584300 evaluation starts +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] NewStandardValues -> DEBU 413 Initializing protos for *channelconfig.ChannelProtos" +peer1.org2.example.com | [7b6 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +peer0.org2.example.com | [615 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [461 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 414 Processing field: HashingAlgorithm" +peer1.org2.example.com | 00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +peer0.org2.example.com | [616 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [462 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146730 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 415 Processing field: BlockDataHashingStructure" +peer1.org2.example.com | [7b7 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +peer0.org2.example.com | [617 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [463 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 416 Processing field: OrdererAddresses" +peer1.org2.example.com | 00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +peer0.org2.example.com | [618 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [464 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [5fa 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 417 Processing field: Consortium" +peer1.org2.example.com | 00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +peer0.org2.example.com | [619 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11007432676051748334, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes +peer1.org1.example.com | [465 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [5fb 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 418 Processing field: Capabilities" +peer1.org2.example.com | 00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +peer0.org2.example.com | [61a 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 11007432676051748334, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes +peer1.org1.example.com | [466 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [5fc 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] NewStandardValues -> DEBU 419 Initializing protos for *channelconfig.OrdererProtos" +peer1.org2.example.com | 00000040 3c b7 fd fe 94 01 8e |<......| +peer0.org2.example.com | [61b 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [467 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [5fd 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41a Processing field: ConsensusType" +peer1.org2.example.com | [7b8 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | [61c 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [468 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [5fe 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41b Processing field: BatchSize" +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [61d 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [469 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146730 principal matched by identity 0 +peer0.org1.example.com | [5ff 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41c Processing field: BatchTimeout" +peer1.org2.example.com | [7b9 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f fe bb 95 a8 d7 54 68 30 8a 58 f3 |0D. /.....Th0.X.| +peer0.org2.example.com | [61e 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [46a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +orderer0.example.com | "2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41d Processing field: KafkaBrokers" +peer0.org1.example.com | [600 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | 00000010 7d 12 59 d5 61 4b 0c 44 a2 bc e9 0f 8e 8b 0c d0 |}.Y.aK.D........| +peer0.org2.example.com | [61f 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.| +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41e Processing field: ChannelRestrictions" +peer0.org1.example.com | [601 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | 00000020 17 19 1b d1 02 20 01 e1 01 c5 5c 08 29 2a 03 47 |..... ....\.)*.G| +peer0.org2.example.com | [620 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [46b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41f Processing field: Capabilities" +peer0.org1.example.com | [602 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | 00000030 40 53 a1 30 1c 2e 65 35 e5 6f 06 29 73 76 c1 26 |@S.0..e5.o.)sv.&| +peer0.org2.example.com | [621 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [common.channelconfig] NewStandardValues -> DEBU 420 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | [603 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | 00000040 46 41 e8 b2 3c 65 |FA.. DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000020 9d 53 74 88 4b 02 20 0b f6 9b f4 5d 00 74 ee 9d |.St.K. ....].t..| +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 421 Processing field: Endpoints" +peer0.org1.example.com | [604 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [7ba 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [623 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [common.channelconfig] NewStandardValues -> DEBU 422 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [605 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [7bb 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [624 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | 00000040 4d ed a9 9c dd 40 ef |M....@.| +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 423 Processing field: MSP" +peer0.org1.example.com | [606 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [7bc 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [626 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [46c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146730 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [common.channelconfig] validateMSP -> DEBU 424 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | [607 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [7bd 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [627 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [46d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146730 gate 1574140909493584300 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [msp] newBccspMsp -> DEBU 425 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [608 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [7be 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [628 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [46e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +orderer0.example.com | "2019-11-19 05:21:41.287 UTC [msp] New -> DEBU 426 Creating Cache-MSP instance" +peer0.org1.example.com | [609 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [7bf 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [629 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [46f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +orderer0.example.com | "2019-11-19 05:21:41.288 UTC [msp] Setup -> DEBU 427 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | [60a 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [7c0 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [62a 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [470 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +orderer0.example.com | "2019-11-19 05:21:41.288 UTC [msp.identity] newIdentity -> DEBU 428 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [60b 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [7c1 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [62b 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [471 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | [60c 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [7c2 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | [62c 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [472 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [60d 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [7c3 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [62d 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [473 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | [60e 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [7c4 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [62e 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [474 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org1.example.com | [60f 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [62f 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [7c5 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer1.org1.example.com | [475 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [610 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [625 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11007432676051748334, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes +peer1.org2.example.com | [7c6 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org1.example.com | [476 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | [611 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [630 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [7c7 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [477 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org1.example.com | [612 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [631 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [7c8 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [478 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org1.example.com | [613 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [632 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [7c9 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [479 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [614 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [633 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [7ca 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [47a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | [615 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [634 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [7cb 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org1.example.com | [616 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [635 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [7cc 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org1.example.com | [617 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [636 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [7cd 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [47d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +orderer0.example.com | 1g== +peer0.org1.example.com | [618 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [637 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [7ce 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [47e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [619 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [638 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [47f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +orderer0.example.com | "2019-11-19 05:21:41.288 UTC [msp.identity] newIdentity -> DEBU 429 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [61a 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [639 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [7cf 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [480 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | [61b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [63a 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [481 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [61c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [63b 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [482 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | [61d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [63c 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [483 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org1.example.com | [61e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [63d 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [484 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [61f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [63e 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [7d0 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [485 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org1.example.com | [620 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [63f 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [7d1 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [486 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org1.example.com | [621 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [7d2 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [640 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [487 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org1.example.com | [622 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [7d3 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [641 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [488 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org1.example.com | [623 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [7d4 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [642 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [489 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | [624 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [7d5 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [48a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | [625 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [7d6 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [48b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [626 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [48c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [627 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [48d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +orderer0.example.com | "2019-11-19 05:21:41.288 UTC [msp] Validate -> DEBU 42a MSP OrdererMSP validating identity" +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [628 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [48e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +orderer0.example.com | "2019-11-19 05:21:41.289 UTC [common.channelconfig] NewStandardValues -> DEBU 42b Initializing protos for *channelconfig.ApplicationProtos" +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [629 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | [48f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +orderer0.example.com | "2019-11-19 05:21:41.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42c Processing field: ACLs" +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [62a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer1.org1.example.com | [490 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +orderer0.example.com | "2019-11-19 05:21:41.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42d Processing field: Capabilities" +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [62b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer1.org1.example.com | [491 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +orderer0.example.com | "2019-11-19 05:21:41.289 UTC [common.channelconfig] NewStandardValues -> DEBU 42e Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | [62c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | [492 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | "2019-11-19 05:21:41.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42f Processing field: AnchorPeers" +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer0.org1.example.com | [62d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | [493 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +orderer0.example.com | "2019-11-19 05:21:41.289 UTC [common.channelconfig] NewStandardValues -> DEBU 430 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org1.example.com | [62e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer1.org1.example.com | [494 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 431 Processing field: MSP" +peer1.org2.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | [62f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer1.org1.example.com | [495 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | "2019-11-19 05:21:41.289 UTC [common.channelconfig] Validate -> DEBU 432 Anchor peers for org Org2MSP are " +peer1.org2.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org1.example.com | [630 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [496 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | "2019-11-19 05:21:41.290 UTC [common.channelconfig] validateMSP -> DEBU 433 Setting up MSP for org Org2MSP" +peer1.org2.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org1.example.com | [631 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [643 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [497 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.290 UTC [msp] newBccspMsp -> DEBU 434 Creating BCCSP-based MSP instance" +peer1.org2.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org1.example.com | [632 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [644 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [498 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.290 UTC [msp] New -> DEBU 435 Creating Cache-MSP instance" +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [633 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [645 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2019-11-19 05:21:41.290 UTC [msp] Setup -> DEBU 436 Setting up MSP instance Org2MSP" +peer1.org2.example.com | [7d7 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7fa0 gate 1574140911997255100 evaluation starts +peer0.org1.example.com | [634 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [646 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2019-11-19 05:21:41.291 UTC [msp.identity] newIdentity -> DEBU 437 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [7d8 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [635 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [647 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [7d9 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7fa0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [636 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [648 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [7da 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [637 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [649 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [7db 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [638 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [64a 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [7dc 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [639 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [7dd 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7fa0 principal matched by identity 0 +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | [63a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [7de 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [63b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | [63c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | [7df 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [63d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | [63e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | [63f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [640 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | [499 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [641 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | [7e0 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7fa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | [49a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [642 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [7e1 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7fa0 gate 1574140911997255100 evaluation succeeds +peer0.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | [49b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [643 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +orderer0.example.com | "2019-11-19 05:21:41.291 UTC [common.channelconfig] NewStandardValues -> DEBU 438 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | [7e2 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | [49c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [644 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +orderer0.example.com | "2019-11-19 05:21:41.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 439 Processing field: AnchorPeers" +peer1.org2.example.com | [7e3 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 1g== +peer1.org1.example.com | [49d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org1.example.com | [645 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +orderer0.example.com | "2019-11-19 05:21:41.291 UTC [common.channelconfig] NewStandardValues -> DEBU 43a Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [7e4 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [49e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [646 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +orderer0.example.com | "2019-11-19 05:21:41.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43b Processing field: MSP" +peer1.org2.example.com | [7e5 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [64b 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [49f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [647 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +orderer0.example.com | "2019-11-19 05:21:41.292 UTC [common.channelconfig] Validate -> DEBU 43c Anchor peers for org Org1MSP are " +peer1.org2.example.com | [7e6 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [64c 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4a0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [648 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.292 UTC [common.channelconfig] validateMSP -> DEBU 43d Setting up MSP for org Org1MSP" +peer1.org2.example.com | [7e7 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7e8 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4a1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [649 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +orderer0.example.com | "2019-11-19 05:21:41.292 UTC [msp] newBccspMsp -> DEBU 43e Creating BCCSP-based MSP instance" +peer1.org2.example.com | [7e9 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [64d 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [64a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [64b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [7ea 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | [64c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [7eb 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7ec 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.292 UTC [msp] New -> DEBU 43f Creating Cache-MSP instance" +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [64d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [7ed 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +orderer0.example.com | "2019-11-19 05:21:41.292 UTC [msp] Setup -> DEBU 440 Setting up MSP instance Org1MSP" +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [64e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [7ee 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.293 UTC [msp.identity] newIdentity -> DEBU 441 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [64f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [7ef 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [650 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org2.example.com | [7f0 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [651 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [7f1 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [652 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org2.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | [7f2 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [653 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | [7f3 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [654 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org2.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | [7f4 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [655 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org2.example.com | [7f5 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [656 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org2.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org2.example.com | [7f6 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | [657 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org2.example.com | [7f7 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [658 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [7f8 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | [659 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [4a3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [64e 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7f9 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [65a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [4a4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [64f 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7fa 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | [65b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [4a5 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [650 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [7fb 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | [65c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4a6 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [651 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [7fc 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [65d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4a7 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [652 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [7fd 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.293 UTC [msp] Setup -> DEBU 442 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | [65e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4a8 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [653 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [7fe 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [msp] Setup -> DEBU 443 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | [65f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4a9 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [654 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c0c30 gate 1574140910207678800 evaluation starts +peer1.org2.example.com | [7ff 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 444 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | [660 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4aa 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [655 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c0c30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [800 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 445 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | [661 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ab 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [656 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c0c30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [801 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 446 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | [662 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [4ac 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [657 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [802 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 447 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [4ad 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [803 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003625d0 gate 1574140912232045800 evaluation starts +peer0.org2.example.com | [659 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 448 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [4ae 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [65a 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [804 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003625d0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 449 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [4af 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [658 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [805 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003625d0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44a Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [4b0 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [65b 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c0c30 principal matched by identity 0 +peer1.org2.example.com | [806 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003625d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44b Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [4b1 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [65c 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [807 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003625d0 principal evaluation fails +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44c Proposed new policy ChannelCreationPolicy for Channel/Application" +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | [4b2 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [65d 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 8e 4a 56 ff 77 9e 34 e9 6c 45 32 ff 9b 4a 59 |..JV.w.4.lE2..JY| +peer1.org2.example.com | [808 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003625d0 gate 1574140912232045800 evaluation fails +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | 00000010 d6 72 0c a4 5e df 2c 67 0e 0d b0 48 93 65 6b 88 |.r..^.,g...H.ek.| +peer1.org2.example.com | [809 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [65e 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [80a 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [65f 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 8d 1f 03 fe 0e 3b 31 28 87 48 c5 |0D. U.....;1(.H.| +peer1.org2.example.com | [80b 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 450 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org2.example.com | 00000010 9e d8 00 d5 fb 8d a9 59 b1 82 d3 bc 1b e9 dc 92 |.......Y........| +peer1.org2.example.com | [80c 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000362b40 gate 1574140912232809800 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 451 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | 00000020 08 76 7a c9 02 20 5b f2 53 c2 83 2e c7 ed 42 b9 |.vz.. [.S.....B.| +peer1.org2.example.com | [80d 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000362b40 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 452 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | 00000030 94 c9 61 1b f1 fd f7 ff 0d b1 88 4b b6 bd 33 3d |..a........K..3=| +peer1.org2.example.com | [80e 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000362b40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org2.example.com | 00000040 88 0c 75 f3 98 8f |..u...| +peer1.org2.example.com | [80f 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000362b40 principal matched by identity 0 +peer0.org1.example.com | [663 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 gate 1574140909582218900 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 453 Proposed new policy Admins for Channel/Orderer" +peer1.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org2.example.com | [660 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [810 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [664 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] GetPolicy -> DEBU 454 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | [661 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [665 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 455 Proposed new policy Admins for Channel" +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org2.example.com | [662 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [811 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [666 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] GetPolicy -> DEBU 456 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +peer1.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org2.example.com | [663 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c0c30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [667 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +orderer0.example.com | "2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 457 Proposed new policy Readers for Channel" +peer1.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org2.example.com | [664 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [668 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [policies] GetPolicy -> DEBU 458 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +peer1.org1.example.com | 1g== +peer0.org2.example.com | [665 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c0c30 gate 1574140910207678800 evaluation succeeds +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [669 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [policies] NewManagerImpl -> DEBU 459 Proposed new policy Writers for Channel" +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [666 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [66a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45a Adding to config map: [Group] /Channel" +peer1.org1.example.com | [4b3 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [667 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org2.example.com | [812 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000362b40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45b Adding to config map: [Group] /Channel/Orderer" +peer1.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [668 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [813 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000362b40 gate 1574140912232809800 evaluation succeeds +peer0.org1.example.com | [66b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [669 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [814 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [66a 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [815 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org2.example.com | [66b 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [816 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [66c 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [817 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 30 b2 7f b8 62 2d 65 |0...b-e| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 460 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org2.example.com | [66d 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [818 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 461 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | [66c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org2.example.com | [66e 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | [66d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 gate 1574140909582218900 evaluation succeeds +peer1.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org2.example.com | [66f 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [819 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 463 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | [66e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org2.example.com | [670 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | [66f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org2.example.com | [671 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 465 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | [670 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org2.example.com | [672 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 34 fd 7e 77 cc df 4c 77 fa e0 0a 4c 85 5b 8d |i4.~w..Lw...L.[.| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | [671 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | 00000010 fa 6c f4 80 7d 02 b9 1a 55 85 ef d1 0b fd 5e e2 |.l..}...U.....^.| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 467 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | [672 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [4b4 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [673 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [81a 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 468 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | [673 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [4b5 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | [674 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [4b6 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [81b 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46a Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | [675 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [4b7 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | [676 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [4b8 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | [677 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [4b9 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [678 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [4ba 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [679 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0034cb430, CONNECTING +peer1.org1.example.com | [4bb 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [81c 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers +orderer0.example.com | "2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | [67a 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4bc 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [81d 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 470 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | [67b 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [4bd 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | [81e 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer �o��X +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 471 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | [67c 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer1.org1.example.com | [4be 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | 8T)�YR�^",�:��uO�.��� message sent from �%��_k<���\<���8 [:5AT�!�]� +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 472 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | [67d 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [4bf 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | [81f 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [67e 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0034cb430, READY +peer1.org1.example.com | [4c0 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [821 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 474 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | [67f 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4c1 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | [820 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | [680 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org1.example.com | [4c2 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | [822 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | [681 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org1.example.com | [4c3 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [823 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +peer0.org1.example.com | [682 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051 +peer1.org1.example.com | [4c4 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [674 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 bb 49 d4 84 01 2e 7f f6 fb ce |0E.!...I........| +peer1.org2.example.com | [824 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 478 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | [683 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer1.org1.example.com | [4c5 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | 00000010 e3 b6 08 d2 d4 be 80 0f 2d d7 82 70 a6 41 2b 0e |........-..p.A+.| +peer1.org2.example.com | [825 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | [684 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4c6 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | 00000020 d7 75 fc e9 bb 02 20 05 34 8a 8b f0 dd a2 52 20 |.u.... .4.....R | +peer1.org2.example.com | [826 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 47a Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | [685 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4c7 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | 00000030 ba d5 74 b2 60 68 7e 3a bb 7b 89 56 ee 27 e2 c9 |..t.`h~:.{.V.'..| +peer1.org2.example.com | [827 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 47b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | [686 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [4c8 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | 00000040 94 16 6e 2b de c0 02 |..n+...| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [4c9 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [675 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [828 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [4ca 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [676 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [4cb 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [677 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 47f Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [4cc 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [678 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Group] /Channel" +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [4cd 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [679 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +orderer0.example.com | "2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [4ce 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [67a 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +orderer0.example.com | "2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer1.org2.example.com | [829 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4cf 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [67b 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +orderer0.example.com | "2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer1.org2.example.com | [82a 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4d0 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [67c 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | [82b 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4d1 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [67d 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Group] /Channel" +peer0.org1.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer1.org2.example.com | [82c 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [67e 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [4d2 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer1.org2.example.com | [82d 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [67f 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [4d3 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer1.org2.example.com | [82e 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [680 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [4d4 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org1.example.com | [4d5 11-19 05:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [82f 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [681 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [4d6 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [830 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [682 11-19 05:21:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | [687 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [4d7 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [831 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373a80 gate 1574140912236480100 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [688 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [4d8 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [832 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373a80 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [4d9 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [689 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [833 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373a80 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [4da 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [4db 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [834 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [68a 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4dc 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [835 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373a80 principal evaluation fails +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [68b 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4dd 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [836 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373a80 gate 1574140912236480100 evaluation fails +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Value] /Channel/Consortium" +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [68c 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.643Z grpc.peer_address=172.18.0.8:41320 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=131.7µs +peer1.org1.example.com | [4de 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [837 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 491 Processing change to key: [Policy] /Channel/Application/Writers" +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [68d 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4df 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [838 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 492 Processing change to key: [Value] /Channel/Application/Capabilities" +peer0.org2.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | [68e 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4e0 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [839 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 493 Processing change to key: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [68f 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4e1 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [83a 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373ff0 gate 1574140912237037900 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 494 Processing change to key: [Policy] /Channel/Application/Admins" +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | [690 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4e2 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [83b 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373ff0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 495 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [691 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4e3 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [83c 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373ff0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 496 Processing change to key: [Group] /Channel/Application" +peer0.org2.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | [692 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4e4 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [83d 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373ff0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [common.configtx] policyForItem -> DEBU 497 Getting policy for item Application with mod_policy ChannelCreationPolicy" +peer0.org2.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | [693 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4e5 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [83e 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 498 Manager Channel looking up path []" +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [694 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4e6 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 499 Manager Channel has managers Application" +peer0.org2.example.com | [683 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [695 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 gate 1574140909644418100 evaluation starts +peer1.org1.example.com | [4e7 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [83f 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49a Manager Channel has managers Orderer" +peer0.org2.example.com | [684 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [696 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4e8 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49b Manager Channel looking up path [Application]" +peer0.org2.example.com | [685 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [697 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [4e9 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49c Manager Channel has managers Application" +peer0.org2.example.com | [686 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [698 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ea 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49d Manager Channel has managers Orderer" +peer0.org2.example.com | [687 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [699 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4eb 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49e Manager Channel/Application looking up path []" +peer0.org2.example.com | [688 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [69a 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 principal evaluation fails +peer1.org1.example.com | [4ec 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [840 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373ff0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49f Manager Channel/Application has managers Org1MSP" +peer0.org2.example.com | [689 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [69b 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 gate 1574140909644418100 evaluation fails +peer1.org1.example.com | [4ed 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [841 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373ff0 gate 1574140912237037900 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 4a0 Manager Channel/Application has managers Org2MSP" +peer0.org2.example.com | [68a 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [69c 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4ee 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [842 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Evaluate -> DEBU 4a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +peer0.org2.example.com | [68b 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [69d 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4ef 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [843 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.300 UTC [policies] Evaluate -> DEBU 4a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [68c 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [69e 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4f0 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [844 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.301 UTC [policies] Evaluate -> DEBU 4a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org2.example.com | [68d 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [69f 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [4f1 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [845 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.301 UTC [msp] DeserializeIdentity -> DEBU 4a4 Obtaining identity" +peer0.org2.example.com | [68e 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [6a0 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4f2 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [846 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer �o��X +orderer0.example.com | "2019-11-19 05:21:41.301 UTC [msp.identity] newIdentity -> DEBU 4a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [68f 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [6a1 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 gate 1574140909644685400 evaluation starts +peer1.org1.example.com | [4f3 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | 8T)�YR�^",�:��uO�.��� message sent from *g��kҚ�-���$6��[�@p�@�NP3�� +orderer0.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [690 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [6a2 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4f4 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [847 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [691 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [6a3 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [4f5 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [848 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [692 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [6a4 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [4f6 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [849 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [693 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [6a5 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [4f7 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [84a 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [694 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [6a6 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [4f8 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | [84b 11-19 05:21:52.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to peer0.org2.example.com:7051 +peer0.org2.example.com | [695 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [6a7 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 principal matched by identity 0 +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org2.example.com | [84c 11-19 05:21:52.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [696 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [4f9 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [6a8 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [697 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [4fa 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [4fb 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +orderer0.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | [84e 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [698 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [4fc 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +orderer0.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer1.org2.example.com | [84f 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to peer0.org1.example.com:7051 +peer0.org2.example.com | [699 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [4fd 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +orderer0.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer1.org2.example.com | [850 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer1.org1.example.com | [4fe 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [851 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [6a9 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 2a 2a 92 18 d2 f8 fa 21 d4 c5 |0E.!..**.....!..| +peer0.org1.example.com | 00000010 1a fb 9b 71 ff 29 5a 54 6a 26 d0 94 bc be 74 30 |...q.)ZTj&....t0| +peer1.org1.example.com | [4ff 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [69a 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [852 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 48 46 a0 6c 5e 02 20 0c 20 ae c3 f7 93 38 a0 76 |HF.l^. . ....8.v| +orderer0.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer1.org1.example.com | [500 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [69b 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [853 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15957342345483174526, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 87 3a 26 2f 5e e9 a0 ce d2 e6 1a 1d 8a 23 56 86 |.:&/^........#V.| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [501 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [69c 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [854 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15957342345483174526, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 99 cc 5d c6 04 bb 72 |..]...r| +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [cauthdsl] func1 -> DEBU 4a6 0xc000b78100 gate 1574140901301988600 evaluation starts" +peer1.org1.example.com | [502 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [69d 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [855 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 10 04 b5 a3 2a 10 1a 4d 56 66 c4 f3 70 0f 31 |.....*..MVf..p.1| +peer0.org1.example.com | [6aa 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [cauthdsl] func2 -> DEBU 4a7 0xc000b78100 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [503 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [69e 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | 00000010 c8 d0 a3 ab a5 ba 00 36 67 eb 56 a7 61 c6 4b ea |.......6g.V.a.K.| +peer0.org1.example.com | [6ab 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 gate 1574140909644685400 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [cauthdsl] func2 -> DEBU 4a8 0xc000b78100 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | [504 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [69f 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [856 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 7a 55 44 ca 72 63 38 96 2d 0a bf |0D. .zUD.rc8.-..| +peer0.org1.example.com | [6ac 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 4a9 Checking if identity has been named explicitly as an admin for Org1MSP" +peer1.org1.example.com | [505 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [6a0 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | 00000010 9b c0 0d 1e 70 36 ec f4 c3 f9 05 45 ab 5c 21 06 |....p6.....E.\!.| +peer0.org1.example.com | [6ad 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 4aa Checking if identity carries the admin ou for Org1MSP" +peer1.org1.example.com | [506 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [6a1 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | 00000020 dd c4 a8 ac 02 20 18 9c f8 41 1c c6 81 f6 be ec |..... ...A......| +peer0.org1.example.com | [6ae 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [msp] Validate -> DEBU 4ab MSP Org1MSP validating identity" +peer1.org1.example.com | [507 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [6a2 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | 00000030 b0 4d a9 b8 0b 79 82 f5 6d 52 aa 1b bf 24 ee d2 |.M...y..mR...$..| +peer0.org1.example.com | [6af 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [msp] getCertificationChain -> DEBU 4ac MSP Org1MSP getting certification chain" +peer1.org1.example.com | [508 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [6a3 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | 00000040 cd 2b be b4 dc 4c |.+...L| +peer0.org1.example.com | [6b0 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [msp] hasOURole -> DEBU 4ad MSP Org1MSP checking if the identity is a client" +peer1.org1.example.com | [509 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [6a4 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [857 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15957342345483174526, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [6b1 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +orderer0.example.com | "2019-11-19 05:21:41.302 UTC [msp] getCertificationChain -> DEBU 4ae MSP Org1MSP getting certification chain" +peer1.org1.example.com | [50a 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [6a5 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [858 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 102 105 102 67 76 119 72 51 110 66 114 75 72 80 115 121 82 75 78 70 68 122 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 114 77 122 71 105 79 121 106 104 83 43 10 86 87 101 43 84 47 56 79 89 105 102 75 110 75 84 118 102 73 102 51 105 119 75 89 106 75 104 108 49 103 67 101 87 86 90 110 72 89 75 79 80 98 85 117 73 80 116 55 97 77 54 120 76 57 51 121 117 118 120 111 77 100 51 105 10 65 74 107 80 83 55 111 100 50 54 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 106 109 117 86 48 72 47 102 89 48 51 75 88 52 104 118 122 110 110 104 81 90 85 73 78 119 100 100 52 48 48 105 100 73 71 100 100 99 76 77 116 78 81 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 99 113 85 43 110 112 50 85 104 57 119 109 103 79 55 54 88 69 50 107 121 71 49 110 56 111 112 114 102 82 106 68 51 66 119 53 49 103 87 74 118 116 65 105 66 114 85 71 57 103 10 70 114 97 73 49 57 49 78 114 113 122 53 108 98 99 65 98 112 107 84 43 74 83 116 84 80 113 55 54 79 120 69 111 43 81 56 110 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [6b2 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +orderer0.example.com | "2019-11-19 05:21:41.303 UTC [cauthdsl] func2 -> DEBU 4af 0xc000b78100 principal matched by identity 0" +peer1.org1.example.com | [50b 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [6a6 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [859 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Added *g��kҚ�-���$6��[�@p�@�NP3�� to the in memory item map, total items: 2 +peer1.org2.example.com | [85a 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [6b3 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [50c 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [6a7 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [85b 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 2736871708268434561, Envelope: 1900 bytes, Signature: 0 bytes +peer0.org1.example.com | [6b4 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0028eff40 env 0xc002f41810 txn 0 +orderer0.example.com | "2019-11-19 05:21:41.303 UTC [msp.identity] Verify -> DEBU 4b0 Verify: digest = 00000000 f9 6f 4d ca e1 d0 95 1d 1d 09 87 f1 47 35 33 91 |.oM.........G53.| +peer0.org2.example.com | [6a8 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [85c 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [50d 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [6b5 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +orderer0.example.com | 00000010 09 ac fd d6 12 40 bb 66 ea 49 fa 7b 6f 84 b7 72 |.....@.f.I.{o..r|" +peer0.org2.example.com | [6a9 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [85d 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [50e 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [6b6 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 119ms +orderer0.example.com | "2019-11-19 05:21:41.303 UTC [msp.identity] Verify -> DEBU 4b1 Verify: sig = 00000000 30 45 02 21 00 f5 b3 1c f4 c4 bb 3f d2 03 0c 6f |0E.!.......?...o| +peer0.org2.example.com | [6aa 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [85e 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [50f 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [6b7 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +orderer0.example.com | 00000010 15 d9 68 59 0a 69 49 a1 63 9d 07 14 52 80 db a4 |..hY.iI.c...R...| +peer0.org2.example.com | [6ab 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [510 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [6b8 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +orderer0.example.com | 00000020 e5 27 2c 7b 3e 02 20 0a eb 04 74 31 4b 3b e1 1c |.',{>. ...t1K;..| +peer0.org2.example.com | [6ac 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [511 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [6b9 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +orderer0.example.com | 00000030 9f 78 a7 ea f2 c6 d9 3c ee ff 97 d6 37 13 a8 78 |.x.....<....7..x| +peer0.org2.example.com | [6ad 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [512 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [6ba 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | 00000040 32 7a 3f 6b c5 e7 f9 |2z?k...|" +peer0.org2.example.com | [6ae 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [513 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [6bb 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +orderer0.example.com | "2019-11-19 05:21:41.303 UTC [cauthdsl] func2 -> DEBU 4b2 0xc000b78100 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [6af 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [514 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [6bc 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +orderer0.example.com | "2019-11-19 05:21:41.303 UTC [cauthdsl] func1 -> DEBU 4b3 0xc000b78100 gate 1574140901301988600 evaluation succeeds" +peer0.org2.example.com | [6b0 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [515 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | [6bd 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:41320 +orderer0.example.com | "2019-11-19 05:21:41.303 UTC [policies] Evaluate -> DEBU 4b4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [6b1 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [516 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | [6be 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41320 +orderer0.example.com | "2019-11-19 05:21:41.304 UTC [policies] Evaluate -> DEBU 4b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [6b2 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [517 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | [6bf 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +orderer0.example.com | "2019-11-19 05:21:41.304 UTC [policies] Evaluate -> DEBU 4b6 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +peer0.org2.example.com | [6b3 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [518 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +orderer0.example.com | "2019-11-19 05:21:41.304 UTC [policies] Evaluate -> DEBU 4b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +peer0.org2.example.com | [6b4 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [519 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | [6c0 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 dd 81 79 16 e4 72 97 89 1b 7f |0E.!....y..r....| +orderer0.example.com | "2019-11-19 05:21:41.304 UTC [common.configtx] verifyDeltaSet -> DEBU 4b8 Processing change to key: [Policy] /Channel/Application/Endorsement" +peer0.org2.example.com | [6b5 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [51a 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | 00000010 c4 74 f0 52 37 00 5c c0 d0 84 60 33 1d 18 10 ca |.t.R7.\...`3....| +orderer0.example.com | "2019-11-19 05:21:41.304 UTC [common.configtx] verifyDeltaSet -> DEBU 4b9 Processing change to key: [Policy] /Channel/Application/Readers" +peer0.org2.example.com | [6b6 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [51b 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321fb90 gate 1574140909522562100 evaluation starts +peer1.org2.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | 00000020 f5 e4 2d 3f 3d 02 20 7f 30 ab ee 95 40 7c 03 24 |..-?=. .0...@|.$| +orderer0.example.com | "2019-11-19 05:21:41.304 UTC [common.configtx] recurseConfigMap -> DEBU 4ba Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6b7 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [51c 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321fb90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | 00000030 79 09 dd ce e5 13 92 b8 39 78 3f c3 8b ae e0 3d |y.......9x?....=| +orderer0.example.com | "2019-11-19 05:21:41.304 UTC [common.configtx] recurseConfigMap -> DEBU 4bb Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6b8 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [51d 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321fb90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [85f 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | 00000040 c4 9e 65 0e 2a 84 5e |..e.*.^| +orderer0.example.com | "2019-11-19 05:21:41.304 UTC [common.configtx] recurseConfigMap -> DEBU 4bc Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6b9 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [51e 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321fb90 principal matched by identity 0 +peer1.org2.example.com | [860 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [6c1 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41320 +orderer0.example.com | "2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4bd Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6ba 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [51f 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 c5 b2 2c 3e af b8 f7 8f 8c 2a 44 ef 9e 8a 87 |&..,>.....*D....| +peer1.org2.example.com | [861 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [6c2 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41320 +orderer0.example.com | "2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4be Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6bb 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | 00000010 c4 01 30 aa 3d 34 f0 bf 16 81 4f a0 44 19 df e5 |..0.=4....O.D...| +peer1.org2.example.com | [862 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6c3 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4bf Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6bc 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [520 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 92 fb 35 13 3f 29 99 4d 95 47 ff |0D. "..5.?).M.G.| +peer1.org2.example.com | [863 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6c4 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +orderer0.example.com | "2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c0 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6bd 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | 00000010 1b 92 6b 1a c2 34 2e 78 03 f0 8a 7c 07 fb 53 30 |..k..4.x...|..S0| +peer1.org2.example.com | [864 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [6c5 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6be 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | 00000020 1c 7e 48 f2 02 20 10 7c 9f 70 52 85 f2 3c eb fb |.~H.. .|.pR..<..| +peer1.org2.example.com | [865 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 ef f4 a5 28 0d d1 46 54 f6 62 3d bf 6a d9 2d d4 |...(..FT.b=.j.-.| +orderer0.example.com | "2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c2 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6bf 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [866 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 18 8b 11 50 9a 69 |...P.i| +peer0.org1.example.com | [6c6 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c3 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6c0 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [867 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652b90 gate 1574140912409415000 evaluation starts +peer1.org1.example.com | [521 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321fb90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [6c7 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c4 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6c1 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [868 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652b90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [522 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321fb90 gate 1574140909522562100 evaluation succeeds +peer1.org1.example.com | [523 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [524 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [869 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652b90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [6c2 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c5 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [86a 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [6c3 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [525 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c6 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [86b 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652b90 principal evaluation fails +peer0.org2.example.com | [6c4 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [526 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c7 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org2.example.com | [86c 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652b90 gate 1574140912409415000 evaluation fails +peer0.org2.example.com | [6c5 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [527 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c8 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer1.org2.example.com | [86d 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [6c6 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [528 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c9 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [86e 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [6c7 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer1.org1.example.com | [529 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4ca Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [86f 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [6c8 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer1.org1.example.com | [52a 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4cb Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org2.example.com | [870 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002653130 gate 1574140912410251700 evaluation starts +peer0.org2.example.com | [6c9 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer1.org1.example.com | [52b 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4cc Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer1.org2.example.com | [871 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002653130 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [6ca 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | [52c 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +orderer0.example.com | "2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4cd Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer1.org2.example.com | [872 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002653130 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [6cb 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer1.org1.example.com | [52d 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +orderer0.example.com | "2019-11-19 05:21:41.307 UTC [common.configtx] recurseConfigMap -> DEBU 4ce Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [873 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [6cc 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer1.org1.example.com | [52e 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0032499f0, CONNECTING +orderer0.example.com | "2019-11-19 05:21:41.307 UTC [common.configtx] recurseConfigMap -> DEBU 4cf Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org2.example.com | [874 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [6cd 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer1.org1.example.com | [52f 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.307 UTC [common.configtx] recurseConfigMap -> DEBU 4d0 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [875 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [6ce 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [530 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +orderer0.example.com | "2019-11-19 05:21:41.307 UTC [common.channelconfig] NewStandardValues -> DEBU 4d1 Initializing protos for *channelconfig.ChannelProtos" +peer1.org2.example.com | [876 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002653130 principal matched by identity 0 +peer0.org2.example.com | [6cf 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [6c8 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [531 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +orderer0.example.com | "2019-11-19 05:21:41.307 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d2 Processing field: HashingAlgorithm" +peer1.org2.example.com | [877 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 4a 3d 37 1d 50 54 7a 09 18 4c ca 94 e8 c2 63 |.J=7.PTz..L....c| +peer0.org2.example.com | [6d0 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [6c9 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15100E +peer1.org1.example.com | [532 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +orderer0.example.com | "2019-11-19 05:21:41.307 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d3 Processing field: BlockDataHashingStructure" +peer1.org2.example.com | 00000010 fe ce 97 59 47 0e 19 d5 32 6c e4 1d 62 3f a6 d3 |...YG...2l..b?..| +peer0.org2.example.com | [6d1 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [6ca 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DD08DBE6E6601D9A298B5B6568C742526EAD9031F726F4B2AFAD08A3C5FA0F54 +peer1.org1.example.com | [533 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +orderer0.example.com | "2019-11-19 05:21:41.307 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d4 Processing field: OrdererAddresses" +peer1.org2.example.com | [878 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 42 0b 6e 3e 75 b8 b3 6b b2 f7 |0E.!..B.n>u..k..| +peer0.org2.example.com | [6d2 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [6cb 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [534 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0032499f0, READY +orderer0.example.com | "2019-11-19 05:21:41.307 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d5 Processing field: Consortium" +peer1.org2.example.com | 00000010 0f 22 ca 07 ef dd b1 ad fe fc 5a 34 e7 7f cf 3c |."........Z4...<| +peer0.org2.example.com | [6d3 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [6cc 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [535 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: Capabilities" +peer1.org2.example.com | 00000020 e9 18 b5 53 8d 02 20 50 02 00 da e9 ef b0 c3 48 |...S.. P.......H| +peer0.org2.example.com | [6d4 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [6cd 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [536 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] NewStandardValues -> DEBU 4d7 Initializing protos for *channelconfig.OrdererProtos" +peer1.org2.example.com | 00000030 f7 5d af ea 61 02 c9 4d 29 72 fe e2 6f 42 6f 71 |.]..a..M)r..oBoq| +peer0.org2.example.com | [6d5 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [6ce 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [537 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org2.example.com | 00000040 83 80 a6 3e ea cc 77 |...>..w| +peer0.org2.example.com | [6d6 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [6d7 11-19 05:21:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: ConsensusType" +peer1.org1.example.com | [538 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [879 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002653130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [87a 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002653130 gate 1574140912410251700 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d9 Processing field: BatchSize" +peer0.org1.example.com | [6cf 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:14982435750489679862 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [87b 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [6d8 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4da Processing field: BatchTimeout" +peer0.org1.example.com | [6d0 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:14982435750489679862 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org1.example.com | [539 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [87c 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [87d 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [6d9 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [6d1 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [6d2 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [87e 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [6da 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4db Processing field: KafkaBrokers" +peer0.org1.example.com | [6d3 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [87f 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [53a 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [6db 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4dc Processing field: ChannelRestrictions" +peer0.org1.example.com | [6d4 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [880 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6dc 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [53b 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4dd Processing field: Capabilities" +peer0.org1.example.com | [6d5 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [881 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6dd 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [53c 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [53d 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [6d6 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003625a90, CONNECTING +peer1.org2.example.com | [882 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6de 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [53e 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002f0ef40 env 0xc0030bc320 txn 0 +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] NewStandardValues -> DEBU 4de Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org2.example.com | [883 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6d7 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [6df 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [53f 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4df Processing field: Endpoints" +peer1.org2.example.com | [884 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6d8 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [6e0 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [540 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 89ms +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] NewStandardValues -> DEBU 4e0 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [885 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [6d9 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [6e1 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [541 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e1 Processing field: MSP" +peer1.org2.example.com | [886 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [6da 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41320 disconnected +peer0.org2.example.com | [6e2 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [542 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [common.channelconfig] validateMSP -> DEBU 4e2 Setting up MSP for org OrdererOrg" +peer1.org2.example.com | [887 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [6db 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:21:59.654Z grpc.peer_address=172.18.0.8:41320 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.5442ms +peer0.org2.example.com | [6e3 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [543 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +orderer0.example.com | "2019-11-19 05:21:41.308 UTC [msp] newBccspMsp -> DEBU 4e3 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [888 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670b00 gate 1574140912412833000 evaluation starts +peer0.org1.example.com | [6dc 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [6e4 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [544 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +orderer0.example.com | "2019-11-19 05:21:41.309 UTC [msp] New -> DEBU 4e4 Creating Cache-MSP instance" +peer1.org2.example.com | [889 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670b00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [6dd 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [6e5 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [545 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +orderer0.example.com | "2019-11-19 05:21:41.309 UTC [msp] Setup -> DEBU 4e5 Setting up MSP instance OrdererMSP" +peer1.org2.example.com | [88a 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670b00 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [6de 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org2.example.com | [6e6 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [546 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +orderer0.example.com | "2019-11-19 05:21:41.309 UTC [msp.identity] newIdentity -> DEBU 4e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [88b 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [6df 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [6e7 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer1.org1.example.com | [547 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [88c 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670b00 principal evaluation fails +peer0.org1.example.com | [6e0 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [6e8 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [548 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [88d 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670b00 gate 1574140912412833000 evaluation fails +peer0.org1.example.com | [6e1 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [6e9 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [549 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [88e 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [6e2 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org2.example.com | [6ea 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [54a 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org2.example.com | [88f 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [6e3 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [6eb 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [54b 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [890 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [6e4 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [6ec 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [54c 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [891 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671070 gate 1574140912413467800 evaluation starts +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | [6e5 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [54d 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [6ed 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [892 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671070 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org1.example.com | [6e6 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [54e 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [6ee 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [893 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671070 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org1.example.com | [6e7 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [54f 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [6ef 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [894 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671070 principal matched by identity 0 +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [6e8 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [6f0 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [895 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 fb 10 d3 c1 45 7f 72 73 57 f6 d5 57 e9 31 28 |.....E.rsW..W.1(| +peer1.org1.example.com | [550 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | [6e9 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [6f1 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | 00000010 64 f3 fc 1a e0 bf 8d d0 e1 50 bf 24 6e 3c c1 e9 |d........P.$n<..| +peer1.org1.example.com | [551 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org2.example.com | [6f3 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [896 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d e8 15 00 90 fc 0d 45 af de a9 f4 |0D. .......E....| +peer1.org1.example.com | [552 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer0.org1.example.com | [6ea 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org2.example.com | [6f2 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 25 cc 00 39 97 25 76 48 a5 8a 62 48 4d ee 08 04 |%..9.%vH..bHM...| +peer1.org1.example.com | [553 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org1.example.com | [6eb 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003625a90, READY +orderer0.example.com | 1g== +peer0.org2.example.com | [6f5 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | 00000020 c4 93 d5 fc 02 20 5f 50 02 65 6c 97 9e 4f 71 99 |..... _P.el..Oq.| +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org1.example.com | [6ec 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [6f4 11-19 05:21:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002839f20, CONNECTING +peer1.org2.example.com | 00000030 87 da fd b3 b3 7c dc 00 e4 10 89 cd d4 6f 76 b0 |.....|.......ov.| +peer1.org1.example.com | [554 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 64 9e ab 38 ce 0b b6 c3 2e f8 c0 |0D. .d..8.......| +peer0.org1.example.com | [6ed 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +orderer0.example.com | "2019-11-19 05:21:41.309 UTC [msp.identity] newIdentity -> DEBU 4e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [6f6 11-19 05:21:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002839f20, READY +peer1.org2.example.com | 00000040 ed 31 25 ac 1a eb |.1%...| +peer1.org1.example.com | 00000010 ae 98 06 ab e6 61 4a 3d ea 37 81 ad 74 4c 90 27 |.....aJ=.7..tL.'| +peer0.org1.example.com | [6ee 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [6f7 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [897 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671070 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000020 f7 1c 6f a3 02 20 00 e2 d4 a0 32 0a 4d 60 4a 37 |..o.. ....2.M`J7| +peer0.org1.example.com | [6ef 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003672400)} +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [6f8 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer1.org2.example.com | [898 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671070 gate 1574140912413467800 evaluation succeeds +peer1.org1.example.com | 00000030 a2 48 88 dc d0 29 b9 3b 3e a1 fd f4 d0 d7 cc 87 |.H...).;>.......| +peer0.org1.example.com | [6f0 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [6f9 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer1.org2.example.com | [899 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 8a 5c e8 a7 0a 7b |.\...{| +peer0.org1.example.com | [6f1 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org2.example.com | [6fa 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [89a 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [555 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [6f2 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [89b 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [6fb 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org1.example.com | [556 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [6f3 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | [89c 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [6fc 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [557 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15100C +peer0.org1.example.com | [6f4 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | [89d 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6fd 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [558 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D120FFD9794AB80ACED3A0C389E5CD03A6F7AAFB18500C68A429634B46635C3D +peer0.org1.example.com | [6f5 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | [89e 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6fe 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [559 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [6f6 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org2.example.com | [89f 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 2736871708268434561, Envelope: 1900 bytes, Signature: 0 bytes +peer0.org2.example.com | [6ff 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [55a 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [6f7 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x39, 0x34, 0x96, 0xee, 0x50, 0x5e, 0xad, 0x78, 0xfc, 0x3, 0xa3, 0xac, 0x21, 0xe9, 0xfb, 0x52, 0x19, 0x4e, 0xd1, 0x91, 0xc2, 0x3c, 0xb8, 0xb, 0x70, 0x9b, 0xb2, 0x3d, 0xdd, 0xb4, 0xc8, 0xd8} txOffsets= +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org2.example.com | [8a0 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [700 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [55b 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | txId=02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732 locPointer=offset=71, bytesLength=24474 +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org2.example.com | [8a1 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [701 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [55c 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | ] +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [8a2 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [702 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [55d 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes +peer0.org1.example.com | [6f8 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to txid-index +orderer0.example.com | "2019-11-19 05:21:41.309 UTC [msp] Validate -> DEBU 4e8 MSP OrdererMSP validating identity" +peer0.org2.example.com | [703 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [8a3 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [55e 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [6f9 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx number:[0] ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to blockNumTranNum index +orderer0.example.com | "2019-11-19 05:21:41.309 UTC [common.channelconfig] NewStandardValues -> DEBU 4e9 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org2.example.com | [704 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [8a4 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [55f 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [6fa 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76838], isChainEmpty=[false], lastBlockNumber=[2] +orderer0.example.com | "2019-11-19 05:21:41.309 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ea Processing field: ACLs" +peer0.org2.example.com | [705 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [8a5 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 69 116 74 120 69 56 69 56 48 101 56 103 51 104 103 47 118 49 73 88 99 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 80 102 111 117 43 101 66 81 80 122 113 10 51 78 70 87 83 68 43 101 119 75 121 102 77 100 75 79 75 75 112 102 99 104 52 47 104 76 68 47 48 113 52 48 87 53 49 98 82 108 68 84 75 111 76 119 52 73 67 104 121 111 76 79 51 69 90 117 118 90 57 55 100 98 112 119 10 105 113 99 97 66 101 90 68 55 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 76 53 52 122 43 102 79 74 76 54 51 75 110 105 69 120 72 109 98 77 115 48 100 115 107 69 53 102 43 77 106 111 66 79 52 90 78 122 106 89 57 65 50 65 105 65 109 103 70 81 50 10 81 112 81 85 69 114 48 104 49 108 43 75 117 76 55 73 118 84 85 107 98 73 118 79 122 116 113 113 48 99 76 111 54 105 112 114 53 81 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [560 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org1.example.com | [6fb 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +orderer0.example.com | "2019-11-19 05:21:41.309 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4eb Processing field: Capabilities" +peer0.org2.example.com | [706 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [8a6 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Added �o��X +peer1.org1.example.com | [561 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [6fc 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [common.channelconfig] NewStandardValues -> DEBU 4ec Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org2.example.com | [707 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00296ca60 gate 1574140910245157100 evaluation starts +peer1.org2.example.com | 8T)�YR�^",�:��uO�.��� to the in memory item map, total items: 3 +peer1.org1.example.com | [562 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [6fd 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ed Processing field: AnchorPeers" +peer0.org2.example.com | [708 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00296ca60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [8a7 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [563 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003207580)} +peer0.org1.example.com | [6fe 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [common.channelconfig] NewStandardValues -> DEBU 4ee Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | [709 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00296ca60 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [8a8 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [564 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [6ff 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ef Processing field: MSP" +peer0.org2.example.com | [70a 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00296ca60 principal matched by identity 0 +peer1.org2.example.com | [8a9 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [565 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [700 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [common.channelconfig] Validate -> DEBU 4f0 Anchor peers for org Org1MSP are " +peer0.org2.example.com | [70b 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | [566 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [8aa 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [common.channelconfig] validateMSP -> DEBU 4f1 Setting up MSP for org Org1MSP" +peer0.org1.example.com | [701 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org1.example.com | [567 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org2.example.com | [8ab 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 74 53 85 89 111 88 108 49 90 120 79 106 50 69 54 54 74 87 67 107 49 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 80 49 117 51 118 74 69 71 113 89 89 50 10 54 103 47 56 112 84 98 57 48 122 77 71 56 56 83 47 67 85 121 71 106 74 102 43 80 65 68 82 48 112 111 111 107 51 74 79 85 119 98 118 111 113 82 115 87 67 85 107 79 103 69 113 112 101 78 116 113 67 120 80 110 72 77 81 10 80 98 118 73 71 112 55 90 65 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 98 112 65 97 110 108 101 122 111 51 121 119 49 113 113 76 48 50 122 102 105 114 107 87 108 47 89 101 84 100 81 120 101 114 56 77 52 121 105 98 72 98 107 67 73 66 57 73 71 85 85 79 10 100 111 71 54 121 81 110 66 88 102 121 97 67 116 102 78 89 100 112 101 105 51 69 76 43 116 50 97 78 113 43 106 68 104 110 79 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [msp] newBccspMsp -> DEBU 4f2 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [702 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [70c 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 fc 45 13 d3 3e 82 63 85 0c e6 |0E.!...E..>.c...| +peer1.org1.example.com | [568 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org2.example.com | [8ac 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Added �%��_k<���\<���8 [:5AT�!�]� to the in memory item map, total items: 4 +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [msp] New -> DEBU 4f3 Creating Cache-MSP instance" +peer0.org1.example.com | [703 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 ac 6e fc c4 33 c4 46 cc e8 78 cf c7 12 01 a0 b1 |.n..3.F..x......| +peer1.org1.example.com | [569 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org2.example.com | [8ad 11-19 05:21:52.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [msp] Setup -> DEBU 4f4 Setting up MSP instance Org1MSP" +peer0.org1.example.com | [704 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org2.example.com | 00000020 77 26 66 8f 8c 02 20 08 8d 6a 25 b8 ad fa 74 d6 |w&f... ..j%...t.| +peer1.org1.example.com | [56a 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org2.example.com | [8ae 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.310 UTC [msp.identity] newIdentity -> DEBU 4f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [705 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org2.example.com | 00000030 d0 96 52 2c 5f e1 5d 17 d6 a5 ef 7d 4f bb f8 2b |..R,_.]....}O..+| +peer1.org1.example.com | [56b 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x60, 0x1e, 0xe1, 0xb7, 0xa1, 0x19, 0x69, 0xc3, 0xf3, 0xb5, 0x51, 0x11, 0x52, 0x94, 0x60, 0xd, 0x7b, 0xd0, 0x3f, 0x9f, 0xa0, 0x2a, 0x24, 0xa6, 0x25, 0xf8, 0xdd, 0x54, 0x3d, 0xb9, 0xca, 0x84} txOffsets= +peer1.org2.example.com | [8af 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [706 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051 +peer0.org2.example.com | 00000040 2a 3f 51 28 a3 c1 c0 |*?Q(...| +peer1.org1.example.com | txId=994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727 locPointer=offset=71, bytesLength=24470 +peer1.org2.example.com | [8b0 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [707 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [70d 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00296ca60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | ] +peer1.org2.example.com | [8b1 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [708 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org2.example.com | [70e 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00296ca60 gate 1574140910245157100 evaluation succeeds +peer1.org1.example.com | [56c 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to txid-index +peer1.org2.example.com | [8b2 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [709 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org2.example.com | [70f 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [56d 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx number:[0] ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to blockNumTranNum index +peer1.org2.example.com | [8b3 11-19 05:21:54.22 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [70a 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org2.example.com | [710 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [56e 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51321], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org2.example.com | [8b4 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [70b 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [711 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [56f 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org2.example.com | [8b5 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [70c 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer0.org2.example.com | [712 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [570 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org2.example.com | [8b6 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | [70d 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer0.org2.example.com | [713 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org1.example.com | [571 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org2.example.com | [8b7 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [70e 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [714 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [572 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [8b8 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | [70f 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org2.example.com | [715 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [573 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [8b9 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [710 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 38ms (state_validation=11ms block_and_pvtdata_commit=8ms state_commit=15ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org2.example.com | [716 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151010 +peer1.org1.example.com | [574 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [8ba 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | [711 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [717 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 39E612F6453CCE5E238D1C58731BDBC3BD34A13E518C10B477D36F723CD7DD30 +peer1.org1.example.com | [575 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [8bb 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | [712 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408BCAFBBCFFB999EEC15...EA55014EA68C22F9710D59632A020803 +peer0.org2.example.com | [718 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [576 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [8bc 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [713 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C3812AF4027289ED8E56A976CD94048BE7C809E1E102EECA9140415EE22D2ED +peer0.org2.example.com | [719 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [577 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [8bd 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [common.channelconfig] NewStandardValues -> DEBU 4f6 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | [714 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer0.org2.example.com | [71a 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [578 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org2.example.com | [8be 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f7 Processing field: AnchorPeers" +peer0.org1.example.com | [715 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer0.org2.example.com | [71b 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [579 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org2.example.com | [8bf 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [common.channelconfig] NewStandardValues -> DEBU 4f8 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [716 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [71c 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:1329517227700458756 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [57a 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [8c0 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f9 Processing field: MSP" +peer0.org1.example.com | [717 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [71d 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:1329517227700458756 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [57b 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org2.example.com | [8c1 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [common.channelconfig] Validate -> DEBU 4fa Anchor peers for org Org2MSP are " +peer0.org1.example.com | [718 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [71e 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [57c 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org2.example.com | [8c2 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [common.channelconfig] validateMSP -> DEBU 4fb Setting up MSP for org Org2MSP" +peer0.org1.example.com | [719 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [71f 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [57d 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [8c3 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [msp] newBccspMsp -> DEBU 4fc Creating BCCSP-based MSP instance" +peer0.org1.example.com | [71a 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [720 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [57e 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org2.example.com | [8c4 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [msp] New -> DEBU 4fd Creating Cache-MSP instance" +peer0.org1.example.com | [71b 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [721 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [57f 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org2.example.com | [8c5 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [msp] Setup -> DEBU 4fe Setting up MSP instance Org2MSP" +peer0.org1.example.com | [71c 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [722 11-19 05:21:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [580 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 19ms (state_validation=4ms block_and_pvtdata_commit=10ms state_commit=3ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org2.example.com | [8c6 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [msp.identity] newIdentity -> DEBU 4ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [71d 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [723 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [581 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [8c7 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [71e 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [724 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [582 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F0B3D5E6FC999EEC15...05172BB05543DDAEAECD899A2A020802 +peer1.org2.example.com | [8c8 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [71f 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [725 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [583 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 23E730A84B1108059C1CD1893A6822C585B393A4BA09BAFE4497527569A6C910 +peer1.org2.example.com | [8c9 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690030 gate 1574140914789978000 evaluation starts +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [720 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [726 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00280cb00 env 0xc0004c2410 txn 0 +peer1.org1.example.com | [584 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org2.example.com | [8ca 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690030 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [721 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [727 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [722 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [8cb 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690030 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [728 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 115ms +peer1.org1.example.com | [585 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer0.org1.example.com | [723 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 gate 1574140909731137900 evaluation starts +peer1.org2.example.com | [8cc 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [729 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [724 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [8cd 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690030 principal evaluation fails +peer1.org1.example.com | [586 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [72a 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [725 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [8ce 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690030 gate 1574140914789978000 evaluation fails +peer1.org1.example.com | [587 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org2.example.com | [72b 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [726 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [8cf 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [588 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [72c 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org1.example.com | [727 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [8d0 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [589 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org2.example.com | [72d 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [728 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [8d1 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [58a 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00325d0c0 env 0xc00337a5f0 txn 0 +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | [72e 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [729 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 principal matched by identity 0 +peer1.org2.example.com | [8d2 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026905a0 gate 1574140914793642300 evaluation starts +peer1.org1.example.com | [58b 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00337a5f0 +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org2.example.com | [72f 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [72a 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 0xc0026905a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [58c 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | [730 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer1.org2.example.com | [8d4 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026905a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [58d 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [731 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [72b 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 83 d7 9a e8 05 8a 09 5f 95 09 4d |0D. ........_..M| +peer1.org2.example.com | [8d5 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026905a0 principal matched by identity 0 +peer1.org1.example.com | [58e 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU begin +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [msp] Setup -> DEBU 500 Setting up the MSP manager (3 msps)" +peer0.org2.example.com | [732 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | 00000010 96 e1 65 fa b1 4f ea de 4d 40 a5 e0 bf ea ce c9 |..e..O..M@......| +peer1.org2.example.com | [8d6 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 cf bf 83 d0 79 da 79 3d f6 5f 40 64 20 5c fc |$....y.y=._@d \.| +peer1.org1.example.com | [58f 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +orderer0.example.com | "2019-11-19 05:21:41.311 UTC [msp] Setup -> DEBU 501 MSP manager setup complete, setup 3 msps" +peer0.org2.example.com | [733 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | 00000010 3e d2 89 b1 d5 f7 92 1f de 70 9a 00 5b cc 64 f7 |>........p..[.d.| +peer0.org1.example.com | 00000020 cc 51 ec 02 02 20 49 15 6f 7e 35 45 a0 80 a3 5b |.Q... I.o~5E...[| +peer1.org1.example.com | [590 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 502 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [734 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [8d7 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 83 e1 4c 41 86 2f 65 31 1c a2 b7 |0D. ...LA./e1...| +peer0.org1.example.com | 00000030 c8 55 83 21 5b be 1a 93 c2 1b 25 a4 45 5c b4 79 |.U.![.....%.E\.y| +peer1.org1.example.com | [591 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 503 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [736 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | 00000010 5c 9c 55 36 6a cc 24 65 cb a2 6b d0 bf d6 85 ca |\.U6j.$e..k.....| +peer0.org1.example.com | 00000040 ea dc 76 3e 62 5a |..v>bZ| +peer1.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 504 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [737 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | 00000020 97 b7 af 8d 02 20 1a c1 3e 84 d4 61 42 01 40 7c |..... ..>..aB.@|| +peer0.org1.example.com | [72c 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 505 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org2.example.com | [738 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | 00000030 9b 7e d6 4d a0 d1 2d 16 08 60 00 5d 00 3f 75 bb |.~.M..-..`.].?u.| +peer0.org1.example.com | [72d 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 gate 1574140909731137900 evaluation succeeds +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 506 Proposed new policy Readers for Channel/Orderer" +peer0.org2.example.com | [735 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.287Z grpc.peer_address=172.18.0.6:37228 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=184.4µs +peer1.org2.example.com | 00000040 b0 0a 3f 1c 78 49 |..?.xI| +peer0.org1.example.com | [72e 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 507 Proposed new policy Writers for Channel/Orderer" +peer1.org2.example.com | [8d8 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026905a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [72f 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [739 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 508 Proposed new policy Admins for Channel/Orderer" +peer1.org2.example.com | [8d9 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026905a0 gate 1574140914793642300 evaluation succeeds +peer0.org1.example.com | [730 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org2.example.com | [73a 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 509 Proposed new policy Admins for Channel/Application/Org1MSP" +peer1.org2.example.com | [8da 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [731 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org2.example.com | [73b 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50a Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer1.org2.example.com | [8db 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [732 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +peer1.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org2.example.com | [73c 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50b Proposed new policy Readers for Channel/Application/Org1MSP" +peer1.org2.example.com | [8dc 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [733 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org2.example.com | [73d 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer1.org2.example.com | [8dd 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50c Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | [734 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org2.example.com | [73e 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50d Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer1.org2.example.com | [8de 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [735 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org2.example.com | [73f 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:37228 +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50e Proposed new policy Readers for Channel/Application/Org2MSP" +peer1.org2.example.com | [8df 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [736 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 14982435750489679862, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer1.org1.example.com | fQ== +peer0.org2.example.com | [740 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:37228 +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50f Proposed new policy Writers for Channel/Application/Org2MSP" +peer1.org2.example.com | [8e0 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [737 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 14982435750489679862, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [741 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 510 Proposed new policy Admins for Channel/Application/Org2MSP" +peer1.org2.example.com | [8e1 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [738 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [592 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer0.org2.example.com | [742 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Readers for Channel/Application" +peer1.org2.example.com | [8e2 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [739 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 14982435750489679862, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer1.org1.example.com | [593 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [743 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Writers for Channel/Application" +peer1.org2.example.com | [8e3 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [73a 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [594 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Admins for Channel/Application" +peer1.org2.example.com | [8e4 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [73b 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 8e 4a 56 ff 77 9e 34 e9 6c 45 32 ff 9b 4a 59 |..JV.w.4.lE2..JY| +peer1.org1.example.com | [595 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5c 3f 1b d8 4a da c3 4b 67 20 49 d8 48 ce 53 | \?..J..Kg I.H.S| +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy LifecycleEndorsement for Channel/Application" +peer1.org2.example.com | [8e5 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 d6 72 0c a4 5e df 2c 67 0e 0d b0 48 93 65 6b 88 |.r..^.,g...H.ek.| +peer1.org1.example.com | 00000010 e1 89 fc 50 b4 b1 5e c3 a1 04 2d 2b 2a a2 53 c9 |...P..^...-+*.S.| +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Endorsement for Channel/Application" +peer1.org2.example.com | [8e6 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [73c 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 8d 1f 03 fe 0e 3b 31 28 87 48 c5 |0D. U.....;1(.H.| +peer1.org1.example.com | [596 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c da 5b 7f f8 0b 78 dd 56 60 07 6f |0D. <.[...x.V`.o| +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 516 Proposed new policy Writers for Channel" +peer1.org2.example.com | [8e7 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 9e d8 00 d5 fb 8d a9 59 b1 82 d3 bc 1b e9 dc 92 |.......Y........| +peer1.org1.example.com | 00000010 55 50 96 78 11 13 49 28 89 52 93 b7 b2 9d bb 4d |UP.x..I(.R.....M| +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 517 Proposed new policy Admins for Channel" +peer1.org2.example.com | [8e9 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 08 76 7a c9 02 20 5b f2 53 c2 83 2e c7 ed 42 b9 |.vz.. [.S.....B.| +peer1.org1.example.com | 00000020 1c 1a 01 32 02 20 63 c4 7c ca a7 d6 48 c5 10 9b |...2. c.|...H...| +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 518 Proposed new policy Readers for Channel" +peer1.org2.example.com | [8ea 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 94 c9 61 1b f1 fd f7 ff 0d b1 88 4b b6 bd 33 3d |..a........K..3=| +peer1.org1.example.com | 00000030 00 2d 4d 59 a6 7a c2 62 62 b5 9b 3a ce f0 9e e7 |.-MY.z.bb..:....| +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Group] /Channel" +peer1.org2.example.com | [8eb 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000040 88 0c 75 f3 98 8f |..u...| +peer1.org1.example.com | 00000040 61 25 fa 66 d3 6c |a%.f.l| +peer0.org2.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51a Adding to config map: [Group] /Channel/Orderer" +peer1.org2.example.com | [8ec 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [73d 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [597 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [8ed 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [73e 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [598 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0033ea000, header channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +peer0.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org2.example.com | [8e8 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [73f 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [599 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org2.example.com | [8ee 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [740 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [59a 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [8ef 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [741 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [59b 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org2.example.com | [8f0 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [742 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [59c 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [744 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 520 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org2.example.com | [8f1 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [743 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [59d 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [745 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 521 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org2.example.com | [8f2 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [744 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [59e 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [746 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 522 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org2.example.com | [8f3 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [745 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 08 db e6 e6 60 1d 9a 29 8b 5b 65 68 c7 42 52 |.....`..).[eh.BR| +peer1.org1.example.com | [59f 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [747 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 523 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org2.example.com | [8f4 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 6e ad 90 31 f7 26 f4 b2 af ad 08 a3 c5 fa 0f 54 |n..1.&.........T| +peer1.org1.example.com | [5a0 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [748 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org2.example.com | [8f5 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [746 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 97 ca 8f 47 3c c1 df 9a ca 18 44 |0D. k...G<.....D| +peer1.org1.example.com | [5a1 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [749 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer1.org2.example.com | [8f6 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 12 a0 45 c1 58 f4 5e 41 58 97 6d 4e f3 29 4d e0 |..E.X.^AX.mN.)M.| +peer1.org1.example.com | [5a2 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [74a 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org2.example.com | [8f7 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 ae 26 b0 39 02 20 69 31 4f c6 c0 c5 52 c9 8d 3c |.&.9. i1O...R..<| +peer1.org1.example.com | [5a3 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [74b 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org2.example.com | [8f8 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 15 f0 e9 ce 7d a9 ad 6b 17 f2 6b cc dd b1 c0 08 |....}..k..k.....| +peer1.org1.example.com | [5a4 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [74c 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org2.example.com | [8f9 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 55 b0 84 1f 05 72 |U....r| +peer1.org1.example.com | [5a5 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [74d 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [8fa 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [747 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [5a6 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [74e 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [8fb 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [748 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [5a7 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [74f 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52b Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org2.example.com | [8fc 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [749 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [5a8 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [750 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a02c30 gate 1574140910299211900 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [8fd 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687860 gate 1574140914843748900 evaluation starts +peer0.org1.example.com | [74a 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [5a9 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [751 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a02c30 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | [8fe 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687860 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [74b 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [5aa 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [752 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a02c30 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer1.org2.example.com | [8ff 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687860 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [5ab 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer0.org2.example.com | [753 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a02c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [74c 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer1.org2.example.com | [900 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [5ac 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [754 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a02c30 principal evaluation fails +peer0.org1.example.com | [74d 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 530 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org2.example.com | [901 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687860 principal evaluation fails +peer1.org1.example.com | [5ad 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [755 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a02c30 gate 1574140910299211900 evaluation fails +peer0.org1.example.com | [74e 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [902 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687860 gate 1574140914843748900 evaluation fails +peer1.org1.example.com | [5ae 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [756 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [74f 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 531 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer1.org2.example.com | [903 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [5af 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [757 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [750 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [904 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [5b0 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [758 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [751 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer1.org2.example.com | [905 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [5b1 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [759 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a031c0 gate 1574140910299471000 evaluation starts +peer0.org1.example.com | [752 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 gate 1574140909742587500 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer1.org2.example.com | [906 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687dd0 gate 1574140914845005700 evaluation starts +peer1.org1.example.com | [5b2 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer0.org2.example.com | [75a 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a031c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [753 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.315 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer1.org2.example.com | [907 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687dd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [5b3 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [75b 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a031c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [754 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.315 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org2.example.com | [908 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687dd0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [5b4 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [75c 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [755 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:41.316 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org2.example.com | [909 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687dd0 principal matched by identity 0 +peer1.org1.example.com | [5b5 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer0.org2.example.com | [75d 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [756 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 a8 5e e1 4d bf 89 97 fb cf d0 29 0e 67 fd 42 |..^.M......).g.B| +orderer0.example.com | "2019-11-19 05:21:41.316 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org2.example.com | [90a 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer1.org1.example.com | [5b6 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org2.example.com | [75e 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | 00000010 f5 e2 f5 fa 4a e9 35 2d 0f fd 6a 97 5c 05 db 08 |....J.5-..j.\...| +orderer0.example.com | "2019-11-19 05:21:41.316 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer1.org2.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer1.org1.example.com | [5b7 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [75f 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a031c0 principal matched by identity 0 +peer0.org1.example.com | [757 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 29 d4 2b 63 e9 58 3e 8b 8b dd |0E.!..).+c.X>...| +orderer0.example.com | "2019-11-19 05:21:41.316 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org2.example.com | [90b 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer1.org1.example.com | [5b8 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [760 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org1.example.com | 00000010 0f 44 dc 11 ad 76 7d 8a 6f 0f 18 af 5c 84 4b 09 |.D...v}.o...\.K.| +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org2.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer1.org1.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org1.example.com | 00000020 e1 67 f5 8a 95 02 20 25 fa 49 5b c6 12 47 c1 e6 |.g.... %.I[..G..| +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org2.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [761 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 57 af 9c 07 0b c2 67 06 4b b1 |0E.!..W.....g.K.| +peer0.org1.example.com | 00000030 01 c9 f6 f5 39 e8 74 d8 ed 87 32 f2 9c 90 ea 59 |....9.t...2....Y| +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Value] /Channel/OrdererAddresses" +peer1.org2.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | 00000010 d6 83 3b 84 37 71 d8 79 ea 2a 7e c0 c7 be 13 b9 |..;.7q.y.*~.....| +peer0.org1.example.com | 00000040 ae 2c 27 01 eb 65 dc |.,'..e.| +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Value] /Channel/Capabilities" +peer1.org2.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org2.example.com | 00000020 c5 d1 5b c4 1b 02 20 30 b1 d6 cc fd 5b b9 87 8a |..[... 0....[...| +peer0.org1.example.com | [758 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org2.example.com | [90c 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687dd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | 00000030 bd 00 a6 1a c1 8b ff 13 1d c9 44 be 6d c4 95 c5 |..........D.m...| +peer0.org1.example.com | [759 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 gate 1574140909742587500 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Value] /Channel/Consortium" +peer1.org2.example.com | [90d 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687dd0 gate 1574140914845005700 evaluation succeeds +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | 00000040 3b 66 ef 63 b7 ac e3 |;f.c...| +peer0.org1.example.com | [75a 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org2.example.com | [90e 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer0.org2.example.com | [762 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a031c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [75b 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Policy] /Channel/Writers" +peer1.org2.example.com | [90f 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer0.org2.example.com | [763 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a031c0 gate 1574140910299471000 evaluation succeeds +peer0.org1.example.com | [75c 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Policy] /Channel/Admins" +peer1.org2.example.com | [910 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | [764 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [75d 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Policy] /Channel/Readers" +peer1.org2.example.com | [911 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer0.org2.example.com | [765 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [75e 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.capabilities] Supported -> DEBU 545 Orderer capability V1_4_2 is supported and is enabled" +peer1.org2.example.com | [912 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer0.org2.example.com | [766 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [75f 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +orderer0.example.com | "2019-11-19 05:21:41.317 UTC [common.capabilities] Supported -> DEBU 546 Channel capability V1_4_3 is supported and is enabled" +peer1.org2.example.com | [913 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer0.org2.example.com | [767 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [760 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.318 UTC [orderer.common.cluster] NewStream -> DEBU 547 Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +peer1.org2.example.com | [914 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [768 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:37228 +peer0.org1.example.com | [761 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.318 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 548 Sending msg of 26611 bytes to 3 on channel testchainid took 146.7µs" +peer1.org2.example.com | [915 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [5b9 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407b80 gate 1574140909575842800 evaluation starts +peer0.org2.example.com | [769 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:37228 +peer0.org1.example.com | [762 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.318 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 549 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:51414" +peer1.org1.example.com | [5ba 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407b80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [76a 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [763 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.318 UTC [orderer.common.cluster.step] sendMessage -> DEBU 54a Send of SubmitRequest for channel testchainid with payload of size 26611 to orderer2.example.com(orderer2.example.com:7050) took 128.6µs " +peer1.org2.example.com | [916 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [5bb 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407b80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [76b 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [764 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 54b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 26821" +peer1.org2.example.com | [917 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [5bc 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [5bd 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [765 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15100F +orderer0.example.com | "2019-11-19 05:21:41.346 UTC [orderer.common.cluster.step] handleMessage -> DEBU 54c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:41.354 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 54d Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +peer1.org1.example.com | [5be 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [76c 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [766 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA55CBB33439D6E8A73AC955D8EF501712631D7B040E3643EBB0E97742EF9A1C +orderer0.example.com | "2019-11-19 05:21:41.355 UTC [orderer.common.cluster.step] sendMessage -> DEBU 54e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 763.6µs " +orderer0.example.com | "2019-11-19 05:21:41.360 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 54f Sending msg of 28 bytes to 3 on channel testchainid took 4.6843ms" +peer1.org1.example.com | [5bf 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [76d 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00314db80)} +peer0.org1.example.com | [767 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.363 UTC [orderer.common.cluster.step] sendMessage -> DEBU 550 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.3µs " +peer1.org1.example.com | [5c0 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [918 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [76e 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [768 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2019-11-19 05:21:41.363 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 551 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +peer1.org1.example.com | [5c1 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [919 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [76f 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [769 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +orderer0.example.com | "2019-11-19 05:21:41.370 UTC [common.channelconfig] NewStandardValues -> DEBU 552 Initializing protos for *channelconfig.ChannelProtos" +peer1.org1.example.com | [5c2 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407b80 principal matched by identity 0 +peer1.org2.example.com | [91a 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [770 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [76a 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | "2019-11-19 05:21:41.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 553 Processing field: HashingAlgorithm" +peer1.org1.example.com | [5c3 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +peer1.org2.example.com | [91b 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [771 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org1.example.com | [76b 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 554 Processing field: BlockDataHashingStructure" +peer1.org1.example.com | 00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.| +peer1.org2.example.com | [91c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [772 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org1.example.com | [76c 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:21:41.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 555 Processing field: OrdererAddresses" +peer1.org1.example.com | [5c4 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +peer1.org2.example.com | [91d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [773 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org1.example.com | [76d 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.372 UTC [common.channelconfig] initializeProtosStruct -> DEBU 556 Processing field: Consortium" +peer1.org1.example.com | 00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +peer0.org2.example.com | [774 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer1.org2.example.com | [91e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > alive: alive: +orderer0.example.com | "2019-11-19 05:21:41.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 557 Processing field: Capabilities" +peer0.org1.example.com | [76e 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +peer0.org2.example.com | [775 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x39, 0x34, 0x96, 0xee, 0x50, 0x5e, 0xad, 0x78, 0xfc, 0x3, 0xa3, 0xac, 0x21, 0xe9, 0xfb, 0x52, 0x19, 0x4e, 0xd1, 0x91, 0xc2, 0x3c, 0xb8, 0xb, 0x70, 0x9b, 0xb2, 0x3d, 0xdd, 0xb4, 0xc8, 0xd8} txOffsets= +peer1.org2.example.com | [91f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.375 UTC [common.channelconfig] NewStandardValues -> DEBU 558 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | [76f 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +peer0.org2.example.com | txId=02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732 locPointer=offset=71, bytesLength=24474 +peer1.org2.example.com | [920 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 559 Processing field: ACLs" +peer0.org1.example.com | [770 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 56 71 ab 2e 37 58 4a |Vq..7XJ| +peer0.org2.example.com | ] +peer1.org2.example.com | [921 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55a Processing field: Capabilities" +peer0.org1.example.com | [771 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [5c5 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407b80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [776 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51391, bytesLength=24474] for tx ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to txid-index +peer1.org2.example.com | [922 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.376 UTC [common.channelconfig] NewStandardValues -> DEBU 55b Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | [772 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [5c6 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407b80 gate 1574140909575842800 evaluation succeeds +peer0.org2.example.com | [778 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51391, bytesLength=24474] for tx number:[0] ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to blockNumTranNum index +peer1.org2.example.com | [923 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 2d 5a 85 32 6f 56 c4 69 40 91 8a 4f 2f 1f 69 |.-Z.2oV.i@..O/.i| +orderer0.example.com | "2019-11-19 05:21:41.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55c Processing field: AnchorPeers" +peer0.org1.example.com | [773 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [5c7 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [779 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76838], isChainEmpty=[false], lastBlockNumber=[2] +peer1.org2.example.com | 00000010 c6 87 d0 01 26 24 cd b4 9c c0 81 62 4a e9 a9 d7 |....&$.....bJ...| +orderer0.example.com | "2019-11-19 05:21:41.376 UTC [common.channelconfig] NewStandardValues -> DEBU 55d Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [774 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [5c8 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [77a 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer1.org2.example.com | [924 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 18 8c 1b 55 09 64 0e 56 d5 26 |0E.!.....U.d.V.&| +orderer0.example.com | "2019-11-19 05:21:41.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55e Processing field: MSP" +peer0.org1.example.com | [775 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer1.org1.example.com | [5c9 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [777 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 1329517227700458756, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 00 06 38 0b f2 8b 82 14 b8 89 cb 30 73 b2 15 85 |..8........0s...| +orderer0.example.com | "2019-11-19 05:21:41.377 UTC [common.channelconfig] Validate -> DEBU 55f Anchor peers for org Org1MSP are " +peer0.org1.example.com | [776 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [5ca 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [77b 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 f4 43 63 57 be 02 20 34 8e 9e d9 7b 01 b1 4e 27 |.CcW.. 4...{..N'| +orderer0.example.com | "2019-11-19 05:21:41.380 UTC [orderer.common.broadcast] Handle -> DEBU 560 Received EOF from 172.18.0.5:51414, hangup" +peer0.org1.example.com | [777 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037c3690, CONNECTING +peer1.org1.example.com | [5cb 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [77c 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer1.org2.example.com | 00000030 8d e2 a5 95 0a 97 11 32 a3 19 5e 2d 2f ac a9 94 |.......2..^-/...| +orderer0.example.com | "2019-11-19 05:21:41.382 UTC [orderer.common.server] func1 -> DEBU 561 Closing Broadcast stream" +peer0.org1.example.com | [778 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037c3690, READY +peer1.org1.example.com | [5cc 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [77e 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer1.org2.example.com | 00000040 5b 6e 0d a9 7e ef dc |[n..~..| +orderer0.example.com | "2019-11-19 05:21:41.382 UTC [comm.grpc.server] 1 -> INFO 562 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51414 grpc.code=OK grpc.call_duration=120.7758ms +peer0.org1.example.com | [779 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5cd 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [77f 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [925 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.382 UTC [common.channelconfig] validateMSP -> DEBU 563 Setting up MSP for org Org1MSP" +peer0.org1.example.com | [77a 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org1.example.com | [5ce 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [77d 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 1329517227700458756, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes +peer1.org2.example.com | [926 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +orderer0.example.com | "2019-11-19 05:21:41.382 UTC [msp] newBccspMsp -> DEBU 564 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [77b 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org1.example.com | [5cf 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [780 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [927 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning true +orderer0.example.com | "2019-11-19 05:21:41.382 UTC [msp] New -> DEBU 565 Creating Cache-MSP instance" +peer0.org1.example.com | [77c 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051 +peer1.org1.example.com | [5d0 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [781 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [928 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> INFO 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 Stopped being a leader +orderer0.example.com | "2019-11-19 05:21:41.391 UTC [msp] Setup -> DEBU 566 Setting up MSP instance Org1MSP" +peer0.org1.example.com | [77d 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:7051 +peer1.org1.example.com | [5d1 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [782 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [929 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> INFO Renounced leadership, stopping delivery service for channel businesschannel +orderer0.example.com | "2019-11-19 05:21:41.391 UTC [msp.identity] newIdentity -> DEBU 567 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [77e 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer1.org1.example.com | [5d2 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [783 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [92a 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer1.org1.example.com | [5d3 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [784 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [92b 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [77f 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d a5 10 3f 18 39 01 2c 39 02 ca |0E.!....?.9.,9..| +peer1.org1.example.com | [5d4 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [785 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [92c 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU This peer will stop pass blocks from orderer service to other peers +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | 00000010 e1 92 55 76 12 a2 4b 00 e7 f1 ee 9b 08 fc 23 b1 |..Uv..K.......#.| +peer1.org1.example.com | [5d5 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [786 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [92d 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | 00000020 57 19 05 98 95 02 20 38 ab 7d f6 f8 6c 22 ab 4f |W..... 8.}..l".O| +peer1.org1.example.com | [5d6 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [92f 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | 00000030 94 c2 c0 85 ad a6 1e 9c 1d 5f 75 aa ca 6c d1 69 |........._u..l.i| +peer1.org1.example.com | [5d7 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [92e 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | 00000040 f0 c8 4b 5a 50 22 c3 |..KZP".| +peer1.org1.example.com | [5d8 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [931 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [780 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [5d9 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [932 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> WARN Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | [781 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [5da 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [933 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> WARN [businesschannel] Receive error: client is closing +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [782 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | [5db 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [934 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | [783 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer1.org1.example.com | [5dc 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [930 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [784 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer1.org1.example.com | [5dd 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [935 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | [785 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | [5de 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [936 11-19 05:21:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | [786 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | [5df 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [937 11-19 05:21:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [787 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer1.org1.example.com | [5e0 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [938 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.393 UTC [common.channelconfig] NewStandardValues -> DEBU 568 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | [788 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer1.org1.example.com | [5e1 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [939 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU 569 Processing field: AnchorPeers" +peer0.org1.example.com | [789 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 55 cb b3 34 39 d6 e8 a7 3a c9 55 d8 ef 50 17 |.U..49...:.U..P.| +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [5e2 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [93a 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.393 UTC [common.channelconfig] NewStandardValues -> DEBU 56a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | 00000010 12 63 1d 7b 04 0e 36 43 eb b0 e9 77 42 ef 9a 1c |.c.{..6C...wB...| +peer0.org2.example.com | [787 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [5e3 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [93b 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56b Processing field: MSP" +peer0.org1.example.com | [78a 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d c8 c3 99 a2 69 02 ac 4d af 7c |0E.!......i..M.|| +peer0.org2.example.com | [788 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [5e4 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [93c 11-19 05:21:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.393 UTC [common.channelconfig] Validate -> DEBU 56c Anchor peers for org Org2MSP are " +peer0.org2.example.com | [789 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | 00000010 8f e4 a0 cd d2 a3 05 47 c2 ca 7f 82 e4 03 7c c0 |.......G......|.| +peer1.org1.example.com | [5e5 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [93d 11-19 05:21:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151015 +orderer0.example.com | "2019-11-19 05:21:41.393 UTC [common.channelconfig] validateMSP -> DEBU 56d Setting up MSP for org Org2MSP" +peer0.org2.example.com | [78a 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | 00000020 f9 a5 d7 9a 0b 02 20 4a 78 c4 c5 fc 6a 4a b4 6d |...... Jx...jJ.m| +peer1.org1.example.com | [5e6 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [93e 11-19 05:21:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 96081677FBFB6D780054322FBFF415C9AEB31279DB6FC044D77E72C1D32E74D9 +orderer0.example.com | "2019-11-19 05:21:41.394 UTC [msp] newBccspMsp -> DEBU 56e Creating BCCSP-based MSP instance" +peer0.org2.example.com | [78b 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org1.example.com | 00000030 5e c0 89 63 9a 2b 02 27 67 fd 16 c0 8b fa b4 b7 |^..c.+.'g.......| +peer1.org1.example.com | [5e7 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [93f 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.394 UTC [msp] New -> DEBU 56f Creating Cache-MSP instance" +peer0.org2.example.com | [78c 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org1.example.com | 00000040 52 91 6c 4a f1 e5 40 |R.lJ..@| +peer1.org1.example.com | [5e8 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [940 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2019-11-19 05:21:41.394 UTC [msp] Setup -> DEBU 570 Setting up MSP instance Org2MSP" +peer0.org2.example.com | [78d 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org1.example.com | [78b 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [5e9 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [941 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer0.example.com | "2019-11-19 05:21:41.395 UTC [msp.identity] newIdentity -> DEBU 571 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [78c 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [78e 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [5ea 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [942 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [78d 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.118Z grpc.peer_address=172.18.0.9:44656 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=138.5µs +peer0.org2.example.com | [790 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [5eb 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [943 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [78e 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [791 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [5ec 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [944 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [78f 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org2.example.com | [792 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [5ed 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [945 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [790 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org2.example.com | [793 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [5ee 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [946 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [791 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:44656 +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [794 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [5ef 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [947 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [792 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44656 +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [795 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [5f0 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [948 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [793 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [796 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe2b0 gate 1574140910320303300 evaluation starts +peer1.org1.example.com | [5f1 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [794 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [949 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org2.example.com | [797 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe2b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [5f2 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [795 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [94a 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [798 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe2b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [5f3 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [94b 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [796 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org2.example.com | [799 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [94c 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [797 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | [79a 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe2b0 principal evaluation fails +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [94d 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [798 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org2.example.com | [79b 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe2b0 gate 1574140910320303300 evaluation fails +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [94e 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [799 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | [79c 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org2.example.com | [94f 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [79a 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [79d 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [950 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [79b 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.396 UTC [common.channelconfig] NewStandardValues -> DEBU 572 Initializing protos for *channelconfig.OrdererProtos" +peer0.org2.example.com | [79e 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [951 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [79c 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 573 Processing field: ConsensusType" +peer0.org2.example.com | [78f 11-19 05:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org2.example.com | [952 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [79d 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 574 Processing field: BatchSize" +peer0.org2.example.com | [79f 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer1.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org2.example.com | [953 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [79e 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 gate 1574140910126923900 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 575 Processing field: BatchTimeout" +peer0.org2.example.com | [7a0 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe840 gate 1574140910320577500 evaluation starts +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | [954 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [79f 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 576 Processing field: KafkaBrokers" +peer0.org2.example.com | [7a1 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe840 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org2.example.com | [955 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [7a0 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 577 Processing field: ChannelRestrictions" +peer0.org2.example.com | [7a2 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org2.example.com | [956 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7a1 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: Capabilities" +peer0.org2.example.com | [7a3 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe840 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org2.example.com | [957 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [7a2 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 579 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org2.example.com | [7a4 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | 1g== +peer1.org2.example.com | [958 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +orderer0.example.com | "2019-11-19 05:21:41.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: Endpoints" +peer0.org2.example.com | [7a5 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [959 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7a3 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 04 25 89 01 b0 a5 43 2a 66 1b |0E.!...%....C*f.| +orderer0.example.com | "2019-11-19 05:21:41.397 UTC [common.channelconfig] NewStandardValues -> DEBU 57b Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | [7a6 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [5f4 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [95a 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 22 5c ab 2b a4 d5 f0 3c 54 fe d3 e2 d4 b6 9d c2 |"\.+... DEBU 57c Processing field: MSP" +peer0.org2.example.com | [7a7 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe840 principal matched by identity 0 +peer1.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [95b 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151016 +peer0.org1.example.com | 00000020 8a 24 f8 5c 75 02 20 2f 76 82 4f 63 50 19 85 5f |.$.\u. /v.OcP.._| +orderer0.example.com | "2019-11-19 05:21:41.397 UTC [common.channelconfig] validateMSP -> DEBU 57d Setting up MSP for org OrdererOrg" +peer0.org2.example.com | [7a8 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 8e 4a 56 ff 77 9e 34 e9 6c 45 32 ff 9b 4a 59 |..JV.w.4.lE2..JY| +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [95c 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37C815BF0BA6EA0B953B3B8FCD406591C8A1D22B63E61FA62AFA69FE78492286 +peer0.org1.example.com | 00000030 a3 42 96 df ac 84 71 6c 40 89 09 ab e7 7f 2b b8 |.B....ql@.....+.| +orderer0.example.com | "2019-11-19 05:21:41.397 UTC [msp] newBccspMsp -> DEBU 57e Creating BCCSP-based MSP instance" +peer0.org2.example.com | 00000010 d6 72 0c a4 5e df 2c 67 0e 0d b0 48 93 65 6b 88 |.r..^.,g...H.ek.| +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [95d 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000040 48 12 97 b4 dc 0c 69 |H.....i| +orderer0.example.com | "2019-11-19 05:21:41.397 UTC [msp] New -> DEBU 57f Creating Cache-MSP instance" +peer0.org2.example.com | [7a9 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 8d 1f 03 fe 0e 3b 31 28 87 48 c5 |0D. U.....;1(.H.| +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org2.example.com | [95e 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [7a4 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.397 UTC [msp] Setup -> DEBU 580 Setting up MSP instance OrdererMSP" +peer0.org2.example.com | 00000010 9e d8 00 d5 fb 8d a9 59 b1 82 d3 bc 1b e9 dc 92 |.......Y........| +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [95f 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [7a5 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 gate 1574140910126923900 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.398 UTC [msp.identity] newIdentity -> DEBU 581 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | 00000020 08 76 7a c9 02 20 5b f2 53 c2 83 2e c7 ed 42 b9 |.vz.. [.S.....B.| +peer1.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | [960 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7a6 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | 00000030 94 c9 61 1b f1 fd f7 ff 0d b1 88 4b b6 bd 33 3d |..a........K..3=| +peer1.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | [961 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [7a7 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | 00000040 88 0c 75 f3 98 8f |..u...| +peer1.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | [962 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [7a8 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [7aa 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer1.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org1.example.com | [7a9 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [963 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org2.example.com | [7ab 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 38ms (state_validation=19ms block_and_pvtdata_commit=13ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer1.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | [7aa 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44656 +peer1.org2.example.com | [964 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [7ac 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | [7ab 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44656 +peer1.org2.example.com | [965 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | [7ad 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E12140898B48782FE999EEC15...3FF04E590AF5F9A12CFD445B2A020803 +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [7ac 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [966 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org2.example.com | [7ae 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3673EBD0FA8E888D9F144A69D9EB9DA8F03A6960A3F82B8199BAF91F78F26701 +peer1.org1.example.com | [5f5 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [7ad 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing +peer1.org2.example.com | [967 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org2.example.com | [7af 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer1.org1.example.com | [5f6 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [7ae 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer1.org2.example.com | [968 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | [7b0 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe840 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [5f7 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [7af 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [969 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org2.example.com | [7b1 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebe840 gate 1574140910320577500 evaluation succeeds +peer1.org1.example.com | [5f8 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [7b0 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [96a 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | [5f9 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [7b2 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [7b1 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [96b 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:57.443Z grpc.peer_address=172.18.0.8:38162 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=103.1µs +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | [5fa 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [7b3 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [7b2 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44656 disconnected +peer1.org2.example.com | [96c 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | 1g== +peer1.org1.example.com | [5fb 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [7b4 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [96d 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +peer0.org1.example.com | [7b3 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.121Z grpc.peer_address=172.18.0.9:44656 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.468ms +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [5fc 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [7b5 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +peer0.org1.example.com | [7b4 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +orderer0.example.com | "2019-11-19 05:21:41.398 UTC [msp.identity] newIdentity -> DEBU 582 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [5fd 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org2.example.com | [7b6 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [96e 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +peer0.org1.example.com | [7b5 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.166Z grpc.peer_address=172.18.0.9:44658 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=316.6µs +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [5fe 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [7b7 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +peer0.org1.example.com | [7b6 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [5ff 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [7b8 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | 00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +peer0.org1.example.com | [7b7 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [600 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [7b9 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 e6 12 f6 45 3c ce 5e 23 8d 1c 58 73 1b db c3 |9...E<.^#..Xs...| +peer1.org2.example.com | 00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +peer0.org1.example.com | [7b8 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org1.example.com | [601 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | 00000010 bd 34 a1 3e 51 8c 10 b4 77 d3 6f 72 3c d7 dd 30 |.4.>Q...w.or<..0| +peer1.org2.example.com | 00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +peer0.org1.example.com | [7b9 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:44658 +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [602 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [7ba 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 96 c4 15 75 5e 34 01 6b f1 00 d0 |0D. &...u^4.k...| +peer1.org2.example.com | [96f 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [7ba 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44658 +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | 00000010 52 34 d2 39 a3 8c 63 3b 5f 98 d3 84 6a 63 26 18 |R4.9..c;_...jc&.| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [7bb 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | 00000020 84 8a c4 b2 02 20 10 02 c4 91 62 a2 e4 0e 62 cb |..... ....b...b.| +peer1.org2.example.com | [970 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 6f ca bd a6 35 bd 77 cf 81 31 |0E.!..o...5.w..1| +peer0.org1.example.com | [7bc 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | 00000030 53 db f0 6e f5 99 df 30 2a 17 c6 8d 8a 4a de 49 |S..n...0*....J.I| +peer1.org2.example.com | 00000010 03 4f bf f3 30 94 3f 83 a9 f9 b4 ea 90 e7 bc 92 |.O..0.?.........| +peer0.org1.example.com | [7bd 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | 00000040 7b a1 88 e2 a6 54 |{....T| +peer1.org2.example.com | 00000020 1a 4a e5 1f 95 02 20 17 c7 95 60 38 dc 0b 92 22 |.J.... ...`8..."| +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | [7be 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [7bb 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 6c 84 cc 23 6c 83 c0 1f 45 fe 14 5a f1 30 13 1c |l..#l...E..Z.0..| +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | [7bf 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [7bc 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000040 e3 b4 02 88 73 1d 6c |....s.l| +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [7c0 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [7bd 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [971 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.399 UTC [msp] Validate -> DEBU 583 MSP OrdererMSP validating identity" +peer0.org1.example.com | [7c1 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org2.example.com | [7be 11-19 05:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [972 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.399 UTC [msp] Setup -> DEBU 584 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | [7c2 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [7bf 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.482Z grpc.peer_address=172.18.0.7:32980 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=117.5µs +peer1.org2.example.com | [973 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.399 UTC [msp] Setup -> DEBU 585 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | [7c3 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org2.example.com | [7c0 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [974 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.399 UTC [policies] NewManagerImpl -> DEBU 586 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | [7c4 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | [7c1 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer1.org2.example.com | [975 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.399 UTC [policies] NewManagerImpl -> DEBU 587 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | [7c5 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org2.example.com | [7c2 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer1.org2.example.com | [976 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.399 UTC [policies] NewManagerImpl -> DEBU 588 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | [7c6 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 gate 1574140910173960500 evaluation starts +peer1.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | [7c3 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:32980 +peer1.org2.example.com | [977 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +orderer0.example.com | "2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | [7c7 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [7c4 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:32980 +peer1.org2.example.com | [978 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | [7c8 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [603 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [7c5 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy Writers for Channel/Application/Org2MSP" +peer1.org2.example.com | [979 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7c9 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 principal matched by identity 0 +peer0.org2.example.com | [7c6 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [604 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +orderer0.example.com | "2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Admins for Channel/Application/Org2MSP" +peer1.org2.example.com | [97a 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7ca 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Initializing protos for *channelconfig.OrganizationProtos +orderer0.example.com | "2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer1.org2.example.com | [97b 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [606 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | "2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Endorsement for Channel/Application" +peer1.org2.example.com | [97c 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7cb 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e8 fc 29 ab c5 ad 14 e9 18 8c 67 |0D. E..).......g| +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | [607 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +orderer0.example.com | "2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Readers for Channel/Application" +peer1.org2.example.com | [97d 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 47 0c 0d dd 29 32 6f c9 ee db 45 5e d1 16 c2 27 |G...)2o...E^...'| +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org1.example.com | [608 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Writers for Channel/Application" +peer1.org2.example.com | [97e 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 51 ef 21 6c 02 20 55 65 28 75 50 2d 9e 66 ac 0a |Q.!l. Ue(uP-.f..| +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | [609 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Admins for Channel/Application" +peer1.org2.example.com | [97f 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028294d0 gate 1574140915452998800 evaluation starts +peer0.org1.example.com | 00000030 0f 47 6a 36 ae 24 7d 72 fb 59 59 bd e8 5e 8c bd |.Gj6.$}r.YY..^..| +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer1.org1.example.com | [60a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy LifecycleEndorsement for Channel/Application" +peer1.org2.example.com | [980 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028294d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 7c ba 3c 9e 1f a2 ||.<...| +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer1.org1.example.com | [60b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [981 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028294d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [7cc 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org1.example.com | [60c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [982 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028294d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [7cd 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 gate 1574140910173960500 evaluation succeeds +peer0.org2.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [983 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028294d0 principal evaluation fails +peer0.org1.example.com | [7ce 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy Readers for Channel/Orderer" +peer1.org2.example.com | [984 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028294d0 gate 1574140915452998800 evaluation fails +peer0.org1.example.com | [7cf 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Writers for Channel/Orderer" +peer1.org2.example.com | [985 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7d0 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Admins for Channel/Orderer" +peer1.org2.example.com | [986 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7d1 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org2.example.com | [987 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [7d2 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44658 +peer0.org2.example.com | [7c7 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | "2019-11-19 05:21:41.402 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy Admins for Channel" +peer1.org2.example.com | [988 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ae0 gate 1574140915454464200 evaluation starts +peer0.org1.example.com | [7d3 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44658 +peer0.org2.example.com | [7c8 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | "2019-11-19 05:21:41.402 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Readers for Channel" +peer1.org2.example.com | [989 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [7d4 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:44658 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:11007432676051748334 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org2.example.com | [7c9 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer1.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org2.example.com | [98a 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ae0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.402 UTC [policies] NewManagerImpl -> DEBU 59c Proposed new policy Writers for Channel" +peer0.org1.example.com | [7d5 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer1.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [98b 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ae0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:41.402 UTC [common.configtx] addToMap -> DEBU 59d Adding to config map: [Group] /Channel" +peer0.org1.example.com | [7d6 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:11007432676051748334 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org2.example.com | [7ca 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 09 a6 e0 c7 6d f8 20 fe 08 66 4c |0D. .....m. ..fL| +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org2.example.com | [98c 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +orderer0.example.com | "2019-11-19 05:21:41.402 UTC [common.configtx] addToMap -> DEBU 59e Adding to config map: [Group] /Channel/Application" +peer0.org2.example.com | 00000010 e5 d9 eb 90 6f 85 9a cb a4 fa 68 3b 6a ce c8 ab |....o.....h;j...| +peer0.org1.example.com | [7d7 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | 00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 59f Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org2.example.com | 00000020 a3 94 bd 17 02 20 41 0f f7 13 b7 b4 ad cb 90 90 |..... A.........| +peer0.org1.example.com | [7d8 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org2.example.com | [98d 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org2.example.com | 00000030 21 82 cd 21 b3 47 d2 12 ec 7a 93 55 c4 e4 35 c1 |!..!.G...z.U..5.| +peer0.org1.example.com | [7d9 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org2.example.com | 00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | 00000040 bc e4 b9 52 e1 d2 |...R..| +peer0.org1.example.com | [7da 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | 00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [7cb 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:32980 +peer0.org1.example.com | [7db 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [60d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | 00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [7cc 11-19 05:21:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:32980 +peer0.org1.example.com | [7dc 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [60e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | 00000040 b0 a7 83 ce 50 7e |....P~| +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org2.example.com | [7cd 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [7dd 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [60f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [98e 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ae0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org2.example.com | [7ce 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:32980 disconnected +peer0.org1.example.com | [7de 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [610 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [98f 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ae0 gate 1574140915454464200 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org2.example.com | [7cf 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.485Z grpc.peer_address=172.18.0.7:32980 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.2495ms +peer0.org1.example.com | [7df 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 gate 1574140910186069600 evaluation starts +peer1.org1.example.com | [611 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [990 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [7d0 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7e0 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [612 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [991 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org2.example.com | [7d1 11-19 05:21:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7e1 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [613 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [992 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org2.example.com | [7d2 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.546Z grpc.peer_address=172.18.0.7:32984 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=114.7µs +peer0.org1.example.com | [7e2 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 principal matched by identity 0 +peer1.org1.example.com | [614 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [993 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org2.example.com | [7d3 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [7e3 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 34 fd 7e 77 cc df 4c 77 fa e0 0a 4c 85 5b 8d |i4.~w..Lw...L.[.| +peer1.org1.example.com | [615 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [994 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | [7d4 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org1.example.com | 00000010 fa 6c f4 80 7d 02 b9 1a 55 85 ef d1 0b fd 5e e2 |.l..}...U.....^.| +peer1.org1.example.com | [616 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [995 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org2.example.com | [7d5 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org1.example.com | [7e4 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 bb 49 d4 84 01 2e 7f f6 fb ce |0E.!...I........| +peer1.org1.example.com | [617 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [996 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org2.example.com | [7d6 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:32984 +peer0.org1.example.com | 00000010 e3 b6 08 d2 d4 be 80 0f 2d d7 82 70 a6 41 2b 0e |........-..p.A+.| +peer1.org1.example.com | [618 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [997 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org2.example.com | [7d7 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:32984 +peer0.org1.example.com | 00000020 d7 75 fc e9 bb 02 20 05 34 8a 8b f0 dd a2 52 20 |.u.... .4.....R | +peer1.org1.example.com | [619 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [998 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org2.example.com | [7d8 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org1.example.com | 00000030 ba d5 74 b2 60 68 7e 3a bb 7b 89 56 ee 27 e2 c9 |..t.`h~:.{.V.'..| +peer1.org1.example.com | [61a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [999 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +orderer0.example.com | "2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org2.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer0.org1.example.com | 00000040 94 16 6e 2b de c0 02 |..n+...| +peer1.org1.example.com | [61b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [99a 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +orderer0.example.com | "2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | [7d9 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 9d 13 e0 0e 2a 58 dd 08 ed 80 ed |0D. @....*X.....| +peer0.org1.example.com | [7e5 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [61c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | 00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +orderer0.example.com | "2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Group] /Channel/Orderer" +peer0.org2.example.com | 00000010 29 d1 63 79 cd f1 17 d5 a7 f4 fe 5a 60 a9 19 0a |).cy.......Z`...| +peer0.org1.example.com | [7e6 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 gate 1574140910186069600 evaluation succeeds +peer1.org1.example.com | [61d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [99b 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +orderer0.example.com | "2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org2.example.com | 00000020 7a 1b 94 50 02 20 6d e9 86 de b7 ad 93 b1 88 7b |z..P. m........{| +peer0.org1.example.com | [7e7 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [61e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | 00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +orderer0.example.com | "2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org2.example.com | 00000030 c3 22 a2 b2 16 83 bd af 4d 46 b7 21 af 09 65 e5 |."......MF.!..e.| +peer0.org1.example.com | [7e8 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [61f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | 00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +orderer0.example.com | "2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | 00000040 01 c3 9b 6d 42 d9 |...mB.| +peer0.org1.example.com | [7e9 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [620 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | 00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +orderer0.example.com | "2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | [7da 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:32984 +peer0.org1.example.com | [7ea 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [621 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | 00000040 3c b7 fd fe 94 01 8e |<......| +orderer0.example.com | "2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org2.example.com | [7db 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:32984 +peer0.org1.example.com | [7eb 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [622 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [99c 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.407 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org2.example.com | [7dc 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:12228799154479252007 tag:EMPTY mem_req:\002 \037\276\230\263\\\027Y\251\234~\303\365\005\232\264\312\267'\247\034\363\222#\377f\376b=5\006th9\0162\215U\364\265\326p\014}\255\317\002 \001\325\316\272S\336\305\330\021\226w\327u\233\335#\337\033\336\030~\341q\022\207,\266\267o\275\004\327" > > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [7ec 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [623 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [99d 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.408 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org2.example.com | [7dd 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7ed 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [624 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [99e 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | "2019-11-19 05:21:41.408 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org2.example.com | [7de 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12228799154479252007 tag:EMPTY mem_req:\002 \037\276\230\263\\\027Y\251\234~\303\365\005\232\264\312\267'\247\034\363\222#\377f\376b=5\006th9\0162\215U\364\265\326p\014}\255\317\002 \001\325\316\272S\336\305\330\021\226w\327u\233\335#\337\033\336\030~\341q\022\207,\266\267o\275\004\327" > > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [7ee 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [625 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [99f 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +orderer0.example.com | "2019-11-19 05:21:41.418 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org2.example.com | [7df 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [7ef 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:21:41.418 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org2.example.com | [7e0 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e f8 80 a5 e3 28 6d 18 1c 9d ba fe c3 41 e3 b2 |.....(m......A..| +peer0.org1.example.com | [7f0 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [626 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | 00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +orderer0.example.com | "2019-11-19 05:21:41.419 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org2.example.com | 00000010 11 84 90 75 ba 4f 5d 14 73 29 84 2b e8 9d fc ef |...u.O].s).+....| +peer0.org1.example.com | [7f1 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [627 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [9a0 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +orderer0.example.com | "2019-11-19 05:21:41.419 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | [7f2 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7e1 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 05 7b 17 02 f3 b8 53 af 34 8c fb |0D. 8.{....S.4..| +peer1.org1.example.com | [628 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | 00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +orderer0.example.com | "2019-11-19 05:21:41.420 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | [7f3 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | 00000010 a2 0a 60 9d 35 e8 73 f4 17 f8 2f 9c db e2 ca 91 |..`.5.s.../.....| +peer1.org1.example.com | [629 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | 00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +orderer0.example.com | "2019-11-19 05:21:41.420 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | [7f4 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 57 ce f5 3e 02 20 1f be 98 b3 5c 17 59 a9 9c 7e |W..>. ....\.Y..~| +peer1.org1.example.com | [62a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | 00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +orderer0.example.com | "2019-11-19 05:21:41.420 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | [7f5 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 c3 f5 05 9a b4 ca b7 27 a7 1c 3c 50 fa 40 3a d4 |.......'.. DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | 00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +orderer0.example.com | "2019-11-19 05:21:41.421 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org2.example.com | 00000040 d9 e3 0b 09 25 da |....%.| +peer0.org1.example.com | [7f6 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11007432676051748334, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [62c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [9a1 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.421 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Value] /Channel/Capabilities" +peer0.org2.example.com | [7e2 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [7f7 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer1.org1.example.com | [62d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [9a2 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [7f8 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11007432676051748334, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes +peer1.org1.example.com | [62e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [9a3 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.421 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org2.example.com | [7e3 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba f4 14 6a ea c8 3e f3 92 23 ff |0E.!....j..>..#.| +peer0.org1.example.com | [7f9 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [62f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [9a4 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.422 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Value] /Channel/Consortium" +peer0.org2.example.com | 00000010 66 fe 62 3d 35 06 74 68 39 0e 32 8d 55 f4 b5 d6 |f.b=5.th9.2.U...| +peer0.org1.example.com | [7fa 11-19 05:21:50.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.238Z grpc.peer_address=172.18.0.9:44660 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127.7µs +peer1.org1.example.com | [630 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [9a5 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.422 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Policy] /Channel/Admins" +peer0.org2.example.com | 00000020 70 0c 7d ad cf 02 20 01 d5 ce ba 53 de c5 d8 11 |p.}... ....S....| +peer0.org1.example.com | [7fb 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [631 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [9a6 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.423 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Policy] /Channel/Readers" +peer0.org2.example.com | 00000030 96 77 d7 75 9b dd 23 df 1b de 18 7e e1 71 12 87 |.w.u..#....~.q..| +peer0.org1.example.com | [7fc 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org1.example.com | [632 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [9a7 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +orderer0.example.com | "2019-11-19 05:21:41.423 UTC [common.configtx] addToMap -> DEBU 5c8 Adding to config map: [Policy] /Channel/Writers" +peer0.org2.example.com | 00000040 2c b6 b7 6f bd 04 d7 |,..o...| +peer0.org1.example.com | [7fd 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org1.example.com | [633 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [9a8 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +orderer0.example.com | "2019-11-19 05:21:41.424 UTC [common.channelconfig] LogSanityChecks -> DEBU 5c9 As expected, current configuration has policy '/Channel/Readers'" +peer0.org2.example.com | [7e4 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [7fe 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:44660 +peer1.org1.example.com | [634 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [9a9 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:38162 +orderer0.example.com | "2019-11-19 05:21:41.424 UTC [common.channelconfig] LogSanityChecks -> DEBU 5ca As expected, current configuration has policy '/Channel/Writers'" +peer0.org2.example.com | [7e5 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer0.org1.example.com | [7ff 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44660 +peer1.org1.example.com | [635 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [9aa 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:38162 +orderer0.example.com | "2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5cb Manager Channel looking up path [Application]" +peer0.org2.example.com | [7e6 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [800 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [636 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [9ab 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5cc Manager Channel has managers Application" +peer0.org2.example.com | [7e7 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [801 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [637 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [9ac 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5cd Manager Channel has managers Orderer" +peer0.org2.example.com | [7e8 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [804 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [638 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [9ad 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5ce Manager Channel/Application looking up path []" +peer0.org2.example.com | [7e9 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [802 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [639 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +orderer0.example.com | "2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5cf Manager Channel/Application has managers Org1MSP" +peer1.org2.example.com | [9ae 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7ea 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [803 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:44658 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:1329517227700458756 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5d0 Manager Channel/Application has managers Org2MSP" +peer1.org1.example.com | [63a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [9af 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7eb 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [806 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.425 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d1 As expected, current configuration has policy '/Channel/Application/Readers'" +peer1.org1.example.com | [63b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [9b0 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7ec 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [805 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.426 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d2 As expected, current configuration has policy '/Channel/Application/Writers'" +peer1.org1.example.com | [63c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9b1 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7ed 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12228799154479252007, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [807 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.426 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d3 As expected, current configuration has policy '/Channel/Application/Admins'" +peer1.org1.example.com | [63d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [9b2 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7ee 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002 \037\276\230\263\\\027Y\251\234~\303\365\005\232\264\312\267'\247\034\363\222#\377f\376b=5\006th9\0162\215U\364\265\326p\014}\255\317\002 \001\325\316\272S\336\305\330\021\226w\327u\233\335#\337\033\336\030~\341q\022\207,\266\267o\275\004\327" > > alive:\213\213\335\017D\334\021\255v}\212o\017\030\257\\\204K\t\341g\365\212\225\002 %\372I[\306\022G\301\346\001\311\366\3659\350t\330\355\2072\362\234\220\352Y\256,'\001\353e\334" secret_envelope:\317\010\367v\242p\276r\272\266\t6\217p\376\264\233\307\250\\\022" > > +peer0.org1.example.com | [809 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d4 Manager Channel looking up path [Orderer]" +peer1.org1.example.com | [63e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [9b3 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [7ef 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12228799154479252007, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes +peer0.org1.example.com | [80a 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [63f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +orderer0.example.com | "2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d5 Manager Channel has managers Application" +peer1.org2.example.com | [9b4 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [7f0 11-19 05:21:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [80b 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [640 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +orderer0.example.com | "2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d6 Manager Channel has managers Orderer" +peer1.org2.example.com | [9b5 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [7f1 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [808 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1329517227700458756 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [641 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +orderer0.example.com | "2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d7 Manager Channel/Orderer looking up path []" +peer1.org2.example.com | [9b6 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7e30 gate 1574140915466421900 evaluation starts +peer0.org2.example.com | [7f2 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [80c 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [642 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +orderer0.example.com | "2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d8 Manager Channel/Orderer has managers OrdererOrg" +peer1.org2.example.com | [9b7 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7e30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7f3 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [80e 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [643 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +orderer0.example.com | "2019-11-19 05:21:41.427 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d9 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer1.org2.example.com | [9b8 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7e30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [7f4 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [80f 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [644 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.427 UTC [common.channelconfig] LogSanityChecks -> DEBU 5da As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer1.org2.example.com | [9b9 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [7f5 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [80d 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [645 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +orderer0.example.com | "2019-11-19 05:21:41.427 UTC [common.channelconfig] LogSanityChecks -> DEBU 5db As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer1.org2.example.com | [9ba 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7e30 principal evaluation fails +peer0.org2.example.com | [7f6 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [810 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [646 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +orderer0.example.com | "2019-11-19 05:21:41.427 UTC [common.channelconfig] LogSanityChecks -> DEBU 5dc As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer1.org2.example.com | [9bb 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7e30 gate 1574140915466421900 evaluation fails +peer0.org2.example.com | [7f7 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [811 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 gate 1574140910250991200 evaluation starts +peer1.org1.example.com | [647 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.427 UTC [common.capabilities] Supported -> DEBU 5dd Orderer capability V1_4_2 is supported and is enabled" +peer1.org2.example.com | [9bc 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7f8 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [812 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [648 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +orderer0.example.com | "2019-11-19 05:21:41.428 UTC [common.capabilities] Supported -> DEBU 5de Channel capability V1_4_3 is supported and is enabled" +peer1.org2.example.com | [9bd 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7f9 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [649 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [813 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.428 UTC [fsblkstorage] newBlockfileMgr -> DEBU 5df newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +peer1.org2.example.com | [9be 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [7fa 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [64a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [814 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:41.428 UTC [kvledger.util] CreateDirIfMissing -> DEBU 5e0 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +peer1.org2.example.com | [9bf 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c64e0 gate 1574140915469613600 evaluation starts +peer1.org1.example.com | [64b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [7fb 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [815 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.428 UTC [kvledger.util] logDirStatus -> DEBU 5e1 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +peer1.org2.example.com | [9c0 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c64e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [64c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [7fc 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [816 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:41.430 UTC [kvledger.util] logDirStatus -> DEBU 5e2 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +peer1.org2.example.com | [9c1 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c64e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [64d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [7fd 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [817 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:41.435 UTC [fsblkstorage] newBlockfileMgr -> INFO 5e3 Getting block information from block storage" +peer1.org2.example.com | [9c2 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c64e0 principal matched by identity 0 +peer1.org1.example.com | [64e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [7fe 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [819 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:41.435 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5e4 Retrieving checkpoint info from block files" +peer1.org2.example.com | [9c3 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer1.org1.example.com | [64f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [7ff 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [81a 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:41.436 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 5e5 retrieveLastFileSuffix()" +peer1.org2.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer1.org1.example.com | [650 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [800 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [81b 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:41.436 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 5e6 retrieveLastFileSuffix() - biggestFileNum = -1" +peer1.org2.example.com | [9c4 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 97 71 98 88 c0 07 04 6c 42 0b c7 |0D. e.q.....lB..| +peer1.org1.example.com | [651 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [801 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9ec40 gate 1574140910796983400 evaluation starts +peer0.org1.example.com | [81c 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 gate 1574140910252016900 evaluation starts +orderer0.example.com | "2019-11-19 05:21:41.436 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5e7 Last file number found = -1" +peer1.org2.example.com | 00000010 59 3d 3d 2e fa da e6 94 cc e6 4e 56 00 2e 33 9a |Y==.......NV..3.| +peer1.org1.example.com | [652 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [802 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9ec40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [818 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 5e8 No block file found" +peer1.org2.example.com | 00000020 fc 9c d0 60 02 20 59 02 7f 77 36 35 5e 97 dd 4b |...`. Y..w65^..K| +peer1.org1.example.com | [653 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [803 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9ec40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +orderer0.example.com | "2019-11-19 05:21:41.437 UTC [fsblkstorage] newBlockfileMgr -> DEBU 5e9 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000168d60)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +peer1.org2.example.com | 00000030 96 5f fd 79 39 1b b9 df 5c ba 52 cb e5 d6 15 16 |._.y9...\.R.....| +peer1.org1.example.com | [654 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [804 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9ec40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [81d 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.439 UTC [fsblkstorage] newBlockIndex -> DEBU 5ea newBlockIndex() - indexItems:[[BlockNum]]" +peer1.org2.example.com | 00000040 a7 82 59 00 68 ae |..Y.h.| +peer1.org1.example.com | [655 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [805 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9ec40 principal evaluation fails +peer0.org1.example.com | [81e 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.439 UTC [orderer.common.server] func1 -> DEBU 5eb Executing callback to update root CAs" +peer1.org2.example.com | [9c5 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c64e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [656 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [806 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9ec40 gate 1574140910796983400 evaluation fails +peer0.org1.example.com | [81f 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4c 1d 86 b1 40 40 ab 44 d9 e6 3f |0D. .L...@@.D..?| +orderer0.example.com | "2019-11-19 05:21:41.439 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ec updating root CAs for channel [businesschannel]" +peer1.org1.example.com | [657 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [9c6 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c64e0 gate 1574140915469613600 evaluation succeeds +peer0.org2.example.com | [807 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 3d 71 be 97 bc ea 29 f7 e4 57 4a 90 a2 b0 33 1c |=q....)..WJ...3.| +orderer0.example.com | "2019-11-19 05:21:41.439 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ed adding app root CAs for MSP [Org1MSP]" +peer1.org1.example.com | [658 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [9c7 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [808 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 59 46 f9 77 02 20 4d 72 67 c1 51 d5 f8 d2 79 9e |YF.w. Mrg.Q...y.| +orderer0.example.com | "2019-11-19 05:21:41.440 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ee adding app root CAs for MSP [Org2MSP]" +peer1.org1.example.com | [659 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [9c8 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [809 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 7a 5a 3b f9 3b c9 bf f5 35 ee 51 23 e5 bc 3f 2e |zZ;.;...5.Q#..?.| +orderer0.example.com | "2019-11-19 05:21:41.440 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ef adding orderer root CAs for MSP [OrdererMSP]" +peer1.org1.example.com | [65a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [9c9 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [80a 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9f1f0 gate 1574140910797546300 evaluation starts +peer0.org1.example.com | 00000040 14 d2 9e 70 02 6d |...p.m| +orderer0.example.com | "2019-11-19 05:21:41.443 UTC [fsblkstorage] indexBlock -> DEBU 5f0 Indexing block [blockNum=0, blockHash=[]byte{0xeb, 0xcd, 0x1f, 0x7, 0xa0, 0x44, 0x7e, 0xdb, 0xb0, 0xc3, 0xd8, 0x38, 0xb2, 0x31, 0xa, 0x6d, 0xa6, 0x14, 0x14, 0x86, 0xef, 0x53, 0x16, 0x8b, 0x27, 0xf5, 0x83, 0xcc, 0x3e, 0xcb, 0xfd, 0x8c} txOffsets= +peer1.org1.example.com | [65b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [9ca 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [80b 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9f1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [820 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 principal matched by identity 0 +orderer0.example.com | txId=92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426 locPointer=offset=39, bytesLength=25761 +peer1.org1.example.com | [65c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [9cb 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:38162 +peer0.org2.example.com | [80c 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9f1f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [821 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 e6 12 f6 45 3c ce 5e 23 8d 1c 58 73 1b db c3 |9...E<.^#..Xs...| +orderer0.example.com | ]" +peer1.org1.example.com | [65d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [9cc 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:38162 +peer0.org2.example.com | [80d 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9f1f0 principal matched by identity 0 +peer0.org1.example.com | 00000010 bd 34 a1 3e 51 8c 10 b4 77 d3 6f 72 3c d7 dd 30 |.4.>Q...w.or<..0| +orderer0.example.com | "2019-11-19 05:21:41.445 UTC [fsblkstorage] updateCheckpoint -> DEBU 5f1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25806], isChainEmpty=[false], lastBlockNumber=[0]" +peer1.org1.example.com | [65e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [9cd 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [80e 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 17 05 84 38 0c 79 48 ed 68 77 4f e4 a8 dc 2e |....8.yH.hwO....| +peer0.org1.example.com | [822 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 96 c4 15 75 5e 34 01 6b f1 00 d0 |0D. &...u^4.k...| +orderer0.example.com | "2019-11-19 05:21:41.445 UTC [fsblkstorage] Next -> DEBU 5f2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer1.org1.example.com | [65f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [9ce 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 08 19 d6 73 63 62 de 37 a8 ca 4a 4a 88 c1 68 37 |...scb.7..JJ..h7| +peer0.org1.example.com | 00000010 52 34 d2 39 a3 8c 63 3b 5f 98 d3 84 6a 63 26 18 |R4.9..c;_...jc&.| +orderer0.example.com | "2019-11-19 05:21:41.446 UTC [fsblkstorage] newBlockfileStream -> DEBU 5f3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +peer1.org1.example.com | [660 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [9cf 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [80f 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 32 ed 6c 52 d9 72 ea 04 95 98 |0E.!..2.lR.r....| +peer0.org1.example.com | 00000020 84 8a c4 b2 02 20 10 02 c4 91 62 a2 e4 0e 62 cb |..... ....b...b.| +orderer0.example.com | "2019-11-19 05:21:41.446 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f4 Remaining bytes=[25806], Going to peek [8] bytes" +peer1.org1.example.com | [661 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [9d0 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 08 16 77 fb fb 6d 78 00 54 32 2f bf f4 15 c9 |...w..mx.T2/....| +peer0.org2.example.com | 00000010 bd 70 08 2d cd 2b ea 6a 75 53 2d 2d fc 68 56 6e |.p.-.+.juS--.hVn| +peer0.org1.example.com | 00000030 53 db f0 6e f5 99 df 30 2a 17 c6 8d 8a 4a de 49 |S..n...0*....J.I| +orderer0.example.com | "2019-11-19 05:21:41.446 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f5 Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer1.org1.example.com | [662 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | 00000010 ae b3 12 79 db 6f c0 44 d7 7e 72 c1 d3 2e 74 d9 |...y.o.D.~r...t.| +peer0.org2.example.com | 00000020 33 f8 b9 79 94 02 20 25 23 44 ad 84 83 51 ae 20 |3..y.. %#D...Q. | +peer0.org1.example.com | 00000040 7b a1 88 e2 a6 54 |{....T| +orderer0.example.com | "2019-11-19 05:21:41.446 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f6 blockbytes [25803] read from file [0]" +peer1.org1.example.com | [663 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [9d1 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d c7 65 f0 b9 59 a4 06 7d f3 3b 49 |0D. m.e..Y..}.;I| +peer0.org2.example.com | 00000030 6c c6 98 10 44 b0 f7 d1 37 85 02 6c be 79 43 12 |l...D...7..l.yC.| +peer0.org1.example.com | [823 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.447 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 5f7 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +peer1.org1.example.com | [664 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | 00000010 5f 28 4d 19 5e 25 7a 95 a3 6a 1c 4a 43 bf c1 ab |_(M.^%z..j.JC...| +peer0.org2.example.com | 00000040 9b 03 26 35 30 6e cf |..&50n.| +peer0.org1.example.com | [824 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 gate 1574140910250991200 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.447 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 5f8 EvictionSuspicion not set, defaulting to 10m0s" +peer1.org1.example.com | [665 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | 00000020 94 5a 1f 08 02 20 1e f6 dc ce d6 94 f8 b1 b0 36 |.Z... .........6| +peer0.org2.example.com | [810 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9f1f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [811 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9f1f0 gate 1574140910797546300 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.447 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 5f9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +peer1.org1.example.com | [666 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | 00000030 c1 56 e7 a9 e5 ec 2c e1 d9 71 6a 45 e9 dc 92 17 |.V....,..qjE....| +peer0.org2.example.com | [812 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [825 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.447 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 5fa No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +peer1.org1.example.com | [667 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | 00000040 59 dd b8 17 1e 9c |Y.....| +peer0.org2.example.com | [813 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [826 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:41.452 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 5fb Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +peer1.org1.example.com | [668 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [9d2 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [814 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [827 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:41.453 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 5fc Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +peer1.org1.example.com | [669 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [9d3 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [815 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [828 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 gate 1574140910252016900 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:41.453 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 5fd Appending 0 entries to memory storage" channel=businesschannel node=1 +peer1.org1.example.com | [66a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [9d4 11-19 05:21:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [816 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.453 UTC [fsblkstorage] Next -> DEBU 5fe Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org1.example.com | [829 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [66b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [9d5 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [817 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:21:41.453 UTC [fsblkstorage] newBlockfileStream -> DEBU 5ff newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +peer0.org1.example.com | [82a 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [66c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [9d6 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [818 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:21:41.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 600 Remaining bytes=[25806], Going to peek [8] bytes" +peer0.org1.example.com | [82b 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [66d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [9d7 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [819 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:21:41.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 601 Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | [82c 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [66e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [9d8 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [81a 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [82d 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44660 +orderer0.example.com | "2019-11-19 05:21:41.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 602 blockbytes [25803] read from file [0]" +peer1.org1.example.com | [66f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9d9 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:35398 +peer0.org2.example.com | [81b 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [82e 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.454 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 603 [channel: businesschannel] Done creating channel support resources" +peer1.org1.example.com | [670 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9da 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0027adae0 +peer0.org2.example.com | [81c 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [82f 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:41.454 UTC [orderer.commmon.multichannel] newChain -> INFO 604 Created and starting new chain businesschannel" +peer1.org1.example.com | [671 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [9db 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [830 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44660 +peer0.org2.example.com | [81d 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.454 UTC [orderer.consensus.etcdraft] Start -> INFO 605 Starting Raft node" channel=businesschannel node=1 +peer1.org1.example.com | [672 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [9dc 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [831 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [81e 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.455 UTC [orderer.common.cluster] Configure -> INFO 606 Entering, channel: businesschannel, nodes: [ID: 2, +peer1.org1.example.com | [673 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [9dd 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org1.example.com | [832 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [81f 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | Endpoint: orderer1.example.com:7050, +peer1.org1.example.com | [674 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9de 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [833 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org2.example.com | [820 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | [675 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [9df 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 f0 29 24 85 ab 90 42 5e a2 2d 30 fd be cc e5 |..)$...B^.-0....| +peer0.org1.example.com | [834 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44658 disconnected +peer0.org2.example.com | [821 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | 00000010 b7 c9 a1 e8 8e 7a 2f 42 32 c2 76 6b ec be a2 1e |.....z/B2.vk....| +peer0.org1.example.com | [835 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [822 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [9e0 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee a4 39 fa d2 67 3a 60 55 46 be |0E.!...9..g:`UF.| +peer0.org1.example.com | [836 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [823 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | 00000010 fb b5 53 00 97 27 1e db 89 fd 20 9e db 6c a0 29 |..S..'.... ..l.)| +peer0.org2.example.com | [824 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | 00000020 19 a7 89 8b d2 02 20 2d 4a f4 4d 4a c2 df b4 81 |...... -J.MJ....| +peer0.org1.example.com | [837 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:44658 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=83.5611ms +peer0.org2.example.com | [825 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | 00000030 22 85 e4 ff c1 10 8b 14 30 27 cb 65 e5 00 51 56 |".......0'.e..QV| +peer0.org1.example.com | [838 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [826 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer1.org2.example.com | 00000040 4b 3d 27 c7 85 29 4e |K='..)N| +peer0.org1.example.com | [839 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [827 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer1.org2.example.com | [9e1 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [83a 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [828 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +peer1.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer1.org2.example.com | [9e2 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000168230, header 0xc0027adef0 +peer0.org1.example.com | [83b 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [829 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | [9e3 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [83c 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org2.example.com | [82a 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +peer1.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org2.example.com | [9e4 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU [][c053449b] processing txid: c053449b96108fed8fe842237d69b566c69f537b69b6285740b231eb1fc3b202 +peer0.org1.example.com | [83d 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [82b 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +peer1.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer1.org2.example.com | [9e5 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU [][c053449b] Entry chaincode: name:"lscc" +peer0.org1.example.com | [83e 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44660 disconnected +peer0.org2.example.com | [82c 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +peer1.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer1.org2.example.com | [9e6 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> INFO [][c053449b] Entry chaincode: name:"lscc" +peer0.org1.example.com | [83f 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | [82d 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151011 +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [9e7 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [840 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.241Z grpc.peer_address=172.18.0.9:44660 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=10.9007ms +peer0.org2.example.com | [82e 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6C4D5F51E3327F75F0D9FBD47A6BA5C961232041208BF283D0A618A035CA7656 +orderer0.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [676 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035018c0 gate 1574140909590568100 evaluation starts +peer1.org2.example.com | [9e8 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 f0 29 24 85 ab 90 42 5e a2 2d 30 fd be cc e5 |..)$...B^.-0....| +peer0.org1.example.com | [841 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [82f 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | [677 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035018c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 b7 c9 a1 e8 8e 7a 2f 42 32 c2 76 6b ec be a2 1e |.....z/B2.vk....| +peer0.org1.example.com | [842 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [830 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +peer1.org1.example.com | [678 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035018c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [9e9 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee a4 39 fa d2 67 3a 60 55 46 be |0E.!...9..g:`UF.| +peer0.org1.example.com | [843 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing +peer0.org2.example.com | [831 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [679 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | 00000010 fb b5 53 00 97 27 1e db 89 fd 20 9e db 6c a0 29 |..S..'.... ..l.)| +peer0.org1.example.com | [844 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [832 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org1.example.com | [67a 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | 00000020 19 a7 89 8b d2 02 20 2d 4a f4 4d 4a c2 df b4 81 |...... -J.MJ....| +peer0.org1.example.com | [845 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1329517227700458756, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [833 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +peer1.org1.example.com | [67b 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | 00000030 22 85 e4 ff c1 10 8b 14 30 27 cb 65 e5 00 51 56 |".......0'.e..QV| +peer0.org1.example.com | [846 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1329517227700458756, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes +peer0.org2.example.com | [834 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org1.example.com | [67c 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035018c0 principal matched by identity 0 +peer1.org2.example.com | 00000040 4b 3d 27 c7 85 29 4e |K='..)N| +peer0.org1.example.com | [847 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [835 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org1.example.com | [67d 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 c5 b2 2c 3e af b8 f7 8f 8c 2a 44 ef 9e 8a 87 |&..,>.....*D....| +peer1.org2.example.com | [9ea 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org1.example.com | [848 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [836 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +peer1.org1.example.com | 00000010 c4 01 30 aa 3d 34 f0 bf 16 81 4f a0 44 19 df e5 |..0.=4....O.D...| +peer1.org2.example.com | [9eb 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer0.org1.example.com | [849 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [837 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +peer1.org1.example.com | [67e 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 92 fb 35 13 3f 29 99 4d 95 47 ff |0D. "..5.?).M.G.| +peer1.org2.example.com | [9ec 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer0.org1.example.com | [84a 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org2.example.com | [838 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org1.example.com | 00000010 1b 92 6b 1a c2 34 2e 78 03 f0 8a 7c 07 fb 53 30 |..k..4.x...|..S0| +peer0.org1.example.com | [84b 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [9ed 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0d7ef405-7841-44ae-a485-5f206c335063] +peer0.org2.example.com | [839 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +peer1.org1.example.com | 00000020 1c 7e 48 f2 02 20 10 7c 9f 70 52 85 f2 3c eb fb |.~H.. .|.pR..<..| +peer0.org1.example.com | [84c 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00397db10, CONNECTING +peer1.org2.example.com | [9ee 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [83a 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +peer1.org1.example.com | 00000030 ef f4 a5 28 0d d1 46 54 f6 62 3d bf 6a d9 2d d4 |...(..FT.b=.j.-.| +peer0.org1.example.com | [84d 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer1.org2.example.com | [9ef 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0d7ef405-7841-44ae-a485-5f206c335063] +peer0.org2.example.com | [83b 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +peer1.org1.example.com | 00000040 18 8b 11 50 9a 69 |...P.i| +peer0.org1.example.com | [84e 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00397db10, READY +peer1.org2.example.com | [9f0 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer0.org2.example.com | [83c 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +peer1.org1.example.com | [67f 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035018c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [84f 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [9f1 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer0.org2.example.com | [83d 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [680 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035018c0 gate 1574140909590568100 evaluation succeeds +peer1.org2.example.com | [9f2 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU [c053449b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [850 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org2.example.com | [83e 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | ID: 3, +peer1.org1.example.com | [681 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [9f3 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU [c053449b] notifying Txid:c053449b96108fed8fe842237d69b566c69f537b69b6285740b231eb1fc3b202, channelID: +peer0.org1.example.com | [851 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org2.example.com | [83f 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | Endpoint: orderer2.example.com:7050, +peer1.org1.example.com | [682 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [9f4 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [852 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051 +peer0.org2.example.com | [840 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | [683 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [9f5 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> INFO [][c053449b] Exit chaincode: name:"lscc" (2ms) +peer0.org1.example.com | [853 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer0.org2.example.com | [841 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer1.org1.example.com | [684 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [9f6 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU [][c053449b] Exit +peer0.org1.example.com | [854 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [842 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [685 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [9f7 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:35398 +peer0.org1.example.com | [855 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [843 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer1.org1.example.com | [686 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [9f8 11-19 05:21:55.75 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:35398 grpc.code=OK grpc.call_duration=5.1263ms +peer0.org1.example.com | [856 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [844 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +peer1.org1.example.com | [687 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [9f9 11-19 05:21:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [857 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [845 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org1.example.com | [688 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9fa 11-19 05:21:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [858 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [846 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org1.example.com | [689 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [9fb 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [847 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [859 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +peer1.org1.example.com | [68a 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [9fc 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [848 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [85a 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer1.org1.example.com | [68b 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [9fd 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [849 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [85b 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org1.example.com | [68c 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [9fe 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [84a 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [85c 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +peer1.org1.example.com | [68d 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [9ff 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [84b 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003047b40 gate 1574140910839944100 evaluation starts +peer0.org1.example.com | [85d 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer1.org1.example.com | [68e 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00353f370, CONNECTING +peer1.org2.example.com | [a00 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [84c 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003047b40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [85e 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +peer1.org1.example.com | [68f 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [a01 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [84d 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003047b40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [85f 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 gate 1574140910304034400 evaluation starts +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +peer1.org1.example.com | [690 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a02 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [84e 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003047b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [860 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [692 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [a03 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [84f 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003047b40 principal evaluation fails +peer0.org1.example.com | [861 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | [693 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org2.example.com | [a04 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [850 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003047b40 gate 1574140910839944100 evaluation fails +peer0.org1.example.com | [862 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 principal matched by identity 0 +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer1.org1.example.com | [694 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [a05 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [851 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [863 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [691 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [a06 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [852 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [864 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [a07 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [853 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +peer1.org1.example.com | [696 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [a08 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [854 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030540c0 gate 1574140910842575700 evaluation starts +peer0.org1.example.com | [865 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 82 9d b8 11 ad 53 43 84 57 3f |0E.!.......SC.W?| +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org1.example.com | [697 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [a09 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [855 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030540c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 69 b5 51 27 5b 58 d8 56 1d 31 fb 6b b6 8a 9c 2a |i.Q'[X.V.1.k...*| +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org1.example.com | [698 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035795a0, CONNECTING +peer1.org2.example.com | [a0a 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [856 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030540c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000020 80 42 92 b5 0e 02 20 0b 7f be 18 0d 3f b2 13 b0 |.B.... .....?...| +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +peer1.org1.example.com | [699 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00353f370, READY +peer1.org2.example.com | [a0b 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [857 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030540c0 principal matched by identity 0 +peer0.org1.example.com | 00000030 ff e7 73 c4 f5 cb 4b c0 4e a0 e3 91 f0 e1 70 f2 |..s...K.N.....p.| +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer1.org1.example.com | [69a 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [a0c 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [858 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +peer0.org1.example.com | 00000040 3a de b4 f2 ac ea de |:......| +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org1.example.com | [69b 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org2.example.com | [a0d 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +peer0.org1.example.com | [866 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 principal evaluation succeeds for identity 0 +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +peer1.org1.example.com | [69c 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org2.example.com | [a0e 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [859 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +peer0.org1.example.com | [867 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 gate 1574140910304034400 evaluation succeeds +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer1.org2.example.com | [a0f 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [69d 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.9:7051 +peer0.org2.example.com | 00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +peer0.org1.example.com | [868 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +peer1.org2.example.com | [a10 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34620 gate 1574140915803675200 evaluation starts +peer1.org1.example.com | [69e 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | 00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +peer0.org1.example.com | [869 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +peer1.org2.example.com | [a11 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34620 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [69f 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | 00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +peer0.org1.example.com | [86a 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [a12 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34620 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [6a0 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | 00000040 c0 54 b2 99 1b 95 3e |.T....>| +peer0.org1.example.com | [86b 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | ]" +peer1.org2.example.com | [a13 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [6a1 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [85a 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030540c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [86c 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +orderer0.example.com | "2019-11-19 05:21:41.457 UTC [orderer.common.cluster] updateStubInMapping -> INFO 607 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +peer1.org2.example.com | [a14 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34620 principal evaluation fails +peer1.org1.example.com | [6a2 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [85b 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030540c0 gate 1574140910842575700 evaluation succeeds +peer0.org1.example.com | [86d 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.457 UTC [orderer.common.cluster] updateStubInMapping -> INFO 608 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +peer1.org2.example.com | [a15 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34620 gate 1574140915803675200 evaluation fails +peer1.org1.example.com | [6a3 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00325d0c0 env 0xc00337a5f0 txn 0 +peer0.org2.example.com | [85c 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [86e 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +orderer0.example.com | "2019-11-19 05:21:41.457 UTC [orderer.common.cluster] func1 -> DEBU 609 Connecting to ID: 2, +peer1.org2.example.com | [a16 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6a4 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [85d 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [86f 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | Endpoint: orderer1.example.com:7050, +peer1.org2.example.com | [a17 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6a5 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 44ms +peer0.org2.example.com | [85e 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [870 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.355Z grpc.peer_address=172.18.0.7:39090 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=391.9µs +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [a18 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [6a6 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [85f 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [871 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +peer1.org2.example.com | [a19 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34bb0 gate 1574140915827800800 evaluation starts +peer1.org1.example.com | [6a7 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [860 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [872 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [a1a 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [6a8 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [861 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [873 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org2.example.com | [a1b 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34bb0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [6a9 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org2.example.com | [862 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [874 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:39090 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +peer1.org2.example.com | [a1c 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34bb0 principal matched by identity 0 +peer1.org1.example.com | [6aa 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [863 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [875 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:39090 +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org2.example.com | [a1d 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 f6 4a 00 cc 7b 1f 2c 43 72 2a df c4 3c 90 65 |U.J..{.,Cr*..<.e| +peer1.org1.example.com | [6ab 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [864 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [876 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org2.example.com | 00000010 e0 e1 fe ae d3 d8 92 56 78 20 b9 26 64 be a5 71 |.......Vx .&d..q| +peer1.org1.example.com | [6ac 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [865 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [877 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +peer1.org2.example.com | [a1e 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ad 45 3d 3a e8 d9 2d fb ab 71 |0E.!...E=:..-..q| +peer1.org1.example.com | [6ad 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org2.example.com | [866 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [878 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +peer1.org2.example.com | 00000010 72 7a 60 32 e3 24 aa e2 81 51 47 b6 c8 9f 5a 6d |rz`2.$...QG...Zm| +peer1.org1.example.com | [6ae 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [867 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org2.example.com | 00000020 d7 03 68 c4 4f 02 20 49 db c7 d7 8f cf 48 d1 16 |..h.O. I.....H..| +peer1.org1.example.com | [6af 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [868 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +peer1.org2.example.com | 00000030 ea 63 c9 6e db 26 e5 12 5e 11 c6 5f 94 3a 03 c6 |.c.n.&..^.._.:..| +peer1.org1.example.com | [6b0 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [869 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +peer1.org2.example.com | 00000040 db b2 14 8a 0f ae 3c |......<| +peer1.org1.example.com | [6b1 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [86a 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +peer1.org2.example.com | [a1f 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34bb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [6b2 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [86b 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +peer1.org2.example.com | [a20 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e34bb0 gate 1574140915827800800 evaluation succeeds +peer1.org1.example.com | [6b3 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [86c 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [a21 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [6b4 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [86d 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [a22 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [86e 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org1.example.com | [6b5 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +peer1.org2.example.com | [a23 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [86f 11-19 05:21:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" > alive:\002 \037\276\230\263\\\027Y\251\234~\303\365\005\232\264\312\267'\247\034 alive:\216\350\311\331\031\200\371%\267\242i\024\326\321\224\201\252\177t\246\320\002Zv{\346\002 {\357b~S\203y\342\201\360\006\3276.\342\005$\374\204e)#\336u\237\r%\207\205\013\364\240" > +peer0.org1.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [6b6 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [a24 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [870 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org1.example.com | [6b7 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org2.example.com | [a25 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [871 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org1.example.com | [6b8 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +peer1.org2.example.com | [a26 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [872 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [879 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [87a 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [6b9 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0034ed300)} +peer0.org2.example.com | [873 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [87b 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer0.org1.example.com | [87c 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [6ba 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [874 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer0.org1.example.com | [87d 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a27 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [6bb 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [875 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +peer0.org1.example.com | [87e 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a28 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [6bc 11-19 05:21:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [876 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +peer0.org1.example.com | [87f 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +peer1.org1.example.com | [6bd 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org1.example.com | [880 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +peer1.org2.example.com | [a29 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [6bf 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org2.example.com | [877 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [881 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +peer1.org2.example.com | [a2a 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [6c0 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org2.example.com | [878 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [882 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +peer1.org2.example.com | [a2b 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [6be 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer0.org1.example.com | [883 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [879 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [a2c 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [6c1 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [884 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [87a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | for channel businesschannel" +peer1.org2.example.com | [a2d 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [6c2 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [885 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [87b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a2e 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.458 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60a Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-11-19 05:21:41.458 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60b Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +peer1.org2.example.com | [a2f 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.459 UTC [orderer.common.cluster] func1 -> DEBU 60c Connecting to ID: 3, +peer0.org1.example.com | [886 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [6c3 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [a30 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [87c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | Endpoint: orderer2.example.com:7050, +peer0.org1.example.com | [887 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 gate 1574140910374249400 evaluation starts +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [a31 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [87d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer0.org1.example.com | [888 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [a32 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [87e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer0.org1.example.com | [889 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [a33 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [87f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030297f0 gate 1574140911361809400 evaluation starts +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [88a 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [a34 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [880 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030297f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer0.org1.example.com | [88b 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [a35 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [881 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030297f0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +peer0.org1.example.com | [88c 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer1.org2.example.com | [a36 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [882 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030297f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer0.org1.example.com | [88d 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 principal matched by identity 0 +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer1.org2.example.com | [a37 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [883 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030297f0 principal evaluation fails +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer0.org1.example.com | [88e 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer1.org1.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org2.example.com | [884 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030297f0 gate 1574140911361809400 evaluation fails +peer1.org2.example.com | [a38 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer1.org1.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | [885 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a39 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer0.org2.example.com | [886 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [887 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [a3a 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +peer0.org1.example.com | [88f 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 35 af 18 99 ae ab cd ff 72 e0 |0E.!..5.......r.| +peer0.org2.example.com | [888 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029d60 gate 1574140911362339000 evaluation starts +peer1.org2.example.com | [a3b 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer0.org1.example.com | 00000010 3e 9d 94 95 2a 07 b3 0a 7d 5d d7 6f a5 37 8a 45 |>...*...}].o.7.E| +peer0.org2.example.com | [889 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029d60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a3c 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +peer0.org1.example.com | 00000020 49 21 dd dc 23 02 20 71 8e ce 63 0d 12 87 de dc |I!..#. q..c.....| +peer0.org2.example.com | [88a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029d60 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [a3d 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +peer0.org1.example.com | 00000030 3d b0 ba b9 24 30 d7 72 f6 e2 32 ee 83 08 fc 58 |=...$0.r..2....X| +peer0.org2.example.com | [88b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029d60 principal matched by identity 0 +peer1.org2.example.com | [a3e 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | 00000040 49 0c 83 5c 75 2a 20 |I..\u* | +peer0.org2.example.com | [88c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [a3f 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [6c4 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer0.org1.example.com | [890 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [a40 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [6c5 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer0.org1.example.com | [891 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 gate 1574140910374249400 evaluation succeeds +peer0.org2.example.com | [88d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [a41 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [6c6 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [892 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [a42 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [6c7 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer0.org1.example.com | [893 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [a43 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [6c8 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +peer0.org1.example.com | [894 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a44 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [6c9 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [895 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [a45 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [6ca 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [896 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:39090 +peer1.org2.example.com | [a46 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [6cb 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +peer0.org2.example.com | [88e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029d60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [897 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:39090 +peer1.org2.example.com | [a47 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer0.org2.example.com | [88f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029d60 gate 1574140911362339000 evaluation succeeds +peer1.org1.example.com | [6cc 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [898 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [a48 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer0.org2.example.com | [890 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [6cd 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [899 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:39090 disconnected +peer1.org2.example.com | [a49 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +peer0.org2.example.com | [891 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [6ce 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [89a 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.359Z grpc.peer_address=172.18.0.7:39090 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.5774ms +peer1.org2.example.com | [a4a 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer0.org2.example.com | [892 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [6cf 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [89b 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.404Z grpc.peer_address=172.18.0.7:39092 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=121.3µs +peer1.org2.example.com | [a4b 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +peer0.org2.example.com | [893 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [6d0 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [89c 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [a4c 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +peer0.org2.example.com | [894 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [6d1 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [89d 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [a4d 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [895 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [6d2 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b0940 gate 1574140909626245700 evaluation starts +peer0.org1.example.com | [89e 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +orderer0.example.com | for channel businesschannel" +peer1.org2.example.com | [a4e 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [896 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [6d3 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b0940 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:41.459 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 60d 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +peer0.org1.example.com | [89f 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:39092 +peer1.org2.example.com | [a4f 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [897 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [6d4 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b0940 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:41.459 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 60e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +peer0.org1.example.com | [8a0 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:39092 +peer1.org2.example.com | [a50 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3f 7c f1 9a ee 25 79 35 df 74 e5 d3 53 0a 15 |.?|...%y5.t..S..| +peer0.org2.example.com | [898 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [6d5 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +orderer0.example.com | "2019-11-19 05:21:41.465 UTC [orderer.common.cluster] Configure -> INFO 60f Exiting" +peer0.org1.example.com | [8a1 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 07 6d 27 19 e6 08 67 9a 5b 31 ab df dc c4 ef 6b |.m'...g.[1.....k| +peer0.org2.example.com | [899 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [6d6 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +orderer0.example.com | "2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] start -> DEBU 610 Starting raft node: #peers: 3" channel=businesschannel node=1 +peer0.org1.example.com | [8a2 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a51 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 d1 da 29 17 ed a1 99 9d b1 88 d0 |0D. P..)........| +peer0.org2.example.com | [89a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [6d7 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x39, 0x34, 0x96, 0xee, 0x50, 0x5e, 0xad, 0x78, 0xfc, 0x3, 0xa3, 0xac, 0x21, 0xe9, 0xfb, 0x52, 0x19, 0x4e, 0xd1, 0x91, 0xc2, 0x3c, 0xb8, 0xb, 0x70, 0x9b, 0xb2, 0x3d, 0xdd, 0xb4, 0xc8, 0xd8} txOffsets= +orderer0.example.com | "2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] start -> INFO 611 Starting raft node as part of a new channel" channel=businesschannel node=1 +peer0.org1.example.com | [8a3 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 6a 4c 2e ef 3e 47 b6 d9 a5 68 66 ba 56 74 3d 35 |jL..>G...hf.Vt=5| +peer0.org2.example.com | [89b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c9e0 gate 1574140911363881200 evaluation starts +peer1.org1.example.com | txId=02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732 locPointer=offset=71, bytesLength=24474 +orderer0.example.com | "2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 612 1 became follower at term 0" channel=businesschannel node=1 +peer0.org1.example.com | [8a4 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 76 d7 6d 4f 02 20 31 85 7d 8b 65 eb a7 46 7b 12 |v.mO. 1.}.e..F{.| +peer0.org2.example.com | [89c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | ] +orderer0.example.com | "2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] newRaft -> INFO 613 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +peer0.org1.example.com | [8a5 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 18 8d 7a 85 67 1a 7a d3 39 ae 55 91 77 2b 62 7e |..z.g.z.9.U.w+b~| +peer0.org2.example.com | [89d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c9e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [6d8 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to txid-index +orderer0.example.com | "2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 614 1 became follower at term 1" channel=businesschannel node=1 +peer1.org2.example.com | 00000040 24 04 f3 d7 c4 7b |$....{| +peer0.org1.example.com | [8a6 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [89e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [6d9 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx number:[0] ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to blockNumTranNum index +orderer0.example.com | "2019-11-19 05:21:41.466 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 615 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +peer1.org2.example.com | [a52 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [8a7 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [89f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c9e0 principal evaluation fails +peer1.org1.example.com | [6da 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76838], isChainEmpty=[false], lastBlockNumber=[2] +orderer0.example.com | "2019-11-19 05:21:41.466 UTC [msp] GetDefaultSigningIdentity -> DEBU 616 Obtaining default signing identity" +peer1.org2.example.com | [a53 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [8a8 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8a0 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c9e0 gate 1574140911363881200 evaluation fails +peer1.org1.example.com | [6db 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +orderer0.example.com | "2019-11-19 05:21:41.466 UTC [msp] GetDefaultSigningIdentity -> DEBU 617 Obtaining default signing identity" +peer1.org2.example.com | [a54 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [8a9 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8a1 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6dc 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +orderer0.example.com | "2019-11-19 05:21:41.466 UTC [msp.identity] Sign -> DEBU 618 Sign: plaintext: 0A00120B0A090A03010203100418050A...6A5F52C44195187F2F6CC97D288A1283 " +peer1.org2.example.com | [a55 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [8aa 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8a2 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6dd 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +orderer0.example.com | "2019-11-19 05:21:41.466 UTC [msp.identity] Sign -> DEBU 619 Sign: digest: 79351464429015126BDA4D07B75CE29969D95A3FF95ECF87CE085F8CBF67E161 " +peer1.org2.example.com | [a56 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [8ab 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [8a3 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [6de 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +orderer0.example.com | "2019-11-19 05:21:41.468 UTC [orderer.consensus.etcdraft] run -> INFO 61a This node is picked to start campaign" channel=businesschannel node=1 +peer1.org2.example.com | [a57 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8ac 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 gate 1574140910418265000 evaluation starts +peer0.org2.example.com | [8a4 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308cf50 gate 1574140911364410300 evaluation starts +peer1.org1.example.com | [6df 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +orderer0.example.com | "2019-11-19 05:21:41.470 UTC [fsblkstorage] indexBlock -> DEBU 61b Indexing block [blockNum=1, blockHash=[]byte{0x99, 0xe4, 0xbf, 0x1d, 0x57, 0xdc, 0xe1, 0xe4, 0x76, 0x42, 0xcb, 0x5, 0x13, 0xcf, 0x4f, 0x64, 0xd8, 0x44, 0x1c, 0x4c, 0xde, 0x74, 0xd2, 0xac, 0x5, 0xa5, 0xb7, 0xa4, 0x1c, 0x63, 0x7d, 0x26} txOffsets= +peer1.org2.example.com | [a58 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8ad 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8a5 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308cf50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [6e0 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +orderer0.example.com | txId=023949a6631ee2d7e0e47b7c0948d4e2886db2b79b5914bfa467dc5da576f2fa locPointer=offset=71, bytesLength=26690 +peer1.org2.example.com | [a59 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8ae 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [8a6 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308cf50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [6e1 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +orderer0.example.com | ]" +peer1.org2.example.com | [a5b 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [8af 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 principal matched by identity 0 +peer0.org2.example.com | [8a7 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308cf50 principal matched by identity 0 +peer1.org1.example.com | [6e2 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +orderer0.example.com | "2019-11-19 05:21:41.474 UTC [orderer.consensus.etcdraft] apply -> INFO 61c Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +peer1.org2.example.com | [a5c 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8b0 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org2.example.com | [8a8 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [6e3 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +orderer0.example.com | "2019-11-19 05:21:41.474 UTC [orderer.consensus.etcdraft] apply -> INFO 61d Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +peer1.org2.example.com | [a5d 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [6e4 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +orderer0.example.com | "2019-11-19 05:21:41.474 UTC [orderer.consensus.etcdraft] apply -> INFO 61e Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +peer1.org2.example.com | [a5f 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer0.org1.example.com | [8b1 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 d8 76 8c a4 e5 a9 39 93 68 d4 |0E.!...v....9.h.| +peer0.org2.example.com | [8a9 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [6e5 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +orderer0.example.com | "2019-11-19 05:21:41.474 UTC [common.deliver] deliverBlocks -> WARN 61f [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51412 because of consenter error" +peer1.org2.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer0.org1.example.com | 00000010 a1 fc d8 be 17 25 9f 19 eb 05 ab 55 0e c5 ae 25 |.....%.....U...%| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [6e6 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +orderer0.example.com | "2019-11-19 05:21:41.475 UTC [orderer.common.server] func1 -> DEBU 620 Closing Deliver stream" +peer1.org2.example.com | [a60 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer0.org1.example.com | 00000020 47 6e 71 85 73 02 20 1e 0c 07 5e ef 10 99 c3 d4 |Gnq.s. ...^.....| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [6e7 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +orderer0.example.com | "2019-11-19 05:21:41.475 UTC [comm.grpc.server] 1 -> INFO 621 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51412 grpc.code=OK grpc.call_duration=234.4417ms +peer1.org2.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer0.org1.example.com | 00000030 46 5a dc c9 72 6a 11 5f 9f f0 8a f5 81 05 a1 9e |FZ..rj._........| +peer1.org1.example.com | [6e8 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +orderer0.example.com | "2019-11-19 05:21:41.496 UTC [fsblkstorage] updateCheckpoint -> DEBU 622 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47979], isChainEmpty=[false], lastBlockNumber=[1]" +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer0.org1.example.com | 00000040 93 fd 5b 45 93 0f 1a |..[E...| +peer1.org1.example.com | [6e9 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +orderer0.example.com | "2019-11-19 05:21:41.496 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 623 [channel: testchainid] Wrote block [1]" +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer0.org1.example.com | [8b2 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [6ea 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +orderer0.example.com | "2019-11-19 05:21:41.519 UTC [orderer.common.server] Deliver -> DEBU 624 Starting new Deliver handler" +peer0.org2.example.com | [8aa 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308cf50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer0.org1.example.com | [8b3 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 gate 1574140910418265000 evaluation succeeds +peer1.org1.example.com | [6eb 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +orderer0.example.com | "2019-11-19 05:21:41.520 UTC [common.deliver] Handle -> DEBU 625 Starting new deliver loop for 172.18.0.5:51416" +peer0.org2.example.com | [8ab 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308cf50 gate 1574140911364410300 evaluation succeeds +peer1.org2.example.com | [a5e 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [8b4 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6ec 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 16ms (state_validation=2ms block_and_pvtdata_commit=10ms state_commit=1ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +orderer0.example.com | "2019-11-19 05:21:41.521 UTC [common.deliver] Handle -> DEBU 626 Attempting to read seek info message from 172.18.0.5:51416" +peer0.org2.example.com | [8ac 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a5a 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8b5 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6ed 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:41.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 627 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [8ad 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a61 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8b6 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [6ee 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F0B3D5E6FC999EEC15...05172BB05543DDAEAECD899A2A020803 +orderer0.example.com | "2019-11-19 05:21:41.600 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 628 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +peer0.org2.example.com | [8ae 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a62 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8b7 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [6ef 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0EB68DCBAFE45C8DEA274B100000D70268B1D02D4C4ECF1E1BA5F10B3E9873FA +orderer0.example.com | "2019-11-19 05:21:41.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 629 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.2µs " +peer0.org2.example.com | [8af 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [a63 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [8b8 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:39092 +peer1.org1.example.com | [6f0 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +orderer0.example.com | "2019-11-19 05:21:41.723 UTC [common.deliver] deliverBlocks -> WARN 62a [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51416 because of consenter error" +peer0.org2.example.com | [8b0 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a64 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8b9 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:39092 +peer1.org1.example.com | [6f1 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035795a0, READY +orderer0.example.com | "2019-11-19 05:21:41.724 UTC [orderer.common.server] func1 -> DEBU 62b Closing Deliver stream" +peer0.org2.example.com | [8b1 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a65 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [8ba 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:39092 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:7233013353250887132 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org1.example.com | [6f2 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +orderer0.example.com | "2019-11-19 05:21:41.725 UTC [comm.grpc.server] 1 -> INFO 62c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51416 grpc.code=OK grpc.call_duration=206.4013ms +peer0.org2.example.com | [8b2 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a66 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [8bb 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [6f3 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b0940 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:41.749 UTC [orderer.common.server] Deliver -> DEBU 62d Starting new Deliver handler" +peer0.org2.example.com | [8b3 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [a67 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8bc 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7233013353250887132 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org1.example.com | [6f4 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 62e Starting new deliver loop for 172.18.0.5:51418" +peer0.org2.example.com | [8b4 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a68 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [8bd 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer0.org2.example.com | [8b5 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:41.749 UTC [common.deliver] Handle -> DEBU 62f Attempting to read seek info message from 172.18.0.5:51418" +peer1.org2.example.com | [a69 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8be 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [6f5 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 c4 6d ef 04 d8 30 90 ec 43 2a |0E.!...m...0..C*| +peer0.org2.example.com | [8b6 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.951 UTC [common.deliver] deliverBlocks -> WARN 630 [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51418 because of consenter error" +peer1.org2.example.com | [a6a 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | 00000010 aa 39 20 c2 74 6f 35 53 29 df 68 a2 5b cf e8 b0 |.9 .to5S).h.[...| +peer0.org1.example.com | [8bf 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8b7 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.952 UTC [orderer.common.server] func1 -> DEBU 631 Closing Deliver stream" +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | 00000020 6b 5f 59 0d a6 02 20 2e 03 6c 52 2e 5b f9 62 ee |k_Y... ..lR.[.b.| +peer0.org1.example.com | [8c0 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8b8 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:41.955 UTC [comm.grpc.server] 1 -> INFO 632 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51418 grpc.code=OK grpc.call_duration=207.0777ms +peer1.org2.example.com | [a6b 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 97 d8 e6 f8 19 c6 76 94 5a ed |0E.!........v.Z.| +peer1.org1.example.com | 00000030 ed d2 46 f6 21 ae 20 dd c3 e8 e6 3e f7 52 9b 35 |..F.!. ....>.R.5| +peer0.org1.example.com | [8c1 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8b9 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:41.988 UTC [orderer.common.server] Deliver -> DEBU 633 Starting new Deliver handler" +peer1.org2.example.com | 00000010 0a d0 c1 93 f9 35 01 e0 64 a4 3c 5c 56 b6 7a 2a |.....5..d.<\V.z*| +peer1.org1.example.com | 00000040 b8 43 93 1b 8c 05 d7 |.C.....| +peer0.org1.example.com | [8c2 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8ba 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:41.989 UTC [common.deliver] Handle -> DEBU 634 Starting new deliver loop for 172.18.0.5:51420" +peer1.org2.example.com | 00000020 66 df 1a 9a 22 02 20 27 a5 41 bf 23 ab 0d cf bb |f...". '.A.#....| +peer1.org1.example.com | [6f6 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [8c3 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [6f7 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +orderer0.example.com | "2019-11-19 05:21:41.989 UTC [common.deliver] Handle -> DEBU 635 Attempting to read seek info message from 172.18.0.5:51420" +peer1.org2.example.com | 00000030 55 8f 6d 8f cf 29 1f 47 0a b4 f0 ff d5 2f 0b 8e |U.m..).G...../..| +peer0.org1.example.com | [8c4 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [6f8 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer0.org2.example.com | [8bb 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 636 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000040 22 ed 95 d7 50 2c d9 |"...P,.| +peer0.org1.example.com | [8c5 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 gate 1574140910435203200 evaluation starts +peer1.org1.example.com | [6f9 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer0.org2.example.com | [8bc 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +orderer0.example.com | "2019-11-19 05:21:42.101 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 637 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +peer1.org2.example.com | [a6c 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [8c6 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [6fa 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b0940 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [8bd 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 638 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +peer1.org2.example.com | [a6d 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [8c7 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [6fb 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b0940 gate 1574140909626245700 evaluation succeeds +peer0.org2.example.com | [8be 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.191 UTC [common.deliver] deliverBlocks -> WARN 639 [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51420 because of consenter error" +peer1.org2.example.com | [a6e 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [8c8 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 principal matched by identity 0 +peer1.org1.example.com | [6fc 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8bf 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.194 UTC [orderer.common.server] func1 -> DEBU 63a Closing Deliver stream" +peer1.org2.example.com | [a6f 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [8c9 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 41 22 91 e2 af 31 74 47 bb 7f 06 cd e6 62 a6 |'A"...1tG.....b.| +peer1.org1.example.com | [6fd 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8c0 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.197 UTC [comm.grpc.server] 1 -> INFO 63b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51420 grpc.code=OK grpc.call_duration=208.3239ms +peer1.org2.example.com | [a70 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000010 c0 7d 7b 1f 8d 86 2b 44 3f 75 dc d9 93 d1 5c ae |.}{...+D?u....\.| +peer1.org1.example.com | [6fe 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8c1 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | "2019-11-19 05:21:42.225 UTC [orderer.common.server] Deliver -> DEBU 63c Starting new Deliver handler" +peer1.org2.example.com | [a71 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8ca 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 0d 60 5e 40 c4 6b d1 59 2f 0e |0E.!...`^@.k.Y/.| +peer1.org1.example.com | [6ff 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8c2 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 22 53 4e e7 78 ea dd 97 fa 4f af cc 9d 7b c8 |6"SN.x....O...{.| +orderer0.example.com | "2019-11-19 05:21:42.225 UTC [common.deliver] Handle -> DEBU 63d Starting new deliver loop for 172.18.0.5:51422" +peer1.org2.example.com | [a72 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 f4 df c9 60 92 25 b4 6b ab 82 1d 0f ec da 94 0f |...`.%.k........| +peer1.org1.example.com | [700 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +peer0.org2.example.com | 00000010 28 bd 43 2e 47 4c 60 e2 9f 25 1d c0 74 6f a0 f0 |(.C.GL`..%..to..| +orderer0.example.com | "2019-11-19 05:21:42.225 UTC [common.deliver] Handle -> DEBU 63e Attempting to read seek info message from 172.18.0.5:51422" +peer1.org2.example.com | [a73 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 34 99 57 91 0c 02 20 6c 3a 8a ab 42 14 9e 38 fe |4.W... l:..B..8.| +peer1.org1.example.com | [701 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8c3 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 96 22 d0 d6 eb e9 2f 69 a7 3d 7f |0D. l."..../i.=.| +orderer0.example.com | "2019-11-19 05:21:42.440 UTC [common.deliver] deliverBlocks -> WARN 63f [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51422 because of consenter error" +peer1.org2.example.com | [a74 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 a0 ea f5 e2 1f 08 2e 2d 40 bb 40 98 dd 47 3c 01 |.......-@.@..G<.| +peer1.org1.example.com | [702 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | 00000010 2a dd 7c ef 18 30 37 08 71 0d 78 e0 7a 7f de 91 |*.|..07.q.x.z...| +orderer0.example.com | "2019-11-19 05:21:42.440 UTC [orderer.common.server] func1 -> DEBU 640 Closing Deliver stream" +peer1.org2.example.com | [a75 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 d1 e0 4a 03 0b c0 63 |..J...c| +peer1.org1.example.com | [703 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer0.org2.example.com | 00000020 a5 77 4c 14 02 20 38 21 cb e3 6a 1d 42 85 16 9e |.wL.. 8!..j.B...| +orderer0.example.com | "2019-11-19 05:21:42.440 UTC [comm.grpc.server] 1 -> INFO 641 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51422 grpc.code=OK grpc.call_duration=215.2155ms +peer1.org2.example.com | [a76 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8cb 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [704 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org2.example.com | 00000030 bc da 5f 34 0e 3d 2d da 2d 73 92 6d 4d 46 99 22 |.._4.=-.-s.mMF."| +orderer0.example.com | "2019-11-19 05:21:42.477 UTC [orderer.consensus.etcdraft] Step -> INFO 642 1 is starting a new election at term 1" channel=businesschannel node=1 +peer1.org2.example.com | [a77 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [8cc 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 gate 1574140910435203200 evaluation succeeds +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org2.example.com | 00000040 54 df bf 03 9e c9 |T.....| +orderer0.example.com | "2019-11-19 05:21:42.479 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 643 1 became pre-candidate at term 1" channel=businesschannel node=1 +peer1.org2.example.com | [a78 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8cd 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [705 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 c2 93 52 6d 8e 33 bd 5f d5 1b |0E.!....Rm.3._..| +peer0.org2.example.com | [8c4 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +orderer0.example.com | "2019-11-19 05:21:42.479 UTC [orderer.consensus.etcdraft] poll -> INFO 644 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +peer1.org2.example.com | [a79 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [8ce 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 0a 90 67 48 a5 90 0d ed 12 9c f2 cc a4 46 f8 2e |..gH.........F..| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +orderer0.example.com | "2019-11-19 05:21:42.479 UTC [orderer.consensus.etcdraft] campaign -> INFO 645 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +peer1.org2.example.com | [a7a 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [8cf 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 12 0a e6 90 05 02 20 10 b3 c5 1c c4 b2 8e 6a d3 |...... .......j.| +peer0.org2.example.com | [8c5 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 89 a7 75 4f 56 7e f9 f2 03 75 |0E.!....uOV~...u| +orderer0.example.com | "2019-11-19 05:21:42.480 UTC [orderer.consensus.etcdraft] campaign -> INFO 646 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +peer1.org2.example.com | [a7b 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [8d0 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 ea a2 87 0a 4b ae 64 d3 4d 76 a1 36 09 26 d9 a5 |....K.d.Mv.6.&..| +peer0.org2.example.com | 00000010 db 29 48 a6 d8 87 78 9e 46 8a 93 52 20 67 23 8f |.)H...x.F..R g#.| +orderer0.example.com | "2019-11-19 05:21:42.481 UTC [orderer.common.cluster] NewStream -> DEBU 647 Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +peer1.org2.example.com | [a7c 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8d1 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 ed b7 01 ca 0a 82 78 |......x| +peer0.org2.example.com | 00000020 d8 16 44 4a 4f 02 20 3c b8 d3 f2 07 8c 36 3b 11 |..DJO. <.....6;.| +orderer0.example.com | "2019-11-19 05:21:42.481 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 648 Sending msg of 28 bytes to 2 on channel businesschannel took 553.5µs" +peer1.org2.example.com | [a7d 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8d2 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org1.example.com | [8d3 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 9f 70 ae ae 80 29 53 6e 11 fd fc dc 5d 12 84 bd |.p...)Sn....]...| +orderer0.example.com | "2019-11-19 05:21:42.482 UTC [orderer.common.cluster.step] sendMessage -> DEBU 649 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97µs " +peer0.org1.example.com | [8d4 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [706 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org2.example.com | 00000040 a1 fb 95 de 9e f5 81 |.......| +peer1.org2.example.com | [a7e 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:42.485 UTC [orderer.common.cluster] NewStream -> DEBU 64a Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-11-19 05:21:42.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 64b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.1µs " +peer0.org1.example.com | [8d5 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8c6 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [a7f 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:42.459 UTC [orderer.common.cluster] Step -> DEBU 64c Connection from orderer2.example.com(172.18.0.4:44088)" +peer0.org1.example.com | [8d6 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [707 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [8c7 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [a80 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:42.460 UTC [orderer.common.cluster.step] handleMessage -> DEBU 64d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [8d7 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [708 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151013 +peer0.org2.example.com | [8c8 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [a81 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:42.460 UTC [orderer.consensus.etcdraft] poll -> INFO 64e 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 +peer0.org1.example.com | [8d8 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [709 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8CBCB361F5ED65483A125BDD40402811A9BE9A04F4DD36F5E2B5DA36E85373BB +peer0.org2.example.com | [8c9 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [a82 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:42.460 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 64f 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +peer0.org1.example.com | [8d9 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [70a 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [8ca 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [a83 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5240 gate 1574140915926154100 evaluation starts +orderer0.example.com | "2019-11-19 05:21:42.461 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 650 1 became candidate at term 2" channel=businesschannel node=1 +peer0.org1.example.com | [8da 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [70b 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [8cb 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a84 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5240 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:42.462 UTC [orderer.consensus.etcdraft] poll -> INFO 651 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +peer0.org1.example.com | [8db 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 7233013353250887132, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [8dc 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [8cc 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a85 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5240 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:42.462 UTC [orderer.consensus.etcdraft] campaign -> INFO 652 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +peer1.org1.example.com | [70c 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [8cd 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [8dd 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7233013353250887132, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [a86 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:21:42.463 UTC [orderer.consensus.etcdraft] campaign -> INFO 653 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +peer1.org1.example.com | [70d 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [8ce 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8de 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a87 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5240 principal evaluation fails +orderer0.example.com | "2019-11-19 05:21:42.463 UTC [orderer.common.cluster] Step -> DEBU 654 Connection from orderer1.example.com(172.18.0.2:42290)" +peer1.org1.example.com | [70e 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org2.example.com | [8cf 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8df 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.516Z grpc.peer_address=172.18.0.7:39096 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=252.8µs +peer1.org2.example.com | [a88 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5240 gate 1574140915926154100 evaluation fails +orderer0.example.com | "2019-11-19 05:21:42.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU 655 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [70f 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8d0 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8e0 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [a89 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:42.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 656 Sending msg of 28 bytes to 3 on channel businesschannel took 2.5865ms" +peer1.org1.example.com | [710 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f isn't responsive: EOF +peer0.org2.example.com | [8d1 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [8e1 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org2.example.com | [a8a 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:42.467 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 657 Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +peer1.org1.example.com | [711 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> WARN Entering [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] +peer0.org2.example.com | [8d2 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [8e2 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org2.example.com | [a8b 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:42.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 659 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [8d3 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [712 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: +peer0.org1.example.com | [8e3 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:39096 +peer1.org2.example.com | [a8c 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee57b0 gate 1574140915926531600 evaluation starts +orderer0.example.com | "2019-11-19 05:21:42.470 UTC [orderer.consensus.etcdraft] poll -> INFO 65a 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +peer0.org2.example.com | [8d4 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\216\350\311\331\031\200\371%\267\242i\024\326\321\224\201\252\177t\246\320\002Zv{\346\002 {\357b~S\203y\342\201\360\006\3276.\342\005$\374\204e)#\336u\237\r%\207\205\013\364\240" > +peer1.org1.example.com | [713 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [8e4 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:39096 +peer1.org2.example.com | [a8d 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee57b0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:42.468 UTC [orderer.common.cluster.step] sendMessage -> DEBU 658 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.1µs " +peer0.org2.example.com | [8d5 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [714 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org1.example.com | [8e5 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a8e 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee57b0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:42.477 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 65b 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +peer0.org2.example.com | [8d6 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [715 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [8e6 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a8f 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee57b0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:42.477 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 65c 1 became leader at term 2" channel=businesschannel node=1 +peer0.org2.example.com | [8d7 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [716 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [8e7 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a90 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer0.org2.example.com | [8d8 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.477 UTC [orderer.consensus.etcdraft] run -> INFO 65d raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +peer1.org1.example.com | [717 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer0.org1.example.com | [8e8 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8d9 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:42.483 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 65e Sending msg of 28 bytes to 3 on channel businesschannel took 14.277ms" +peer1.org1.example.com | [718 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151012 +peer1.org2.example.com | [a91 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer0.org1.example.com | [8e9 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8da 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:42.485 UTC [orderer.common.server] Deliver -> DEBU 660 Starting new Deliver handler" +peer1.org1.example.com | [719 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0B8E4A56FF779E34E96C4532FF9B4A59D6720CA45EDF2C670E0DB04893656B88 +peer1.org2.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer0.org1.example.com | [8ea 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8db 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:42.485 UTC [common.deliver] Handle -> DEBU 661 Starting new deliver loop for 172.18.0.5:51424" +peer1.org1.example.com | [71a 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer0.org1.example.com | [8eb 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8dc 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:42.486 UTC [common.deliver] Handle -> DEBU 662 Attempting to read seek info message from 172.18.0.5:51424" +peer1.org1.example.com | [71b 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer0.org1.example.com | [8ec 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8dd 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:42.486 UTC [orderer.consensus.etcdraft] run -> INFO 663 Leader 1 is present, quit campaign" channel=businesschannel node=1 +peer1.org1.example.com | [71c 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer0.org1.example.com | [8ed 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8de 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:42.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 65f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.1µs " +peer1.org1.example.com | [71d 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a92 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee57b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [8ee 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8df 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:42.486 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 664 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +peer1.org1.example.com | [71e 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:2830936016594819812 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [a93 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee57b0 gate 1574140915926531600 evaluation succeeds +peer0.org1.example.com | [8ef 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [8e0 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:42.487 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 665 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +peer1.org1.example.com | [71f 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:2830936016594819812 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org2.example.com | [a94 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [8f0 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 gate 1574140910533788800 evaluation starts +peer0.org2.example.com | [8e1 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118490 gate 1574140911686581600 evaluation starts +orderer0.example.com | "2019-11-19 05:21:42.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 666 Sending msg of 36 bytes to 2 on channel businesschannel took 56.5µs" +peer1.org1.example.com | [720 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [a95 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [8f1 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8e2 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118490 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:42.490 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 667 Sending msg of 36 bytes to 3 on channel businesschannel took 124.7µs" +peer1.org1.example.com | [721 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [a96 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [8f2 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [8e3 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118490 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:42.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 668 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 2.3562ms " +peer1.org1.example.com | [722 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [a97 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [8f3 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 principal matched by identity 0 +peer0.org2.example.com | [8e4 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:21:42.498 UTC [orderer.common.cluster.step] sendMessage -> DEBU 669 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 519.9µs " +peer1.org1.example.com | [723 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [a98 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [8f4 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org2.example.com | [8e5 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118490 principal evaluation fails +orderer0.example.com | "2019-11-19 05:21:42.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 66a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [724 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [a99 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [8e6 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118490 gate 1574140911686581600 evaluation fails +peer0.org2.example.com | [8e7 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [725 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003753130, CONNECTING +peer1.org2.example.com | [a9a 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [a9b 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [8e8 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [726 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003753130, READY +orderer0.example.com | "2019-11-19 05:21:42.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66c Sending msg of 28 bytes to 2 on channel businesschannel took 16.8µs" +peer1.org2.example.com | [a9c 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [8e9 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer1.org1.example.com | [727 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:42.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 66d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216.1µs " +peer1.org2.example.com | [a9d 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ea 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118a10 gate 1574140911691019000 evaluation starts +peer0.org1.example.com | [8f5 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 81 53 47 96 3e c7 78 96 2c 73 41 |0D. D.SG.>.x.,sA| +peer1.org1.example.com | [728 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +orderer0.example.com | "2019-11-19 05:21:42.502 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 66e Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +peer1.org2.example.com | [a9e 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8eb 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118a10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 ad 6d 19 cc cd 5c 0c 00 7d 1d 51 53 92 71 03 71 |.m...\..}.QS.q.q| +peer1.org1.example.com | [729 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +orderer0.example.com | "2019-11-19 05:21:42.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 66b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [a9f 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ec 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118a10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000020 b0 b2 7b 68 02 20 56 f9 bd 29 86 6e 20 4b a5 be |..{h. V..).n K..| +peer1.org1.example.com | [72a 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.9:7051 +orderer0.example.com | "2019-11-19 05:21:42.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 66f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [aa0 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8ed 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118a10 principal matched by identity 0 +peer0.org1.example.com | 00000030 e6 3e f3 0a ca 2e 1e 3b f5 b6 c2 59 5e d4 c5 9d |.>.....;...Y^...| +peer1.org1.example.com | [72b 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +orderer0.example.com | "2019-11-19 05:21:42.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 670 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [aa1 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ee 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000040 89 78 b8 01 7a 61 |.x..za| +peer1.org1.example.com | [72c 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:42.508 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 671 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +peer1.org2.example.com | [aa2 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [8f6 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:42.509 UTC [orderer.common.cluster.step] sendMessage -> DEBU 672 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 315.9µs " +peer1.org2.example.com | [aa3 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [72d 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8ef 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [8f7 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 gate 1574140910533788800 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:42.512 UTC [orderer.common.cluster.step] handleMessage -> DEBU 673 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [aa4 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [72e 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [8f8 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:42.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 674 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [aa5 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [72f 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [8f9 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:42.568 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 675 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +peer1.org2.example.com | [aa6 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [730 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [8fa 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:42.568 UTC [orderer.common.cluster.step] sendMessage -> DEBU 676 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.4µs " +peer1.org2.example.com | [aa7 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [731 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [8fb 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:42.616 UTC [orderer.common.server] replicateDisabledChains -> DEBU 677 No inactive chains to try to replicate" +peer1.org2.example.com | [aa8 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [732 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8f0 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118a10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [8fc 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:39096 +orderer0.example.com | "2019-11-19 05:21:42.688 UTC [policies] Evaluate -> DEBU 678 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [aa9 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [733 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8f1 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118a10 gate 1574140911691019000 evaluation succeeds +peer0.org1.example.com | [8fd 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:39096 +orderer0.example.com | "2019-11-19 05:21:42.689 UTC [policies] Evaluate -> DEBU 679 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [aaa 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [734 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8f2 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [8fe 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +orderer0.example.com | "2019-11-19 05:21:42.689 UTC [policies] Evaluate -> DEBU 67a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | [aab 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [735 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8f3 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [8ff 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:39092 disconnected +orderer0.example.com | "2019-11-19 05:21:42.691 UTC [policies] Evaluate -> DEBU 67b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [aac 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [736 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [8f4 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [901 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +orderer0.example.com | "2019-11-19 05:21:42.691 UTC [policies] Evaluate -> DEBU 67c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | [aad 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [737 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a2c50 gate 1574140909699826700 evaluation starts +peer0.org2.example.com | [8f5 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [900 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:39092 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=132.0249ms +orderer0.example.com | "2019-11-19 05:21:42.692 UTC [msp] DeserializeIdentity -> DEBU 67d Obtaining identity" +peer1.org2.example.com | [aae 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [738 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a2c50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8f6 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [902 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +orderer0.example.com | "2019-11-19 05:21:42.693 UTC [msp.identity] newIdentity -> DEBU 67e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [aaf 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [739 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a2c50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [8f7 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [903 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:39096 disconnected +orderer0.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [ab0 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [73a 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a2c50 principal matched by identity 0 +peer0.org2.example.com | [8f8 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [906 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.522Z grpc.peer_address=172.18.0.7:39096 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=19.1908ms +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [ab1 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > alive: alive: alive: +peer1.org1.example.com | [73b 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [904 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [ab2 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [8fa 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer0.org1.example.com | [905 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [ab3 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [8fb 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [73c 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 97 36 b0 e2 d1 05 ee 09 88 4b 58 |0D. A.6.......KX| +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [907 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [ab4 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8fc 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 b8 e3 a2 f7 09 b7 29 b5 c1 e0 03 63 c4 0c 3c c9 |......)....c..<.| +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | [908 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [ab5 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8fd 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119600 gate 1574140911697229700 evaluation starts +peer1.org1.example.com | 00000020 5c 99 7a 3b 02 20 0a 2d 8b bc 1b 02 f1 2f 5f 73 |\.z;. .-...../_s| +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | [909 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [ab6 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [8fe 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119600 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 e0 ce c7 d8 d7 e0 b5 85 c4 3e 51 b2 51 85 0b 47 |.........>Q.Q..G| +orderer0.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | [90a 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ab7 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [8ff 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119600 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000040 7d de 87 0f 44 40 |}...D@| +orderer0.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | [90b 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [ab8 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [900 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [73d 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a2c50 principal evaluation succeeds for identity 0 +orderer0.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | [90c 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ab9 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [901 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119600 principal evaluation fails +peer1.org1.example.com | [73e 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a2c50 gate 1574140909699826700 evaluation succeeds +orderer0.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | [90d 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [aba 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [902 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119600 gate 1574140911697229700 evaluation fails +peer1.org1.example.com | [73f 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | [90f 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [abb 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [903 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [740 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [910 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [abc 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [904 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [741 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:42.694 UTC [cauthdsl] func1 -> DEBU 67f 0xc0008eee30 gate 1574140902694116700 evaluation starts" +peer0.org1.example.com | [911 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [abd 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [905 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [742 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:42.694 UTC [cauthdsl] func2 -> DEBU 680 0xc0008eee30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [90e 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [abf 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [906 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119b70 gate 1574140911697484100 evaluation starts +peer1.org1.example.com | [743 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +orderer0.example.com | "2019-11-19 05:21:42.694 UTC [cauthdsl] func2 -> DEBU 681 0xc0008eee30 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [912 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ac0 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [907 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [744 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.694 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 682 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | [913 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org2.example.com | [ac1 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [908 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119b70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [745 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +orderer0.example.com | "2019-11-19 05:21:42.694 UTC [msp] Validate -> DEBU 683 MSP Org1MSP validating identity" +peer0.org1.example.com | [914 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org2.example.com | [ac2 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [909 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119b70 principal matched by identity 0 +peer1.org1.example.com | [746 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.695 UTC [msp] getCertificationChain -> DEBU 684 MSP Org1MSP getting certification chain" +peer0.org1.example.com | [915 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org2.example.com | [abe 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [90a 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [747 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 2830936016594819812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.696 UTC [cauthdsl] func2 -> DEBU 685 0xc0008eee30 principal matched by identity 0" +peer0.org1.example.com | [916 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ac3 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [748 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 2830936016594819812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org1.example.com | [917 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.696 UTC [msp.identity] Verify -> DEBU 686 Verify: digest = 00000000 c4 a3 63 0e 74 7b 1b 5e a8 20 9f 1e fd 6e ca c3 |..c.t{.^. ...n..| +peer1.org2.example.com | [ac4 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [90b 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [749 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [918 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 0e 30 75 6e 15 fa c1 45 bd aa f1 63 34 09 f5 6a |.0un...E...c4..j|" +peer1.org2.example.com | [ac5 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [74a 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 2830936016594819812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org1.example.com | [919 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.696 UTC [msp.identity] Verify -> DEBU 687 Verify: sig = 00000000 30 45 02 21 00 e2 fe 3a 7f ad 49 29 49 81 90 d8 |0E.!...:..I)I...| +peer1.org2.example.com | [ac6 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [74b 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [91a 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 68 27 cd ff 27 cc 63 d7 21 bd e8 0d d3 29 0b ec |h'..'.c.!....)..| +peer1.org2.example.com | [ac7 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [74c 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 8e 4a 56 ff 77 9e 34 e9 6c 45 32 ff 9b 4a 59 |..JV.w.4.lE2..JY| +peer0.org1.example.com | [91b 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | 00000020 e5 75 9d ff d2 02 20 77 7b 59 a8 aa af 0c d8 1c |.u.... w{Y......| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [ac8 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 d6 72 0c a4 5e df 2c 67 0e 0d b0 48 93 65 6b 88 |.r..^.,g...H.ek.| +peer0.org1.example.com | [91c 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +orderer0.example.com | 00000030 06 d5 09 1b 53 2a 43 2d f9 0b 6b 29 22 db 51 b2 |....S*C-..k)".Q.| +peer0.org2.example.com | [90c 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119b70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [ac9 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [74d 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 8d 1f 03 fe 0e 3b 31 28 87 48 c5 |0D. U.....;1(.H.| +peer0.org1.example.com | [91d 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +orderer0.example.com | 00000040 f8 e2 d6 0b 94 5b e3 |.....[.|" +peer0.org2.example.com | [90d 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003119b70 gate 1574140911697484100 evaluation succeeds +peer1.org2.example.com | [aca 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 9e d8 00 d5 fb 8d a9 59 b1 82 d3 bc 1b e9 dc 92 |.......Y........| +peer0.org1.example.com | [91e 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +orderer0.example.com | "2019-11-19 05:21:42.697 UTC [cauthdsl] func2 -> DEBU 688 0xc0008eee30 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [90e 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [acb 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 08 76 7a c9 02 20 5b f2 53 c2 83 2e c7 ed 42 b9 |.vz.. [.S.....B.| +peer0.org1.example.com | [91f 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +orderer0.example.com | "2019-11-19 05:21:42.697 UTC [cauthdsl] func1 -> DEBU 689 0xc0008eee30 gate 1574140902694116700 evaluation succeeds" +peer1.org2.example.com | [acc 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [90f 11-19 05:21:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 94 c9 61 1b f1 fd f7 ff 0d b1 88 4b b6 bd 33 3d |..a........K..3=| +peer0.org1.example.com | [920 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +orderer0.example.com | "2019-11-19 05:21:42.697 UTC [policies] Evaluate -> DEBU 68a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [910 11-19 05:21:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 88 0c 75 f3 98 8f |..u...| +peer0.org1.example.com | [921 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b398b0, CONNECTING +orderer0.example.com | "2019-11-19 05:21:42.697 UTC [policies] Evaluate -> DEBU 68b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [acd 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [911 11-19 05:21:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [74e 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [922 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b398b0, READY +orderer0.example.com | "2019-11-19 05:21:42.698 UTC [policies] Evaluate -> DEBU 68c Signature set satisfies policy /Channel/Application/Readers" +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [912 11-19 05:21:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [74f 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [923 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:21:42.698 UTC [policies] Evaluate -> DEBU 68d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [913 11-19 05:21:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [750 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [924 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +orderer0.example.com | "2019-11-19 05:21:42.698 UTC [policies] Evaluate -> DEBU 68e Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [914 11-19 05:21:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [751 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [925 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +orderer0.example.com | "2019-11-19 05:21:42.698 UTC [policies] Evaluate -> DEBU 68f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [915 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [752 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [926 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +orderer0.example.com | "2019-11-19 05:21:42.700 UTC [common.deliver] deliverBlocks -> DEBU 690 [channel: businesschannel] Received seekInfo (0xc00095eb00) start: > stop: > from 172.18.0.5:51424" +peer1.org2.example.com | [ace 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [916 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [753 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [927 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:42.701 UTC [fsblkstorage] Next -> DEBU 691 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer1.org2.example.com | [acf 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [917 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [754 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:42.702 UTC [fsblkstorage] newBlockfileStream -> DEBU 692 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +peer0.org1.example.com | [928 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ad0 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [918 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [755 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:42.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 693 Remaining bytes=[25806], Going to peek [8] bytes" +peer0.org1.example.com | [929 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ad1 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [919 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [756 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:42.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 694 Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | [92a 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ad2 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [91a 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:42.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 695 blockbytes [25803] read from file [0]" +peer1.org1.example.com | [757 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [92b 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [ad3 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [91b 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.703 UTC [common.deliver] deliverBlocks -> DEBU 696 [channel: businesschannel] Delivering block for (0xc00095eb00) for 172.18.0.5:51424" +peer1.org1.example.com | [758 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [92c 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 17 05 84 38 0c 79 48 ed 68 77 4f e4 a8 dc 2e |....8.yH.hwO....| +peer1.org2.example.com | [ad4 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [91c 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.703 UTC [common.deliver] deliverBlocks -> DEBU 697 [channel: businesschannel] Done delivering to 172.18.0.5:51424 for (0xc00095eb00)" +peer1.org1.example.com | [759 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bf660 gate 1574140909725733900 evaluation starts +peer0.org1.example.com | 00000010 08 19 d6 73 63 62 de 37 a8 ca 4a 4a 88 c1 68 37 |...scb.7..JJ..h7| +peer1.org2.example.com | [ad5 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [91d 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.704 UTC [common.deliver] Handle -> DEBU 698 Waiting for new SeekInfo from 172.18.0.5:51424" +peer1.org1.example.com | [75a 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bf660 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [92d 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:7051 +peer1.org2.example.com | [ad6 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [91e 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:42.705 UTC [common.deliver] Handle -> DEBU 699 Attempting to read seek info message from 172.18.0.5:51424" +peer1.org1.example.com | [75b 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bf660 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [92f 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ad7 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa9e0 gate 1574140916237469300 evaluation starts +peer0.org2.example.com | [91f 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.709 UTC [grpc] infof -> DEBU 69a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | [75c 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bf660 principal matched by identity 0 +peer0.org1.example.com | [930 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ad8 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa9e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [920 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +orderer0.example.com | "2019-11-19 05:21:42.709 UTC [common.deliver] Handle -> WARN 69b Error reading from 172.18.0.5:51424: rpc error: code = Canceled desc = context canceled" +peer1.org1.example.com | [75d 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 a8 5e e1 4d bf 89 97 fb cf d0 29 0e 67 fd 42 |..^.M......).g.B| +peer0.org1.example.com | [931 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ad9 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa9e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [921 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.709 UTC [orderer.common.server] func1 -> DEBU 69c Closing Deliver stream" +peer1.org1.example.com | 00000010 f5 e2 f5 fa 4a e9 35 2d 0f fd 6a 97 5c 05 db 08 |....J.5-..j.\...| +peer0.org1.example.com | [932 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [ada 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [922 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.709 UTC [comm.grpc.server] 1 -> INFO 69d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51424 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=224.9038ms +peer1.org1.example.com | [75e 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 29 d4 2b 63 e9 58 3e 8b 8b dd |0E.!..).+c.X>...| +peer0.org1.example.com | [933 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151010 +peer1.org2.example.com | [adb 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa9e0 principal evaluation fails +peer0.org2.example.com | [923 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:42.709 UTC [grpc] infof -> DEBU 69e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | 00000010 0f 44 dc 11 ad 76 7d 8a 6f 0f 18 af 5c 84 4b 09 |.D...v}.o...\.K.| +peer0.org1.example.com | [92e 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 32 ed 6c 52 d9 72 ea 04 95 98 |0E.!..2.lR.r....| +peer1.org2.example.com | [adc 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faa9e0 gate 1574140916237469300 evaluation fails +peer0.org2.example.com | [924 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +orderer0.example.com | "2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 69f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | 00000020 e1 67 f5 8a 95 02 20 25 fa 49 5b c6 12 47 c1 e6 |.g.... %.I[..G..| +peer0.org1.example.com | 00000010 bd 70 08 2d cd 2b ea 6a 75 53 2d 2d fc 68 56 6e |.p.-.+.juS--.hVn| +peer1.org2.example.com | [add 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [925 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 6a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | 00000030 01 c9 f6 f5 39 e8 74 d8 ed 87 32 f2 9c 90 ea 59 |....9.t...2....Y| +peer0.org1.example.com | 00000020 33 f8 b9 79 94 02 20 25 23 44 ad 84 83 51 ae 20 |3..y.. %#D...Q. | +peer1.org2.example.com | [ade 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [926 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 6a1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | 00000040 ae 2c 27 01 eb 65 dc |.,'..e.| +peer0.org1.example.com | 00000030 6c c6 98 10 44 b0 f7 d1 37 85 02 6c be 79 43 12 |l...D...7..l.yC.| +peer1.org2.example.com | [adf 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [927 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 6a2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | [75f 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bf660 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 9b 03 26 35 30 6e cf |..&50n.| +peer1.org2.example.com | [ae0 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaf50 gate 1574140916239432000 evaluation starts +peer0.org2.example.com | [928 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 6a3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | [760 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bf660 gate 1574140909725733900 evaluation succeeds +peer0.org1.example.com | [934 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E816214EC528CF7AC3A412B16FB6ED92131F0A98A7F5D12AD7160156F9D32D0E +peer1.org2.example.com | [ae1 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaf50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [929 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +orderer0.example.com | "2019-11-19 05:21:42.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a4 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +peer1.org1.example.com | [761 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [935 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [ae2 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaf50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [92a 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:42.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.8µs " +peer1.org1.example.com | [762 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [939 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [ae3 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaf50 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:42.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.4µs " +peer0.org2.example.com | [92b 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [763 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [93a 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [ae4 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:21:42.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a7 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +peer0.org2.example.com | [92c 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [764 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [93b 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:21:42.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [92d 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [765 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [936 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ae5 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:21:42.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [92e 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [766 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org1.example.com | [937 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:21:43.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6aa Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [92f 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [767 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [938 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:21:43.066 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ab Sending msg of 28 bytes to 3 on channel testchainid took 37.2µs" +peer0.org2.example.com | [930 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [768 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [93c 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:21:43.067 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ac Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.4µs " +peer0.org2.example.com | [931 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003182e10 gate 1574140911813752500 evaluation starts +peer1.org1.example.com | [769 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [940 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:21:43.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +peer0.org2.example.com | [932 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003182e10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [76a 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [941 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ae6 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaf50 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:43.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.1µs " +peer0.org2.example.com | [933 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003182e10 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [76b 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [942 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:21:43.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6af Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [ae7 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaf50 gate 1574140916239432000 evaluation succeeds +peer0.org2.example.com | [934 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003182e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [76c 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [945 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:43.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b0 Sending msg of 28 bytes to 2 on channel businesschannel took 1.3399ms" +peer1.org2.example.com | [ae8 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [935 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003182e10 principal evaluation fails +peer1.org1.example.com | [76d 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [946 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ae9 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:43.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.1µs " +peer0.org2.example.com | [936 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003182e10 gate 1574140911813752500 evaluation fails +peer1.org1.example.com | [76e 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [943 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [aea 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:43.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [937 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [76f 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [947 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aeb 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:43.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [938 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [770 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 55 cb b3 34 39 d6 e8 a7 3a c9 55 d8 ef 50 17 |.U..49...:.U..P.| +peer0.org1.example.com | [93e 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aec 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:43.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b4 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +peer0.org2.example.com | [939 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 12 63 1d 7b 04 0e 36 43 eb b0 e9 77 42 ef 9a 1c |.c.{..6C...wB...| +peer1.org2.example.com | [aed 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [948 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:43.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.2µs " +peer0.org2.example.com | [93a 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183380 gate 1574140911814179500 evaluation starts +peer1.org1.example.com | [771 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d c8 c3 99 a2 69 02 ac 4d af 7c |0E.!......i..M.|| +peer1.org2.example.com | [aee 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [949 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:43.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +peer0.org2.example.com | [93b 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183380 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 8f e4 a0 cd d2 a3 05 47 c2 ca 7f 82 e4 03 7c c0 |.......G......|.| +peer1.org2.example.com | [aef 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [94a 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:43.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b7 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +peer0.org2.example.com | [93c 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183380 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000020 f9 a5 d7 9a 0b 02 20 4a 78 c4 c5 fc 6a 4a b4 6d |...... Jx...jJ.m| +peer1.org2.example.com | [af0 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [94b 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:43.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.6µs " +peer0.org2.example.com | [93d 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183380 principal matched by identity 0 +peer1.org1.example.com | 00000030 5e c0 89 63 9a 2b 02 27 67 fd 16 c0 8b fa b4 b7 |^..c.+.'g.......| +peer1.org2.example.com | [af1 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [94c 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:43.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 162.2µs " +peer0.org2.example.com | [93e 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +peer1.org1.example.com | 00000040 52 91 6c 4a f1 e5 40 |R.lJ..@| +peer1.org2.example.com | [af2 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [94d 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:43.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ba Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +peer1.org1.example.com | [772 11-19 05:21:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [af3 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [94e 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 gate 1574140910836146900 evaluation starts +orderer0.example.com | "2019-11-19 05:21:43.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bb Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [93f 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +peer1.org1.example.com | [773 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1574140894789402700 15 {} [] 0} +peer1.org2.example.com | [af4 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4140 gate 1574140916244288200 evaluation starts +peer0.org1.example.com | [94f 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:44.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bc Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +peer1.org1.example.com | [774 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [af5 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [950 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:44.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bd Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +peer0.org2.example.com | 00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +peer1.org1.example.com | [775 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [af6 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4140 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [93f 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:21:44.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.4µs " +peer0.org2.example.com | 00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +peer1.org1.example.com | [776 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [af7 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [93d 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:44.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bf Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +peer0.org2.example.com | 00000040 b0 a7 83 ce 50 7e |....P~| +peer1.org1.example.com | [777 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.802Z grpc.peer_address=172.18.0.6:45148 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=115.4µs +peer1.org2.example.com | [af8 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4140 principal evaluation fails +peer0.org1.example.com | [944 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:44.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.7µs " +peer0.org2.example.com | [940 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183380 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [778 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [af9 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4140 gate 1574140916244288200 evaluation fails +peer0.org1.example.com | [951 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:44.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c1 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +peer0.org2.example.com | [941 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183380 gate 1574140911814179500 evaluation succeeds +peer1.org1.example.com | [779 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org2.example.com | [afa 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [956 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +orderer0.example.com | "2019-11-19 05:21:44.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +peer0.org2.example.com | [942 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [77a 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org2.example.com | [afb 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +orderer0.example.com | "2019-11-19 05:21:44.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [943 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [afc 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [952 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [77b 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:45148 +orderer0.example.com | "2019-11-19 05:21:44.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [944 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [afd 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc46b0 gate 1574140916247133500 evaluation starts +peer0.org1.example.com | [957 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [77c 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:45148 +orderer0.example.com | "2019-11-19 05:21:44.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [945 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [afe 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc46b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [958 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [77d 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +orderer0.example.com | "2019-11-19 05:21:44.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c6 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +peer0.org2.example.com | [946 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [aff 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc46b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [959 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +orderer0.example.com | "2019-11-19 05:21:44.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " +peer0.org2.example.com | [947 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [b00 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc46b0 principal matched by identity 0 +peer0.org1.example.com | [95a 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [77e 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 3b c4 c4 20 9a d3 9f 6b fe a6 1e |0D. b;.. ...k...| +orderer0.example.com | "2019-11-19 05:21:44.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c8 Sending msg of 28 bytes to 2 on channel businesschannel took 37.3µs" +peer0.org2.example.com | [948 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [b01 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [95b 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 30 41 4c 2d d5 83 1b e3 e2 38 19 69 3c ec ad 31 |0AL-.....8.i<..1| +orderer0.example.com | "2019-11-19 05:21:44.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c9 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +peer0.org2.example.com | [949 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [95c 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 9f c7 4b 03 02 20 45 7c 04 5a 9f 19 17 e9 f7 98 |..K.. E|.Z......| +orderer0.example.com | "2019-11-19 05:21:44.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.2µs " +peer0.org2.example.com | [94a 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [b02 11-19 05:21:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [95d 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 8d 40 df c5 30 a3 f0 ab 29 b6 6a 3c 28 ae 93 68 |.@..0...).j<(..h| +orderer0.example.com | "2019-11-19 05:21:44.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6cb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [94b 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [95e 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 16 7c 79 92 47 66 |.|y.Gf| +orderer0.example.com | "2019-11-19 05:21:44.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4372ms " +peer0.org2.example.com | [94c 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [95f 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [77f 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:45148 +orderer0.example.com | "2019-11-19 05:21:44.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6cd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [94d 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [960 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [780 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:45148 +orderer0.example.com | "2019-11-19 05:21:45.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [94e 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [961 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [781 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:45.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +peer0.org2.example.com | [94f 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b03 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc46b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [962 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [782 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:45.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.3µs " +peer0.org2.example.com | [950 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b04 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc46b0 gate 1574140916247133500 evaluation succeeds +peer0.org1.example.com | [963 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [783 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:45.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d1 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +peer0.org2.example.com | [951 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b05 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [784 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [964 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:45.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d2 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +peer0.org2.example.com | [952 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [b06 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [785 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [966 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:45.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 226.6µs " +peer1.org2.example.com | [b07 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [953 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:" > alive:\216\350\311\331\031\200\371%\267\242i\024\326\321\224\201\252\177t\246\320\002Zv{\346\002 {\357b~S\203y\342\201\360\006\3276.\342\005$\374\204e)#\336u\237\r%\207\205\013\364\240" > +peer1.org1.example.com | [786 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [965 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 1f cf db 53 ac 11 6f b3 47 75 |0E.!.....S..o.Gu| +orderer0.example.com | "2019-11-19 05:21:45.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d4 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [b08 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [954 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [787 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 e8 4d c4 66 99 85 0b 3d 75 6a 95 38 77 fa e7 f0 |.M.f...=uj.8w...| +orderer0.example.com | "2019-11-19 05:21:45.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [b09 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [955 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [788 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 fb 81 58 b4 45 02 20 69 4d e5 2e e3 c8 d0 98 06 |..X.E. iM.......| +orderer0.example.com | "2019-11-19 05:21:45.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.8µs " +peer1.org2.example.com | [b0a 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [956 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [789 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 3d 57 51 31 80 bf 06 66 24 ea 32 30 ab 9d c1 57 |=WQ1...f$.20...W| +peer1.org2.example.com | [b0b 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:45.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [957 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [78a 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 72 af 65 01 36 13 59 |r.e.6.Y| +orderer0.example.com | "2019-11-19 05:21:45.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d8 Sending msg of 28 bytes to 3 on channel testchainid took 182.7µs" +peer1.org2.example.com | [b0c 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [958 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [78b 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [967 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:45.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +peer1.org2.example.com | [b0d 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [959 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [78c 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [969 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:45.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6da Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" +peer1.org2.example.com | [b0e 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [95a 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [78d 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [954 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:45.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6db Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +peer1.org2.example.com | [b0f 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc51f0 gate 1574140916252890800 evaluation starts +peer0.org2.example.com | [95b 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [78e 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151014 +peer0.org1.example.com | [968 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:45.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.5µs " +peer1.org2.example.com | [b10 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc51f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [95c 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [78f 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 12170584380C7948ED68774FE4A8DC2E0819D6736362DE37A8CA4A4A88C16837 +peer0.org1.example.com | [96b 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 gate 1574140910836146900 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:45.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6dd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 155.6µs " +peer1.org2.example.com | [b11 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc51f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [95d 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [790 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [953 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:45.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6de Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [b12 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc51f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [95e 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [791 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [955 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:45.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6df Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [b13 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc51f0 principal evaluation fails +peer0.org2.example.com | [95f 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [792 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [96e 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:46.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [b14 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc51f0 gate 1574140916252890800 evaluation fails +peer0.org2.example.com | [960 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [793 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [96a 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:46.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e1 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +peer1.org2.example.com | [b15 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [961 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [794 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [96f 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:46.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 921.3µs " +peer1.org2.example.com | [b16 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [962 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [795 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [970 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 gate 1574140910860327800 evaluation starts +orderer0.example.com | "2019-11-19 05:21:46.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e3 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +peer1.org2.example.com | [b17 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [963 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [796 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [971 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:46.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e4 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +peer1.org2.example.com | [b18 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5760 gate 1574140916255297500 evaluation starts +peer0.org2.example.com | [964 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [797 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [96d 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " +peer1.org2.example.com | [b19 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5760 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [965 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [798 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [972 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.4µs " +peer1.org2.example.com | [b1a 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5760 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [966 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [799 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [974 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [b1b 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5760 principal matched by identity 0 +peer0.org2.example.com | [967 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [79a 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [96c 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [b1c 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [968 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [79b 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [973 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:46.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [969 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [79c 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [975 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ea Sending msg of 28 bytes to 3 on channel testchainid took 67.8µs" +peer1.org2.example.com | [b1d 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [96a 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [79d 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [978 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:21:46.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6eb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.8µs " +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [96b 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [79e 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [976 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.681 UTC [orderer.common.server] Deliver -> DEBU 6ec Starting new Deliver handler" +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [96c 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151012 +peer1.org1.example.com | [79f 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [979 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.685 UTC [common.deliver] Handle -> DEBU 6ed Starting new deliver loop for 172.18.0.5:51450" +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [96d 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6DF017F4CF9870F13DB3345A0A83ACE3513C8035D543219305175A62B652D9E0 +peer1.org1.example.com | [7a0 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [97a 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.685 UTC [common.deliver] Handle -> DEBU 6ee Attempting to read seek info message from 172.18.0.5:51450" +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [96e 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [7a1 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [97b 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +orderer0.example.com | "2019-11-19 05:21:46.695 UTC [orderer.common.server] Broadcast -> DEBU 6ef Starting new Broadcast handler" +peer1.org2.example.com | [b1e 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5760 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [96f 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [7a2 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [97c 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.695 UTC [orderer.common.broadcast] Handle -> DEBU 6f0 Starting new broadcast loop for 172.18.0.5:51452" +peer1.org2.example.com | [b1f 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5760 gate 1574140916255297500 evaluation succeeds +peer0.org2.example.com | [970 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [7a3 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [97d 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +orderer0.example.com | "2019-11-19 05:21:46.696 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 6f1 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:51452" +peer1.org2.example.com | [b20 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [971 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7a4 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [97e 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.696 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 6f2 Processing config update message for exisitng channel businesschannel" +peer1.org2.example.com | [b21 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [972 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [7a5 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [977 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:46.697 UTC [policies] Evaluate -> DEBU 6f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer1.org2.example.com | [b22 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [973 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7a6 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [97f 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 4d 5f 51 e3 32 7f 75 f0 d9 fb d4 7a 6b a5 c9 |lM_Q.2.u....zk..| +orderer0.example.com | "2019-11-19 05:21:46.697 UTC [policies] Evaluate -> DEBU 6f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [b23 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [974 11-19 05:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [7a7 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848f00 gate 1574140910822549500 evaluation starts +peer0.org1.example.com | 00000010 61 23 20 41 20 8b f2 83 d0 a6 18 a0 35 ca 76 56 |a# A .......5.vV| +orderer0.example.com | "2019-11-19 05:21:46.697 UTC [policies] Evaluate -> DEBU 6f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer1.org2.example.com | [b24 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [975 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7a8 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848f00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [980 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 1a 97 6b aa 3e 8e e8 c9 d9 19 80 |0D. ;..k.>......| +orderer0.example.com | "2019-11-19 05:21:46.698 UTC [policies] Evaluate -> DEBU 6f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [976 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [7a9 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848f00 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000010 f9 25 b7 a2 69 14 d6 d1 94 81 aa 7f 74 a6 d0 02 |.%..i.......t...| +orderer0.example.com | "2019-11-19 05:21:46.698 UTC [policies] Evaluate -> DEBU 6f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer1.org2.example.com | [b25 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [977 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [7aa 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848f00 principal matched by identity 0 +peer0.org1.example.com | 00000020 5a 76 7b e6 02 20 7b ef 62 7e 53 83 79 e2 81 f0 |Zv{.. {.b~S.y...| +orderer0.example.com | "2019-11-19 05:21:46.698 UTC [cauthdsl] func1 -> DEBU 6f8 0xc000b03240 gate 1574140906698476300 evaluation starts" +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [978 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [7ab 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 4d 5f 51 e3 32 7f 75 f0 d9 fb d4 7a 6b a5 c9 |lM_Q.2.u....zk..| +peer0.org1.example.com | 00000030 06 d7 36 2e e2 05 24 fc 84 65 29 23 de 75 9f 0d |..6...$..e)#.u..| +orderer0.example.com | "2019-11-19 05:21:46.698 UTC [cauthdsl] func2 -> DEBU 6f9 0xc000b03240 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [979 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 61 23 20 41 20 8b f2 83 d0 a6 18 a0 35 ca 76 56 |a# A .......5.vV| +peer0.org1.example.com | 00000040 25 87 85 0b f4 a0 |%.....| +orderer0.example.com | "2019-11-19 05:21:46.698 UTC [cauthdsl] func2 -> DEBU 6fa 0xc000b03240 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [97a 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [7ac 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 1a 97 6b aa 3e 8e e8 c9 d9 19 80 |0D. ;..k.>......| +peer0.org1.example.com | [981 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:46.699 UTC [cauthdsl] func2 -> DEBU 6fb 0xc000b03240 principal matched by identity 0" +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [97b 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 f9 25 b7 a2 69 14 d6 d1 94 81 aa 7f 74 a6 d0 02 |.%..i.......t...| +peer0.org1.example.com | [982 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 gate 1574140910860327800 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:46.699 UTC [msp.identity] Verify -> DEBU 6fc Verify: digest = 00000000 94 36 ec e8 20 52 d0 4d f8 19 92 d4 7c 83 89 13 |.6.. R.M....|...| +peer1.org2.example.com | [b26 11-19 05:21:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [97c 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 5a 76 7b e6 02 20 7b ef 62 7e 53 83 79 e2 81 f0 |Zv{.. {.b~S.y...| +peer0.org1.example.com | [983 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000010 83 5e 12 c5 e9 b6 a2 5c 3b ea 22 15 04 f7 0a b5 |.^.....\;.".....|" +peer1.org2.example.com | [b27 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [97d 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 06 d7 36 2e e2 05 24 fc 84 65 29 23 de 75 9f 0d |..6...$..e)#.u..| +peer0.org1.example.com | [984 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.699 UTC [msp.identity] Verify -> DEBU 6fd Verify: sig = 00000000 30 44 02 20 1f e7 f5 8c 39 2a 1c dc 70 f9 90 19 |0D. ....9*..p...| +peer1.org2.example.com | [b28 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [97e 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 25 87 85 0b f4 a0 |%.....| +peer0.org1.example.com | [985 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | 00000010 62 08 cc 47 5e c2 de 02 3b 8d 45 e8 c8 fd 7c d8 |b..G^...;.E...|.| +peer1.org2.example.com | [b29 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [97f 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [7ad 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848f00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [986 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | 00000020 5b 69 48 ef 02 20 5c 30 9c 80 3e 8f fc 40 26 1f |[iH.. \0..>..@&.| +peer1.org2.example.com | [b2a 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [980 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +peer1.org1.example.com | [7ae 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848f00 gate 1574140910822549500 evaluation succeeds +peer0.org1.example.com | [987 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000030 a0 e7 fa 17 63 20 7f 3a 33 a6 cf b6 08 3b 92 35 |....c .:3....;.5| +peer1.org2.example.com | [b2b 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +peer1.org1.example.com | [7af 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000040 74 a1 98 33 6f 80 |t..3o.|" +peer0.org1.example.com | [988 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [981 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +peer1.org2.example.com | [b2c 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7b1 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.700 UTC [cauthdsl] func2 -> DEBU 6fe 0xc000b03240 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [989 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +peer1.org2.example.com | [b2d 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7b2 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.700 UTC [cauthdsl] func1 -> DEBU 6ff 0xc000b03240 gate 1574140906698476300 evaluation succeeds" +peer0.org1.example.com | [98a 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +peer1.org2.example.com | [b2e 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [7b3 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.700 UTC [policies] Evaluate -> DEBU 700 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [98b 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +peer1.org2.example.com | [b2f 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [7b4 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:46.700 UTC [policies] Evaluate -> DEBU 701 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [98c 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 3c b7 fd fe 94 01 8e |<......| +peer1.org2.example.com | [b30 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [7b5 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [98d 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.701 UTC [policies] Evaluate -> DEBU 702 Signature set satisfies policy /Channel/Application/Writers" +peer0.org2.example.com | [982 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | [b31 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe13d0 gate 1574140916264840400 evaluation starts +peer1.org1.example.com | [7b6 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [98e 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.701 UTC [policies] Evaluate -> DEBU 703 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [b32 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe13d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [7b7 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [98f 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.701 UTC [policies] Evaluate -> DEBU 704 Signature set satisfies policy /Channel/Writers" +peer0.org2.example.com | [983 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f fe bb 95 a8 d7 54 68 30 8a 58 f3 |0D. /.....Th0.X.| +peer1.org2.example.com | [b33 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe13d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [7b8 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [990 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.701 UTC [policies] Evaluate -> DEBU 705 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org2.example.com | 00000010 7d 12 59 d5 61 4b 0c 44 a2 bc e9 0f 8e 8b 0c d0 |}.Y.aK.D........| +peer1.org2.example.com | [b34 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe13d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [7b0 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [991 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.701 UTC [common.configtx] addToMap -> DEBU 706 Adding to config map: [Group] /Channel" +peer0.org2.example.com | 00000020 17 19 1b d1 02 20 01 e1 01 c5 5c 08 29 2a 03 47 |..... ....\.)*.G| +peer1.org2.example.com | [b35 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe13d0 principal evaluation fails +peer1.org1.example.com | [7b9 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [992 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:21:46.703 UTC [common.configtx] addToMap -> DEBU 707 Adding to config map: [Group] /Channel/Application" +peer0.org2.example.com | 00000030 40 53 a1 30 1c 2e 65 35 e5 6f 06 29 73 76 c1 26 |@S.0..e5.o.)sv.&| +peer1.org2.example.com | [b36 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe13d0 gate 1574140916264840400 evaluation fails +peer1.org1.example.com | [7ba 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [993 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.703 UTC [common.configtx] addToMap -> DEBU 708 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org2.example.com | 00000040 46 41 e8 b2 3c 65 |FA.. DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7bb 11-19 05:21:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [994 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:46.703 UTC [common.configtx] addToMap -> DEBU 709 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org2.example.com | [984 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [b38 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7bc 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [995 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [985 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [b39 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [7bd 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [996 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [986 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b3a 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1940 gate 1574140916267394300 evaluation starts +peer1.org1.example.com | [7be 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [997 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [987 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [b3b 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [7bf 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [998 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70d Adding to config map: [Group] /Channel" +peer0.org2.example.com | [988 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 19 8b 85 59 7d 69 4c 24 0d eb f9 6e 6e 19 5d |....Y}iL$...nn.]| +peer1.org2.example.com | [b3c 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1940 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [7c0 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [999 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70e Adding to config map: [Group] /Channel/Application" +peer0.org2.example.com | 00000010 56 3f 42 5a 39 65 7f 10 b4 3d ef a3 b9 1a 23 14 |V?BZ9e...=....#.| +peer1.org2.example.com | [b3d 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1940 principal matched by identity 0 +peer1.org1.example.com | [7c1 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [99a 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70f Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org2.example.com | [989 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 35 11 38 3f dc 0c 83 3a fb ea |0E.!..5.8?...:..| +peer1.org2.example.com | [b3e 11-19 05:21:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [7c2 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [99b 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 710 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org2.example.com | 00000010 0e 51 7c f2 0a 23 7d 71 7f 6b 28 0d 48 51 81 3b |.Q|..#}q.k(.HQ.;| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [7c3 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [99c 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 711 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org2.example.com | 00000020 22 09 b5 af e3 02 20 10 d9 9c e7 51 65 4a b5 f7 |"..... ....QeJ..| +peer1.org2.example.com | [b3f 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [7c4 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 712 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | 00000030 df 51 dc 08 7c e5 e1 24 66 f5 87 2d 6f 68 cb 44 |.Q..|..$f..-oh.D| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [7c5 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [99d 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 713 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | 00000040 b6 0c ba 96 ca 37 f6 |.....7.| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [7c6 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | 00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 714 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [98a 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [7c7 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +peer0.org1.example.com | 00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] verifyDeltaSet -> DEBU 715 Processing change to key: [Group] /Channel/Application/Org1MSP" +peer0.org2.example.com | [98b 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | 00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +peer0.org1.example.com | 00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [common.configtx] policyForItem -> DEBU 716 Getting policy for item Org1MSP with mod_policy Admins" +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [b40 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [7c8 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +peer0.org1.example.com | 00000040 c0 54 b2 99 1b 95 3e |.T....>| +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [policies] Manager -> DEBU 717 Manager Channel looking up path [Application]" +peer0.org2.example.com | [98c 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f7 a3 81 aa 4b 96 da 2e 23 65 13 |0D. X....K...#e.| +peer1.org2.example.com | [b41 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1940 gate 1574140916267394300 evaluation succeeds +peer1.org1.example.com | 00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +peer0.org1.example.com | [99e 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [policies] Manager -> DEBU 718 Manager Channel has managers Application" +peer0.org2.example.com | 00000010 62 84 a1 09 08 0f ca d6 9f 56 e8 1e b5 46 5e 34 |b........V...F^4| +peer1.org2.example.com | [b42 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +peer0.org1.example.com | [99f 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.704 UTC [policies] Manager -> DEBU 719 Manager Channel has managers Orderer" +peer0.org2.example.com | 00000020 d4 6c 2c 18 02 20 2f 81 b8 fd 83 7b be 40 b7 c4 |.l,.. /....{.@..| +peer1.org2.example.com | [b43 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +peer0.org1.example.com | [9a0 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71a Manager Channel/Application looking up path []" +peer0.org2.example.com | 00000030 f8 50 5f 37 8c 64 bf 4e 00 33 4a 57 1b db 31 01 |.P_7.d.N.3JW..1.| +peer1.org2.example.com | [b44 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 c0 54 b2 99 1b 95 3e |.T....>| +peer0.org1.example.com | [9a1 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71b Manager Channel/Application has managers Org1MSP" +peer0.org2.example.com | 00000040 93 9f 98 4a 4c 90 |...JL.| +peer1.org2.example.com | [b45 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [7c9 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | [9a2 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71c Manager Channel/Application has managers Org2MSP" +peer0.org2.example.com | [98d 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [b46 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [9a3 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71d Manager Channel/Application looking up path [Org1MSP]" +peer0.org2.example.com | [98e 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 20 but got ts: inc_num:1574140895405208300 seq_num:12 +peer1.org2.example.com | [b47 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7ca 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 0f 8f ca 5c 5d 65 ca b6 56 33 ff |0D. 2...\]e..V3.| +peer0.org1.example.com | [9a4 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71e Manager Channel/Application has managers Org1MSP" +peer0.org2.example.com | [98f 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b48 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 d6 ed 5d ec 86 ae 66 21 88 75 e9 5b 71 87 e2 e8 |..]...f!.u.[q...| +peer0.org1.example.com | [9a5 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71f Manager Channel/Application has managers Org2MSP" +peer0.org2.example.com | [990 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b49 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 6f ba d6 f5 02 20 3f 98 92 91 85 01 23 47 06 7d |o.... ?.....#G.}| +peer0.org1.example.com | [9a6 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 720 Manager Channel/Application/Org1MSP looking up path []" +peer0.org2.example.com | [991 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer1.org2.example.com | [b4a 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 44 82 4c 5d df ae 49 25 ff 5d 98 35 6b 96 aa 68 |D.L]..I%.].5k..h| +peer0.org1.example.com | [9a7 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [policies] Evaluate -> DEBU 721 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org2.example.com | [992 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [b4b 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000040 34 94 1e 7b f7 f4 |4..{..| +peer0.org1.example.com | [9a8 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [cauthdsl] func1 -> DEBU 722 0xc000b3dc20 gate 1574140906705424900 evaluation starts" +peer0.org2.example.com | [993 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +peer1.org2.example.com | [b4c 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [7cb 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [9a9 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 gate 1574140910875060000 evaluation starts +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [cauthdsl] func2 -> DEBU 723 0xc000b3dc20 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | 00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +peer1.org2.example.com | [b4d 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [7cc 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [9aa 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [cauthdsl] func2 -> DEBU 724 0xc000b3dc20 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [994 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +peer1.org2.example.com | [b4e 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe4c60 gate 1574140916274204700 evaluation starts +peer1.org1.example.com | [7cd 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [9ac 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 725 Checking if identity has been named explicitly as an admin for Org1MSP" +peer0.org2.example.com | 00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +peer1.org2.example.com | [b4f 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe4c60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [7ce 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [9ad 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 726 Checking if identity carries the admin ou for Org1MSP" +peer0.org2.example.com | 00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +peer1.org2.example.com | [b50 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe4c60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [7cf 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [9ab 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [msp] Validate -> DEBU 727 MSP Org1MSP validating identity" +peer0.org2.example.com | 00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +peer1.org1.example.com | [7d0 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b51 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe4c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [9ae 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.705 UTC [msp] getCertificationChain -> DEBU 728 MSP Org1MSP getting certification chain" +peer0.org2.example.com | 00000040 3c b7 fd fe 94 01 8e |<......| +peer1.org1.example.com | [7d1 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b52 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe4c60 principal evaluation fails +peer0.org1.example.com | [9af 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [msp] hasOURole -> DEBU 729 MSP Org1MSP checking if the identity is a client" +peer0.org2.example.com | [995 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [7d2 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b53 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe4c60 gate 1574140916274204700 evaluation fails +peer0.org1.example.com | [9b0 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [msp] getCertificationChain -> DEBU 72a MSP Org1MSP getting certification chain" +peer0.org2.example.com | [996 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [7d3 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [b54 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9b1 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e f8 80 a5 e3 28 6d 18 1c 9d ba fe c3 41 e3 b2 |.....(m......A..| +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [cauthdsl] func2 -> DEBU 72b 0xc000b3dc20 principal matched by identity 0" +peer0.org2.example.com | [997 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7d4 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b55 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 11 84 90 75 ba 4f 5d 14 73 29 84 2b e8 9d fc ef |...u.O].s).+....| +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [msp.identity] Verify -> DEBU 72c Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +peer0.org2.example.com | [998 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [7d5 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [b56 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [9b2 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 05 7b 17 02 f3 b8 53 af 34 8c fb |0D. 8.{....S.4..| +orderer0.example.com | 00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.|" +peer0.org2.example.com | [999 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7d6 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [b57 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5230 gate 1574140916274451000 evaluation starts +peer0.org1.example.com | 00000010 a2 0a 60 9d 35 e8 73 f4 17 f8 2f 9c db e2 ca 91 |..`.5.s.../.....| +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [msp.identity] Verify -> DEBU 72d Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +peer0.org2.example.com | [99a 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [7d7 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b58 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 57 ce f5 3e 02 20 1f be 98 b3 5c 17 59 a9 9c 7e |W..>. ....\.Y..~| +orderer0.example.com | 00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +peer0.org2.example.com | [99b 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7d8 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" secret_envelope: > alive: +peer1.org2.example.com | [b59 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5230 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000030 c3 f5 05 9a b4 ca b7 27 a7 1c 3c 50 fa 40 3a d4 |.......'.. DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7d9 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [b5a 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5230 principal matched by identity 0 +peer0.org1.example.com | 00000040 d9 e3 0b 09 25 da |....%.| +orderer0.example.com | 00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +peer0.org2.example.com | [99d 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [7da 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b5b 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [9b3 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 principal evaluation succeeds for identity 0 +orderer0.example.com | 00000040 4d ed a9 9c dd 40 ef |M....@.|" +peer1.org1.example.com | [7db 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [99e 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [9b4 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 gate 1574140910875060000 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [cauthdsl] func2 -> DEBU 72e 0xc000b3dc20 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [7dc 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [99f 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [b5c 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [9b5 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [cauthdsl] func1 -> DEBU 72f 0xc000b3dc20 gate 1574140906705424900 evaluation succeeds" +peer1.org1.example.com | [7dd 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [9a0 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032139d0 gate 1574140911863510100 evaluation starts +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [9b6 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [policies] Evaluate -> DEBU 730 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer1.org1.example.com | [7de 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9a1 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032139d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [9b7 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [policies] Evaluate -> DEBU 731 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer1.org1.example.com | [7df 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [9a2 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032139d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [9b8 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.706 UTC [common.configtx] verifyDeltaSet -> DEBU 732 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer1.org1.example.com | [7e0 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [9a3 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032139d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [9b9 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 733 Setting policy for key Readers to " +peer1.org1.example.com | [7e1 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [9a4 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032139d0 principal evaluation fails +peer1.org2.example.com | [b5d 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5230 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9ba 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 734 Setting policy for key Writers to " +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [9a5 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032139d0 gate 1574140911863510100 evaluation fails +peer1.org2.example.com | [b5e 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5230 gate 1574140916274451000 evaluation succeeds +peer0.org1.example.com | [9bb 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 735 Setting policy for key Admins to " +peer1.org1.example.com | [7e2 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [9a6 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b5f 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [9bc 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 736 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [9a7 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b60 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [9bd 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 737 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [9a8 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b61 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9be 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 738 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [9a9 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e040 gate 1574140911864215300 evaluation starts +peer1.org2.example.com | [b62 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9bf 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:21:46.708 UTC [common.configtx] recurseConfigMap -> DEBU 739 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org2.example.com | [9aa 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e040 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b63 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [9c0 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [7e3 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.708 UTC [common.configtx] recurseConfigMap -> DEBU 73a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org2.example.com | [9ab 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e040 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [9c1 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7e4 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:46.708 UTC [common.configtx] recurseConfigMap -> DEBU 73b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org2.example.com | [9ac 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e040 principal matched by identity 0 +peer1.org2.example.com | [b64 11-19 05:21:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [9c2 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7e5 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:46.708 UTC [common.configtx] recurseConfigMap -> DEBU 73c Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [9ad 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [9c3 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [7e6 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 73d Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [9c4 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7e7 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 73e Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [9ae 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [9c5 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7e8 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 73f Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [9c6 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7e9 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 740 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +peer1.org2.example.com | [b65 11-19 05:21:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [9c7 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7ea 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 741 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +peer0.org2.example.com | 00000040 c0 54 b2 99 1b 95 3e |.T....>| +peer0.org1.example.com | [9c8 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 742 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [9af 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e040 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [9c9 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 743 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [9b0 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e040 gate 1574140911864215300 evaluation succeeds +peer1.org2.example.com | [b66 11-19 05:21:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [9ca 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 744 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [9b1 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [9cb 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 745 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | [9b2 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | [9cc 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 746 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [9b3 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [9cd 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 747 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org2.example.com | [9b4 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [9ce 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.710 UTC [common.configtx] recurseConfigMap -> DEBU 748 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org2.example.com | [9b5 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b67 11-19 05:21:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9cf 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.710 UTC [common.channelconfig] NewStandardValues -> DEBU 749 Initializing protos for *channelconfig.ChannelProtos" +peer1.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org2.example.com | [9b6 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b68 11-19 05:21:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [9d0 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74a Processing field: HashingAlgorithm" +peer1.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | [9b7 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [b69 11-19 05:21:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9d1 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74b Processing field: BlockDataHashingStructure" +peer1.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org2.example.com | [9b8 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b6a 11-19 05:21:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9d2 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74c Processing field: OrdererAddresses" +peer1.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org2.example.com | [9b9 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b6b 11-19 05:21:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9d3 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74d Processing field: Consortium" +peer1.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org2.example.com | [9ba 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [b6c 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [9d4 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74e Processing field: Capabilities" +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [9bb 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [b6d 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9d5 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +orderer0.example.com | "2019-11-19 05:21:46.710 UTC [common.channelconfig] NewStandardValues -> DEBU 74f Initializing protos for *channelconfig.OrdererProtos" +peer1.org1.example.com | [7eb 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387ff20 gate 1574140911379269400 evaluation starts +peer0.org2.example.com | [9bc 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b6e 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9d6 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 750 Processing field: ConsensusType" +peer1.org1.example.com | [7ec 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387ff20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9bd 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +peer1.org2.example.com | [b6f 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 751 Processing field: BatchSize" +peer1.org1.example.com | [7ed 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387ff20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [9be 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9d7 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +peer1.org2.example.com | [b70 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 752 Processing field: BatchTimeout" +peer1.org1.example.com | [7ee 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387ff20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [9bf 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +peer1.org2.example.com | [b71 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 753 Processing field: KafkaBrokers" +peer1.org1.example.com | [7ef 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387ff20 principal evaluation fails +peer0.org2.example.com | [9c0 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +peer1.org2.example.com | [b72 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083440 gate 1574140916295510100 evaluation starts +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 754 Processing field: ChannelRestrictions" +peer1.org1.example.com | [7f0 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387ff20 gate 1574140911379269400 evaluation fails +peer0.org2.example.com | [9c1 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +peer1.org2.example.com | [b73 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083440 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 755 Processing field: Capabilities" +peer1.org1.example.com | [7f1 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [9c2 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000040 c0 54 b2 99 1b 95 3e |.T....>| +peer1.org2.example.com | [b74 11-19 05:21:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083440 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] NewStandardValues -> DEBU 756 Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org1.example.com | [7f2 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [9c3 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334f5b0 gate 1574140911865605500 evaluation starts +peer0.org1.example.com | [9d8 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [b75 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 757 Processing field: Endpoints" +peer1.org1.example.com | [7f3 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [9c4 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334f5b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [b76 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083440 principal evaluation fails +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] NewStandardValues -> DEBU 758 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [7f4 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a2d30 gate 1574140911379759100 evaluation starts +peer0.org2.example.com | [9c5 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334f5b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [9d9 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 0f 8f ca 5c 5d 65 ca b6 56 33 ff |0D. 2...\]e..V3.| +peer1.org2.example.com | [b77 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083440 gate 1574140916295510100 evaluation fails +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 759 Processing field: MSP" +peer1.org1.example.com | [7f5 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a2d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9c6 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334f5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 d6 ed 5d ec 86 ae 66 21 88 75 e9 5b 71 87 e2 e8 |..]...f!.u.[q...| +peer1.org2.example.com | [b78 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [common.channelconfig] validateMSP -> DEBU 75a Setting up MSP for org OrdererOrg" +peer1.org1.example.com | [7f6 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a2d30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [9c7 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334f5b0 principal evaluation fails +peer0.org1.example.com | 00000020 6f ba d6 f5 02 20 3f 98 92 91 85 01 23 47 06 7d |o.... ?.....#G.}| +peer1.org2.example.com | [b79 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [msp] newBccspMsp -> DEBU 75b Creating BCCSP-based MSP instance" +peer1.org1.example.com | [7f7 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [9c8 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334f5b0 gate 1574140911865605500 evaluation fails +peer0.org1.example.com | 00000030 44 82 4c 5d df ae 49 25 ff 5d 98 35 6b 96 aa 68 |D.L]..I%.].5k..h| +peer1.org2.example.com | [b7a 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [msp] New -> DEBU 75c Creating Cache-MSP instance" +peer1.org1.example.com | [7f8 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [9c9 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 34 94 1e 7b f7 f4 |4..{..| +peer1.org2.example.com | [b7b 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083a20 gate 1574140916302020600 evaluation starts +orderer0.example.com | "2019-11-19 05:21:46.711 UTC [msp] Setup -> DEBU 75d Setting up MSP instance OrdererMSP" +peer1.org1.example.com | [7f9 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [9ca 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9da 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [b7c 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083a20 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [msp.identity] newIdentity -> DEBU 75e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [7fa 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a2d30 principal matched by identity 0 +peer0.org2.example.com | [9cb 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [9db 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [b7d 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083a20 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [7fb 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [9cc 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334fb20 gate 1574140911866249100 evaluation starts +peer0.org1.example.com | [9dc 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b7e 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083a20 principal matched by identity 0 +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [9cd 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334fb20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9dd 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b7f 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [7fc 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [9ce 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334fb20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [9de 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [9cf 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334fb20 principal matched by identity 0 +peer0.org1.example.com | [9df 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b80 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [9d0 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +peer0.org1.example.com | [9e0 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +peer0.org1.example.com | [9e1 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [9d1 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +peer0.org1.example.com | 00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org1.example.com | [7fd 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a2d30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +peer0.org1.example.com | [9e2 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | [7fe 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a2d30 gate 1574140911379759100 evaluation succeeds +peer0.org2.example.com | 00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +peer0.org1.example.com | 00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +peer1.org2.example.com | [b81 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083a20 principal evaluation succeeds for identity 0 +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | [7ff 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +peer0.org1.example.com | 00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +peer1.org2.example.com | [b82 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083a20 gate 1574140916302020600 evaluation succeeds +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | [800 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000040 b0 a7 83 ce 50 7e |....P~| +peer0.org1.example.com | 00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +peer1.org2.example.com | [b83 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | [801 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [9d2 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 c0 54 b2 99 1b 95 3e |.T....>| +peer1.org2.example.com | [b84 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | 1g== +peer1.org1.example.com | [802 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [9d3 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334fb20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9e3 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b85 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [803 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9d4 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334fb20 gate 1574140911866249100 evaluation succeeds +peer0.org1.example.com | [9e4 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b86 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [msp.identity] newIdentity -> DEBU 75f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [804 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [9d5 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [9e5 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b87 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [805 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [9e6 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [806 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [9e7 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9d6 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b88 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [9e8 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9d7 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [9e9 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9d8 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [9ea 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9d9 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [9eb 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9da 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org1.example.com | [807 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9ec 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [9db 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [b89 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org1.example.com | [808 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9ed 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [9dc 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org1.example.com | [809 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [9ee 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 gate 1574140910891609200 evaluation starts +peer0.org2.example.com | 00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +peer1.org2.example.com | [b8a 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org1.example.com | [80a 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9ef 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9dd 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org1.example.com | [80b 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [9f0 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [80c 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9f1 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 principal matched by identity 0 +peer0.org2.example.com | 00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [msp] Validate -> DEBU 760 MSP OrdererMSP validating identity" +peer1.org1.example.com | [80d 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f2 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 19 8b 85 59 7d 69 4c 24 0d eb f9 6e 6e 19 5d |....Y}iL$...nn.]| +peer0.org2.example.com | 00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] NewStandardValues -> DEBU 761 Initializing protos for *channelconfig.ApplicationProtos" +peer1.org1.example.com | [80e 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 56 3f 42 5a 39 65 7f 10 b4 3d ef a3 b9 1a 23 14 |V?BZ9e...=....#.| +peer0.org2.example.com | 00000040 3c b7 fd fe 94 01 8e |<......| +peer1.org2.example.com | [b8b 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] initializeProtosStruct -> DEBU 762 Processing field: ACLs" +peer1.org1.example.com | [80f 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [9f3 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 35 11 38 3f dc 0c 83 3a fb ea |0E.!..5.8?...:..| +peer0.org2.example.com | [9de 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b8c 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] initializeProtosStruct -> DEBU 763 Processing field: Capabilities" +peer1.org1.example.com | [810 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 0e 51 7c f2 0a 23 7d 71 7f 6b 28 0d 48 51 81 3b |.Q|..#}q.k(.HQ.;| +peer0.org2.example.com | [9df 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] NewStandardValues -> DEBU 764 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | [b8d 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [811 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 22 09 b5 af e3 02 20 10 d9 9c e7 51 65 4a b5 f7 |"..... ....QeJ..| +peer0.org2.example.com | [9e0 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] initializeProtosStruct -> DEBU 765 Processing field: AnchorPeers" +peer1.org2.example.com | [b8e 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [812 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer0.org1.example.com | 00000030 df 51 dc 08 7c e5 e1 24 66 f5 87 2d 6f 68 cb 44 |.Q..|..$f..-oh.D| +peer0.org2.example.com | [9e1 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] NewStandardValues -> DEBU 766 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [b8f 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [813 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 b6 0c ba 96 ca 37 f6 |.....7.| +peer0.org2.example.com | [9e2 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 22 53 4e e7 78 ea dd 97 fa 4f af cc 9d 7b c8 |6"SN.x....O...{.| +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] initializeProtosStruct -> DEBU 767 Processing field: MSP" +peer1.org2.example.com | [b90 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [814 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9f4 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 28 bd 43 2e 47 4c 60 e2 9f 25 1d c0 74 6f a0 f0 |(.C.GL`..%..to..| +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] Validate -> DEBU 768 Anchor peers for org Org1MSP are anchor_peers: " +peer1.org2.example.com | [b91 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [815 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f5 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 gate 1574140910891609200 evaluation succeeds +peer0.org2.example.com | [9e3 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 96 22 d0 d6 eb e9 2f 69 a7 3d 7f |0D. l."..../i.=.| +orderer0.example.com | "2019-11-19 05:21:46.712 UTC [common.channelconfig] validateMSP -> DEBU 769 Setting up MSP for org Org1MSP" +peer1.org2.example.com | [b92 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [816 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9f6 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 2a dd 7c ef 18 30 37 08 71 0d 78 e0 7a 7f de 91 |*.|..07.q.x.z...| +orderer0.example.com | "2019-11-19 05:21:46.715 UTC [msp] newBccspMsp -> DEBU 76a Creating BCCSP-based MSP instance" +peer1.org2.example.com | [b93 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cf8e0 gate 1574140916307777700 evaluation starts +peer1.org1.example.com | [817 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9f7 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 a5 77 4c 14 02 20 38 21 cb e3 6a 1d 42 85 16 9e |.wL.. 8!..j.B...| +orderer0.example.com | "2019-11-19 05:21:46.715 UTC [msp] New -> DEBU 76b Creating Cache-MSP instance" +peer1.org2.example.com | [b94 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cf8e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [818 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [9f8 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 bc da 5f 34 0e 3d 2d da 2d 73 92 6d 4d 46 99 22 |.._4.=-.-s.mMF."| +orderer0.example.com | "2019-11-19 05:21:46.715 UTC [msp] Setup -> DEBU 76c Setting up MSP instance Org1MSP" +peer1.org2.example.com | [b95 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cf8e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [819 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9f9 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 54 df bf 03 9e c9 |T.....| +orderer0.example.com | "2019-11-19 05:21:46.716 UTC [msp.identity] newIdentity -> DEBU 76d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [b96 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cf8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [81a 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [9fa 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [9e4 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [b97 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cf8e0 principal evaluation fails +peer1.org1.example.com | [81b 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9fb 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 18 but got ts: inc_num:1574140895405208300 seq_num:12 +peer0.org2.example.com | [9e5 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [b98 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cf8e0 gate 1574140916307777700 evaluation fails +peer1.org1.example.com | [81c 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [9fc 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9e6 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [b99 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [81d 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9fd 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9e7 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [b9a 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [81e 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [9fe 11-19 05:21:51.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9e8 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [b9b 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [820 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [9ff 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9e9 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [b9c 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cfe50 gate 1574140916308925600 evaluation starts +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [a00 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [9ea 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [b9d 11-19 05:21:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cfe50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [821 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [a01 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [9eb 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org2.example.com | [b9e 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cfe50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [a02 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ec 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [b9f 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cfe50 principal matched by identity 0 +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [a03 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [9ed 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org2.example.com | [ba0 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [a04 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ee 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [a05 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [9ef 11-19 05:21:51.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org2.example.com | [ba1 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [81f 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [a06 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9f0 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [822 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a07 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +peer0.org2.example.com | [9f1 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [823 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [a08 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +peer0.org2.example.com | [9f2 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes to 3 peers +orderer0.example.com | "2019-11-19 05:21:46.716 UTC [common.channelconfig] NewStandardValues -> DEBU 76e Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [824 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a09 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f3 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [common.channelconfig] initializeProtosStruct -> DEBU 76f Processing field: AnchorPeers" +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [825 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer A^���g�� +peer0.org1.example.com | [a0a 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f4 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [common.channelconfig] NewStandardValues -> DEBU 770 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [ba2 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cfe50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | ����U���ʒ�:+��aSpq� message sent from �%��_k<���\<���8 [:5AT�!�]� +peer0.org1.example.com | [a0b 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f5 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [common.channelconfig] initializeProtosStruct -> DEBU 771 Processing field: MSP" +peer1.org2.example.com | [ba3 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cfe50 gate 1574140916308925600 evaluation succeeds +peer1.org1.example.com | [826 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a0c 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9f6 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [common.channelconfig] Validate -> DEBU 772 Anchor peers for org Org2MSP are " +peer1.org2.example.com | [ba4 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [827 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [a0f 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9f7 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [common.channelconfig] validateMSP -> DEBU 773 Setting up MSP for org Org2MSP" +peer1.org2.example.com | [ba5 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [828 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [a10 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9f8 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [msp] newBccspMsp -> DEBU 774 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [ba6 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [829 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a11 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9f9 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [msp] New -> DEBU 775 Creating Cache-MSP instance" +peer1.org2.example.com | [ba7 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [82a 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 375 bytes, Signature: 0 bytes +peer0.org1.example.com | [a0d 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer0.org2.example.com | [9fa 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [msp] Setup -> DEBU 776 Setting up MSP instance Org2MSP" +peer1.org2.example.com | [ba8 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [82b 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 375 bytes, Signature: 0 bytes +peer0.org1.example.com | [a0e 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org2.example.com | [9fb 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [msp.identity] newIdentity -> DEBU 777 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [ba9 11-19 05:21:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [82c 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a12 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [9fc 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [baa 11-19 05:21:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [82d 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a13 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [9fd 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [bab 11-19 05:21:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [82e 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a14 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 gate 1574140911351351400 evaluation starts +peer0.org2.example.com | [9fe 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [bac 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [a15 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [82f 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9ff 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [bad 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [a16 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [830 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a00 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [bae 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a17 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 principal matched by identity 0 +peer1.org1.example.com | [831 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [a01 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [baf 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a18 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [832 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [a02 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bb0 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [833 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org2.example.com | [a03 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bb1 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a19 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [834 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [a04 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [bb2 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [835 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5510 gate 1574140911677099100 evaluation starts +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org2.example.com | [a05 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [bb3 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [836 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5510 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | [a06 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [bb4 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [837 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5510 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org2.example.com | [a07 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a43e0 gate 1574140912001582400 evaluation starts +peer1.org2.example.com | [bb5 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [838 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5510 principal matched by identity 0 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org2.example.com | [a08 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a43e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [bb6 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [a1a 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [839 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [a09 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a43e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [bb7 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a1b 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 gate 1574140911351351400 evaluation succeeds +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [msp] Setup -> DEBU 778 Setting up the MSP manager (3 msps)" +peer0.org2.example.com | [a0a 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a43e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [a1c 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bb8 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [83a 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [msp] Setup -> DEBU 779 MSP manager setup complete, setup 3 msps" +peer0.org2.example.com | [a0b 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a43e0 principal evaluation fails +peer0.org1.example.com | [a1d 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bb9 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77a Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org2.example.com | [a0c 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a43e0 gate 1574140912001582400 evaluation fails +peer0.org1.example.com | [a1e 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [bba 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77b Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org2.example.com | [a0d 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a1f 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [bbb 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77c Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org2.example.com | [a0e 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a20 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bbc 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77d Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org2.example.com | [a0f 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [a21 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bbd 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [83b 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5510 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77e Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org2.example.com | [a10 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4950 gate 1574140912001957200 evaluation starts +peer0.org1.example.com | [a22 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bbe 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [83c 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5510 gate 1574140911677099100 evaluation succeeds +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77f Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org2.example.com | [a11 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4950 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [a23 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [bbf 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [83d 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 780 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org2.example.com | [a12 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4950 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [a24 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [bc0 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [83e 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 781 Proposed new policy Writers for Channel/Application" +peer0.org2.example.com | [a13 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4950 principal matched by identity 0 +peer0.org1.example.com | [a25 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [bc1 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229510 gate 1574140918856326800 evaluation starts +peer1.org1.example.com | [83f 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 782 Proposed new policy Admins for Channel/Application" +peer0.org2.example.com | [a14 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [a26 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 gate 1574140911353538600 evaluation starts +peer1.org2.example.com | [bc2 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [840 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] GetPolicy -> DEBU 783 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [a27 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [bc3 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229510 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [841 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 784 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org2.example.com | [a15 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [a28 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [bc4 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [842 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] GetPolicy -> DEBU 785 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [a29 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 principal matched by identity 0 +peer1.org2.example.com | [bc5 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229510 principal evaluation fails +peer1.org1.example.com | [843 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 786 Proposed new policy Endorsement for Channel/Application" +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [a2a 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [bc6 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229510 gate 1574140918856326800 evaluation fails +peer1.org1.example.com | [844 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 787 Proposed new policy Readers for Channel/Application" +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [bc7 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [845 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 788 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [bc8 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a2b 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [846 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 789 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [a16 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4950 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [bc9 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [847 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4050 gate 1574140911679831900 evaluation starts +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [a17 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4950 gate 1574140912001957200 evaluation succeeds +peer1.org2.example.com | [bca 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229a80 gate 1574140918856837000 evaluation starts +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [848 11-19 05:21:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4050 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78b Proposed new policy Writers for Channel/Orderer" +peer0.org2.example.com | [a18 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [bcb 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229a80 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78c Proposed new policy Admins for Channel/Orderer" +peer1.org1.example.com | [849 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4050 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [a19 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [bcc 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229a80 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78d Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78e Proposed new policy Readers for Channel/Orderer" +peer1.org2.example.com | [bcd 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229a80 principal matched by identity 0 +peer0.org2.example.com | [a1a 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78f Proposed new policy Writers for Channel" +peer1.org2.example.com | [bce 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [84a 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4050 principal matched by identity 0 +peer0.org2.example.com | [a1b 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [policies] NewManagerImpl -> DEBU 790 Proposed new policy Admins for Channel" +peer1.org2.example.com | 00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [84b 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [a1c 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [policies] NewManagerImpl -> DEBU 791 Proposed new policy Readers for Channel" +peer1.org2.example.com | [bcf 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +peer0.org1.example.com | [a2c 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 792 Adding to config map: [Group] /Channel" +peer1.org2.example.com | 00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +peer0.org1.example.com | [a2d 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 gate 1574140911353538600 evaluation succeeds +peer1.org1.example.com | [84c 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [a1d 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 793 Adding to config map: [Group] /Channel/Orderer" +peer1.org2.example.com | 00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +peer0.org1.example.com | [a2e 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 794 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org2.example.com | 00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +peer0.org1.example.com | [a2f 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 795 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org2.example.com | 00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +peer0.org1.example.com | [a30 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 3 peers +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 796 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [bd0 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229a80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [a31 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 797 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org2.example.com | [bd1 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003229a80 gate 1574140918856837000 evaluation succeeds +peer0.org1.example.com | [a32 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [84d 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4050 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a1e 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 798 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org2.example.com | [bd2 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [a33 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [84e 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4050 gate 1574140911679831900 evaluation succeeds +peer0.org2.example.com | [a1f 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 799 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org2.example.com | [bd3 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [a34 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [84f 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a20 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 79a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org2.example.com | [bd4 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [a35 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [850 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a21 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 79b Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org2.example.com | [bd5 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [a36 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [851 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a22 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 79c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org2.example.com | [bd6 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a37 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [852 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a23 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 79d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org2.example.com | [bd7 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [a38 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [853 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [a24 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 79e Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org2.example.com | [bd8 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [a39 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 79f Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org2.example.com | [bd9 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [a3a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [854 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a0 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org2.example.com | [bda 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [a3b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer1.org2.example.com | [bdb 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a3c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a2 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [bdc 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a3d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a3 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org2.example.com | [bdd 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a3e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a4 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer1.org2.example.com | [bde 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | [a3f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer1.org1.example.com | [855 11-19 05:21:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer1.org2.example.com | [bdf 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a40 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org1.example.com | [856 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer1.org2.example.com | [be0 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a41 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [857 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer1.org2.example.com | [be1 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a42 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org1.example.com | [858 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [be2 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a43 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org1.example.com | [859 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a9 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [be3 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [a44 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer1.org1.example.com | [85a 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7aa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org2.example.com | [be4 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [a45 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [85b 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7ab Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | [be5 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a46 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a25 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5af0 gate 1574140912028369000 evaluation starts +peer1.org1.example.com | [85c 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7ac Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer1.org2.example.com | [be6 11-19 05:21:59.22 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] +peer0.org1.example.com | [a47 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a26 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5af0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [85d 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7ad Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer1.org2.example.com | [be7 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [a27 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5af0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [a48 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 gate 1574140911366604200 evaluation starts +peer1.org1.example.com | [85e 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [be8 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a28 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [a49 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [85f 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7af Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org2.example.com | [be9 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a29 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [a4a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [860 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b0 Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org2.example.com | [bea 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a2a 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [a4b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 principal matched by identity 0 +peer1.org1.example.com | [861 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b1 Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org2.example.com | [beb 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a2b 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5af0 principal matched by identity 0 +peer0.org1.example.com | [a4c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [862 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b2 Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org2.example.com | [bec 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [a2c 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [863 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b3 Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org2.example.com | [bed 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [a4d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [864 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [865 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [866 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151015 +peer1.org1.example.com | [867 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 70353DC0F9E476F42EAAE847B94797A195F8A511EC586E81C04834D5A72CE2D0 +peer1.org1.example.com | [868 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [869 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [86a 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [86b 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [86c 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [86d 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [86e 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [86f 11-19 05:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [870 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org1.example.com | [871 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [872 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [873 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [874 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [875 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [876 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [877 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [878 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +peer1.org1.example.com | 00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +peer1.org1.example.com | [879 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +peer1.org1.example.com | 00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +peer1.org1.example.com | 00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +peer1.org1.example.com | 00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +peer1.org1.example.com | 00000040 b0 a7 83 ce 50 7e |....P~| +peer1.org1.example.com | [87a 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [87b 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [87c 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [87d 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [87e 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +peer1.org1.example.com | 00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +peer1.org1.example.com | [87f 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +peer1.org1.example.com | 00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +peer1.org1.example.com | 00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +peer1.org1.example.com | 00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +peer1.org1.example.com | 00000040 c0 54 b2 99 1b 95 3e |.T....>| +peer1.org1.example.com | [880 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [881 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b5 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b7 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b8 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b9 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7ba Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:21:46.722 UTC [common.configtx] addToMap -> DEBU 7bb Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:46.722 UTC [common.configtx] addToMap -> DEBU 7bc Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:46.722 UTC [common.configtx] addToMap -> DEBU 7bd Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:46.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 7be As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-11-19 05:21:46.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 7bf As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-11-19 05:21:46.722 UTC [policies] Manager -> DEBU 7c0 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:21:46.722 UTC [policies] Manager -> DEBU 7c1 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:46.722 UTC [policies] Manager -> DEBU 7c2 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:46.723 UTC [policies] Manager -> DEBU 7c3 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:21:46.723 UTC [policies] Manager -> DEBU 7c4 Manager Channel/Application has managers Org1MSP" +peer1.org1.example.com | [882 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [883 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [884 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [885 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [886 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [887 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [888 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [889 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [88a 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [88b 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [88c 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [88d 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [88e 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +peer1.org1.example.com | 00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +peer1.org1.example.com | [88f 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +peer1.org1.example.com | 00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +peer1.org1.example.com | 00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +peer1.org1.example.com | 00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +peer1.org1.example.com | 00000040 b0 a7 83 ce 50 7e |....P~| +peer1.org1.example.com | [890 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [891 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e d8 7c 41 ed 7e 17 52 22 d7 4e 6f |0D. N.|A.~.R".No| +peer1.org1.example.com | 00000010 30 2f 81 cc 6f cc 8c b2 7b a9 f3 e3 47 6a 6c aa |0/..o...{...Gjl.| +peer1.org1.example.com | 00000020 e4 13 d8 fe 02 20 6b 7e e6 a1 96 10 cd 1d 90 dc |..... k~........| +peer1.org1.example.com | 00000030 c1 5d da a9 ac 31 ab 33 71 95 cc 8b 13 db 20 be |.]...1.3q..... .| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [a4e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [a4f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 gate 1574140911366604200 evaluation succeeds +peer0.org1.example.com | [a50 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a51 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a52 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [a53 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [a54 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a55 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a56 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a57 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [a58 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [a59 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [a5a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 gate 1574140911367505400 evaluation starts +peer0.org1.example.com | [a5b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [a5c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [a5d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 principal matched by identity 0 +peer0.org1.example.com | [a5e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [a5f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [a60 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [a61 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 gate 1574140911367505400 evaluation succeeds +peer0.org1.example.com | [a62 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a63 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a64 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [a65 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [a66 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a67 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org1.example.com | [a68 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 c5 b2 2c 3e af b8 f7 8f 8c 2a 44 ef 9e 8a 87 |&..,>.....*D....| +peer0.org1.example.com | 00000010 c4 01 30 aa 3d 34 f0 bf 16 81 4f a0 44 19 df e5 |..0.=4....O.D...| +peer0.org1.example.com | [a69 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 92 fb 35 13 3f 29 99 4d 95 47 ff |0D. "..5.?).M.G.| +peer0.org1.example.com | 00000010 1b 92 6b 1a c2 34 2e 78 03 f0 8a 7c 07 fb 53 30 |..k..4.x...|..S0| +peer0.org1.example.com | 00000020 1c 7e 48 f2 02 20 10 7c 9f 70 52 85 f2 3c eb fb |.~H.. .|.pR..<..| +peer0.org1.example.com | 00000030 ef f4 a5 28 0d d1 46 54 f6 62 3d bf 6a d9 2d d4 |...(..FT.b=.j.-.| +peer0.org1.example.com | 00000040 18 8b 11 50 9a 69 |...P.i| +peer0.org1.example.com | [a6a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [a6b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [a6c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a6d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a6e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [a6f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [a70 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [a71 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a72 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [bee 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [bef 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [bf0 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bf1 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bf2 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [bf3 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bf5 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [bf6 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bf4 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [bf7 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bf8 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [a2d 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [a2e 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5af0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a2f 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5af0 gate 1574140912028369000 evaluation succeeds +peer0.org2.example.com | [a30 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a31 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a32 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a33 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a34 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [a35 11-19 05:21:52.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [a36 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a37 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a38 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a39 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a3a 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a3b 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a3c 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a3d 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a3e 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be30 gate 1574140912047415100 evaluation starts +peer0.org2.example.com | [a3f 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a40 11-19 05:21:52.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [a41 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [a42 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be30 principal evaluation fails +peer0.org2.example.com | [a43 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be30 gate 1574140912047415100 evaluation fails +peer0.org2.example.com | [a44 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a45 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a46 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [a47 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281c3a0 gate 1574140912054506400 evaluation starts +peer0.org2.example.com | [a48 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281c3a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a49 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281c3a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [a4a 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281c3a0 principal matched by identity 0 +peer0.org2.example.com | [a4b 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [a4c 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [a4d 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281c3a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a4e 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281c3a0 gate 1574140912054506400 evaluation succeeds +peer0.org2.example.com | [a4f 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a50 11-19 05:21:52.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a51 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a52 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a53 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a54 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:46.723 UTC [policies] Manager -> DEBU 7c5 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.723 UTC [common.channelconfig] LogSanityChecks -> DEBU 7c6 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-11-19 05:21:46.723 UTC [common.channelconfig] LogSanityChecks -> DEBU 7c7 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7c8 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7c9 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7ca Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7cb Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7cc Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7cd Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7ce As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7cf As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7d0 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7d1 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [common.capabilities] Supported -> DEBU 7d2 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [common.capabilities] Supported -> DEBU 7d3 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:46.724 UTC [msp] GetDefaultSigningIdentity -> DEBU 7d4 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:46.725 UTC [msp] GetDefaultSigningIdentity -> DEBU 7d5 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:46.725 UTC [msp.identity] Sign -> DEBU 7d6 Sign: plaintext: 0AD2060A1B08011A0608EAF7CDEE0522...7F3A33A6CFB6083B923574A198336F80 " +orderer0.example.com | "2019-11-19 05:21:46.725 UTC [msp.identity] Sign -> DEBU 7d7 Sign: digest: BD24AC104616FECEBB6E57F7C21EA1D7CAF6E7E8448CCDD1BFF4D7409411A479 " +orderer0.example.com | "2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:21:46.726 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity" +orderer0.example.com | "2019-11-19 05:21:46.726 UTC [msp.identity] newIdentity -> DEBU 7de Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.727 UTC [cauthdsl] func1 -> DEBU 7df 0xc0001f65c0 gate 1574140906727017600 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:46.727 UTC [cauthdsl] func2 -> DEBU 7e0 0xc0001f65c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7e1 0xc0001f65c0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7e2 0xc0001f65c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7e3 0xc0001f65c0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func1 -> DEBU 7e4 0xc0001f65c0 gate 1574140906727017600 evaluation fails" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7e5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func1 -> DEBU 7e8 0xc0001f7740 gate 1574140906728218300 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7e9 0xc0001f7740 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7ea 0xc0001f7740 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7eb 0xc0001f7740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7ec 0xc0001f7740 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func1 -> DEBU 7ed 0xc0001f7740 gate 1574140906728218300 evaluation fails" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7ee Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] func1 -> DEBU 7f0 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f1 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [a73 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 gate 1574140911370706100 evaluation starts +peer0.org1.example.com | [a74 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [a75 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [a76 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [a77 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 principal evaluation fails +peer0.org1.example.com | [a78 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 gate 1574140911370706100 evaluation fails +peer0.org1.example.com | [a79 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a7a 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a7b 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [a7c 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 gate 1574140911372379600 evaluation starts +peer0.org1.example.com | [a7d 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [a7e 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [a7f 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [a80 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [a81 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [a82 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 principal matched by identity 0 +peer0.org1.example.com | [a83 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [a84 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [a85 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [a86 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 gate 1574140911372379600 evaluation succeeds +peer0.org1.example.com | [a87 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [a88 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [a89 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [a8a 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [a8b 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a8c 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [a8d 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [a8e 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [a8f 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [a90 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a91 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a92 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [a93 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [a94 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func1 -> DEBU 7f6 0xc000264660 gate 1574140906728909800 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7f7 0xc000264660 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:46.729 UTC [cauthdsl] func2 -> DEBU 7f8 0xc000264660 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:46.729 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7f9 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:46.729 UTC [msp] Validate -> DEBU 7fa MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:46.729 UTC [cauthdsl] func2 -> DEBU 7fb 0xc000264660 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [msp.identity] Verify -> DEBU 7fc Verify: digest = 00000000 bd 24 ac 10 46 16 fe ce bb 6e 57 f7 c2 1e a1 d7 |.$..F....nW.....| +orderer0.example.com | 00000010 ca f6 e7 e8 44 8c cd d1 bf f4 d7 40 94 11 a4 79 |....D......@...y|" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [msp.identity] Verify -> DEBU 7fd Verify: sig = 00000000 30 45 02 21 00 c3 c4 5b a3 d3 2b 64 c0 35 61 d6 |0E.!...[..+d.5a.| +orderer0.example.com | 00000010 95 cb 42 f3 53 ed ef ed 72 82 6d 75 eb c7 a6 cf |..B.S...r.mu....| +orderer0.example.com | 00000020 f1 06 36 11 63 02 20 1c 0c c7 c4 d6 6e e7 f0 43 |..6.c. .....n..C| +orderer0.example.com | 00000030 67 71 a7 fd 4f 11 0f ce c9 86 9f 83 ad a4 58 be |gq..O.........X.| +orderer0.example.com | 00000040 b3 5c 64 f4 e2 dd 4d |.\d...M|" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [cauthdsl] func2 -> DEBU 7fe 0xc000264660 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [cauthdsl] func1 -> DEBU 7ff 0xc000264660 gate 1574140906728909800 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 800 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 801 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 802 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 803 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 804 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 805 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [orderer.common.msgprocessor] Apply -> DEBU 806 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] NewStandardValues -> DEBU 807 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 808 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 809 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80a Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80b Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80c Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] NewStandardValues -> DEBU 80d Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80e Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80f Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 810 Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 811 Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 812 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 813 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [common.channelconfig] NewStandardValues -> DEBU 814 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 815 Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [common.channelconfig] NewStandardValues -> DEBU 816 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 817 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [common.channelconfig] validateMSP -> DEBU 818 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [msp] newBccspMsp -> DEBU 819 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [msp] New -> DEBU 81a Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.732 UTC [msp] Setup -> DEBU 81b Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:46.733 UTC [msp.identity] newIdentity -> DEBU 81c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [msp.identity] newIdentity -> DEBU 81d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [msp] Validate -> DEBU 81e MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] NewStandardValues -> DEBU 81f Initializing protos for *channelconfig.ApplicationProtos" +peer1.org1.example.com | 00000040 fd 6f 4d c4 4e 27 |.oM.N'| +peer1.org1.example.com | [892 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [893 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [894 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [895 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [896 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [897 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [898 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [899 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [89a 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [89b 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [89c 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [89d 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [89e 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [89f 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8a0 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [8a1 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [8a2 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909fe0 gate 1574140911844593800 evaluation starts +peer1.org1.example.com | [8a3 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [8a4 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909fe0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [8a5 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909fe0 principal matched by identity 0 +peer1.org1.example.com | [8a6 11-19 05:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +peer1.org1.example.com | 00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +peer1.org1.example.com | [8a7 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +peer1.org1.example.com | 00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +peer1.org1.example.com | 00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +peer1.org1.example.com | 00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +peer1.org1.example.com | 00000040 3c b7 fd fe 94 01 8e |<......| +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 820 Processing field: ACLs" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 821 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] NewStandardValues -> DEBU 822 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 823 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] NewStandardValues -> DEBU 824 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 825 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] Validate -> DEBU 826 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [common.channelconfig] validateMSP -> DEBU 827 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [msp] newBccspMsp -> DEBU 828 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [msp] New -> DEBU 829 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.735 UTC [msp] Setup -> DEBU 82a Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.736 UTC [msp.identity] newIdentity -> DEBU 82b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.737 UTC [common.channelconfig] NewStandardValues -> DEBU 82c Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:46.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82d Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:46.737 UTC [common.channelconfig] NewStandardValues -> DEBU 82e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:46.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82f Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:46.737 UTC [common.channelconfig] Validate -> DEBU 830 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:21:46.737 UTC [common.channelconfig] validateMSP -> DEBU 831 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.738 UTC [msp] newBccspMsp -> DEBU 832 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.738 UTC [msp] New -> DEBU 833 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.738 UTC [msp] Setup -> DEBU 834 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.738 UTC [msp.identity] newIdentity -> DEBU 835 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.740 UTC [msp] Setup -> DEBU 836 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:46.740 UTC [msp] Setup -> DEBU 837 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:46.740 UTC [policies] NewManagerImpl -> DEBU 838 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.740 UTC [policies] NewManagerImpl -> DEBU 839 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83e Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83f Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 840 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 841 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 842 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 843 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 844 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 845 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 846 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 847 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.742 UTC [policies] GetPolicy -> DEBU 848 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 849 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.742 UTC [policies] GetPolicy -> DEBU 84a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 84b Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 84c Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.743 UTC [policies] NewManagerImpl -> DEBU 84d Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:46.743 UTC [policies] NewManagerImpl -> DEBU 84e Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:46.743 UTC [policies] NewManagerImpl -> DEBU 84f Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:46.743 UTC [common.configtx] addToMap -> DEBU 850 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:46.743 UTC [common.configtx] addToMap -> DEBU 851 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.743 UTC [common.configtx] addToMap -> DEBU 852 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 853 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 854 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 855 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 856 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 862 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 863 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 864 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 865 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 866 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 867 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 868 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 869 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86d Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86e Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:21:46.747 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:46.747 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:46.747 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 87b Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:46.749 UTC [orderer.consensus.etcdraft] propose -> INFO 87c Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:21:46.749 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 87d Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:21:46.751 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 87e [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:51452" +orderer0.example.com | "2019-11-19 05:21:46.752 UTC [orderer.consensus.etcdraft] 2 -> DEBU 87f Proposed block [1] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:21:46.757 UTC [common.deliver] Handle -> WARN 880 Error reading from 172.18.0.5:51450: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:21:46.757 UTC [orderer.common.server] func1 -> DEBU 881 Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:21:46.757 UTC [comm.grpc.server] 1 -> INFO 882 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51450 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=75.8921ms +orderer0.example.com | "2019-11-19 05:21:46.758 UTC [grpc] infof -> DEBU 883 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [a95 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [a96 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a97 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a98 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a99 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [a9a 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a9b 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a9c 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a9d 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [a9e 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a9f 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa0 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa1 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa2 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aa3 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa4 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa5 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa6 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [aa7 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [aa8 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [aa9 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aaa 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [aab 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [aac 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aad 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [aae 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [aaf 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 884 Sending msg of 24601 bytes to 2 on channel businesschannel took 28.1µs" +orderer0.example.com | "2019-11-19 05:21:46.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 885 Sending msg of 24601 bytes to 3 on channel businesschannel took 14.6µs" +orderer0.example.com | "2019-11-19 05:21:46.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 886 Send of ConsensusRequest for channel businesschannel with payload of size 24601 to orderer2.example.com(orderer2.example.com:7050) took 737.2µs " +orderer0.example.com | "2019-11-19 05:21:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 887 Send of ConsensusRequest for channel businesschannel with payload of size 24601 to orderer1.example.com(orderer1.example.com:7050) took 265.7µs " +orderer0.example.com | "2019-11-19 05:21:46.761 UTC [grpc] infof -> DEBU 888 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:21:46.761 UTC [orderer.common.broadcast] Handle -> WARN 889 Error reading from 172.18.0.5:51452: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:21:46.761 UTC [orderer.common.server] func1 -> DEBU 88a Closing Broadcast stream" +orderer0.example.com | "2019-11-19 05:21:46.761 UTC [comm.grpc.server] 1 -> INFO 88b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51452 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=66.4525ms +orderer0.example.com | "2019-11-19 05:21:46.773 UTC [orderer.common.cluster.step] handleMessage -> DEBU 88c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:46.779 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 88d Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-11-19 05:21:46.779 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 88e Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-11-19 05:21:46.781 UTC [orderer.common.cluster.step] handleMessage -> DEBU 88f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:46.781 UTC [orderer.common.cluster.step] sendMessage -> DEBU 892 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.7µs " +orderer0.example.com | "2019-11-19 05:21:46.781 UTC [orderer.common.cluster.step] sendMessage -> DEBU 890 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " +orderer0.example.com | "2019-11-19 05:21:46.781 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 891 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:21:46.786 UTC [common.configtx] addToMap -> DEBU 893 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:46.786 UTC [common.configtx] addToMap -> DEBU 894 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.786 UTC [common.configtx] addToMap -> DEBU 895 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.787 UTC [common.configtx] addToMap -> DEBU 896 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:46.789 UTC [common.configtx] addToMap -> DEBU 897 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:46.790 UTC [common.configtx] addToMap -> DEBU 898 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:46.792 UTC [common.configtx] addToMap -> DEBU 899 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.792 UTC [common.configtx] addToMap -> DEBU 89a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:46.793 UTC [common.configtx] addToMap -> DEBU 89b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.793 UTC [common.configtx] addToMap -> DEBU 89c Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.794 UTC [common.configtx] addToMap -> DEBU 89d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:46.794 UTC [common.configtx] addToMap -> DEBU 89e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:46.795 UTC [common.configtx] addToMap -> DEBU 89f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.795 UTC [common.configtx] addToMap -> DEBU 8a0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:46.796 UTC [common.configtx] addToMap -> DEBU 8a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:46.796 UTC [common.configtx] verifyDeltaSet -> DEBU 8a2 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.796 UTC [common.configtx] policyForItem -> DEBU 8a3 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-11-19 05:21:46.796 UTC [policies] Manager -> DEBU 8a4 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:21:46.796 UTC [policies] Manager -> DEBU 8a5 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:46.797 UTC [policies] Manager -> DEBU 8a6 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:46.797 UTC [policies] Manager -> DEBU 8a7 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:21:46.797 UTC [policies] Manager -> DEBU 8a8 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.797 UTC [policies] Manager -> DEBU 8a9 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.798 UTC [policies] Manager -> DEBU 8aa Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-11-19 05:21:46.798 UTC [policies] Manager -> DEBU 8ab Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.798 UTC [policies] Manager -> DEBU 8ac Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.798 UTC [policies] Manager -> DEBU 8ad Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-11-19 05:21:46.799 UTC [policies] Evaluate -> DEBU 8ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-11-19 05:21:46.799 UTC [cauthdsl] func1 -> DEBU 8af 0xc00093ad30 gate 1574140906799652700 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:46.800 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8b0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:46.799 UTC [cauthdsl] func2 -> DEBU 8b1 0xc00093ad30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:46.800 UTC [cauthdsl] func2 -> DEBU 8b2 0xc00093ad30 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:46.801 UTC [cauthdsl] func2 -> DEBU 8b3 0xc00093ad30 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:21:46.801 UTC [msp.identity] Verify -> DEBU 8b4 Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +orderer0.example.com | 00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.|" +orderer0.example.com | "2019-11-19 05:21:46.802 UTC [msp.identity] Verify -> DEBU 8b5 Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +peer1.org2.example.com | [bf9 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [bfa 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [bfb 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bfc 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [bfd 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [bfe 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bff 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [c00 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [c01 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c02 11-19 05:21:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [c03 11-19 05:21:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151017 +peer1.org2.example.com | [c04 11-19 05:21:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BD95616F3DD8C2ECF69004C5F50E71AD4B3B13F76DE7DAB84F77427558C3C9A9 +peer1.org2.example.com | [c05 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [c06 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [c07 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [c08 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c09 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [c0a 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [c0b 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c0c 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [c0d 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [c0e 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c0f 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a8 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909fe0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [8a9 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909fe0 gate 1574140911844593800 evaluation succeeds +peer1.org1.example.com | [8aa 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8ab 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8ac 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [8ad 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [8ae 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8af 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [8b0 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [8b1 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [8b2 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [8b3 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8b4 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8b5 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8b6 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [8b7 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8b8 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8b9 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [8ba 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer1.org1.example.com | [8bb 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8bc 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" > alive: +peer1.org1.example.com | [8bd 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [8be 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [8bf 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8c0 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8c1 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8c2 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [8c3 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [8c4 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a55 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [a56 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [a57 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a58 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a59 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a5a 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a5b 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a5c 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a5d 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a5e 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a5f 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281dd50 gate 1574140912068267400 evaluation starts +peer0.org2.example.com | [a60 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281dd50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a61 11-19 05:21:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281dd50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [a62 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281dd50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [a63 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281dd50 principal evaluation fails +peer0.org2.example.com | [a64 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00281dd50 gate 1574140912068267400 evaluation fails +peer0.org1.example.com | [ab0 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ab1 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ab2 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ab3 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ab4 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ab5 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ab6 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 gate 1574140911458545900 evaluation starts +peer0.org1.example.com | [ab7 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ab8 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [ab9 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 principal matched by identity 0 +peer0.org1.example.com | [aba 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 22 53 4e e7 78 ea dd 97 fa 4f af cc 9d 7b c8 |6"SN.x....O...{.| +peer0.org1.example.com | 00000010 28 bd 43 2e 47 4c 60 e2 9f 25 1d c0 74 6f a0 f0 |(.C.GL`..%..to..| +peer0.org1.example.com | [abb 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 96 22 d0 d6 eb e9 2f 69 a7 3d 7f |0D. l."..../i.=.| +peer0.org1.example.com | 00000010 2a dd 7c ef 18 30 37 08 71 0d 78 e0 7a 7f de 91 |*.|..07.q.x.z...| +peer0.org1.example.com | 00000020 a5 77 4c 14 02 20 38 21 cb e3 6a 1d 42 85 16 9e |.wL.. 8!..j.B...| +peer0.org1.example.com | 00000030 bc da 5f 34 0e 3d 2d da 2d 73 92 6d 4d 46 99 22 |.._4.=-.-s.mMF."| +peer0.org1.example.com | 00000040 54 df bf 03 9e c9 |T.....| +peer0.org1.example.com | [abc 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [abd 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 gate 1574140911458545900 evaluation succeeds +peer0.org1.example.com | [abe 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [abf 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ac0 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ac1 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ac2 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ac3 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [ac4 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [ac5 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [ac6 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [ac7 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ac8 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ac9 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aca 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [acb 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [acc 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [acd 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ace 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [acf 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\216\350\311\331\031\200\371%\267\242i\024\326\321\224\201\252\177t\246\320\002Zv{\346\002 {\357b~S\203y\342\201\360\006\3276.\342\005$\374\204e)#\336u\237\r%\207\205\013\364\240" > alive: +peer0.org1.example.com | [ad0 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ad1 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ad2 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ad3 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ad4 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ad5 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ad6 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ad7 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [ad8 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [ad9 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [ada 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [adb 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [adc 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [add 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [ade 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [adf 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [ae0 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ae1 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [ae2 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [ae3 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [ae4 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [ae5 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ae6 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ae7 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to peer1.org2.example.com:7051 +peer0.org1.example.com | [ae8 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ae9 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to peer0.org2.example.com:7051 +peer0.org1.example.com | [aea 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [aeb 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [aec 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aed 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [a65 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a66 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a67 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [a68 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002942c0 gate 1574140912075222000 evaluation starts +peer0.org2.example.com | [a69 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002942c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a6a 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002942c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [a6b 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002942c0 principal matched by identity 0 +peer0.org2.example.com | [a6c 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [a6d 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [a6e 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002942c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a6f 11-19 05:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002942c0 gate 1574140912075222000 evaluation succeeds +peer0.org2.example.com | [a70 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a71 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a72 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a73 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a74 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a75 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [a76 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a77 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a78 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a79 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a7a 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a7b 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a7c 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a7d 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a7e 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a7f 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002956a0 gate 1574140912085688600 evaluation starts +peer0.org2.example.com | [a80 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002956a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a81 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002956a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [a82 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002956a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [a83 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002956a0 principal evaluation fails +peer0.org2.example.com | [a84 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002956a0 gate 1574140912085688600 evaluation fails +peer0.org2.example.com | [a85 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a86 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a87 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | 00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +orderer0.example.com | 00000020 9d 53 74 88 4b 02 20 0b f6 9b f4 5d 00 74 ee 9d |.St.K. ....].t..| +orderer0.example.com | 00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +orderer0.example.com | 00000040 4d ed a9 9c dd 40 ef |M....@.|" +orderer0.example.com | "2019-11-19 05:21:46.802 UTC [cauthdsl] func2 -> DEBU 8b6 0xc00093ad30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:21:46.803 UTC [cauthdsl] func1 -> DEBU 8b7 0xc00093ad30 gate 1574140906799652700 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:21:46.803 UTC [policies] Evaluate -> DEBU 8b8 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:46.803 UTC [policies] Evaluate -> DEBU 8b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:46.803 UTC [common.configtx] verifyDeltaSet -> DEBU 8ba Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:46.804 UTC [common.configtx] recurseConfigMap -> DEBU 8bb Setting policy for key Readers to " +orderer0.example.com | "2019-11-19 05:21:46.804 UTC [common.configtx] recurseConfigMap -> DEBU 8bc Setting policy for key Writers to " +orderer0.example.com | "2019-11-19 05:21:46.805 UTC [common.configtx] recurseConfigMap -> DEBU 8bd Setting policy for key Admins to " +orderer0.example.com | "2019-11-19 05:21:46.805 UTC [common.configtx] recurseConfigMap -> DEBU 8be Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.805 UTC [common.configtx] recurseConfigMap -> DEBU 8bf Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.806 UTC [common.configtx] recurseConfigMap -> DEBU 8c0 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.806 UTC [common.configtx] recurseConfigMap -> DEBU 8c1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.806 UTC [common.configtx] recurseConfigMap -> DEBU 8c2 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.806 UTC [common.configtx] recurseConfigMap -> DEBU 8c3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8ca Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8cb Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8cc Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8cd Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8ce Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8cf Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8d0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:46.809 UTC [common.channelconfig] NewStandardValues -> DEBU 8d1 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:46.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d2 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:46.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d3 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:46.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d4 Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:46.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d5 Processing field: Consortium" +peer0.org1.example.com | [aee 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6034116066613526804, Envelope: 960 bytes, Signature: 0 bytes +peer0.org1.example.com | [aef 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6034116066613526804, Envelope: 960 bytes, Signature: 0 bytes +peer0.org1.example.com | [af0 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [af1 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [af2 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [af3 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [af4 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7972021935824796748, Envelope: 960 bytes, Signature: 0 bytes +peer0.org1.example.com | [af5 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [af6 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [af7 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [af8 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [af9 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 gate 1574140911783276900 evaluation starts +peer0.org1.example.com | [afa 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [afb 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [afc 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 principal matched by identity 0 +peer0.org1.example.com | [afd 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a c7 07 b8 a6 e2 3f 6d 3f 52 f9 11 5e c4 ac a3 |......?m?R..^...| +peer0.org1.example.com | 00000010 86 a0 13 5c 24 43 f8 af dc db 79 58 90 84 d9 fe |...\$C....yX....| +peer0.org1.example.com | [afe 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 72 1b f0 55 5e d1 c7 0a de af b2 |0D. .r..U^......| +peer0.org1.example.com | 00000010 ee 11 7e 45 6f a8 2e 1b ea a8 a2 c8 6e cf 01 d2 |..~Eo.......n...| +peer0.org1.example.com | 00000020 c2 b3 f1 d6 02 20 5f 8b ea 0e 41 fd ac ca 5e 0f |..... _...A...^.| +peer0.org1.example.com | 00000030 7a 8a 5b 43 5a a7 47 97 85 d7 30 8f 7d b4 c5 b9 |z.[CZ.G...0.}...| +peer0.org1.example.com | 00000040 15 1e 09 1d e2 c6 |......| +peer0.org1.example.com | [aff 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b00 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 gate 1574140911783276900 evaluation succeeds +peer0.org1.example.com | [b01 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b02 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b03 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b04 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b05 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c10 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c11 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [c12 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c13 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [c14 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c15 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [c16 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [c17 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [c18 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [c19 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer1.org2.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer1.org2.example.com | [c1a 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer1.org2.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer1.org2.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer1.org2.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer1.org2.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer1.org2.example.com | [c1b 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c1c 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c1d 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [c1e 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c1f 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c20 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c21 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c22 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c23 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c24 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c25 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfa10 gate 1574140919473157200 evaluation starts +peer1.org2.example.com | [c26 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfa10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c27 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfa10 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [c28 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfa10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c29 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfa10 principal evaluation fails +peer0.org2.example.com | [a88 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000295c10 gate 1574140912088061600 evaluation starts +peer0.org2.example.com | [a89 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000295c10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a8a 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000295c10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [a8b 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000295c10 principal matched by identity 0 +peer0.org2.example.com | [a8c 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [a8d 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [a8e 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000295c10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a8f 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000295c10 gate 1574140912088061600 evaluation succeeds +peer0.org2.example.com | [a90 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a91 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a92 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a93 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a94 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a95 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a96 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a97 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a98 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a99 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a9a 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a9b 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a9c 11-19 05:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002aeda0 gate 1574140912089963900 evaluation starts +peer0.org2.example.com | [a9d 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002aeda0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a9e 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002aeda0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [a9f 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002aeda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [aa0 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002aeda0 principal evaluation fails +peer0.org2.example.com | [aa1 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002aeda0 gate 1574140912089963900 evaluation fails +peer0.org2.example.com | [aa2 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [aa3 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [aa4 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [aa5 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002af310 gate 1574140912090201100 evaluation starts +peer0.org2.example.com | [aa6 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002af310 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [aa7 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002af310 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [aa8 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002af310 principal matched by identity 0 +peer0.org2.example.com | [aa9 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [aaa 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [aab 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002af310 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [aac 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002af310 gate 1574140912090201100 evaluation succeeds +peer0.org2.example.com | [aad 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [aae 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [aaf 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [ab0 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ab1 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [ab2 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [ab3 11-19 05:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ab4 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [ab5 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ab6 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ab7 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ab8 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [ab9 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [aba 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [abb 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [abc 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [abd 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [abe 11-19 05:21:52.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [abf 11-19 05:21:52.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ac0 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [ac1 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [ac2 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ac3 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [ac4 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to peer1.org2.example.com:7051 +peer0.org2.example.com | [ac5 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [ac6 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to peer1.org1.example.com:7051 +peer1.org1.example.com | [8c5 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8c6 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8c7 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8c8 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8c9 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [8ca 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [8cb 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394fae0 gate 1574140912001849200 evaluation starts +peer1.org1.example.com | [8cc 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394fae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [8cd 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394fae0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [8ce 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394fae0 principal matched by identity 0 +peer1.org1.example.com | [8cf 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [8d0 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [8d1 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394fae0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [8d2 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394fae0 gate 1574140912001849200 evaluation succeeds +peer1.org1.example.com | [8d3 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8d4 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8d5 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [8d6 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [8d7 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8d8 11-19 05:21:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8d9 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to peer0.org1.example.com:7051 +peer1.org1.example.com | [8da 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [8db 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [8dc 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8dd 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 2451639194954220049, Envelope: 1903 bytes, Signature: 0 bytes +peer1.org1.example.com | [8de 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8df 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8e0 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer1.org1.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org1.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org1.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [8e1 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [8e2 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [c2a 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfa10 gate 1574140919473157200 evaluation fails +peer1.org2.example.com | [c2b 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c2c 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c2d 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c2e 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff90 gate 1574140919477465000 evaluation starts +peer1.org2.example.com | [c2f 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c30 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [c31 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff90 principal matched by identity 0 +peer1.org2.example.com | [c32 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +peer1.org2.example.com | 00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +peer1.org2.example.com | [c33 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +peer1.org2.example.com | 00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +peer1.org2.example.com | 00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +peer1.org2.example.com | 00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +peer1.org2.example.com | 00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +peer1.org2.example.com | [c34 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c35 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff90 gate 1574140919477465000 evaluation succeeds +peer1.org2.example.com | [c36 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c37 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c38 11-19 05:21:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c39 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c3a 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c3b 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c3c 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [c3d 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer1.org2.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer1.org2.example.com | [c3e 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer1.org2.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer1.org2.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer1.org2.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer1.org2.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer1.org2.example.com | [c3f 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c40 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c41 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c42 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c43 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [c44 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c45 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [c46 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [c47 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer1.org2.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer1.org2.example.com | [c48 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer1.org2.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer1.org2.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer1.org2.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer1.org2.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer1.org2.example.com | [c49 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [c4a 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 9e d8 f3 eb 5c 2f fe 86 21 6e |0E.!......\/..!n| +peer1.org2.example.com | 00000010 89 43 5d 36 81 08 42 f4 9c b3 f7 94 c9 6f 53 c4 |.C]6..B......oS.| +peer1.org2.example.com | 00000020 1f d7 98 72 46 02 20 05 fc 29 4c bf c7 82 25 e8 |...rF. ..)L...%.| +peer1.org2.example.com | 00000030 ba 8a e7 04 b4 8f 73 fe a6 31 c1 0f 2e cc c4 b0 |......s..1......| +peer1.org2.example.com | 00000040 cd 0d eb ab 17 27 68 |.....'h| +peer1.org2.example.com | [c4b 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d6 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.810 UTC [common.channelconfig] NewStandardValues -> DEBU 8d7 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d8 Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d9 Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8da Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8db Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:46.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dc Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:46.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dd Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.811 UTC [common.channelconfig] NewStandardValues -> DEBU 8de Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:46.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8df Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:46.812 UTC [common.channelconfig] NewStandardValues -> DEBU 8e0 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:46.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e1 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:46.812 UTC [common.channelconfig] validateMSP -> DEBU 8e2 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.812 UTC [msp] newBccspMsp -> DEBU 8e3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.813 UTC [msp] New -> DEBU 8e4 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.813 UTC [msp] Setup -> DEBU 8e5 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:46.814 UTC [msp.identity] newIdentity -> DEBU 8e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.814 UTC [msp.identity] newIdentity -> DEBU 8e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.815 UTC [msp] Validate -> DEBU 8e8 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:46.815 UTC [common.channelconfig] NewStandardValues -> DEBU 8e9 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-11-19 05:21:46.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ea Processing field: ACLs" +orderer0.example.com | "2019-11-19 05:21:46.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8eb Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.816 UTC [common.channelconfig] NewStandardValues -> DEBU 8ec Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:46.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ed Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:46.817 UTC [common.channelconfig] NewStandardValues -> DEBU 8ee Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:46.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ef Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:46.817 UTC [common.channelconfig] Validate -> DEBU 8f0 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:21:46.818 UTC [common.channelconfig] validateMSP -> DEBU 8f1 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.818 UTC [msp] newBccspMsp -> DEBU 8f2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.818 UTC [msp] New -> DEBU 8f3 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.818 UTC [msp] Setup -> DEBU 8f4 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.819 UTC [msp.identity] newIdentity -> DEBU 8f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.819 UTC [common.channelconfig] NewStandardValues -> DEBU 8f6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:46.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f7 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:46.820 UTC [common.channelconfig] NewStandardValues -> DEBU 8f8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f9 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:46.820 UTC [common.channelconfig] Validate -> DEBU 8fa Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-11-19 05:21:46.821 UTC [common.channelconfig] validateMSP -> DEBU 8fb Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.821 UTC [msp] newBccspMsp -> DEBU 8fc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.821 UTC [msp] New -> DEBU 8fd Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:46.822 UTC [msp] Setup -> DEBU 8fe Setting up MSP instance Org2MSP" +peer0.org2.example.com | [ac7 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [ac8 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ac9 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12601237178846632525, Envelope: 961 bytes, Signature: 0 bytes +peer0.org2.example.com | [aca 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a c7 07 b8 a6 e2 3f 6d 3f 52 f9 11 5e c4 ac a3 |......?m?R..^...| +peer0.org2.example.com | 00000010 86 a0 13 5c 24 43 f8 af dc db 79 58 90 84 d9 fe |...\$C....yX....| +peer0.org2.example.com | [acb 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 72 1b f0 55 5e d1 c7 0a de af b2 |0D. .r..U^......| +peer0.org2.example.com | 00000010 ee 11 7e 45 6f a8 2e 1b ea a8 a2 c8 6e cf 01 d2 |..~Eo.......n...| +peer0.org2.example.com | 00000020 c2 b3 f1 d6 02 20 5f 8b ea 0e 41 fd ac ca 5e 0f |..... _...A...^.| +peer0.org2.example.com | 00000030 7a 8a 5b 43 5a a7 47 97 85 d7 30 8f 7d b4 c5 b9 |z.[CZ.G...0.}...| +peer0.org2.example.com | 00000040 15 1e 09 1d e2 c6 |......| +peer1.org2.example.com | [c4c 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [c4d 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c4e 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c4f 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c50 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [c51 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [c52 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c53 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c54 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c55 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c56 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c57 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c58 11-19 05:21:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c59 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eec0 gate 1574140919490021100 evaluation starts +peer1.org2.example.com | [c5a 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eec0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c5b 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eec0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [c5c 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c5d 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eec0 principal evaluation fails +peer1.org2.example.com | [c5e 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eec0 gate 1574140919490021100 evaluation fails +peer1.org2.example.com | [c5f 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c60 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c61 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c62 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f430 gate 1574140919491546000 evaluation starts +peer1.org2.example.com | [c63 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f430 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c64 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f430 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [c65 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f430 principal matched by identity 0 +peer1.org2.example.com | [c66 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer1.org2.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer1.org2.example.com | [c67 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer1.org2.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer1.org2.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer1.org2.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer1.org2.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer1.org2.example.com | [c68 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f430 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c69 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f430 gate 1574140919491546000 evaluation succeeds +peer1.org2.example.com | [c6a 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c6b 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c6c 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c6d 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c6e 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c6f 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c70 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [c71 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer1.org2.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer1.org2.example.com | [c72 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer1.org2.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer1.org2.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer1.org2.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer1.org2.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer1.org2.example.com | [c73 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c74 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c75 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [c76 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer1.org2.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer1.org2.example.com | [c77 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer1.org2.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer1.org2.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer1.org2.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer1.org2.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer1.org2.example.com | [c78 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c79 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c7a 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c7b 11-19 05:21:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c7c 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [c7d 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c7e 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c7f 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c80 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c81 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c82 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c83 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c84 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [c85 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c86 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c87 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c88 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c89 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c8a 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c8b 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c8c 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1010 gate 1574140919780310600 evaluation starts +peer1.org2.example.com | [c8d 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1010 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c8e 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1010 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [c8f 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c90 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1010 principal evaluation fails +peer0.org1.example.com | [b06 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b07 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6034116066613526804, Envelope: 960 bytes, Signature: 0 bytes +peer0.org1.example.com | [b08 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b09 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b0a 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b0b 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8e3 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8e4 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8e5 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8e6 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8e7 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [8e8 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [8e9 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961770 gate 1574140912804628700 evaluation starts +peer1.org1.example.com | [8ea 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961770 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [8eb 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961770 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [8ec 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [8ed 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [8ee 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [8ef 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961770 principal matched by identity 0 +peer1.org1.example.com | [8f0 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a c7 07 b8 a6 e2 3f 6d 3f 52 f9 11 5e c4 ac a3 |......?m?R..^...| +peer1.org1.example.com | 00000010 86 a0 13 5c 24 43 f8 af dc db 79 58 90 84 d9 fe |...\$C....yX....| +peer1.org1.example.com | [8f1 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 72 1b f0 55 5e d1 c7 0a de af b2 |0D. .r..U^......| +peer1.org1.example.com | 00000010 ee 11 7e 45 6f a8 2e 1b ea a8 a2 c8 6e cf 01 d2 |..~Eo.......n...| +peer1.org1.example.com | 00000020 c2 b3 f1 d6 02 20 5f 8b ea 0e 41 fd ac ca 5e 0f |..... _...A...^.| +peer1.org1.example.com | 00000030 7a 8a 5b 43 5a a7 47 97 85 d7 30 8f 7d b4 c5 b9 |z.[CZ.G...0.}...| +peer1.org1.example.com | 00000040 15 1e 09 1d e2 c6 |......| +peer1.org1.example.com | [8f2 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961770 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [8f3 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961770 gate 1574140912804628700 evaluation succeeds +peer1.org1.example.com | [8f4 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8f5 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8f6 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [8f7 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [8f8 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8ff Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:46.823 UTC [msp.identity] newIdentity -> DEBU 900 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:46.823 UTC [msp] Setup -> DEBU 901 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:46.823 UTC [msp] Setup -> DEBU 902 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:46.824 UTC [policies] NewManagerImpl -> DEBU 903 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.824 UTC [policies] NewManagerImpl -> DEBU 904 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.824 UTC [policies] NewManagerImpl -> DEBU 905 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.824 UTC [policies] NewManagerImpl -> DEBU 906 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.825 UTC [policies] NewManagerImpl -> DEBU 907 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.825 UTC [policies] NewManagerImpl -> DEBU 908 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.826 UTC [policies] NewManagerImpl -> DEBU 909 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.826 UTC [policies] NewManagerImpl -> DEBU 90a Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.826 UTC [policies] NewManagerImpl -> DEBU 90b Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.826 UTC [policies] GetPolicy -> DEBU 90c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 90d Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.827 UTC [policies] GetPolicy -> DEBU 90e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 90f Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 910 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 911 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 912 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 913 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 914 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 915 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 916 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 917 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 918 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 919 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 91a Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.833 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:46.843 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:46.844 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.844 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:46.845 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:46.845 UTC [common.configtx] addToMap -> DEBU 932 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.846 UTC [common.configtx] addToMap -> DEBU 933 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:46.846 UTC [common.configtx] addToMap -> DEBU 934 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.846 UTC [common.configtx] addToMap -> DEBU 935 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:46.846 UTC [common.configtx] addToMap -> DEBU 936 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 937 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 938 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 939 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 93a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 93b Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 93c Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:21:46.848 UTC [common.configtx] addToMap -> DEBU 93d Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:46.848 UTC [common.configtx] addToMap -> DEBU 93e Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:21:46.849 UTC [common.configtx] addToMap -> DEBU 93f Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:46.849 UTC [common.configtx] addToMap -> DEBU 940 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:46.849 UTC [common.configtx] addToMap -> DEBU 941 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:21:46.850 UTC [common.configtx] addToMap -> DEBU 942 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:46.850 UTC [common.configtx] addToMap -> DEBU 943 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:46.851 UTC [common.configtx] addToMap -> DEBU 944 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:46.851 UTC [common.configtx] addToMap -> DEBU 945 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:46.851 UTC [common.configtx] addToMap -> DEBU 946 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:46.852 UTC [common.channelconfig] LogSanityChecks -> DEBU 947 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-11-19 05:21:46.852 UTC [common.channelconfig] LogSanityChecks -> DEBU 948 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-11-19 05:21:46.853 UTC [policies] Manager -> DEBU 949 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:21:46.854 UTC [policies] Manager -> DEBU 94a Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:46.854 UTC [policies] Manager -> DEBU 94b Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:46.854 UTC [policies] Manager -> DEBU 94c Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:21:46.855 UTC [policies] Manager -> DEBU 94d Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:21:46.855 UTC [policies] Manager -> DEBU 94e Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:46.855 UTC [common.channelconfig] LogSanityChecks -> DEBU 94f As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-11-19 05:21:46.855 UTC [common.channelconfig] LogSanityChecks -> DEBU 950 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-11-19 05:21:46.856 UTC [common.channelconfig] LogSanityChecks -> DEBU 951 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-11-19 05:21:46.856 UTC [policies] Manager -> DEBU 952 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-11-19 05:21:46.857 UTC [policies] Manager -> DEBU 953 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:46.857 UTC [policies] Manager -> DEBU 954 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:46.857 UTC [policies] Manager -> DEBU 955 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-11-19 05:21:46.857 UTC [policies] Manager -> DEBU 956 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:46.858 UTC [common.channelconfig] LogSanityChecks -> DEBU 957 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-11-19 05:21:46.858 UTC [common.channelconfig] LogSanityChecks -> DEBU 958 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-11-19 05:21:46.859 UTC [common.channelconfig] LogSanityChecks -> DEBU 959 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-11-19 05:21:46.859 UTC [common.channelconfig] LogSanityChecks -> DEBU 95a As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-11-19 05:21:46.859 UTC [common.capabilities] Supported -> DEBU 95b Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:46.860 UTC [common.capabilities] Supported -> DEBU 95c Channel capability V1_4_3 is supported and is enabled" +peer0.org2.example.com | [acc 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [acd 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to peer0.org1.example.com:7051 +peer0.org2.example.com | [ad0 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [ace 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12601237178846632525, Envelope: 961 bytes, Signature: 0 bytes +peer0.org2.example.com | [ad1 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [ad3 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ad2 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 78 102 48 116 47 73 97 110 78 52 83 84 110 47 74 99 90 52 75 86 99 56 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 119 79 84 73 48 77 68 65 49 79 84 65 119 87 104 99 78 77 106 107 119 79 84 73 120 77 68 65 49 79 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 65 116 51 73 56 50 72 52 50 66 114 10 83 47 52 109 68 69 103 111 73 71 49 115 86 86 97 73 72 82 48 116 47 99 110 53 113 106 50 115 57 116 72 70 108 88 49 88 114 103 112 53 121 72 119 55 110 90 107 73 103 66 105 70 114 50 87 110 87 119 49 83 84 73 106 56 10 100 118 106 105 53 101 122 47 100 98 43 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 73 53 114 108 100 66 47 51 50 78 78 121 108 43 73 98 56 53 53 52 85 71 86 67 68 99 72 88 101 78 78 73 110 83 66 110 88 88 67 122 76 84 85 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 70 50 121 56 69 87 104 49 79 118 69 99 101 121 84 68 71 71 70 114 100 78 119 47 118 106 49 65 86 51 52 105 82 76 57 102 66 57 78 80 72 57 55 65 105 65 52 70 89 114 81 10 115 122 57 106 106 56 74 50 69 111 118 79 121 111 49 113 118 84 73 107 97 113 82 109 89 116 67 120 86 114 101 105 52 73 87 43 105 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [ad4 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Added A^���g�� +peer0.org2.example.com | ����U���ʒ�:+��aSpq� to the in memory item map, total items: 2 +peer0.org2.example.com | [ad5 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [acf 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [ad6 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ad7 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13145790139201548345, Envelope: 962 bytes, Signature: 0 bytes +peer0.org2.example.com | [ad8 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ad9 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [ada 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [adb 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b0c 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 78 102 48 116 47 73 97 110 78 52 83 84 110 47 74 99 90 52 75 86 99 56 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 119 79 84 73 48 77 68 65 49 79 84 65 119 87 104 99 78 77 106 107 119 79 84 73 120 77 68 65 49 79 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 65 116 51 73 56 50 72 52 50 66 114 10 83 47 52 109 68 69 103 111 73 71 49 115 86 86 97 73 72 82 48 116 47 99 110 53 113 106 50 115 57 116 72 70 108 88 49 88 114 103 112 53 121 72 119 55 110 90 107 73 103 66 105 70 114 50 87 110 87 119 49 83 84 73 106 56 10 100 118 106 105 53 101 122 47 100 98 43 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 73 53 114 108 100 66 47 51 50 78 78 121 108 43 73 98 56 53 53 52 85 71 86 67 68 99 72 88 101 78 78 73 110 83 66 110 88 88 67 122 76 84 85 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 70 50 121 56 69 87 104 49 79 118 69 99 101 121 84 68 71 71 70 114 100 78 119 47 118 106 49 65 86 51 52 105 82 76 57 102 66 57 78 80 72 57 55 65 105 65 52 70 89 114 81 10 115 122 57 106 106 56 74 50 69 111 118 79 121 111 49 113 118 84 73 107 97 113 82 109 89 116 67 120 86 114 101 105 52 73 87 43 105 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [b0d 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Added A^���g�� +peer0.org1.example.com | ����U���ʒ�:+��aSpq� to the in memory item map, total items: 3 +peer0.org1.example.com | [b0e 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b0f 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7972021935824796748, Envelope: 960 bytes, Signature: 0 bytes +peer0.org1.example.com | [b10 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b11 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b12 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b13 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b14 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b15 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b16 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b17 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 gate 1574140911789393100 evaluation starts +peer0.org1.example.com | [b18 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b19 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [b1a 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 principal matched by identity 0 +peer0.org1.example.com | [b1b 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 10 04 b5 a3 2a 10 1a 4d 56 66 c4 f3 70 0f 31 |.....*..MVf..p.1| +peer0.org1.example.com | 00000010 c8 d0 a3 ab a5 ba 00 36 67 eb 56 a7 61 c6 4b ea |.......6g.V.a.K.| +peer0.org1.example.com | [b1c 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 7a 55 44 ca 72 63 38 96 2d 0a bf |0D. .zUD.rc8.-..| +peer0.org1.example.com | 00000010 9b c0 0d 1e 70 36 ec f4 c3 f9 05 45 ab 5c 21 06 |....p6.....E.\!.| +peer0.org1.example.com | 00000020 dd c4 a8 ac 02 20 18 9c f8 41 1c c6 81 f6 be ec |..... ...A......| +peer0.org1.example.com | 00000030 b0 4d a9 b8 0b 79 82 f5 6d 52 aa 1b bf 24 ee d2 |.M...y..mR...$..| +peer0.org1.example.com | 00000040 cd 2b be b4 dc 4c |.+...L| +peer0.org1.example.com | [b1d 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b1e 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 gate 1574140911789393100 evaluation succeeds +peer0.org1.example.com | [b1f 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b20 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b21 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b22 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b23 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c91 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1010 gate 1574140919780310600 evaluation fails +peer1.org2.example.com | [c92 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c93 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c94 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c95 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1580 gate 1574140919781322700 evaluation starts +peer1.org2.example.com | [c96 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1580 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c97 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1580 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [c98 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1580 principal matched by identity 0 +peer1.org2.example.com | [c99 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 65 9a 72 41 3c 3c 0e 41 65 0a 13 fc c7 b6 9d |.e.rA<<.Ae......| +peer1.org2.example.com | 00000010 b7 db 03 e3 e5 3c 4d 7d 5d c9 56 5c 7c 30 9c 38 |..... DEBU Verify: sig = 00000000 30 45 02 21 00 8c 32 84 9b 04 e6 82 0c 2f 8c 8b |0E.!..2....../..| +peer1.org2.example.com | 00000010 49 13 de 4a 24 b0 c5 88 ae f9 0e 90 df 09 fb a9 |I..J$...........| +peer1.org2.example.com | 00000020 96 62 5c bf 73 02 20 31 54 c9 32 7e 57 1d 69 c1 |.b\.s. 1T.2~W.i.| +peer1.org2.example.com | 00000030 83 0f d3 c4 35 7a c9 64 52 04 31 54 cf d1 33 5d |....5z.dR.1T..3]| +peer1.org2.example.com | 00000040 cc be f2 41 e8 35 65 |...A.5e| +peer1.org2.example.com | [c9b 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1580 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c9c 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d1580 gate 1574140919781322700 evaluation succeeds +peer1.org2.example.com | [c9d 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c9e 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c9f 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [ca0 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ca1 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ca2 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [ca3 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [ca4 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [ca5 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [ca6 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca7 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca8 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca9 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [caa 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cab 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cac 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cad 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cae 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [caf 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb0 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb1 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb2 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb3 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [adc 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [add 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ade 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [adf 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94ac0 gate 1574140912830318600 evaluation starts +peer0.org2.example.com | [ae0 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94ac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ae1 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94ac0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [ae2 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [ae3 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94ac0 principal evaluation fails +peer0.org2.example.com | [ae4 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94ac0 gate 1574140912830318600 evaluation fails +peer0.org2.example.com | [ae5 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ae6 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ae7 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [ae8 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95030 gate 1574140912830898700 evaluation starts +peer0.org2.example.com | [ae9 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95030 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [aea 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95030 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [aeb 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95030 principal matched by identity 0 +peer0.org2.example.com | [aec 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 4a 3d 37 1d 50 54 7a 09 18 4c ca 94 e8 c2 63 |.J=7.PTz..L....c| +peer0.org2.example.com | 00000010 fe ce 97 59 47 0e 19 d5 32 6c e4 1d 62 3f a6 d3 |...YG...2l..b?..| +peer0.org2.example.com | [aed 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 42 0b 6e 3e 75 b8 b3 6b b2 f7 |0E.!..B.n>u..k..| +peer0.org2.example.com | 00000010 0f 22 ca 07 ef dd b1 ad fe fc 5a 34 e7 7f cf 3c |."........Z4...<| +peer0.org2.example.com | 00000020 e9 18 b5 53 8d 02 20 50 02 00 da e9 ef b0 c3 48 |...S.. P.......H| +peer0.org2.example.com | 00000030 f7 5d af ea 61 02 c9 4d 29 72 fe e2 6f 42 6f 71 |.]..a..M)r..oBoq| +peer0.org2.example.com | 00000040 83 80 a6 3e ea cc 77 |...>..w| +peer0.org2.example.com | [aee 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95030 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [aef 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95030 gate 1574140912830898700 evaluation succeeds +peer0.org2.example.com | [af0 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [af1 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [af2 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [af3 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [af4 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [af5 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [af6 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13145790139201548345, Envelope: 962 bytes, Signature: 0 bytes +peer0.org2.example.com | [af7 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8f9 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8fa 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8fb 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8fc 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8fd 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8fe 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8ff 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [900 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [901 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399b110 gate 1574140912809697100 evaluation starts +peer1.org1.example.com | [902 11-19 05:21:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399b110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [903 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399b110 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [904 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399b110 principal matched by identity 0 +peer1.org1.example.com | [905 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 10 04 b5 a3 2a 10 1a 4d 56 66 c4 f3 70 0f 31 |.....*..MVf..p.1| +peer1.org1.example.com | 00000010 c8 d0 a3 ab a5 ba 00 36 67 eb 56 a7 61 c6 4b ea |.......6g.V.a.K.| +peer1.org1.example.com | [906 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 7a 55 44 ca 72 63 38 96 2d 0a bf |0D. .zUD.rc8.-..| +peer1.org1.example.com | 00000010 9b c0 0d 1e 70 36 ec f4 c3 f9 05 45 ab 5c 21 06 |....p6.....E.\!.| +peer1.org1.example.com | 00000020 dd c4 a8 ac 02 20 18 9c f8 41 1c c6 81 f6 be ec |..... ...A......| +peer1.org1.example.com | 00000030 b0 4d a9 b8 0b 79 82 f5 6d 52 aa 1b bf 24 ee d2 |.M...y..mR...$..| +peer1.org1.example.com | 00000040 cd 2b be b4 dc 4c |.+...L| +peer1.org1.example.com | [907 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399b110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [908 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399b110 gate 1574140912809697100 evaluation succeeds +peer1.org1.example.com | [909 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [90a 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [90b 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [90c 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [90d 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:46.860 UTC [orderer.common.server] func1 -> DEBU 95d Executing callback to update root CAs" +orderer0.example.com | "2019-11-19 05:21:46.860 UTC [orderer.common.server] updateTrustedRoots -> DEBU 95e updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-11-19 05:21:46.861 UTC [orderer.common.server] updateTrustedRoots -> DEBU 95f adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-11-19 05:21:46.861 UTC [orderer.common.server] updateTrustedRoots -> DEBU 960 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-11-19 05:21:46.862 UTC [orderer.common.server] updateTrustedRoots -> DEBU 961 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-11-19 05:21:46.862 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 962 [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +orderer0.example.com | "2019-11-19 05:21:46.862 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 963 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2019-11-19 05:21:46.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 964 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:46.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 965 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:46.863 UTC [msp.identity] Sign -> DEBU 966 Sign: plaintext: 0A020801120B0A090A03010203100418...C777BD462801DDAB76D65A78615D5596 " +orderer0.example.com | "2019-11-19 05:21:46.863 UTC [msp.identity] Sign -> DEBU 967 Sign: digest: 0BBB594FA13D44520D31F25572556F29303F53BCD6AEE4C543BE01A8B7DB71EB " +peer1.org2.example.com | [cb4 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [cb5 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb6 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [cb7 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cb8 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cb9 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cba 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cbb 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [cbc 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [cbd 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cbe 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cbf 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cc0 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cc1 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cc2 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cc3 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [cc4 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cc5 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cc6 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cc7 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cc8 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cc9 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cca 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [ccb 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [ccc 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [ccd 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [cce 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ccf 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [cd0 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [cd1 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b24 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b25 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7972021935824796748, Envelope: 960 bytes, Signature: 0 bytes +peer0.org1.example.com | [b26 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b27 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b28 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b29 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [af8 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [af9 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [afa 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [afb 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 69 116 74 120 69 56 69 56 48 101 56 103 51 104 103 47 118 49 73 88 99 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 80 102 111 117 43 101 66 81 80 122 113 10 51 78 70 87 83 68 43 101 119 75 121 102 77 100 75 79 75 75 112 102 99 104 52 47 104 76 68 47 48 113 52 48 87 53 49 98 82 108 68 84 75 111 76 119 52 73 67 104 121 111 76 79 51 69 90 117 118 90 57 55 100 98 112 119 10 105 113 99 97 66 101 90 68 55 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 76 53 52 122 43 102 79 74 76 54 51 75 110 105 69 120 72 109 98 77 115 48 100 115 107 69 53 102 43 77 106 111 66 79 52 90 78 122 106 89 57 65 50 65 105 65 109 103 70 81 50 10 81 112 81 85 69 114 48 104 49 108 43 75 117 76 55 73 118 84 85 107 98 73 118 79 122 116 113 113 48 99 76 111 54 105 112 114 53 81 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [afc 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Added �o��X +peer0.org2.example.com | 8T)�YR�^",�:��uO�.��� to the in memory item map, total items: 3 +peer0.org2.example.com | [afd 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [afe 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13746236427207047466, Envelope: 957 bytes, Signature: 0 bytes +peer0.org2.example.com | [aff 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [90e 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [90f 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 2451639194954220049, Envelope: 1903 bytes, Signature: 0 bytes +peer1.org1.example.com | [910 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [911 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [912 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [913 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [914 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [915 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 78 102 48 116 47 73 97 110 78 52 83 84 110 47 74 99 90 52 75 86 99 56 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 119 79 84 73 48 77 68 65 49 79 84 65 119 87 104 99 78 77 106 107 119 79 84 73 120 77 68 65 49 79 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 65 116 51 73 56 50 72 52 50 66 114 10 83 47 52 109 68 69 103 111 73 71 49 115 86 86 97 73 72 82 48 116 47 99 110 53 113 106 50 115 57 116 72 70 108 88 49 88 114 103 112 53 121 72 119 55 110 90 107 73 103 66 105 70 114 50 87 110 87 119 49 83 84 73 106 56 10 100 118 106 105 53 101 122 47 100 98 43 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 73 53 114 108 100 66 47 51 50 78 78 121 108 43 73 98 56 53 53 52 85 71 86 67 68 99 72 88 101 78 78 73 110 83 66 110 88 88 67 122 76 84 85 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 70 50 121 56 69 87 104 49 79 118 69 99 101 121 84 68 71 71 70 114 100 78 119 47 118 106 49 65 86 51 52 105 82 76 57 102 66 57 78 80 72 57 55 65 105 65 52 70 89 114 81 10 115 122 57 106 106 56 74 50 69 111 118 79 121 111 49 113 118 84 73 107 97 113 82 109 89 116 67 120 86 114 101 105 52 73 87 43 105 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [916 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Added A^���g�� +peer1.org1.example.com | ����U���ʒ�:+��aSpq� to the in memory item map, total items: 3 +peer1.org1.example.com | [917 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [918 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [919 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [91a 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [91b 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 102 105 102 67 76 119 72 51 110 66 114 75 72 80 115 121 82 75 78 70 68 122 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 114 77 122 71 105 79 121 106 104 83 43 10 86 87 101 43 84 47 56 79 89 105 102 75 110 75 84 118 102 73 102 51 105 119 75 89 106 75 104 108 49 103 67 101 87 86 90 110 72 89 75 79 80 98 85 117 73 80 116 55 97 77 54 120 76 57 51 121 117 118 120 111 77 100 51 105 10 65 74 107 80 83 55 111 100 50 54 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 106 109 117 86 48 72 47 102 89 48 51 75 88 52 104 118 122 110 110 104 81 90 85 73 78 119 100 100 52 48 48 105 100 73 71 100 100 99 76 77 116 78 81 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 99 113 85 43 110 112 50 85 104 57 119 109 103 79 55 54 88 69 50 107 121 71 49 110 56 111 112 114 102 82 106 68 51 66 119 53 49 103 87 74 118 116 65 105 66 114 85 71 57 103 10 70 114 97 73 49 57 49 78 114 113 122 53 108 98 99 65 98 112 107 84 43 74 83 116 84 80 113 55 54 79 120 69 111 43 81 56 110 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [91c 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Added *g��kҚ�-���$6��[�@p�@�NP3�� to the in memory item map, total items: 4 +peer1.org1.example.com | [91d 11-19 05:21:52.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [91e 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [91f 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [920 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [921 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [922 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [923 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [924 11-19 05:21:53.65 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]] +peer1.org1.example.com | [925 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:57438 +peer1.org1.example.com | [926 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003911ae0 +peer1.org1.example.com | [927 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [928 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [929 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org1.example.com | [92a 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [92b 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 ca 0b bb 13 d5 b4 2d 6a 8e 67 86 ad 69 61 5e |.......-j.g..ia^| +peer1.org1.example.com | 00000010 ec bf 38 e2 de 41 8b 09 22 b6 17 f7 37 28 0c 9b |..8..A.."...7(..| +peer1.org1.example.com | [92c 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 41 ca c4 97 00 f4 d4 4f 49 cb |0E.!..A......OI.| +peer1.org1.example.com | 00000010 4d 97 ae 14 11 ff bc 98 69 ae 98 39 b3 51 a3 24 |M.......i..9.Q.$| +peer1.org1.example.com | 00000020 e4 35 ef 6a 45 02 20 7b 59 00 79 13 59 2e 9e b0 |.5.jE. {Y.y.Y...| +peer1.org1.example.com | 00000030 07 27 5c e2 40 37 40 28 6e 17 bc f8 83 fd 56 ab |.'\.@7@(n.....V.| +peer1.org1.example.com | 00000040 25 9a b8 82 22 d8 91 |%..."..| +peer1.org1.example.com | [92d 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [92e 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00381b6c0, header 0xc003911ef0 +peer1.org1.example.com | [92f 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [930 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [][21ef40f2] processing txid: 21ef40f227dfa4750276593c1fb2937d908e8c6badceda4921774c8c1c50b125 +peer1.org1.example.com | [931 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [][21ef40f2] Entry chaincode: name:"lscc" +peer1.org1.example.com | [932 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> INFO [][21ef40f2] Entry chaincode: name:"lscc" +peer1.org1.example.com | [933 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [934 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 ca 0b bb 13 d5 b4 2d 6a 8e 67 86 ad 69 61 5e |.......-j.g..ia^| +peer1.org1.example.com | 00000010 ec bf 38 e2 de 41 8b 09 22 b6 17 f7 37 28 0c 9b |..8..A.."...7(..| +peer1.org1.example.com | [935 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 41 ca c4 97 00 f4 d4 4f 49 cb |0E.!..A......OI.| +peer1.org1.example.com | 00000010 4d 97 ae 14 11 ff bc 98 69 ae 98 39 b3 51 a3 24 |M.......i..9.Q.$| +peer1.org1.example.com | 00000020 e4 35 ef 6a 45 02 20 7b 59 00 79 13 59 2e 9e b0 |.5.jE. {Y.y.Y...| +peer1.org1.example.com | 00000030 07 27 5c e2 40 37 40 28 6e 17 bc f8 83 fd 56 ab |.'\.@7@(n.....V.| +peer1.org1.example.com | 00000040 25 9a b8 82 22 d8 91 |%..."..| +peer1.org1.example.com | [936 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | [937 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer1.org1.example.com | [938 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org1.example.com | [939 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [173b986d-da36-4ecb-84a4-d1ce69f92837] +peer1.org1.example.com | [93a 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [93b 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [173b986d-da36-4ecb-84a4-d1ce69f92837] +peer1.org1.example.com | [93c 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer1.org1.example.com | [93d 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org1.example.com | [93e 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [21ef40f2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [93f 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [21ef40f2] notifying Txid:21ef40f227dfa4750276593c1fb2937d908e8c6badceda4921774c8c1c50b125, channelID: +peer1.org1.example.com | [940 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [941 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> INFO [][21ef40f2] Exit chaincode: name:"lscc" (3ms) +peer1.org1.example.com | [942 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [][21ef40f2] Exit +peer1.org1.example.com | [943 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:57438 +peer1.org1.example.com | [944 11-19 05:21:54.33 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:57438 grpc.code=OK grpc.call_duration=6.6485ms +peer1.org1.example.com | [945 11-19 05:21:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [946 11-19 05:21:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [947 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [948 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 97 88 3b 75 54 cf 29 9f 2b 9a 86 14 19 ae 77 |...;uT.).+.....w| +peer1.org1.example.com | 00000010 a7 9a 53 0f b8 04 7c 1a 9f 8b d1 32 bb 15 01 f0 |..S...|....2....| +peer1.org1.example.com | [949 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb b0 2a aa 7b 1a 20 d5 48 b3 68 |0E.!...*.{. .H.h| +peer1.org1.example.com | 00000010 d8 9a d1 5f 88 92 a1 2d ff b9 54 d8 ac d5 31 c5 |..._...-..T...1.| +peer1.org1.example.com | 00000020 3c 07 6c 46 b7 02 20 71 27 ea 48 48 ee b6 09 23 |<.lF.. q'.HH...#| +peer1.org1.example.com | 00000030 d0 44 a9 ab 63 b5 cc ab 6e 91 08 ac 03 c4 b2 32 |.D..c...n......2| +peer1.org1.example.com | 00000040 87 0b 59 ea 1f 4b 0d |..Y..K.| +peer1.org1.example.com | [94a 11-19 05:21:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [94b 11-19 05:21:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [94c 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [94d 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [94e 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [94f 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [950 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [951 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [952 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [953 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [954 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 cf bf 83 d0 79 da 79 3d f6 5f 40 64 20 5c fc |$....y.y=._@d \.| +peer1.org1.example.com | 00000010 3e d2 89 b1 d5 f7 92 1f de 70 9a 00 5b cc 64 f7 |>........p..[.d.| +peer1.org1.example.com | [955 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 83 e1 4c 41 86 2f 65 31 1c a2 b7 |0D. ...LA./e1...| +peer1.org1.example.com | 00000010 5c 9c 55 36 6a cc 24 65 cb a2 6b d0 bf d6 85 ca |\.U6j.$e..k.....| +peer1.org1.example.com | 00000020 97 b7 af 8d 02 20 1a c1 3e 84 d4 61 42 01 40 7c |..... ..>..aB.@|| +peer1.org1.example.com | 00000030 9b 7e d6 4d a0 d1 2d 16 08 60 00 5d 00 3f 75 bb |.~.M..-..`.].?u.| +peer1.org1.example.com | 00000040 b0 0a 3f 1c 78 49 |..?.xI| +peer1.org1.example.com | [956 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [957 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [958 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [959 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [95a 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [95b 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [95c 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [95d 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [95e 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [95f 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [960 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [b2a 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 102 105 102 67 76 119 72 51 110 66 114 75 72 80 115 121 82 75 78 70 68 122 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 114 77 122 71 105 79 121 106 104 83 43 10 86 87 101 43 84 47 56 79 89 105 102 75 110 75 84 118 102 73 102 51 105 119 75 89 106 75 104 108 49 103 67 101 87 86 90 110 72 89 75 79 80 98 85 117 73 80 116 55 97 77 54 120 76 57 51 121 117 118 120 111 77 100 51 105 10 65 74 107 80 83 55 111 100 50 54 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 106 109 117 86 48 72 47 102 89 48 51 75 88 52 104 118 122 110 110 104 81 90 85 73 78 119 100 100 52 48 48 105 100 73 71 100 100 99 76 77 116 78 81 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 99 113 85 43 110 112 50 85 104 57 119 109 103 79 55 54 88 69 50 107 121 71 49 110 56 111 112 114 102 82 106 68 51 66 119 53 49 103 87 74 118 116 65 105 66 114 85 71 57 103 10 70 114 97 73 49 57 49 78 114 113 122 53 108 98 99 65 98 112 107 84 43 74 83 116 84 80 113 55 54 79 120 69 111 43 81 56 110 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [b2b 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Added *g��kҚ�-���$6��[�@p�@�NP3�� to the in memory item map, total items: 4 +peer0.org1.example.com | [b2c 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b2d 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [b2e 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [b2f 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [b30 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [b31 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b32 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [b33 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [b34 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b35 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [b36 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [b37 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +peer0.org1.example.com | 00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +peer0.org1.example.com | [b38 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +peer0.org1.example.com | 00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +peer0.org1.example.com | 00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +peer0.org1.example.com | 00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +peer0.org1.example.com | 00000040 b0 a7 83 ce 50 7e |....P~| +peer0.org1.example.com | [b39 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [b3a 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e d8 7c 41 ed 7e 17 52 22 d7 4e 6f |0D. N.|A.~.R".No| +peer0.org1.example.com | 00000010 30 2f 81 cc 6f cc 8c b2 7b a9 f3 e3 47 6a 6c aa |0/..o...{...Gjl.| +peer0.org1.example.com | 00000020 e4 13 d8 fe 02 20 6b 7e e6 a1 96 10 cd 1d 90 dc |..... k~........| +peer0.org1.example.com | 00000030 c1 5d da a9 ac 31 ab 33 71 95 cc 8b 13 db 20 be |.]...1.3q..... .| +orderer0.example.com | "2019-11-19 05:21:46.865 UTC [fsblkstorage] indexBlock -> DEBU 968 Indexing block [blockNum=1, blockHash=[]byte{0x60, 0x1e, 0xe1, 0xb7, 0xa1, 0x19, 0x69, 0xc3, 0xf3, 0xb5, 0x51, 0x11, 0x52, 0x94, 0x60, 0xd, 0x7b, 0xd0, 0x3f, 0x9f, 0xa0, 0x2a, 0x24, 0xa6, 0x25, 0xf8, 0xdd, 0x54, 0x3d, 0xb9, 0xca, 0x84} txOffsets= +orderer0.example.com | txId=994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727 locPointer=offset=71, bytesLength=24470 +orderer0.example.com | ]" +orderer0.example.com | "2019-11-19 05:21:46.867 UTC [fsblkstorage] updateCheckpoint -> DEBU 969 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51284], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-11-19 05:21:46.867 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 96a [channel: businesschannel] Wrote block [1]" +orderer0.example.com | "2019-11-19 05:21:46.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96b Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +orderer0.example.com | "2019-11-19 05:21:46.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96c Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +orderer0.example.com | "2019-11-19 05:21:46.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +orderer0.example.com | "2019-11-19 05:21:46.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.4µs " +orderer0.example.com | "2019-11-19 05:21:46.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:46.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU 970 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:47.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU 971 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:47.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 972 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2019-11-19 05:21:47.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 973 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.9µs " +orderer0.example.com | "2019-11-19 05:21:47.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 974 Sending msg of 28 bytes to 2 on channel businesschannel took 58.2µs" +orderer0.example.com | "2019-11-19 05:21:47.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 975 Sending msg of 28 bytes to 3 on channel businesschannel took 34.5µs" +orderer0.example.com | "2019-11-19 05:21:47.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU 976 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 553.2µs " +orderer0.example.com | "2019-11-19 05:21:47.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 977 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6983ms " +orderer0.example.com | "2019-11-19 05:21:47.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 978 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:47.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 979 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:47.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 97a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:47.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 97b Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +orderer0.example.com | "2019-11-19 05:21:47.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 97c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.4µs " +orderer0.example.com | "2019-11-19 05:21:47.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 97d Sending msg of 28 bytes to 2 on channel businesschannel took 42.1µs" +orderer0.example.com | "2019-11-19 05:21:47.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 97e Sending msg of 28 bytes to 3 on channel businesschannel took 118.3µs" +orderer0.example.com | "2019-11-19 05:21:47.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 97f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 673.2µs " +orderer0.example.com | "2019-11-19 05:21:47.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 980 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.5µs " +orderer0.example.com | "2019-11-19 05:21:47.940 UTC [orderer.common.cluster.step] handleMessage -> DEBU 981 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:47.942 UTC [orderer.common.cluster.step] handleMessage -> DEBU 982 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:48.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU 983 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:48.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 984 Sending msg of 28 bytes to 3 on channel testchainid took 24.8µs" +orderer0.example.com | "2019-11-19 05:21:48.065 UTC [orderer.common.cluster.step] sendMessage -> DEBU 985 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.4µs " +orderer0.example.com | "2019-11-19 05:21:48.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 986 Sending msg of 28 bytes to 2 on channel businesschannel took 33.4µs" +orderer0.example.com | "2019-11-19 05:21:48.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 987 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-11-19 05:21:48.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 988 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 259.8µs " +orderer0.example.com | "2019-11-19 05:21:48.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 989 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:48.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 98a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:48.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.8µs " +orderer0.example.com | "2019-11-19 05:21:48.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 98c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:48.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 98d Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +orderer0.example.com | "2019-11-19 05:21:48.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.8µs " +orderer0.example.com | "2019-11-19 05:21:48.894 UTC [orderer.common.server] Deliver -> DEBU 98f Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:21:48.894 UTC [common.deliver] Handle -> DEBU 990 Starting new deliver loop for 172.18.0.5:51454" +orderer0.example.com | "2019-11-19 05:21:48.894 UTC [common.deliver] Handle -> DEBU 991 Attempting to read seek info message from 172.18.0.5:51454" +orderer0.example.com | "2019-11-19 05:21:48.923 UTC [orderer.common.server] Broadcast -> DEBU 992 Starting new Broadcast handler" +orderer0.example.com | "2019-11-19 05:21:48.923 UTC [orderer.common.broadcast] Handle -> DEBU 993 Starting new broadcast loop for 172.18.0.5:51456" +orderer0.example.com | "2019-11-19 05:21:48.923 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 994 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:51456" +orderer0.example.com | "2019-11-19 05:21:48.924 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 995 Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2019-11-19 05:21:48.924 UTC [policies] Evaluate -> DEBU 996 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.924 UTC [policies] Evaluate -> DEBU 997 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:21:48.924 UTC [policies] Evaluate -> DEBU 998 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.924 UTC [policies] Evaluate -> DEBU 999 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:21:48.925 UTC [policies] Evaluate -> DEBU 99a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.926 UTC [msp] DeserializeIdentity -> DEBU 99b Obtaining identity" +orderer0.example.com | "2019-11-19 05:21:48.926 UTC [msp.identity] newIdentity -> DEBU 99c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +orderer0.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +orderer0.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +orderer0.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +orderer0.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.927 UTC [cauthdsl] func1 -> DEBU 99d 0xc000d784f0 gate 1574140908927725700 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:48.927 UTC [cauthdsl] func2 -> DEBU 99e 0xc000d784f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:48.927 UTC [cauthdsl] func2 -> DEBU 99f 0xc000d784f0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:48.928 UTC [cauthdsl] func2 -> DEBU 9a0 0xc000d784f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-11-19 05:21:48.928 UTC [cauthdsl] func2 -> DEBU 9a1 0xc000d784f0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:21:48.928 UTC [cauthdsl] func1 -> DEBU 9a2 0xc000d784f0 gate 1574140908927725700 evaluation fails" +orderer0.example.com | "2019-11-19 05:21:48.928 UTC [policies] Evaluate -> DEBU 9a3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.928 UTC [policies] Evaluate -> DEBU 9a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.929 UTC [policies] Evaluate -> DEBU 9a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.929 UTC [cauthdsl] func1 -> DEBU 9a6 0xc000d79670 gate 1574140908929794800 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:48.930 UTC [cauthdsl] func2 -> DEBU 9a7 0xc000d79670 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:48.930 UTC [cauthdsl] func2 -> DEBU 9a8 0xc000d79670 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:48.930 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9a9 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.930 UTC [msp] Validate -> DEBU 9aa MSP Org2MSP validating identity" +orderer0.example.com | "2019-11-19 05:21:48.931 UTC [msp] getCertificationChain -> DEBU 9ab MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:21:48.931 UTC [cauthdsl] func2 -> DEBU 9ac 0xc000d79670 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:21:48.931 UTC [msp.identity] Verify -> DEBU 9ad Verify: digest = 00000000 70 83 92 0f b1 97 ee cb 0d ae eb 88 b1 10 2b 7f |p.............+.| +orderer0.example.com | 00000010 6a 67 40 9f a8 28 75 68 8a 81 30 74 f7 d3 f1 54 |jg@..(uh..0t...T|" +orderer0.example.com | "2019-11-19 05:21:48.931 UTC [msp.identity] Verify -> DEBU 9ae Verify: sig = 00000000 30 45 02 21 00 d6 63 94 fa 69 b1 a1 62 bd c3 0c |0E.!..c..i..b...| +orderer0.example.com | 00000010 78 3a 62 16 e3 17 e7 17 d5 38 2d cf 88 3e de c4 |x:b......8-..>..| +orderer0.example.com | 00000020 23 13 1a c5 9a 02 20 41 e9 82 be b8 35 74 90 e6 |#..... A....5t..| +orderer0.example.com | 00000030 dc 22 5c 62 d2 11 dc c4 39 35 ba 56 3d da 3a 4a |."\b....95.V=.:J| +orderer0.example.com | 00000040 8e 8f f7 8a 69 47 d5 |....iG.|" +orderer0.example.com | "2019-11-19 05:21:48.932 UTC [cauthdsl] func2 -> DEBU 9af 0xc000d79670 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:21:48.932 UTC [cauthdsl] func1 -> DEBU 9b0 0xc000d79670 gate 1574140908929794800 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:21:48.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9b1 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-11-19 05:21:48.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9b2 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-11-19 05:21:48.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.9µs " +orderer0.example.com | "2019-11-19 05:21:48.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.9µs " +orderer0.example.com | "2019-11-19 05:21:48.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9b5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:48.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9b6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:48.932 UTC [policies] Evaluate -> DEBU 9b7 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.937 UTC [policies] Evaluate -> DEBU 9b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer1.org1.example.com | [961 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [962 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [963 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [964 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [965 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [966 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [967 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [968 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [969 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [96a 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [96b 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [96c 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer1.org1.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer1.org1.example.com | [96d 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer1.org1.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer1.org1.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer1.org1.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer1.org1.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer1.org1.example.com | [96e 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [96f 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 1d 5b 7c f0 c6 8f 69 f8 d2 d1 |0E.!...[|...i...| +peer1.org1.example.com | 00000010 7e e1 40 82 4c 42 0d 63 62 92 d3 1a d8 56 d3 d1 |~.@.LB.cb....V..| +peer1.org1.example.com | 00000020 8f 31 02 28 15 02 20 39 6e 48 02 2f a5 bf 1d c6 |.1.(.. 9nH./....| +peer1.org1.example.com | 00000030 86 5f 52 10 80 1a f7 cb 97 3d 76 0d e9 79 b2 42 |._R......=v..y.B| +peer1.org1.example.com | 00000040 f4 9d 45 9e e1 ae 83 |..E....| +peer1.org1.example.com | [970 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [971 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [972 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [973 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [974 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [975 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [976 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [977 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [978 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [979 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [97a 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [97b 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" secret_envelope: > alive: +peer1.org1.example.com | [97c 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [97d 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [97e 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [97f 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [980 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [981 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [982 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [983 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [984 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [985 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [986 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [987 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [988 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [989 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [98a 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [98b 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [98c 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [98d 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [98e 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [98f 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [990 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [991 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa130 gate 1574140915415803000 evaluation starts +peer1.org1.example.com | [992 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa130 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:21:48.938 UTC [policies] Evaluate -> DEBU 9b9 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:48.938 UTC [policies] Evaluate -> DEBU 9ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:48.938 UTC [policies] Evaluate -> DEBU 9bb Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:48.939 UTC [policies] Evaluate -> DEBU 9bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:48.939 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:48.939 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] verifyDeltaSet -> DEBU 9cc Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.941 UTC [common.configtx] policyForItem -> DEBU 9cd Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9ce Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9cf Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d0 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d1 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d3 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d4 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-11-19 05:21:48.943 UTC [policies] Manager -> DEBU 9d5 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.943 UTC [policies] Manager -> DEBU 9d6 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.944 UTC [policies] Manager -> DEBU 9d7 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-11-19 05:21:48.944 UTC [policies] Evaluate -> DEBU 9d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-11-19 05:21:48.944 UTC [cauthdsl] func1 -> DEBU 9d9 0xc000da63d0 gate 1574140908944497600 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:48.944 UTC [cauthdsl] func2 -> DEBU 9da 0xc000da63d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:48.944 UTC [cauthdsl] func2 -> DEBU 9db 0xc000da63d0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:48.944 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 9dc Checking if identity has been named explicitly as an admin for Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.945 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 9dd Checking if identity carries the admin ou for Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.945 UTC [msp] Validate -> DEBU 9de MSP Org2MSP validating identity" +orderer0.example.com | "2019-11-19 05:21:48.945 UTC [msp] getCertificationChain -> DEBU 9df MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:21:48.946 UTC [msp] hasOURole -> DEBU 9e0 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-11-19 05:21:48.946 UTC [msp] getCertificationChain -> DEBU 9e1 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:21:48.946 UTC [cauthdsl] func2 -> DEBU 9e2 0xc000da63d0 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:21:48.946 UTC [msp.identity] Verify -> DEBU 9e3 Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +orderer0.example.com | 00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.|" +orderer0.example.com | "2019-11-19 05:21:48.946 UTC [msp.identity] Verify -> DEBU 9e4 Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +orderer0.example.com | 00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +orderer0.example.com | 00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +orderer0.example.com | 00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +orderer0.example.com | 00000040 56 71 ab 2e 37 58 4a |Vq..7XJ|" +orderer0.example.com | "2019-11-19 05:21:48.947 UTC [cauthdsl] func2 -> DEBU 9e5 0xc000da63d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:21:48.947 UTC [cauthdsl] func1 -> DEBU 9e6 0xc000da63d0 gate 1574140908944497600 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:21:48.947 UTC [policies] Evaluate -> DEBU 9e7 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:48.947 UTC [policies] Evaluate -> DEBU 9e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:48.947 UTC [common.configtx] verifyDeltaSet -> DEBU 9e9 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.948 UTC [common.configtx] recurseConfigMap -> DEBU 9ea Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.948 UTC [common.configtx] recurseConfigMap -> DEBU 9eb Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.948 UTC [common.configtx] recurseConfigMap -> DEBU 9ec Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [b00 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b01 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b02 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b03 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b04 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b05 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [b06 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002853340 gate 1574140912835788700 evaluation starts +peer0.org2.example.com | [b07 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002853340 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b08 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002853340 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [b09 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002853340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [b0a 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002853340 principal evaluation fails +peer0.org2.example.com | [b0b 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002853340 gate 1574140912835788700 evaluation fails +peer0.org2.example.com | [b0c 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b0d 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b0e 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [b0f 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028538b0 gate 1574140912836199600 evaluation starts +peer0.org2.example.com | [b10 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028538b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b11 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028538b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [b12 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028538b0 principal matched by identity 0 +peer0.org2.example.com | [b13 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 fb 10 d3 c1 45 7f 72 73 57 f6 d5 57 e9 31 28 |.....E.rsW..W.1(| +peer0.org2.example.com | 00000010 64 f3 fc 1a e0 bf 8d d0 e1 50 bf 24 6e 3c c1 e9 |d........P.$n<..| +peer0.org2.example.com | [b14 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d e8 15 00 90 fc 0d 45 af de a9 f4 |0D. .......E....| +peer0.org2.example.com | 00000010 25 cc 00 39 97 25 76 48 a5 8a 62 48 4d ee 08 04 |%..9.%vH..bHM...| +peer0.org2.example.com | 00000020 c4 93 d5 fc 02 20 5f 50 02 65 6c 97 9e 4f 71 99 |..... _P.el..Oq.| +peer0.org2.example.com | 00000030 87 da fd b3 b3 7c dc 00 e4 10 89 cd d4 6f 76 b0 |.....|.......ov.| +peer0.org2.example.com | 00000040 ed 31 25 ac 1a eb |.1%...| +peer0.org2.example.com | [b15 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028538b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b16 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028538b0 gate 1574140912836199600 evaluation succeeds +peer0.org2.example.com | [b17 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b18 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b19 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [b1a 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [b1b 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 fd 6f 4d c4 4e 27 |.oM.N'| +peer0.org1.example.com | [b3b 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [b3c 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [b3d 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [b3e 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [b3f 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [b40 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [b41 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b42 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b43 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [b44 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [b45 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b46 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b47 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b48 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [b49 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b4a 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b4b 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [b4c 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [b4d 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [b4e 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b4f 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b50 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b51 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b52 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b53 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [b54 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b55 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [b56 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [b57 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [993 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa130 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [994 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa130 principal matched by identity 0 +peer1.org1.example.com | [995 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 08 16 77 fb fb 6d 78 00 54 32 2f bf f4 15 c9 |...w..mx.T2/....| +peer1.org1.example.com | 00000010 ae b3 12 79 db 6f c0 44 d7 7e 72 c1 d3 2e 74 d9 |...y.o.D.~r...t.| +peer1.org1.example.com | [996 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d c7 65 f0 b9 59 a4 06 7d f3 3b 49 |0D. m.e..Y..}.;I| +peer1.org1.example.com | 00000010 5f 28 4d 19 5e 25 7a 95 a3 6a 1c 4a 43 bf c1 ab |_(M.^%z..j.JC...| +peer1.org1.example.com | 00000020 94 5a 1f 08 02 20 1e f6 dc ce d6 94 f8 b1 b0 36 |.Z... .........6| +peer1.org1.example.com | 00000030 c1 56 e7 a9 e5 ec 2c e1 d9 71 6a 45 e9 dc 92 17 |.V....,..qjE....| +peer1.org1.example.com | 00000040 59 dd b8 17 1e 9c |Y.....| +peer1.org1.example.com | [997 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa130 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [998 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa130 gate 1574140915415803000 evaluation succeeds +peer1.org1.example.com | [999 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [99a 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [99b 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [99c 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [99d 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [99e 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org1.example.com | [99f 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [9a0 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9a1 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9a2 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9a3 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a4 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a5 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a6 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a7 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a8 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a9 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9aa 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [9ab 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9ac 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [9ad 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [9ae 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9af 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [9b0 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [9b1 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [9b2 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [9b3 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer1.org1.example.com | [9b4 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [9b5 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003adb6e0, CONNECTING +peer1.org1.example.com | [9b6 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [9b7 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9b8 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [9b9 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9ba 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003adb6e0, READY +peer1.org1.example.com | [9bb 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [9bc 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer0.org2.example.com | [b1c 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b1d 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13746236427207047466, Envelope: 957 bytes, Signature: 0 bytes +peer0.org2.example.com | [b1e 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b1f 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b20 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b21 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [cd2 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [cd3 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [cd4 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c bf 11 70 8a 16 7a 01 c9 65 e5 6c 7e e5 b2 84 |,..p..z..e.l~...| +peer1.org2.example.com | 00000010 85 ea 6c 43 0c 62 25 5d 94 9d 2c 97 10 6e 87 0b |..lC.b%]..,..n..| +peer1.org2.example.com | [cd5 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7e 3c 34 08 c3 85 e5 98 45 15 |0E.!..~<4.....E.| +peer1.org2.example.com | 00000010 26 9c 6b 76 29 0e 08 ac 9c a1 f1 f7 c9 4d 77 91 |&.kv)........Mw.| +peer1.org2.example.com | 00000020 c0 72 e4 8f bc 02 20 3b e5 61 fa 2e 3f db 7a 82 |.r.... ;.a..?.z.| +peer1.org2.example.com | 00000030 51 98 4d 9b 47 7b 5e b6 da 14 89 2f 63 06 ac 9f |Q.M.G{^..../c...| +peer1.org2.example.com | 00000040 7a f5 f3 de 42 43 07 |z...BC.| +peer1.org2.example.com | [cd6 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [cd7 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 46 ae 31 8e 0f 4d 7e 6b ad c0 ba |0D. .F.1..M~k...| +peer1.org2.example.com | 00000010 d6 99 95 5b 26 0a dd bd 0a 37 99 40 94 b1 cc 86 |...[&....7.@....| +peer1.org2.example.com | 00000020 da b6 fe bd 02 20 24 27 33 46 6a c7 c0 dc 9c aa |..... $'3Fj.....| +peer1.org2.example.com | 00000030 43 68 fe 4d b9 02 f8 d8 3c a1 80 e4 3d c3 60 91 |Ch.M....<...=.`.| +peer1.org2.example.com | 00000040 74 24 51 ba 43 76 |t$Q.Cv| +peer1.org2.example.com | [cd8 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [cd9 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [cda 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [cdb 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [cdc 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [cdd 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cde 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cdf 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ce0 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [ce1 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ce2 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ce3 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ce5 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [ce6 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ce4 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [ce7 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [ce8 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ce9 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [9bd 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org1.example.com | [9be 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [9bf 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:7051 +peer1.org1.example.com | [9c0 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9c1 11-19 05:21:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9c2 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9c3 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9c4 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9c5 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9c6 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9c7 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9c8 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [9c9 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [9ca 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [9cb 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7b70 gate 1574140915462818500 evaluation starts +peer1.org1.example.com | [9cc 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9cd 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7b70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [9ce 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7b70 principal matched by identity 0 +peer1.org1.example.com | [9cf 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer1.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer1.org1.example.com | [9d0 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 b6 dc 79 37 86 be 10 8d b8 d1 |0E.!....y7......| +peer1.org1.example.com | 00000010 b0 78 ae 6f 47 28 8d 64 f4 c7 a8 c3 1c 67 7c d1 |.x.oG(.d.....g|.| +peer1.org1.example.com | 00000020 00 c6 a6 1c 90 02 20 29 85 8d f4 2d 4c 3e db 3f |...... )...-L>.?| +peer1.org1.example.com | 00000030 c9 3e d6 eb 24 9e a6 1b aa 9a df e5 43 2e 87 aa |.>..$.......C...| +peer1.org1.example.com | 00000040 61 05 1a e9 67 ee 36 |a...g.6| +peer1.org1.example.com | [9d1 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7b70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [9d2 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7b70 gate 1574140915462818500 evaluation succeeds +peer1.org1.example.com | [9d3 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9d4 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9d5 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9d6 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9d7 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [9d8 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9d9 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [9da 11-19 05:21:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9db 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9dc 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9dd 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [9de 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [9df 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9e0 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [9e1 11-19 05:21:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9e2 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [9e3 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9e5 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [b58 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [b59 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [b5a 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b5b 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b5c 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b5d 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b5e 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b5f 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b60 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b61 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 gate 1574140911855042500 evaluation starts +peer0.org1.example.com | [b62 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b63 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [b64 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 principal matched by identity 0 +peer0.org1.example.com | [b65 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +peer0.org1.example.com | 00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +peer0.org1.example.com | [b66 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +peer0.org1.example.com | 00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +peer0.org1.example.com | 00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +peer0.org1.example.com | 00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +peer0.org1.example.com | 00000040 3c b7 fd fe 94 01 8e |<......| +peer0.org1.example.com | [b67 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b68 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 gate 1574140911855042500 evaluation succeeds +peer0.org1.example.com | [b69 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b6a 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b6b 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b6c 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b6d 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [b6e 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [b6f 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [b70 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [b71 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [b72 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b73 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b74 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:21:48.948 UTC [common.configtx] recurseConfigMap -> DEBU 9ed Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.949 UTC [common.configtx] recurseConfigMap -> DEBU 9ee Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.950 UTC [common.configtx] recurseConfigMap -> DEBU 9ef Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.950 UTC [common.configtx] recurseConfigMap -> DEBU 9f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f2 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f3 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f4 Setting policy for key Admins to " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f5 Setting policy for key Readers to " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f6 Setting policy for key Writers to " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9fa Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9fb Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.configtx] recurseConfigMap -> DEBU 9fc Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.configtx] recurseConfigMap -> DEBU 9fd Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.configtx] recurseConfigMap -> DEBU 9fe Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] NewStandardValues -> DEBU 9ff Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a00 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a01 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a02 Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a03 Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a04 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] NewStandardValues -> DEBU a05 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a06 Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a07 Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a08 Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a09 Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0a Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0b Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.953 UTC [common.channelconfig] NewStandardValues -> DEBU a0c Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0d Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:48.953 UTC [common.channelconfig] NewStandardValues -> DEBU a0e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0f Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:48.954 UTC [common.channelconfig] validateMSP -> DEBU a10 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.954 UTC [msp] newBccspMsp -> DEBU a11 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.954 UTC [msp] New -> DEBU a12 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.954 UTC [msp] Setup -> DEBU a13 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:48.955 UTC [msp.identity] newIdentity -> DEBU a14 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.955 UTC [msp.identity] newIdentity -> DEBU a15 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [b75 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [b76 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b77 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b78 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b79 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [b7a 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [b7b 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [b7c 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b7d 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b7e 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b7f 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b80 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b81 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b82 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b83 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b84 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b85 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b86 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b87 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b88 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b89 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b8a 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [cea 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [ceb 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cec 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ced 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [cee 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [cef 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [cf0 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [cf1 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [cf2 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0120 gate 1574140919908928700 evaluation starts +peer1.org2.example.com | [cf3 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [cf4 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0120 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [cf5 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [cf6 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0120 principal evaluation fails +peer1.org2.example.com | [cf7 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0120 gate 1574140919908928700 evaluation fails +peer1.org2.example.com | [cf8 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [cf9 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [cfa 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [cfb 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0690 gate 1574140919913189200 evaluation starts +peer1.org2.example.com | [cfc 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [cfd 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0690 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [cfe 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0690 principal matched by identity 0 +peer1.org2.example.com | [cff 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 11 8b 08 45 f7 ca ad 60 ac 50 0d 92 c3 85 9f |....E...`.P.....| +peer1.org2.example.com | 00000010 6d fe 9c a9 48 42 9c 73 0d 80 28 67 b3 b5 8a 94 |m...HB.s..(g....| +peer1.org2.example.com | [d00 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 cf ee a7 76 61 c8 3a e3 1f ad |0E.!.....va.:...| +peer1.org2.example.com | 00000010 21 a4 83 72 5e d9 37 cb 84 01 6b a6 fb 3e a4 35 |!..r^.7...k..>.5| +peer1.org2.example.com | 00000020 64 50 3a 36 58 02 20 70 81 9c a5 e5 28 32 ea 65 |dP:6X. p....(2.e| +peer1.org2.example.com | 00000030 3a 7c c5 a2 52 c7 51 6c 86 0c 72 d6 5a 7b a2 9c |:|..R.Ql..r.Z{..| +peer1.org2.example.com | 00000040 ae 6b 3c 57 cc 18 19 |.k DEBU 0xc0034d0690 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [d02 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0690 gate 1574140919913189200 evaluation succeeds +peer1.org2.example.com | [d03 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d04 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d05 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [d06 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9e6 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [9e7 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9e8 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9e9 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9ea 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9eb 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9ec 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9ed 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [9ee 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [9ef 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [9f0 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43550 gate 1574140915664951900 evaluation starts +peer1.org1.example.com | [9f1 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43550 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9f2 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43550 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [9f3 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43550 principal matched by identity 0 +peer1.org1.example.com | [9f4 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [9f5 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [9f6 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43550 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [9f7 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43550 gate 1574140915664951900 evaluation succeeds +peer1.org1.example.com | [9f8 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9f9 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9fa 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9fb 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9fc 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [9fd 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [9fe 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9ff 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [a01 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a02 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a03 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [a04 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a00 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [a05 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [9e4 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer1.org1.example.com | [a06 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a07 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a08 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a09 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a0a 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a0b 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a0c 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a0d 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a0e 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e900 gate 1574140915673639100 evaluation starts +peer1.org1.example.com | [a0f 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e900 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a10 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e900 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [a11 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e900 principal matched by identity 0 +peer1.org1.example.com | [a12 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [a13 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [a14 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e900 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a15 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e900 gate 1574140915673639100 evaluation succeeds +peer1.org1.example.com | [a16 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a17 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a18 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a19 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a1a 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a1b 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a1c 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a1d 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a1e 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a1f 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a20 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f440 gate 1574140915677094500 evaluation starts +peer1.org1.example.com | [a21 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f440 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a22 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f440 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [a23 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f440 principal matched by identity 0 +peer1.org1.example.com | [a24 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [a25 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [a26 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f440 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a27 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f440 gate 1574140915677094500 evaluation succeeds +peer1.org1.example.com | [a28 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a29 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a2a 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a2b 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a2c 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a2d 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [a2e 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [a2f 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [a30 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a31 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a32 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a33 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a34 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a35 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a36 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a37 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a38 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98df0 gate 1574140915683912200 evaluation starts +peer1.org1.example.com | [a39 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98df0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a3a 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98df0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [a3b 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98df0 principal matched by identity 0 +peer1.org1.example.com | [a3c 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [a3d 11-19 05:21:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [a3e 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98df0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a3f 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98df0 gate 1574140915683912200 evaluation succeeds +peer1.org1.example.com | [a40 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a41 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a42 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a43 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:21:48.955 UTC [msp] Validate -> DEBU a16 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] NewStandardValues -> DEBU a17 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU a18 Processing field: ACLs" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU a19 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] NewStandardValues -> DEBU a1a Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU a1b Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] NewStandardValues -> DEBU a1c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU a1d Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] Validate -> DEBU a1e Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [common.channelconfig] validateMSP -> DEBU a1f Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [msp] newBccspMsp -> DEBU a20 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [msp] New -> DEBU a21 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.956 UTC [msp] Setup -> DEBU a22 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.957 UTC [msp.identity] newIdentity -> DEBU a23 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.957 UTC [common.channelconfig] NewStandardValues -> DEBU a24 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:48.957 UTC [common.channelconfig] initializeProtosStruct -> DEBU a25 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.957 UTC [common.channelconfig] NewStandardValues -> DEBU a26 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:48.958 UTC [common.channelconfig] initializeProtosStruct -> DEBU a27 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:48.958 UTC [common.channelconfig] Validate -> DEBU a28 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:21:48.958 UTC [common.channelconfig] validateMSP -> DEBU a29 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.958 UTC [msp] newBccspMsp -> DEBU a2a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.958 UTC [msp] New -> DEBU a2b Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.958 UTC [msp] Setup -> DEBU a2c Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.958 UTC [msp.identity] newIdentity -> DEBU a2d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.959 UTC [msp] Setup -> DEBU a2e Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:48.959 UTC [msp] Setup -> DEBU a2f MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:48.959 UTC [policies] NewManagerImpl -> DEBU a30 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.959 UTC [policies] NewManagerImpl -> DEBU a31 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.959 UTC [policies] NewManagerImpl -> DEBU a32 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.959 UTC [policies] NewManagerImpl -> DEBU a33 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a34 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a35 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a36 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a37 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a38 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a39 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a3a Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a3b Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a3c Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] GetPolicy -> DEBU a3d Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.960 UTC [policies] GetPolicy -> DEBU a3e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a3f Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] GetPolicy -> DEBU a40 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] GetPolicy -> DEBU a41 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a42 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a43 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a44 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a45 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a46 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a47 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [policies] NewManagerImpl -> DEBU a48 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5b Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5c Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5d Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5e Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a5f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a60 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a61 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a62 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a63 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a64 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a65 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a66 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a67 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a68 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a69 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a6a Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a6b Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a6c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a6d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a6e Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a6f Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a70 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a71 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a72 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a73 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a74 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:48.969 UTC [common.channelconfig] LogSanityChecks -> DEBU a75 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-11-19 05:21:48.969 UTC [common.channelconfig] LogSanityChecks -> DEBU a76 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | [b8b 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b8c 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 gate 1574140911999459400 evaluation starts +peer0.org1.example.com | [b8d 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b8e 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [b8f 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 principal matched by identity 0 +peer0.org1.example.com | [b90 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [b91 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [b92 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b93 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b94 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 gate 1574140911999459400 evaluation succeeds +peer0.org1.example.com | [b95 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b96 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b97 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b98 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b99 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b9a 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b9b 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b9c 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b9d 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b9e 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b9f 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ba0 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ba1 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ba2 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ba3 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 gate 1574140912013165500 evaluation starts +peer0.org1.example.com | [ba4 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ba5 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [ba6 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 principal matched by identity 0 +peer0.org1.example.com | [ba7 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [ba8 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [b22 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 74 53 85 89 111 88 108 49 90 120 79 106 50 69 54 54 74 87 67 107 49 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 80 49 117 51 118 74 69 71 113 89 89 50 10 54 103 47 56 112 84 98 57 48 122 77 71 56 56 83 47 67 85 121 71 106 74 102 43 80 65 68 82 48 112 111 111 107 51 74 79 85 119 98 118 111 113 82 115 87 67 85 107 79 103 69 113 112 101 78 116 113 67 120 80 110 72 77 81 10 80 98 118 73 71 112 55 90 65 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 98 112 65 97 110 108 101 122 111 51 121 119 49 113 113 76 48 50 122 102 105 114 107 87 108 47 89 101 84 100 81 120 101 114 56 77 52 121 105 98 72 98 107 67 73 66 57 73 71 85 85 79 10 100 111 71 54 121 81 110 66 88 102 121 97 67 116 102 78 89 100 112 101 105 51 69 76 43 116 50 97 78 113 43 106 68 104 110 79 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [b23 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Added �%��_k<���\<���8 [:5AT�!�]� to the in memory item map, total items: 4 +peer0.org2.example.com | [b24 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b25 11-19 05:21:53.98 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051]] , current view: [[peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051]] +peer0.org2.example.com | [b26 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [b27 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [b28 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b29 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b2a 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b2b 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b2c 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b2d 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b2e 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [b2f 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b30 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b31 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b32 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b33 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [b34 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b35 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b36 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b37 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b38 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b39 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b3a 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [b3b 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032cb50 gate 1574140914792157000 evaluation starts +peer0.org2.example.com | [b3c 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032cb50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b3d 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032cb50 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [d07 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d08 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [d09 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [d0a 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d0b 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [d0c 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d0d 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d0f 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [d0e 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d10 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d11 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d12 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d13 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d14 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k alive: alive: alive: +peer1.org2.example.com | [d15 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [d16 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d17 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d18 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d19 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d1a 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d1b 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d1c 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [d1d 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [d1e 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [d1f 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [d20 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d21 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [d22 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [d23 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 3d 4a 09 70 0e de 4f eb 3b 2a 97 9b c8 9c 5d |.=J.p..O.;*....]| +peer1.org2.example.com | 00000010 09 46 e0 53 a5 97 fd da 82 50 d4 e0 d7 5b ca 85 |.F.S.....P...[..| +peer1.org2.example.com | [d24 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 dd 48 02 97 28 4d 67 5f 47 7a |0E.!...H..(Mg_Gz| +peer1.org2.example.com | 00000010 a0 9b 63 ef dc d9 df 8d bd 1a f6 41 a2 fb 90 29 |..c........A...)| +peer1.org2.example.com | 00000020 39 d4 e9 a8 5b 02 20 13 b8 db 26 44 30 38 a9 fb |9...[. ...&D08..| +peer1.org2.example.com | 00000030 b0 54 0a de b3 2b 58 1a 53 30 71 a6 95 be e0 f3 |.T...+X.S0q.....| +peer1.org2.example.com | 00000040 85 e5 d5 2b 83 2c 72 |...+.,r| +peer1.org2.example.com | [d25 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d26 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [d27 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [d28 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d29 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d2a 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [d2b 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d2d 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d2c 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d2e 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d2f 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d31 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d30 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [d32 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [d33 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [d34 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [d35 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d36 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d37 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d38 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [d39 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d3b 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [d3c 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d3a 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d3d 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d3e 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d40 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d3f 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [d41 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [d42 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f1f0 gate 1574140920236145700 evaluation starts +orderer0.example.com | "2019-11-19 05:21:48.969 UTC [policies] Manager -> DEBU a77 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:21:48.969 UTC [policies] Manager -> DEBU a78 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:48.969 UTC [policies] Manager -> DEBU a79 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:48.969 UTC [policies] Manager -> DEBU a7a Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a7b Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a7c Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [common.channelconfig] LogSanityChecks -> DEBU a7d As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [common.channelconfig] LogSanityChecks -> DEBU a7e As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [common.channelconfig] LogSanityChecks -> DEBU a7f As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a80 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a81 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a82 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a83 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a84 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.971 UTC [common.channelconfig] LogSanityChecks -> DEBU a85 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-11-19 05:21:48.971 UTC [common.channelconfig] LogSanityChecks -> DEBU a86 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-11-19 05:21:48.971 UTC [common.channelconfig] LogSanityChecks -> DEBU a87 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-11-19 05:21:48.971 UTC [common.channelconfig] LogSanityChecks -> DEBU a88 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-11-19 05:21:48.971 UTC [common.capabilities] Supported -> DEBU a89 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:48.971 UTC [common.capabilities] Supported -> DEBU a8a Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:48.971 UTC [msp] GetDefaultSigningIdentity -> DEBU a8b Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:48.972 UTC [msp] GetDefaultSigningIdentity -> DEBU a8c Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:48.972 UTC [msp.identity] Sign -> DEBU a8d Sign: plaintext: 0AD2060A1B08011A0608ECF7CDEE0522...C43935BA563DDA3A4A8E8FF78A6947D5 " +orderer0.example.com | "2019-11-19 05:21:48.972 UTC [msp.identity] Sign -> DEBU a8e Sign: digest: 205C3F1BD84ADAC34B672049D848CE53E189FC50B4B15EC3A1042D2B2AA253C9 " +orderer0.example.com | "2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a91 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a92 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.973 UTC [msp] DeserializeIdentity -> DEBU a94 Obtaining identity" +orderer0.example.com | "2019-11-19 05:21:48.975 UTC [msp.identity] newIdentity -> DEBU a95 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.975 UTC [cauthdsl] func1 -> DEBU a96 0xc000e77ee0 gate 1574140908975894200 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU a97 0xc000e77ee0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU a98 0xc000e77ee0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU a99 0xc000e77ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU a9a 0xc000e77ee0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [cauthdsl] func1 -> DEBU a9b 0xc000e77ee0 gate 1574140908975894200 evaluation fails" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [policies] Evaluate -> DEBU a9c Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [policies] Evaluate -> DEBU a9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [policies] Evaluate -> DEBU a9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [cauthdsl] func1 -> DEBU a9f 0xc000fe7020 gate 1574140908976779600 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU aa0 0xc000fe7020 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU aa1 0xc000fe7020 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:48.977 UTC [cauthdsl] func2 -> DEBU aa2 0xc000fe7020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:21:48.977 UTC [cauthdsl] func2 -> DEBU aa3 0xc000fe7020 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:21:48.977 UTC [cauthdsl] func1 -> DEBU aa4 0xc000fe7020 gate 1574140908976779600 evaluation fails" +orderer0.example.com | "2019-11-19 05:21:48.977 UTC [policies] Evaluate -> DEBU aa5 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.977 UTC [policies] Evaluate -> DEBU aa6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.977 UTC [policies] func1 -> DEBU aa7 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2019-11-19 05:21:48.977 UTC [policies] Evaluate -> DEBU aa8 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:48.978 UTC [policies] Evaluate -> DEBU aa9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:48.978 UTC [policies] Evaluate -> DEBU aaa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.978 UTC [policies] Evaluate -> DEBU aab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:21:48.978 UTC [policies] Evaluate -> DEBU aac == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-11-19 05:21:48.978 UTC [cauthdsl] func1 -> DEBU aad 0xc000fe7d30 gate 1574140908978670200 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:48.978 UTC [cauthdsl] func2 -> DEBU aae 0xc000fe7d30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:48.978 UTC [cauthdsl] func2 -> DEBU aaf 0xc000fe7d30 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:48.978 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ab0 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:48.979 UTC [msp] Validate -> DEBU ab1 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:48.979 UTC [cauthdsl] func2 -> DEBU ab2 0xc000fe7d30 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:21:48.979 UTC [msp.identity] Verify -> DEBU ab3 Verify: digest = 00000000 20 5c 3f 1b d8 4a da c3 4b 67 20 49 d8 48 ce 53 | \?..J..Kg I.H.S| +orderer0.example.com | 00000010 e1 89 fc 50 b4 b1 5e c3 a1 04 2d 2b 2a a2 53 c9 |...P..^...-+*.S.|" +orderer0.example.com | "2019-11-19 05:21:48.979 UTC [msp.identity] Verify -> DEBU ab4 Verify: sig = 00000000 30 44 02 20 3c da 5b 7f f8 0b 78 dd 56 60 07 6f |0D. <.[...x.V`.o| +orderer0.example.com | 00000010 55 50 96 78 11 13 49 28 89 52 93 b7 b2 9d bb 4d |UP.x..I(.R.....M| +orderer0.example.com | 00000020 1c 1a 01 32 02 20 63 c4 7c ca a7 d6 48 c5 10 9b |...2. c.|...H...| +orderer0.example.com | 00000030 00 2d 4d 59 a6 7a c2 62 62 b5 9b 3a ce f0 9e e7 |.-MY.z.bb..:....| +orderer0.example.com | 00000040 61 25 fa 66 d3 6c |a%.f.l|" +orderer0.example.com | "2019-11-19 05:21:48.980 UTC [cauthdsl] func2 -> DEBU ab5 0xc000fe7d30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:21:48.980 UTC [cauthdsl] func1 -> DEBU ab6 0xc000fe7d30 gate 1574140908978670200 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU ab7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU ab8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU ab9 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU aba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU abb Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU abc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [orderer.common.msgprocessor] Apply -> DEBU abd Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [common.channelconfig] NewStandardValues -> DEBU abe Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU abf Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac0 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac1 Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac2 Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac3 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [common.channelconfig] NewStandardValues -> DEBU ac4 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac5 Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac6 Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac7 Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac8 Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac9 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU aca Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] NewStandardValues -> DEBU acb Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU acc Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] NewStandardValues -> DEBU acd Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ace Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:48.982 UTC [common.channelconfig] validateMSP -> DEBU acf Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.983 UTC [msp] newBccspMsp -> DEBU ad0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.983 UTC [msp] New -> DEBU ad1 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.983 UTC [msp] Setup -> DEBU ad2 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:48.983 UTC [msp.identity] newIdentity -> DEBU ad3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.984 UTC [msp.identity] newIdentity -> DEBU ad4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.985 UTC [msp] Validate -> DEBU ad5 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:48.985 UTC [common.channelconfig] NewStandardValues -> DEBU ad6 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU ad7 Processing field: ACLs" +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU ad8 Processing field: Capabilities" +peer0.org2.example.com | [b3e 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032cb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [b3f 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032cb50 principal evaluation fails +peer0.org2.example.com | [b40 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032cb50 gate 1574140914792157000 evaluation fails +peer0.org2.example.com | [b41 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b42 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b43 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [b44 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032d0c0 gate 1574140914794277200 evaluation starts +peer0.org2.example.com | [b45 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032d0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b46 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032d0c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [b47 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032d0c0 principal matched by identity 0 +peer0.org2.example.com | [b48 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 cf bf 83 d0 79 da 79 3d f6 5f 40 64 20 5c fc |$....y.y=._@d \.| +peer0.org2.example.com | 00000010 3e d2 89 b1 d5 f7 92 1f de 70 9a 00 5b cc 64 f7 |>........p..[.d.| +peer0.org2.example.com | [b49 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 83 e1 4c 41 86 2f 65 31 1c a2 b7 |0D. ...LA./e1...| +peer0.org2.example.com | 00000010 5c 9c 55 36 6a cc 24 65 cb a2 6b d0 bf d6 85 ca |\.U6j.$e..k.....| +peer0.org2.example.com | 00000020 97 b7 af 8d 02 20 1a c1 3e 84 d4 61 42 01 40 7c |..... ..>..aB.@|| +peer0.org2.example.com | 00000030 9b 7e d6 4d a0 d1 2d 16 08 60 00 5d 00 3f 75 bb |.~.M..-..`.].?u.| +peer0.org2.example.com | 00000040 b0 0a 3f 1c 78 49 |..?.xI| +peer0.org2.example.com | [b4a 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032d0c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b4b 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032d0c0 gate 1574140914794277200 evaluation succeeds +peer0.org2.example.com | [b4c 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b4d 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b4e 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [b4f 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [b50 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b51 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [b52 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [b53 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [b54 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [b55 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b56 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b57 11-19 05:21:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b58 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b59 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b5a 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b5b 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b5c 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b5d 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b5e 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b5f 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b60 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b61 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b62 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [b63 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b64 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b65 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [b66 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [a44 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a45 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d44 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f1f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d45 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f1f0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [d46 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [d43 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d47 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f1f0 principal evaluation fails +peer1.org2.example.com | [d48 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f1f0 gate 1574140920236145700 evaluation fails +peer1.org2.example.com | [d49 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d4a 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [d4b 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d4c 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [d4e 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f780 gate 1574140920239409400 evaluation starts +peer1.org2.example.com | [d4d 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d4f 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f780 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d50 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f780 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [d51 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f780 principal matched by identity 0 +peer1.org2.example.com | [d52 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [d53 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [d54 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f780 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [d56 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350f780 gate 1574140920239409400 evaluation succeeds +peer1.org2.example.com | [d57 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d55 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [d58 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d59 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [d5a 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [d5b 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d5c 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d5d 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [d5e 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d5f 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d60 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d61 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [d62 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [d63 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530a80 gate 1574140920250287000 evaluation starts +peer1.org2.example.com | [d64 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530a80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d65 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530a80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [ba9 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [baa 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 gate 1574140912013165500 evaluation succeeds +peer0.org1.example.com | [bab 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bac 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bad 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [bae 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [baf 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bb0 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bb1 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [bb2 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [bb3 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bb4 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bb5 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bb6 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bb7 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [bb8 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [bb9 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bba 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bbb 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bbc 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bbd 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [bbe 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [bbf 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [bc0 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 gate 1574140912239032500 evaluation starts +peer0.org1.example.com | [bc1 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [bc2 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [bc3 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 principal matched by identity 0 +peer0.org1.example.com | [bc4 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [bc5 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [bc6 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b67 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b68 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b69 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b6a 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b6b 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b6c 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b6d 11-19 05:21:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b6e 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [b6f 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b70 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [b71 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [b72 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b73 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b74 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b75 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b76 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b77 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b78 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [b79 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345520 gate 1574140914836118900 evaluation starts +peer0.org2.example.com | [b7a 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345520 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b7b 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345520 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [b7c 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [b7d 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345520 principal evaluation fails +peer0.org2.example.com | [b7e 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345520 gate 1574140914836118900 evaluation fails +peer0.org2.example.com | [b7f 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b80 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b81 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [b82 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345a90 gate 1574140914837219400 evaluation starts +peer0.org2.example.com | [b83 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345a90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a46 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a47 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a48 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a49 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a4a 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a4b 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a4c 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b99f80 gate 1574140915694889600 evaluation starts +peer1.org1.example.com | [a4d 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b99f80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a4e 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b99f80 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [a4f 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b99f80 principal matched by identity 0 +peer1.org1.example.com | [a50 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [a51 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [a52 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b99f80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a53 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b99f80 gate 1574140915694889600 evaluation succeeds +peer1.org1.example.com | [a54 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a55 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a56 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a57 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a58 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [a59 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [a5a 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a5b 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer1.org1.example.com | [a5c 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a5d 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a5e 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d66 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [d67 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530a80 principal evaluation fails +peer1.org2.example.com | [d68 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530a80 gate 1574140920250287000 evaluation fails +peer1.org2.example.com | [d69 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d6a 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d6b 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [d6c 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530ff0 gate 1574140920254203800 evaluation starts +peer1.org2.example.com | [d6d 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d6e 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530ff0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [d6f 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530ff0 principal matched by identity 0 +peer1.org2.example.com | [d70 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [d71 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [d72 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530ff0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [d73 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003530ff0 gate 1574140920254203800 evaluation succeeds +peer1.org2.example.com | [d74 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d75 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d76 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [d77 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [d78 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [d79 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [d7a 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d7b 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [d7c 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d7d 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d7e 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d7f 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [d80 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d81 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d82 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d83 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [d84 11-19 05:22:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [d85 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353ea90 gate 1574140920260513600 evaluation starts +peer1.org2.example.com | [d86 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353ea90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d87 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353ea90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [d88 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353ea90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [d89 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353ea90 principal evaluation fails +peer1.org2.example.com | [d8a 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353ea90 gate 1574140920260513600 evaluation fails +peer1.org2.example.com | [d8b 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d8c 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d8d 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [d8e 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f010 gate 1574140920261694800 evaluation starts +peer1.org2.example.com | [d8f 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f010 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d90 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f010 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [d91 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f010 principal matched by identity 0 +peer1.org2.example.com | [d92 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [d93 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [d94 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f010 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [d95 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f010 gate 1574140920261694800 evaluation succeeds +peer1.org2.example.com | [d96 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d97 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d98 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [d99 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [d9a 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [d9b 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [d9c 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [d9d 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [d9e 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d9f 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [da0 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [da1 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [da2 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [da3 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [da4 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b84 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345a90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [b85 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345a90 principal matched by identity 0 +peer0.org2.example.com | [b86 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer0.org2.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer0.org2.example.com | [b87 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer0.org2.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer0.org2.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer0.org2.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer0.org2.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer0.org2.example.com | [b88 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345a90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b89 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345a90 gate 1574140914837219400 evaluation succeeds +peer0.org2.example.com | [b8a 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b8b 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b8c 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [b8d 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [b8e 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b8f 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [b90 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [b91 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [b92 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [b93 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b94 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b95 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b96 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [b97 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b98 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b99 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b9a 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b9b 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > alive:\216\350\311\331\031\200\371%\267\242i\024\326\321\224\201\252\177t\246\320\002Zv{\346\002 {\357b~S\203y\342\201\360\006\3276.\342\005$\374\204e)#\336u\237\r%\207\205\013\364\240" > +peer0.org2.example.com | [b9c 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [b9d 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b9e 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [b9f 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [ba0 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [ba1 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510031801 +peer0.org2.example.com | [ba2 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D02D5A85326F56C46940918A4F2F1F69C687D0012624CDB49CC081624AE9A9D7 +peer0.org2.example.com | [ba3 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [ba4 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ba5 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ba6 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ba7 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [common.channelconfig] NewStandardValues -> DEBU ad9 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU ada Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [common.channelconfig] NewStandardValues -> DEBU adb Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU adc Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [common.channelconfig] Validate -> DEBU add Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [common.channelconfig] validateMSP -> DEBU ade Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [msp] newBccspMsp -> DEBU adf Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.986 UTC [msp] New -> DEBU ae0 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.987 UTC [msp] Setup -> DEBU ae1 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.987 UTC [msp.identity] newIdentity -> DEBU ae2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.988 UTC [common.channelconfig] NewStandardValues -> DEBU ae3 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:48.988 UTC [common.channelconfig] initializeProtosStruct -> DEBU ae4 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.988 UTC [common.channelconfig] NewStandardValues -> DEBU ae5 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:48.988 UTC [common.channelconfig] initializeProtosStruct -> DEBU ae6 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:48.988 UTC [common.channelconfig] Validate -> DEBU ae7 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:21:48.989 UTC [common.channelconfig] validateMSP -> DEBU ae8 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.989 UTC [msp] newBccspMsp -> DEBU ae9 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.989 UTC [msp] New -> DEBU aea Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:48.989 UTC [msp] Setup -> DEBU aeb Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.989 UTC [msp.identity] newIdentity -> DEBU aec Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:48.990 UTC [msp] Setup -> DEBU aed Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:48.990 UTC [msp] Setup -> DEBU aee MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:48.990 UTC [policies] NewManagerImpl -> DEBU aef Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.990 UTC [policies] NewManagerImpl -> DEBU af0 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.990 UTC [policies] NewManagerImpl -> DEBU af1 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af2 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af3 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af4 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af5 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af6 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af7 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af8 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af9 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU afa Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU afb Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU afc Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] GetPolicy -> DEBU afd Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] GetPolicy -> DEBU afe Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU aff Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] GetPolicy -> DEBU b00 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] GetPolicy -> DEBU b01 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU b02 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU b03 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU b04 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU b05 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [policies] NewManagerImpl -> DEBU b06 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [policies] NewManagerImpl -> DEBU b07 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b08 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b09 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0a Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0b Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0f Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b10 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b11 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b12 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b13 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b14 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b15 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b16 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:48.995 UTC [common.configtx] addToMap -> DEBU b17 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:48.995 UTC [common.configtx] addToMap -> DEBU b18 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:48.995 UTC [common.configtx] addToMap -> DEBU b19 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1f Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b20 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b21 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b22 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b23 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b24 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b25 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b26 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b27 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b28 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b29 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2a Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2b Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2c Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2d Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2f Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:48.999 UTC [common.configtx] addToMap -> DEBU b30 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:48.999 UTC [common.configtx] addToMap -> DEBU b31 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:48.999 UTC [common.configtx] addToMap -> DEBU b32 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:48.999 UTC [common.configtx] addToMap -> DEBU b33 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:49.000 UTC [orderer.common.broadcast] ProcessMessage -> DEBU b34 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:51456" +orderer0.example.com | "2019-11-19 05:21:49.000 UTC [orderer.consensus.etcdraft] propose -> INFO b35 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:21:49.003 UTC [orderer.consensus.etcdraft] serveRequest -> INFO b36 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:21:49.003 UTC [common.deliver] Handle -> WARN b37 Error reading from 172.18.0.5:51454: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:21:49.004 UTC [orderer.common.server] func1 -> DEBU b38 Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:21:49.004 UTC [comm.grpc.server] 1 -> INFO b39 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51454 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=109.4814ms +peer1.org2.example.com | [da5 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [da6 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003566fc0 gate 1574140920268062400 evaluation starts +peer1.org2.example.com | [da7 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003566fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [da8 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003566fc0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [da9 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003566fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [daa 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003566fc0 principal evaluation fails +peer1.org2.example.com | [dab 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003566fc0 gate 1574140920268062400 evaluation fails +peer1.org2.example.com | [dac 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [dad 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [dae 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [daf 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567530 gate 1574140920269714000 evaluation starts +peer1.org2.example.com | [db0 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [db1 11-19 05:22:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567530 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [db2 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567530 principal matched by identity 0 +peer1.org2.example.com | [db3 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [db4 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [db5 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567530 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [db6 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567530 gate 1574140920269714000 evaluation succeeds +peer1.org2.example.com | [db7 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [db8 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [db9 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [dba 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [dbb 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dbc 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [dbd 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dbe 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dbf 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dc0 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [dc1 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [dc2 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [dc3 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [dc4 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [dc5 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [dc6 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357a9a0 gate 1574140920278689200 evaluation starts +peer1.org2.example.com | [dc7 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357a9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [dc8 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357a9a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [a5f 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a60 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a61 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a62 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a63 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a64 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a65 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb19e0 gate 1574140915698760600 evaluation starts +peer1.org1.example.com | [a66 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb19e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a67 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb19e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [a68 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb19e0 principal matched by identity 0 +peer1.org1.example.com | [a69 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [a6a 11-19 05:21:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [a6b 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb19e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a6c 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb19e0 gate 1574140915698760600 evaluation succeeds +peer1.org1.example.com | [a6d 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a6e 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a6f 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a70 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a71 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [a72 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [a73 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a74 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a75 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a76 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bc7 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 gate 1574140912239032500 evaluation succeeds +peer0.org1.example.com | [bc8 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bc9 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bca 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [bcb 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [bcc 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bcd 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bce 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [bcf 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [bd0 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [bd1 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bd2 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bd3 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bd4 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [bd5 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [bd6 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [bd7 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [bd8 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bd9 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [bda 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [bdb 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [bdc 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [bdd 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bde 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bdf 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [be0 11-19 05:21:53.33 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] +peer0.org1.example.com | [be1 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45582 +peer0.org1.example.com | [be2 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e1af00 +peer0.org1.example.com | [be3 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [be4 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [be5 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [be6 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [be7 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 2a 4c e8 1c 79 64 9e e4 66 d8 a7 07 3e c3 ef |.*L..yd..f...>..| +peer0.org1.example.com | 00000010 3f 2a 92 11 04 40 c3 40 d9 17 97 08 bd 1a 65 06 |?*...@.@......e.| +peer0.org1.example.com | [be8 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 52 4d c4 04 3f d4 0d 82 5e 90 |0E.!..RM..?...^.| +peer0.org1.example.com | 00000010 cc 8e 84 be c0 ca 1d 68 c8 ad 14 85 95 37 8d 17 |.......h.....7..| +peer0.org1.example.com | 00000020 b1 1d 6f 45 44 02 20 17 4e 69 0b a9 10 b8 4a 36 |..oED. .Ni....J6| +peer0.org1.example.com | 00000030 ae 18 dd 4f 49 1b 42 db f0 92 ad c5 53 e6 07 7a |...OI.B.....S..z| +peer0.org1.example.com | 00000040 50 d6 dc b3 28 6b 98 |P...(k.| +peer0.org1.example.com | [be9 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [bea 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003cd9180, header 0xc003e1b310 +peer0.org1.example.com | [beb 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [bec 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][b2ea0184] processing txid: b2ea01846d32b3947dbc344288157c6e745939690a3d7ac66712eb78ccafabb2 +peer0.org1.example.com | [bed 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][b2ea0184] Entry chaincode: name:"lscc" +orderer0.example.com | "2019-11-19 05:21:49.006 UTC [orderer.common.broadcast] Handle -> WARN b3a Error reading from 172.18.0.5:51456: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:21:49.007 UTC [orderer.common.server] func1 -> DEBU b3b Closing Broadcast stream" +orderer0.example.com | "2019-11-19 05:21:49.007 UTC [comm.grpc.server] 1 -> INFO b3c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51456 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.3334ms +orderer0.example.com | "2019-11-19 05:21:49.007 UTC [grpc] infof -> DEBU b3d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:21:49.007 UTC [grpc] infof -> DEBU b3e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:21:49.007 UTC [orderer.consensus.etcdraft] 2 -> DEBU b3f Proposed block [2] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:21:49.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b40 Sending msg of 24605 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-11-19 05:21:49.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU b41 Send of ConsensusRequest for channel businesschannel with payload of size 24605 to orderer1.example.com(orderer1.example.com:7050) took 203.3µs " +orderer0.example.com | "2019-11-19 05:21:49.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b42 Sending msg of 24605 bytes to 3 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-11-19 05:21:49.031 UTC [orderer.common.cluster.step] sendMessage -> DEBU b43 Send of ConsensusRequest for channel businesschannel with payload of size 24605 to orderer2.example.com(orderer2.example.com:7050) took 2.3956ms " +orderer0.example.com | "2019-11-19 05:21:49.033 UTC [orderer.common.cluster.step] handleMessage -> DEBU b44 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.034 UTC [orderer.consensus.etcdraft] writeBlock -> INFO b45 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:21:49.035 UTC [common.configtx] addToMap -> DEBU b46 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:49.035 UTC [common.configtx] addToMap -> DEBU b47 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:49.035 UTC [common.configtx] addToMap -> DEBU b48 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.035 UTC [common.configtx] addToMap -> DEBU b49 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:49.036 UTC [common.configtx] addToMap -> DEBU b4a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:49.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b4b Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-11-19 05:21:49.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b4c Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +orderer0.example.com | "2019-11-19 05:21:49.036 UTC [common.configtx] addToMap -> DEBU b4d Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:49.038 UTC [common.configtx] addToMap -> DEBU b4e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:49.038 UTC [common.configtx] addToMap -> DEBU b4f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b51 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b52 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b53 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:49.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU b50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 405.8µs " +orderer0.example.com | "2019-11-19 05:21:49.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU b56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 9.0249ms " +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU b57 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [common.configtx] verifyDeltaSet -> DEBU b5a Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [common.configtx] verifyDeltaSet -> DEBU b5b Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [common.configtx] policyForItem -> DEBU b5c Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b5d Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b5e Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b5f Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b60 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b61 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b62 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.053 UTC [policies] Manager -> DEBU b63 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-11-19 05:21:49.053 UTC [policies] Manager -> DEBU b64 Manager Channel/Application has managers Org1MSP" +peer1.org2.example.com | [dc9 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357a9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [dca 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357a9a0 principal evaluation fails +peer1.org2.example.com | [dcb 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357a9a0 gate 1574140920278689200 evaluation fails +peer1.org2.example.com | [dcc 11-19 05:22:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [dcd 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [dce 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [dcf 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357af10 gate 1574140920280662500 evaluation starts +peer1.org2.example.com | [dd0 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357af10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [dd1 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357af10 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [dd2 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357af10 principal matched by identity 0 +peer1.org2.example.com | [dd3 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [dd4 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [dd5 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357af10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [dd6 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357af10 gate 1574140920280662500 evaluation succeeds +peer1.org2.example.com | [dd7 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [dd8 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [dd9 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [dda 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ddb 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ddc 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ddd 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [dde 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ddf 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [de0 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [de1 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [de2 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [de3 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c0a0 gate 1574140920284485500 evaluation starts +peer1.org2.example.com | [de4 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c0a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [de5 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c0a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [de6 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [de7 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c0a0 principal evaluation fails +peer1.org2.example.com | [de8 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c0a0 gate 1574140920284485500 evaluation fails +peer1.org2.example.com | [de9 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [dea 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [deb 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [dec 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c610 gate 1574140920286175600 evaluation starts +peer1.org2.example.com | [ded 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c610 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [dee 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c610 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [def 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c610 principal matched by identity 0 +peer1.org2.example.com | [df0 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [df1 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [df2 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c610 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [df3 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359c610 gate 1574140920286175600 evaluation succeeds +peer1.org2.example.com | [df4 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [df5 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [df6 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [df7 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [df8 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [df9 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [dfa 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [dfb 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [dfc 11-19 05:22:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dfd 11-19 05:22:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [dfe 11-19 05:22:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [dff 11-19 05:22:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e00 11-19 05:22:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [e01 11-19 05:22:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [e02 11-19 05:22:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151018 +peer1.org2.example.com | [e03 11-19 05:22:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 105DDCCDA9F52847A3A2F2D27D60A3F28F5DCB61C890581FF4F5EA948BC7053E +peer1.org2.example.com | [e04 11-19 05:22:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [e05 11-19 05:22:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [e06 11-19 05:22:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [e07 11-19 05:22:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [e08 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e09 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e0a 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e0b 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e0c 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e0d 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e0e 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e0f 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e10 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e11 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e12 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bee 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> INFO [][b2ea0184] Entry chaincode: name:"lscc" +peer0.org1.example.com | [bef 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [bf0 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 2a 4c e8 1c 79 64 9e e4 66 d8 a7 07 3e c3 ef |.*L..yd..f...>..| +peer0.org1.example.com | 00000010 3f 2a 92 11 04 40 c3 40 d9 17 97 08 bd 1a 65 06 |?*...@.@......e.| +peer0.org1.example.com | [bf1 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 52 4d c4 04 3f d4 0d 82 5e 90 |0E.!..RM..?...^.| +peer0.org1.example.com | 00000010 cc 8e 84 be c0 ca 1d 68 c8 ad 14 85 95 37 8d 17 |.......h.....7..| +peer0.org1.example.com | 00000020 b1 1d 6f 45 44 02 20 17 4e 69 0b a9 10 b8 4a 36 |..oED. .Ni....J6| +peer0.org1.example.com | 00000030 ae 18 dd 4f 49 1b 42 db f0 92 ad c5 53 e6 07 7a |...OI.B.....S..z| +peer0.org1.example.com | 00000040 50 d6 dc b3 28 6b 98 |P...(k.| +peer0.org1.example.com | [bf2 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org1.example.com | [bf3 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer0.org1.example.com | [bf4 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer0.org1.example.com | [bf5 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [891f24b3-1e22-41ed-a7eb-87b8a481a3f4] +peer0.org1.example.com | [bf6 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [bf7 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [891f24b3-1e22-41ed-a7eb-87b8a481a3f4] +peer0.org1.example.com | [bf8 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer0.org1.example.com | [bf9 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer0.org1.example.com | [bfa 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [b2ea0184] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [bfb 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [b2ea0184] notifying Txid:b2ea01846d32b3947dbc344288157c6e745939690a3d7ac66712eb78ccafabb2, channelID: +peer0.org1.example.com | [bfc 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [bfd 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> INFO [][b2ea0184] Exit chaincode: name:"lscc" (3ms) +peer0.org1.example.com | [bfe 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][b2ea0184] Exit +peer0.org1.example.com | [bff 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45582 +peer0.org1.example.com | [c00 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45582 grpc.code=OK grpc.call_duration=7.1976ms +peer0.org1.example.com | [c01 11-19 05:21:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [c02 11-19 05:21:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45582: read: connection reset by peer +peer0.org1.example.com | [c03 11-19 05:21:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [c04 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [c05 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [c06 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [c07 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510031801 +peer0.org1.example.com | [c08 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8697883B7554CF299F2B9A861419AE77A79A530FB8047C1A9F8BD132BB1501F0 +peer0.org1.example.com | [c09 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [c0a 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c0b 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c0c 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c0d 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c0e 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [c0f 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c11 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c10 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [c12 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c13 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [c14 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151011 +peer0.org1.example.com | [c15 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 24CFBF83D079DA793DF65F4064205CFC3ED289B1D5F7921FDE709A005BCC64F7 +peer0.org1.example.com | [c16 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [c17 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [c18 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [c19 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [c1a 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [c1b 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c1c 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [c1d 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c1f 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [c20 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c22 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [c23 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c1e 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c24 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c21 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [c25 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c26 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [c27 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [c28 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org1.example.com | [c29 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [c2a 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [c2b 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c2c 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [c2d 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [c2e 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c2f 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org1.example.com | [c30 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org1.example.com | [c31 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c32 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c33 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c34 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c35 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [a77 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a78 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a79 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a7a 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a7b 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd91f0 gate 1574140915702969100 evaluation starts +peer1.org1.example.com | [a7c 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd91f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a7d 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd91f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [a7e 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd91f0 principal matched by identity 0 +peer1.org1.example.com | [a7f 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [a80 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [a81 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd91f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a82 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd91f0 gate 1574140915702969100 evaluation succeeds +peer1.org1.example.com | [a83 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a84 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a85 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a86 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a87 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a88 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [a89 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [a8a 11-19 05:21:55.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a8b 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [a8c 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151016 +peer1.org1.example.com | [a8d 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 55F64A00CC7B1F2C43722ADFC43C9065E0E1FEAED3D892567820B92664BEA571 +peer1.org1.example.com | [a8e 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [a8f 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [a90 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [a91 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [a92 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [a93 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a94 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [a95 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a96 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [a97 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a98 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [a99 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [a9a 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a9b 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a9c 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [a9d 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a9e 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [a9f 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [e13 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [e14 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e15 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e16 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e17 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e18 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [e19 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e1a 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e1b 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e1c 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e1d 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [e1e 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [e1f 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [e20 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c4360 gate 1574140920806936300 evaluation starts +peer1.org2.example.com | [e21 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c4360 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e22 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c4360 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [e23 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c4360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [e24 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c4360 principal evaluation fails +peer1.org2.example.com | [e25 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c4360 gate 1574140920806936300 evaluation fails +peer1.org2.example.com | [e26 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e27 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e28 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [e29 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c48d0 gate 1574140920808613500 evaluation starts +peer1.org2.example.com | [e2a 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c48d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e2b 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c48d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [e2c 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c48d0 principal matched by identity 0 +peer1.org2.example.com | [e2d 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 ae 8d b1 be 1c e0 96 8b ee db e6 bc b1 9c bc |................| +peer1.org2.example.com | 00000010 85 84 a8 30 1f 3e c4 23 e8 6c a1 b8 11 83 f9 45 |...0.>.#.l.....E| +peer1.org2.example.com | [e2e 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 86 36 6f 0f e4 4c 65 bc dc 89 |0E.!...6o..Le...| +peer1.org2.example.com | 00000010 9e ec 88 dc 5b 3b f3 da 71 a5 0c c4 65 ba 2d 42 |....[;..q...e.-B| +peer1.org2.example.com | 00000020 06 23 8d 8a 4f 02 20 30 8c 04 ce 94 08 61 05 28 |.#..O. 0.....a.(| +peer1.org2.example.com | 00000030 bd 27 d6 5b 78 74 94 20 93 53 d1 d2 60 63 91 bb |.'.[xt. .S..`c..| +peer1.org2.example.com | 00000040 c3 89 5a 8a bb be 3f |..Z...?| +peer1.org2.example.com | [e2f 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c48d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [e30 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c48d0 gate 1574140920808613500 evaluation succeeds +peer1.org2.example.com | [e31 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:21:49.053 UTC [policies] Manager -> DEBU b65 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.053 UTC [policies] Manager -> DEBU b66 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-11-19 05:21:49.053 UTC [policies] Evaluate -> DEBU b67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-11-19 05:21:49.053 UTC [cauthdsl] func1 -> DEBU b68 0xc0011a4750 gate 1574140909053396900 evaluation starts" +orderer0.example.com | "2019-11-19 05:21:49.053 UTC [cauthdsl] func2 -> DEBU b69 0xc0011a4750 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:21:49.059 UTC [cauthdsl] func2 -> DEBU b6a 0xc0011a4750 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:21:49.059 UTC [cauthdsl] func2 -> DEBU b6b 0xc0011a4750 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:21:49.059 UTC [msp.identity] Verify -> DEBU b6c Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +orderer0.example.com | 00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.|" +orderer0.example.com | "2019-11-19 05:21:49.059 UTC [msp.identity] Verify -> DEBU b6d Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +orderer0.example.com | 00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +orderer0.example.com | 00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +orderer0.example.com | 00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +orderer0.example.com | 00000040 56 71 ab 2e 37 58 4a |Vq..7XJ|" +orderer0.example.com | "2019-11-19 05:21:49.060 UTC [cauthdsl] func2 -> DEBU b6e 0xc0011a4750 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:21:49.060 UTC [cauthdsl] func1 -> DEBU b6f 0xc0011a4750 gate 1574140909053396900 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:21:49.060 UTC [policies] Evaluate -> DEBU b70 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:49.060 UTC [policies] Evaluate -> DEBU b71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:49.061 UTC [common.configtx] recurseConfigMap -> DEBU b72 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.061 UTC [common.configtx] recurseConfigMap -> DEBU b73 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.061 UTC [common.configtx] recurseConfigMap -> DEBU b74 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.062 UTC [common.configtx] recurseConfigMap -> DEBU b75 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.062 UTC [common.configtx] recurseConfigMap -> DEBU b76 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.062 UTC [common.configtx] recurseConfigMap -> DEBU b77 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU b78 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.065 UTC [orderer.common.cluster.step] handleMessage -> DEBU b79 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.066 UTC [orderer.common.cluster.step] handleMessage -> DEBU b7a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.066 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b7b Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +orderer0.example.com | "2019-11-19 05:21:49.067 UTC [orderer.common.cluster.step] sendMessage -> DEBU b7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +orderer0.example.com | "2019-11-19 05:21:49.062 UTC [common.configtx] recurseConfigMap -> DEBU b7d Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.068 UTC [common.configtx] recurseConfigMap -> DEBU b7e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b7f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b80 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b81 Setting policy for key Readers to " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b82 Setting policy for key Writers to " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b83 Setting policy for key Admins to " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b84 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b85 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b86 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b87 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.070 UTC [common.configtx] recurseConfigMap -> DEBU b88 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.070 UTC [common.configtx] recurseConfigMap -> DEBU b89 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.070 UTC [common.configtx] recurseConfigMap -> DEBU b8a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.configtx] recurseConfigMap -> DEBU b8b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] NewStandardValues -> DEBU b8c Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b8d Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b8e Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b8f Processing field: OrdererAddresses" +peer0.org1.example.com | [c36 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c37 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [c38 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c3a 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c39 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [c3b 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c3c 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c3d 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c3e 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c3f 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [c40 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151012 +peer0.org1.example.com | [c41 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 036894E692692D780D4264AF17725599D1B81DD61B859875E5BC42643391722C +peer0.org1.example.com | [c42 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [c43 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [c44 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [c45 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c46 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c47 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c48 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c49 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4a 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c4b 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c4c 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4d 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c4e 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4f 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c50 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa0 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa1 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa2 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aa3 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa4 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa5 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aa6 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa7 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa8 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aa9 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aaa 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aab 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [aac 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aad 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [aae 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aaf 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [ab0 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ab1 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ab2 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ab3 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ab4 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ab5 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ab6 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ab7 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ab8 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ab9 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [aba 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [abb 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e32 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e33 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [e34 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [e35 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e36 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [e37 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [e38 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [e39 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [e3a 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e3b 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e3c 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e3d 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e3e 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e3f 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e40 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e41 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e42 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e43 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [e44 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e45 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e46 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [e47 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e48 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e49 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e4a 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e4b 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e4c 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e4d 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e4e 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e4f 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e50 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e51 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e52 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e53 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e54 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b90 Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b91 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] NewStandardValues -> DEBU b92 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b93 Processing field: ACLs" +orderer0.example.com | "2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b94 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:49.072 UTC [common.channelconfig] NewStandardValues -> DEBU b95 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:49.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU b96 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:49.072 UTC [common.channelconfig] NewStandardValues -> DEBU b97 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:49.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU b98 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:49.073 UTC [common.channelconfig] Validate -> DEBU b99 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:21:49.073 UTC [common.channelconfig] validateMSP -> DEBU b9a Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:21:49.073 UTC [msp] newBccspMsp -> DEBU b9b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:49.073 UTC [msp] New -> DEBU b9c Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:49.073 UTC [msp] Setup -> DEBU b9d Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:21:49.074 UTC [msp.identity] newIdentity -> DEBU b9e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:49.075 UTC [common.channelconfig] NewStandardValues -> DEBU b9f Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:21:49.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba0 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:49.075 UTC [common.channelconfig] NewStandardValues -> DEBU ba1 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:49.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba2 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:49.076 UTC [common.channelconfig] Validate -> DEBU ba3 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:21:49.076 UTC [common.channelconfig] validateMSP -> DEBU ba4 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.076 UTC [msp] newBccspMsp -> DEBU ba5 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:49.077 UTC [msp] New -> DEBU ba6 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:49.077 UTC [msp] Setup -> DEBU ba7 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.077 UTC [msp.identity] newIdentity -> DEBU ba8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:49.078 UTC [common.channelconfig] NewStandardValues -> DEBU ba9 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:21:49.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU baa Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:21:49.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU bab Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:21:49.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU bac Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:49.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU bad Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:21:49.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU bae Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:49.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU baf Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:21:49.080 UTC [common.channelconfig] NewStandardValues -> DEBU bb0 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:21:49.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU bb1 Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:21:49.080 UTC [common.channelconfig] NewStandardValues -> DEBU bb2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:21:49.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU bb3 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:21:49.080 UTC [common.channelconfig] validateMSP -> DEBU bb4 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:49.080 UTC [msp] newBccspMsp -> DEBU bb5 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:21:49.081 UTC [msp] New -> DEBU bb6 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:21:49.081 UTC [msp] Setup -> DEBU bb7 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:21:49.081 UTC [msp.identity] newIdentity -> DEBU bb8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | [abc 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [abd 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [abe 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [abf 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ac0 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [ac1 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ac2 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ac3 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ac4 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ac5 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [ac6 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ac7 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ac8 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ac9 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [aca 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [acb 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [acc 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [acd 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d0f0 gate 1574140915838317700 evaluation starts +peer1.org1.example.com | [ace 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [acf 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d0f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [ad0 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d0f0 principal matched by identity 0 +peer1.org1.example.com | [ad1 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3f 7c f1 9a ee 25 79 35 df 74 e5 d3 53 0a 15 |.?|...%y5.t..S..| +peer1.org1.example.com | 00000010 07 6d 27 19 e6 08 67 9a 5b 31 ab df dc c4 ef 6b |.m'...g.[1.....k| +peer1.org1.example.com | [ad2 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 d1 da 29 17 ed a1 99 9d b1 88 d0 |0D. P..)........| +peer1.org1.example.com | 00000010 6a 4c 2e ef 3e 47 b6 d9 a5 68 66 ba 56 74 3d 35 |jL..>G...hf.Vt=5| +peer1.org1.example.com | 00000020 76 d7 6d 4f 02 20 31 85 7d 8b 65 eb a7 46 7b 12 |v.mO. 1.}.e..F{.| +peer1.org1.example.com | 00000030 18 8d 7a 85 67 1a 7a d3 39 ae 55 91 77 2b 62 7e |..z.g.z.9.U.w+b~| +peer1.org1.example.com | 00000040 24 04 f3 d7 c4 7b |$....{| +peer1.org1.example.com | [ad3 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d0f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ad4 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d0f0 gate 1574140915838317700 evaluation succeeds +peer1.org1.example.com | [ad5 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ad6 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ad7 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ad8 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ad9 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c51 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [c52 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c53 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [c54 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [c55 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c56 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [c57 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c58 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c59 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [c5a 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [c5b 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [c5c 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 gate 1574140914849620300 evaluation starts +peer0.org1.example.com | [c5d 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c5e 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [c5f 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 principal matched by identity 0 +peer0.org1.example.com | [c60 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 22 53 4e e7 78 ea dd 97 fa 4f af cc 9d 7b c8 |6"SN.x....O...{.| +peer0.org1.example.com | 00000010 28 bd 43 2e 47 4c 60 e2 9f 25 1d c0 74 6f a0 f0 |(.C.GL`..%..to..| +peer0.org1.example.com | [c61 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 96 22 d0 d6 eb e9 2f 69 a7 3d 7f |0D. l."..../i.=.| +peer0.org1.example.com | 00000010 2a dd 7c ef 18 30 37 08 71 0d 78 e0 7a 7f de 91 |*.|..07.q.x.z...| +peer0.org1.example.com | 00000020 a5 77 4c 14 02 20 38 21 cb e3 6a 1d 42 85 16 9e |.wL.. 8!..j.B...| +peer0.org1.example.com | 00000030 bc da 5f 34 0e 3d 2d da 2d 73 92 6d 4d 46 99 22 |.._4.=-.-s.mMF."| +peer0.org1.example.com | 00000040 54 df bf 03 9e c9 |T.....| +peer0.org1.example.com | [c62 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c63 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 gate 1574140914849620300 evaluation succeeds +peer0.org1.example.com | [c64 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c65 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c66 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [c67 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [c68 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c69 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c6a 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [c6b 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +peer0.org1.example.com | 00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +peer0.org1.example.com | [c6c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +peer0.org1.example.com | 00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +peer0.org1.example.com | 00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +peer0.org1.example.com | 00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +peer0.org1.example.com | 00000040 b0 a7 83 ce 50 7e |....P~| +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:49.082 UTC [msp.identity] newIdentity -> DEBU bb9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:21:49.083 UTC [msp] Validate -> DEBU bba MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:21:49.083 UTC [msp] Setup -> DEBU bbb Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-11-19 05:21:49.083 UTC [msp] Setup -> DEBU bbc MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-11-19 05:21:49.083 UTC [policies] NewManagerImpl -> DEBU bbd Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bbe Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bbf Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc0 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc1 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc2 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc3 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] GetPolicy -> DEBU bc4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] GetPolicy -> DEBU bc5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc6 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:49.085 UTC [policies] GetPolicy -> DEBU bc7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:49.085 UTC [policies] GetPolicy -> DEBU bc8 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:21:49.085 UTC [policies] NewManagerImpl -> DEBU bc9 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:49.085 UTC [policies] NewManagerImpl -> DEBU bca Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:49.085 UTC [policies] NewManagerImpl -> DEBU bcb Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bcc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bcd Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bce Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bcf Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bd0 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bd1 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:49.087 UTC [policies] NewManagerImpl -> DEBU bd2 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:49.087 UTC [policies] NewManagerImpl -> DEBU bd3 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:21:49.087 UTC [policies] NewManagerImpl -> DEBU bd4 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:21:49.087 UTC [policies] NewManagerImpl -> DEBU bd5 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:21:49.088 UTC [common.configtx] addToMap -> DEBU bd6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:21:49.088 UTC [common.configtx] addToMap -> DEBU bd7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:21:49.088 UTC [common.configtx] addToMap -> DEBU bd8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:49.089 UTC [common.configtx] addToMap -> DEBU bd9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:21:49.089 UTC [common.configtx] addToMap -> DEBU bda Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:21:49.091 UTC [common.configtx] addToMap -> DEBU bdb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:21:49.091 UTC [common.configtx] addToMap -> DEBU bdc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:21:49.091 UTC [common.configtx] addToMap -> DEBU bdd Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:21:49.092 UTC [common.configtx] addToMap -> DEBU bde Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:21:49.092 UTC [common.configtx] addToMap -> DEBU bdf Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be2 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be4 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be5 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU be6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU be7 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU be8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer1.org2.example.com | [e55 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [e56 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 79 57 a8 8d 6c 20 cc 56 64 3f c0 d2 1d 97 b7 |.yW..l .Vd?.....| +peer1.org2.example.com | 00000010 1a 51 37 63 a4 98 d6 b9 27 2d a9 ed 50 b7 57 24 |.Q7c....'-..P.W$| +peer1.org2.example.com | [e57 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 fc 10 eb 1f 45 49 75 a3 39 70 05 |0D. G....EIu.9p.| +peer1.org2.example.com | 00000010 9f 1a d2 51 51 be 64 bd f3 e5 04 6f f0 ba 1d 42 |...QQ.d....o...B| +peer1.org2.example.com | 00000020 0a 0d 51 4a 02 20 0a c0 ea 8c 86 e9 af 8a 43 90 |..QJ. ........C.| +peer1.org2.example.com | 00000030 c6 15 d3 3d 15 d0 b0 71 a2 b1 6f af 57 7f 40 a6 |...=...q..o.W.@.| +peer1.org2.example.com | 00000040 7f 77 2a 8a 18 08 |.w*...| +peer1.org2.example.com | [e58 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e59 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [e5a 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [e5b 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [e5c 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [e5d 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e5e 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e5f 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e60 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e61 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e62 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e63 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e64 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e65 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e67 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e66 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e68 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e69 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e6a 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e6b 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e6c 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e6d 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e6e 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e6f 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e70 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e71 11-19 05:22:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e72 11-19 05:22:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e73 11-19 05:22:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e74 11-19 05:22:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e75 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [e76 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [c6d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c6e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c6f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [c70 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer0.org1.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer0.org1.example.com | [c71 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer0.org1.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer0.org1.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer0.org1.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer0.org1.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer0.org1.example.com | [c72 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c73 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c74 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c75 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c76 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [c78 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [c79 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c7a 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [c7b 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [c7c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer0.org1.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer0.org1.example.com | [c7d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer0.org1.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer0.org1.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer0.org1.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer0.org1.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer0.org1.example.com | [c7e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [c7f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 1d 5b 7c f0 c6 8f 69 f8 d2 d1 |0E.!...[|...i...| +peer0.org1.example.com | 00000010 7e e1 40 82 4c 42 0d 63 62 92 d3 1a d8 56 d3 d1 |~.@.LB.cb....V..| +peer0.org1.example.com | 00000020 8f 31 02 28 15 02 20 39 6e 48 02 2f a5 bf 1d c6 |.1.(.. 9nH./....| +peer0.org1.example.com | 00000030 86 5f 52 10 80 1a f7 cb 97 3d 76 0d e9 79 b2 42 |._R......=v..y.B| +peer0.org1.example.com | 00000040 f4 9d 45 9e e1 ae 83 |..E....| +peer0.org1.example.com | [c80 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [c81 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [c82 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c83 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c77 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [c84 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [c85 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c86 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [c87 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [c88 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer0.org1.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer0.org1.example.com | [c89 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer0.org1.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer0.org1.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer0.org1.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer0.org1.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer0.org1.example.com | [c8a 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ada 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [adb 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [adc 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [add 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [ade 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [adf 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ae0 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ae1 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [ae2 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [ae3 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ae4 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [ae5 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [ae6 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ae7 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ae8 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ae9 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [aea 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [aeb 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [aec 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [aed 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ea80 gate 1574140915869261400 evaluation starts +peer1.org1.example.com | [aee 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ea80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [aef 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ea80 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [af0 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ea80 principal matched by identity 0 +peer1.org1.example.com | [af1 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer1.org1.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer1.org2.example.com | [e77 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e78 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e79 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e7a 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e7b 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e7c 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e7d 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [e7e 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e7f 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e80 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e81 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e82 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [e83 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e84 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e85 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e86 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e87 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [e88 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [e89 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [e8a 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e080 gate 1574140922846186800 evaluation starts +peer1.org2.example.com | [e8b 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e080 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e8c 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e080 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [e8d 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [e8e 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e080 principal evaluation fails +peer1.org2.example.com | [e8f 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e080 gate 1574140922846186800 evaluation fails +peer1.org2.example.com | [e90 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e91 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e92 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [e93 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e5f0 gate 1574140922848271100 evaluation starts +peer1.org2.example.com | [e94 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e5f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e95 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e5f0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [e96 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e5f0 principal matched by identity 0 +peer1.org2.example.com | [e97 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU bec Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU bed Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU bee Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bef Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf3 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf4 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf5 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf6 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf7 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf8 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfa Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfb Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfc Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfd Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfe Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bff Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU c00 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU c01 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.channelconfig] LogSanityChecks -> DEBU c02 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [common.channelconfig] LogSanityChecks -> DEBU c03 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c04 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c05 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c06 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c07 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c08 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c09 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c0a As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c0b As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c0c As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c0d Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c0e Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c0f Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c10 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c11 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c12 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c13 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c14 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c15 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.capabilities] Supported -> DEBU c16 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [common.capabilities] Supported -> DEBU c17 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [orderer.common.server] func1 -> DEBU c18 Executing callback to update root CAs" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [orderer.common.server] updateTrustedRoots -> DEBU c19 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [orderer.common.server] updateTrustedRoots -> DEBU c1a adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [orderer.common.server] updateTrustedRoots -> DEBU c1b adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-11-19 05:21:49.098 UTC [orderer.common.server] updateTrustedRoots -> DEBU c1c adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-11-19 05:21:49.099 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c1d [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +orderer0.example.com | "2019-11-19 05:21:49.099 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c1e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-11-19 05:21:49.099 UTC [msp] GetDefaultSigningIdentity -> DEBU c1f Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:49.099 UTC [msp] GetDefaultSigningIdentity -> DEBU c20 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:21:49.099 UTC [msp.identity] Sign -> DEBU c21 Sign: plaintext: 0A020802120B0A090A03010203100418...65D284A2D7FBCCB5B62D382A473B7410 " +orderer0.example.com | "2019-11-19 05:21:49.099 UTC [msp.identity] Sign -> DEBU c22 Sign: digest: FA78E4DFFD63233ABE02567FF5F97B500845DDFCE649EF1C56F1890754673F13 " +orderer0.example.com | "2019-11-19 05:21:49.101 UTC [fsblkstorage] indexBlock -> DEBU c23 Indexing block [blockNum=2, blockHash=[]byte{0x39, 0x34, 0x96, 0xee, 0x50, 0x5e, 0xad, 0x78, 0xfc, 0x3, 0xa3, 0xac, 0x21, 0xe9, 0xfb, 0x52, 0x19, 0x4e, 0xd1, 0x91, 0xc2, 0x3c, 0xb8, 0xb, 0x70, 0x9b, 0xb2, 0x3d, 0xdd, 0xb4, 0xc8, 0xd8} txOffsets= +orderer0.example.com | txId=02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732 locPointer=offset=71, bytesLength=24474 +orderer0.example.com | ]" +orderer0.example.com | "2019-11-19 05:21:49.103 UTC [fsblkstorage] updateCheckpoint -> DEBU c24 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76767], isChainEmpty=[false], lastBlockNumber=[2]" +orderer0.example.com | "2019-11-19 05:21:49.103 UTC [orderer.commmon.multichannel] commitBlock -> DEBU c25 [channel: businesschannel] Wrote block [2]" +orderer0.example.com | "2019-11-19 05:21:49.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c26 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-11-19 05:21:49.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c27 Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-11-19 05:21:49.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.7µs " +orderer0.example.com | "2019-11-19 05:21:49.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.3µs " +orderer0.example.com | "2019-11-19 05:21:49.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.565 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.565 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2d Sending msg of 28 bytes to 3 on channel testchainid took 9.7µs" +orderer0.example.com | "2019-11-19 05:21:49.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.2µs " +orderer0.example.com | "2019-11-19 05:21:49.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2f Sending msg of 28 bytes to 2 on channel businesschannel took 119.4µs" +orderer0.example.com | "2019-11-19 05:21:49.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c30 Sending msg of 28 bytes to 3 on channel businesschannel took 34.2µs" +orderer0.example.com | "2019-11-19 05:21:49.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU c31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7883ms " +orderer0.example.com | "2019-11-19 05:21:49.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU c32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.1053ms " +orderer0.example.com | "2019-11-19 05:21:49.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU c33 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:49.940 UTC [orderer.common.cluster.step] handleMessage -> DEBU c34 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:50.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c35 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:50.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c36 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2019-11-19 05:21:50.062 UTC [orderer.common.cluster.step] sendMessage -> DEBU c37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300µs " +orderer0.example.com | "2019-11-19 05:21:50.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c38 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-11-19 05:21:50.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3a Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2019-11-19 05:21:50.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +orderer0.example.com | "2019-11-19 05:21:50.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 559.6µs " +orderer0.example.com | "2019-11-19 05:21:50.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:50.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:50.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:50.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3f Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +orderer0.example.com | "2019-11-19 05:21:50.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU c40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.8µs " +orderer0.example.com | "2019-11-19 05:21:50.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c41 Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-11-19 05:21:50.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU c42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 474.3µs " +orderer0.example.com | "2019-11-19 05:21:50.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU c43 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:50.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c44 Sending msg of 28 bytes to 2 on channel businesschannel took 2.7642ms" +orderer0.example.com | "2019-11-19 05:21:50.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU c45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 403.7µs " +orderer0.example.com | "2019-11-19 05:21:50.940 UTC [orderer.common.cluster.step] handleMessage -> DEBU c46 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer1.org2.example.com | [e98 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer1.org2.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer1.org2.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer1.org2.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer1.org2.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer1.org2.example.com | [e99 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e5f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [e9a 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e5f0 gate 1574140922848271100 evaluation succeeds +peer1.org2.example.com | [e9b 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e9c 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e9d 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [e9e 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [e9f 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ea0 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [ea1 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [ea2 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [ea3 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [ea4 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ea5 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ea6 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ea7 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [ea8 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea9 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eaa 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eab 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [eac 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [ead 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [eae 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > alive: alive: alive: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [eb0 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eb1 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eb2 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eb3 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [eb4 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [eb5 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [eb6 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [eb7 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [eb8 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [ba8 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [ba9 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [baa 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bab 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [bac 11-19 05:21:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bad 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:33008 +peer0.org2.example.com | [bae 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003470b90 +peer0.org2.example.com | [baf 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [bb0 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [bb1 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org2.example.com | [bb2 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [bb3 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 67 64 9e 47 cd ab c0 ca 01 60 49 87 7e 4b 23 |fgd.G.....`I.~K#| +peer0.org2.example.com | 00000010 bf 71 62 c5 25 13 ad 55 f6 1c 8c 91 57 4f 50 bb |.qb.%..U....WOP.| +peer0.org2.example.com | [bb4 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 20 6d f9 e9 23 df 7b fd 16 0e |0E.!.. m..#.{...| +peer0.org2.example.com | 00000010 b5 1b e3 af 36 1c 73 43 10 39 65 79 36 71 91 b2 |....6.sC.9ey6q..| +peer0.org2.example.com | 00000020 22 0c 66 46 86 02 20 3b b9 4c b8 4e 21 ec 09 61 |".fF.. ;.L.N!..a| +peer0.org2.example.com | 00000030 0f 53 d7 62 87 93 c5 2a 83 74 a1 87 fa 49 f1 c8 |.S.b...*.t...I..| +peer0.org2.example.com | 00000040 3f f4 af 71 a7 0d ba |?..q...| +peer0.org2.example.com | [bb5 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [bb6 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029b3490, header 0xc003470fa0 +peer0.org2.example.com | [bb7 11-19 05:21:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org2.example.com | [bb8 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU [][4492d6c7] processing txid: 4492d6c735e34b3c1c6aae0de9656e0a5f2a3cd3f320d21fadce7a7c2a44b26c +peer0.org2.example.com | [bb9 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU [][4492d6c7] Entry chaincode: name:"lscc" +peer0.org2.example.com | [bba 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> INFO [][4492d6c7] Entry chaincode: name:"lscc" +peer0.org2.example.com | [bbb 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [bbc 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 67 64 9e 47 cd ab c0 ca 01 60 49 87 7e 4b 23 |fgd.G.....`I.~K#| +peer0.org2.example.com | 00000010 bf 71 62 c5 25 13 ad 55 f6 1c 8c 91 57 4f 50 bb |.qb.%..U....WOP.| +peer0.org2.example.com | [bbd 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 20 6d f9 e9 23 df 7b fd 16 0e |0E.!.. m..#.{...| +peer0.org2.example.com | 00000010 b5 1b e3 af 36 1c 73 43 10 39 65 79 36 71 91 b2 |....6.sC.9ey6q..| +peer0.org2.example.com | 00000020 22 0c 66 46 86 02 20 3b b9 4c b8 4e 21 ec 09 61 |".fF.. ;.L.N!..a| +peer0.org2.example.com | 00000030 0f 53 d7 62 87 93 c5 2a 83 74 a1 87 fa 49 f1 c8 |.S.b...*.t...I..| +peer0.org2.example.com | 00000040 3f f4 af 71 a7 0d ba |?..q...| +peer0.org2.example.com | [bbe 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org2.example.com | [bbf 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer0.org2.example.com | [bc0 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer0.org2.example.com | [bc1 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6e3b165f-101c-4b64-9c7d-e7c1375f5877] +peer0.org2.example.com | [bc2 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [bc3 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6e3b165f-101c-4b64-9c7d-e7c1375f5877] +peer0.org2.example.com | [bc4 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer0.org2.example.com | [bc5 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer0.org2.example.com | [bc6 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU [4492d6c7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [bc7 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU [4492d6c7] notifying Txid:4492d6c735e34b3c1c6aae0de9656e0a5f2a3cd3f320d21fadce7a7c2a44b26c, channelID: +peer0.org2.example.com | [bc8 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [bc9 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> INFO [][4492d6c7] Exit chaincode: name:"lscc" (2ms) +peer0.org2.example.com | [bca 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU [][4492d6c7] Exit +peer0.org2.example.com | [bcb 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:33008 +peer0.org2.example.com | [bcc 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:33008 grpc.code=OK grpc.call_duration=4.3902ms +peer0.org2.example.com | [bcd 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [bce 11-19 05:21:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [bcf 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [bd0 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bd1 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bd2 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bd3 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bd4 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [bd5 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bd6 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [bd7 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [bd8 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 08 16 77 fb fb 6d 78 00 54 32 2f bf f4 15 c9 |...w..mx.T2/....| +peer0.org2.example.com | 00000010 ae b3 12 79 db 6f c0 44 d7 7e 72 c1 d3 2e 74 d9 |...y.o.D.~r...t.| +peer0.org2.example.com | [bd9 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d c7 65 f0 b9 59 a4 06 7d f3 3b 49 |0D. m.e..Y..}.;I| +peer0.org2.example.com | 00000010 5f 28 4d 19 5e 25 7a 95 a3 6a 1c 4a 43 bf c1 ab |_(M.^%z..j.JC...| +peer0.org2.example.com | 00000020 94 5a 1f 08 02 20 1e f6 dc ce d6 94 f8 b1 b0 36 |.Z... .........6| +peer0.org2.example.com | 00000030 c1 56 e7 a9 e5 ec 2c e1 d9 71 6a 45 e9 dc 92 17 |.V....,..qjE....| +peer0.org2.example.com | 00000040 59 dd b8 17 1e 9c |Y.....| +peer0.org2.example.com | [bda 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [bdb 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [bdc 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [bdd 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [bde 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [bdf 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [be0 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [be1 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [be2 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [be3 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [be4 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [be5 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [be6 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [be7 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [be8 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [be9 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [bea 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [beb 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [bec 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [bee 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bed 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [bef 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bf0 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [eb9 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [eba 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [ebc 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ebb 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [ebd 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ebe 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [ebf 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ec0 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [ec1 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [ec2 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [ec3 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ec4 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [ec5 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [ec6 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ec7 11-19 05:22:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [ec8 11-19 05:22:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [ec9 11-19 05:22:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [eca 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [ecb 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151019 +peer1.org2.example.com | [ecc 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9DEB64E51DADB1F10FE0532EEBC0EBA874ECC346F12D0F1E493B0BE3B2D71B33 +peer1.org2.example.com | [ecd 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [ece 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [ecf 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [ed0 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ed1 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ed2 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ed3 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c8b 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [c8c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c8d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [c8e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c8f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [c90 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c91 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c92 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [c93 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [c94 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [c95 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 gate 1574140914858108700 evaluation starts +peer0.org1.example.com | [c96 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c97 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [c98 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 principal matched by identity 0 +peer0.org1.example.com | [c99 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +peer0.org1.example.com | 00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +peer0.org1.example.com | [c9a 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +peer0.org1.example.com | 00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +peer0.org1.example.com | 00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +peer0.org1.example.com | 00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +peer0.org1.example.com | 00000040 3c b7 fd fe 94 01 8e |<......| +peer0.org1.example.com | [c9b 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c9c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 gate 1574140914858108700 evaluation succeeds +peer0.org1.example.com | [c9d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c9e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c9f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ca0 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ca1 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ca2 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ca3 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [ca4 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [af2 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer1.org1.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer1.org1.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer1.org1.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer1.org1.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer1.org1.example.com | [af3 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ea80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [af4 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ea80 gate 1574140915869261400 evaluation succeeds +peer1.org1.example.com | [af5 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [af6 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [af7 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [af8 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [af9 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [afa 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [afb 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [afc 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [afd 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [afe 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aff 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b00 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b01 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [b02 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b03 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b04 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b05 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [b06 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > alive: alive: +peer1.org1.example.com | [b07 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [b08 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b09 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b0a 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b0b 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b0c 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b0d 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b0e 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b0f 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b10 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b11 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b12 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b13 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b14 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [b15 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [b16 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151017 +peer1.org1.example.com | [b17 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2328D77E0A2E5FE16A82380B21D209E4BA6D1F37AA770548D34D9E64C8D82531 +peer1.org1.example.com | [b18 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [b19 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [b1a 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [b1b 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b1c 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [b1d 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b1e 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [b1f 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [b20 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [b21 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b22 11-19 05:21:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [b23 11-19 05:21:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b24 11-19 05:21:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [b25 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b26 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [b27 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b28 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b29 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b2a 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b2b 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [b2c 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b2d 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [b2e 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [bf1 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bf2 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [bf3 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [bf4 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +peer0.org2.example.com | 00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +peer0.org2.example.com | [bf5 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +peer0.org2.example.com | 00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +peer0.org2.example.com | 00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +peer0.org2.example.com | 00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +peer0.org2.example.com | 00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +peer0.org2.example.com | [bf6 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [bf7 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 6f ca bd a6 35 bd 77 cf 81 31 |0E.!..o...5.w..1| +peer0.org2.example.com | 00000010 03 4f bf f3 30 94 3f 83 a9 f9 b4 ea 90 e7 bc 92 |.O..0.?.........| +peer0.org2.example.com | 00000020 1a 4a e5 1f 95 02 20 17 c7 95 60 38 dc 0b 92 22 |.J.... ...`8..."| +peer0.org2.example.com | 00000030 6c 84 cc 23 6c 83 c0 1f 45 fe 14 5a f1 30 13 1c |l..#l...E..Z.0..| +peer0.org2.example.com | 00000040 e3 b4 02 88 73 1d 6c |....s.l| +peer0.org2.example.com | [bf8 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [bf9 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [bfa 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [bfb 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [bfc 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [bfd 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bfe 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bff 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c00 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [c01 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c02 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c03 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c04 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" secret_envelope: > alive:\216\350\311\331\031\200\371%\267\242i\024\326\321\224\201\252\177t\246\320\002Zv{\346\002 {\357b~S\203y\342\201\360\006\3276.\342\005$\374\204e)#\336u\237\r%\207\205\013\364\240" > +peer0.org2.example.com | [c05 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [c06 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c07 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c08 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c09 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c0a 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ed4 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:n\322r\267W\037\000\251\200\206(\322Sg\257f?\335Y\021)\000F2\022\371\233\220\341\315\002 U\260_V\212P%\020bRb?\007\276d\026\237\246\370`\017\327\t\253\207\334P!\270e\255\013" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ed5 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:n\322r\267W\037\000\251\200\206(\322Sg\257f?\335Y\021)\000F2\022\371\233\220\341\315\002 U\260_V\212P%\020bRb?\007\276d\026\237\246\370`\017\327\t\253\207\334P!\270e\255\013" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [ed6 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ed7 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [ed8 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ed9 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [eda 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [edb 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [edc 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [edd 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ede 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [edf 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [ee0 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer1.org2.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer1.org2.example.com | [ee1 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer1.org2.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer1.org2.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer1.org2.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer1.org2.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer1.org2.example.com | [ee2 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [ee3 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 3e 6e d2 72 b7 57 1f 00 a9 80 |0E.!..>n.r.W....| +peer1.org2.example.com | 00000010 86 28 d2 53 67 af 66 3f dd 59 11 29 00 46 32 12 |.(.Sg.f?.Y.).F2.| +peer1.org2.example.com | 00000020 f9 9b 90 e1 cd 02 20 55 b0 5f 56 8a 50 25 10 62 |...... U._V.P%.b| +peer1.org2.example.com | 00000030 52 62 3f 07 be 64 16 9f a6 f8 60 0f d7 09 ab 87 |Rb?..d....`.....| +peer1.org2.example.com | 00000040 dc 50 21 b8 65 ad 0b |.P!.e..| +peer1.org2.example.com | [ee4 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [ee5 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [ee6 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ee7 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ee8 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [ee9 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [eea 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [eeb 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:51.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c47 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:51.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c48 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2019-11-19 05:21:51.062 UTC [orderer.common.cluster.step] sendMessage -> DEBU c49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +orderer0.example.com | "2019-11-19 05:21:51.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4a Sending msg of 28 bytes to 2 on channel businesschannel took 111.8µs" +orderer0.example.com | "2019-11-19 05:21:51.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4b Sending msg of 28 bytes to 3 on channel businesschannel took 113.4µs" +orderer0.example.com | "2019-11-19 05:21:51.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +orderer0.example.com | "2019-11-19 05:21:51.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 287.9µs " +orderer0.example.com | "2019-11-19 05:21:51.441 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:51.441 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:51.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c50 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:51.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c51 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +orderer0.example.com | "2019-11-19 05:21:51.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU c52 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.2µs " +orderer0.example.com | "2019-11-19 05:21:51.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c53 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-11-19 05:21:51.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c54 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +orderer0.example.com | "2019-11-19 05:21:51.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +orderer0.example.com | "2019-11-19 05:21:51.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.2µs " +orderer0.example.com | "2019-11-19 05:21:51.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c57 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:51.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c58 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:52.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c59 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:52.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5a Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2019-11-19 05:21:52.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " +orderer0.example.com | "2019-11-19 05:21:52.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5c Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" +orderer0.example.com | "2019-11-19 05:21:52.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5d Sending msg of 28 bytes to 3 on channel businesschannel took 47.5µs" +orderer0.example.com | "2019-11-19 05:21:52.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 271.7µs " +orderer0.example.com | "2019-11-19 05:21:52.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.2µs " +orderer0.example.com | "2019-11-19 05:21:52.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU c60 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:52.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU c61 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:52.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c62 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:52.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c63 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-11-19 05:21:52.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU c64 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +orderer0.example.com | "2019-11-19 05:21:52.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c65 Sending msg of 28 bytes to 2 on channel businesschannel took 51.7µs" +orderer0.example.com | "2019-11-19 05:21:52.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c66 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-11-19 05:21:52.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU c67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300.7µs " +orderer0.example.com | "2019-11-19 05:21:52.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU c68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 197.3µs " +orderer0.example.com | "2019-11-19 05:21:52.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU c69 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:52.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:53.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:53.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6c Sending msg of 28 bytes to 3 on channel testchainid took 260µs" +peer0.org2.example.com | [c0b 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [c0c 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c0d 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c0e 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c0f 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c10 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [c11 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [c12 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c13 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c14 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c15 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c16 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c17 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c18 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [c19 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c1a 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c1b 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c1c 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c1d 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [c1e 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c1f 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [c20 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c21 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c22 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c23 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [c24 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [c25 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538a70 gate 1574140915802235200 evaluation starts +peer0.org2.example.com | [c26 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538a70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c27 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538a70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [c28 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [c29 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538a70 principal evaluation fails +peer0.org2.example.com | [c2a 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538a70 gate 1574140915802235200 evaluation fails +peer0.org2.example.com | [c2b 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c2c 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c2d 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [c2e 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538fe0 gate 1574140915802626700 evaluation starts +peer0.org2.example.com | [c2f 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c30 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538fe0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [c31 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538fe0 principal matched by identity 0 +peer0.org2.example.com | [c32 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 f6 4a 00 cc 7b 1f 2c 43 72 2a df c4 3c 90 65 |U.J..{.,Cr*..<.e| +peer0.org2.example.com | 00000010 e0 e1 fe ae d3 d8 92 56 78 20 b9 26 64 be a5 71 |.......Vx .&d..q| +peer0.org2.example.com | [c33 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ad 45 3d 3a e8 d9 2d fb ab 71 |0E.!...E=:..-..q| +peer0.org2.example.com | 00000010 72 7a 60 32 e3 24 aa e2 81 51 47 b6 c8 9f 5a 6d |rz`2.$...QG...Zm| +peer0.org2.example.com | 00000020 d7 03 68 c4 4f 02 20 49 db c7 d7 8f cf 48 d1 16 |..h.O. I.....H..| +peer0.org2.example.com | 00000030 ea 63 c9 6e db 26 e5 12 5e 11 c6 5f 94 3a 03 c6 |.c.n.&..^.._.:..| +peer0.org2.example.com | 00000040 db b2 14 8a 0f ae 3c |......<| +peer0.org2.example.com | [c34 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538fe0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [c35 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538fe0 gate 1574140915802626700 evaluation succeeds +peer0.org2.example.com | [c36 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c37 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c38 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [c39 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [c3a 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c3b 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [c3c 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [c3d 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [c3e 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [c3f 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c40 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c41 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c42 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c43 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c44 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c45 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c46 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c47 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c48 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c49 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [c4a 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c4b 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c4c 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c4d 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [c4e 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c4f 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c50 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c51 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c52 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c53 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c54 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c55 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151013 +peer0.org2.example.com | [c56 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F3F7CF19AEE257935DF74E5D3530A15076D2719E608679A5B31ABDFDCC4EF6B +peer0.org2.example.com | [c57 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c58 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [c59 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [c5a 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [c5b 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [c5c 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c5d 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [c5e 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c5f 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [c60 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c61 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [c62 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c63 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [c64 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c65 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [c66 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c67 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c68 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c69 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c6a 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [c6b 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [c6c 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c6d 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [c6e 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c6f 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c70 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c71 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c72 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c73 11-19 05:21:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c74 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [c75 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [c76 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c77 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c78 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151014 +peer0.org2.example.com | [c79 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85ADA73457BB913CC097A1F5F1F3C3AB9C0EAFCD7614F64EDE10EFD961BC866C +peer0.org2.example.com | [c7a 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c7b 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [c7c 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [c7d 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c7e 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c7f 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c80 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c81 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c82 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [c83 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c84 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [c85 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c86 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [c87 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c88 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [c89 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [c8a 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8b 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c8c 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8d 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c8e 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8f 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [c90 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:21:53.062 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +orderer0.example.com | "2019-11-19 05:21:53.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6e Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +orderer0.example.com | "2019-11-19 05:21:53.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6f Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-11-19 05:21:53.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU c70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 259.9µs " +orderer0.example.com | "2019-11-19 05:21:53.441 UTC [orderer.common.cluster.step] handleMessage -> DEBU c71 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:53.442 UTC [orderer.common.cluster.step] handleMessage -> DEBU c72 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:53.443 UTC [orderer.common.cluster.step] sendMessage -> DEBU c73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.3288ms " +orderer0.example.com | "2019-11-19 05:21:53.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c74 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:53.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c75 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2019-11-19 05:21:53.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU c76 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +orderer0.example.com | "2019-11-19 05:21:53.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c77 Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +orderer0.example.com | "2019-11-19 05:21:53.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c78 Sending msg of 28 bytes to 3 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-11-19 05:21:53.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 199.5µs " +orderer0.example.com | "2019-11-19 05:21:53.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.6µs " +orderer0.example.com | "2019-11-19 05:21:53.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c7b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:53.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c7c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:54.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU c7d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:54.065 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7e Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2019-11-19 05:21:54.066 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +orderer0.example.com | "2019-11-19 05:21:54.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c80 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +orderer0.example.com | "2019-11-19 05:21:54.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c82 Sending msg of 28 bytes to 3 on channel businesschannel took 37.4µs" +orderer0.example.com | "2019-11-19 05:21:54.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU c81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.3µs " +orderer0.example.com | "2019-11-19 05:21:54.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU c83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " +orderer0.example.com | "2019-11-19 05:21:54.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU c84 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:54.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU c85 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:54.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU c86 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:54.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c87 Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" +orderer0.example.com | "2019-11-19 05:21:54.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU c88 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.7µs " +orderer0.example.com | "2019-11-19 05:21:54.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c89 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-11-19 05:21:54.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8a Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +orderer0.example.com | "2019-11-19 05:21:54.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.5µs " +orderer0.example.com | "2019-11-19 05:21:54.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.1µs " +orderer0.example.com | "2019-11-19 05:21:54.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:54.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:55.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:55.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c90 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +orderer0.example.com | "2019-11-19 05:21:55.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU c91 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " +orderer0.example.com | "2019-11-19 05:21:55.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c92 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +orderer0.example.com | "2019-11-19 05:21:55.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c93 Sending msg of 28 bytes to 2 on channel businesschannel took 10.8µs" +orderer0.example.com | "2019-11-19 05:21:55.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU c94 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.8µs " +orderer0.example.com | "2019-11-19 05:21:55.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU c95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.7µs " +orderer0.example.com | "2019-11-19 05:21:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU c96 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU c97 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:55.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c98 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:55.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c99 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-11-19 05:21:55.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.7µs " +orderer0.example.com | "2019-11-19 05:21:55.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9b Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2019-11-19 05:21:55.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9c Sending msg of 28 bytes to 2 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-11-19 05:21:55.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.8µs " +orderer0.example.com | "2019-11-19 05:21:55.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 44.7µs " +orderer0.example.com | "2019-11-19 05:21:55.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:55.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca0 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:56.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:56.065 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca2 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +orderer0.example.com | "2019-11-19 05:21:56.065 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " +orderer0.example.com | "2019-11-19 05:21:56.341 UTC [orderer.common.server] Broadcast -> DEBU ca4 Starting new Broadcast handler" +orderer0.example.com | "2019-11-19 05:21:56.341 UTC [orderer.common.broadcast] Handle -> DEBU ca5 Starting new broadcast loop for 172.18.0.5:51520" +orderer0.example.com | "2019-11-19 05:21:56.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca6 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-11-19 05:21:56.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-11-19 05:21:56.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " +orderer0.example.com | "2019-11-19 05:21:56.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.1µs " +orderer0.example.com | "2019-11-19 05:21:56.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU caa Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:56.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU cab Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:56.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU cac Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:56.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cad Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2019-11-19 05:21:56.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU cae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.5µs " +orderer0.example.com | "2019-11-19 05:21:56.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU caf Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +orderer0.example.com | "2019-11-19 05:21:56.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb0 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +orderer0.example.com | "2019-11-19 05:21:56.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.3µs " +orderer0.example.com | "2019-11-19 05:21:56.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " +orderer0.example.com | "2019-11-19 05:21:56.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:56.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:57.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:57.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb6 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +orderer0.example.com | "2019-11-19 05:21:57.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198µs " +orderer0.example.com | "2019-11-19 05:21:57.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-11-19 05:21:57.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cba Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-11-19 05:21:57.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.6µs " +orderer0.example.com | "2019-11-19 05:21:57.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.1µs " +orderer0.example.com | "2019-11-19 05:21:57.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbc Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:57.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:57.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbe Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:57.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cbf Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-11-19 05:21:57.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " +orderer0.example.com | "2019-11-19 05:21:57.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-11-19 05:21:57.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc3 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-11-19 05:21:57.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.5µs " +orderer0.example.com | "2019-11-19 05:21:57.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:57.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 224.2µs " +orderer0.example.com | "2019-11-19 05:21:57.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:58.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:58.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc8 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-11-19 05:21:58.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 419.1µs " +orderer0.example.com | "2019-11-19 05:21:58.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cca Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" +orderer0.example.com | "2019-11-19 05:21:58.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccc Sending msg of 28 bytes to 3 on channel businesschannel took 92.4µs" +orderer0.example.com | "2019-11-19 05:21:58.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:58.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 211.8µs " +orderer0.example.com | "2019-11-19 05:21:58.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU cce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +orderer0.example.com | "2019-11-19 05:21:58.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:58.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:58.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +orderer0.example.com | "2019-11-19 05:21:58.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6288ms " +orderer0.example.com | "2019-11-19 05:21:58.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd3 Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs" +orderer0.example.com | "2019-11-19 05:21:58.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +orderer0.example.com | "2019-11-19 05:21:58.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.6µs " +orderer0.example.com | "2019-11-19 05:21:58.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs " +orderer0.example.com | "2019-11-19 05:21:58.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:58.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:59.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:59.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-11-19 05:21:59.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs " +orderer0.example.com | "2019-11-19 05:21:59.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdc Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-11-19 05:21:59.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 3 on channel businesschannel took 27.1µs" +orderer0.example.com | "2019-11-19 05:21:59.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +orderer0.example.com | "2019-11-19 05:21:59.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.3µs " +orderer0.example.com | "2019-11-19 05:21:59.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce0 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:59.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:59.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:59.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +orderer0.example.com | "2019-11-19 05:21:59.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 830.5µs " +orderer0.example.com | "2019-11-19 05:21:59.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-11-19 05:21:59.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-11-19 05:21:59.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.8µs " +orderer0.example.com | "2019-11-19 05:21:59.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.6µs " +orderer0.example.com | "2019-11-19 05:21:59.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce9 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:21:59.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU cea Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:00.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU ceb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:00.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +orderer0.example.com | "2019-11-19 05:22:00.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.8µs " +orderer0.example.com | "2019-11-19 05:22:00.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-11-19 05:22:00.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf0 Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-11-19 05:22:00.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.7µs " +orderer0.example.com | "2019-11-19 05:22:00.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.3µs " +orderer0.example.com | "2019-11-19 05:22:00.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:00.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:00.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:00.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel testchainid took 31.1µs" +orderer0.example.com | "2019-11-19 05:22:00.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110µs " +orderer0.example.com | "2019-11-19 05:22:00.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf7 Sending msg of 28 bytes to 2 on channel businesschannel took 35.7µs" +orderer0.example.com | "2019-11-19 05:22:00.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf9 Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +orderer0.example.com | "2019-11-19 05:22:00.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 199.2µs " +orderer0.example.com | "2019-11-19 05:22:00.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.2µs " +orderer0.example.com | "2019-11-19 05:22:00.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:00.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:01.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:01.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 3 on channel testchainid took 34.6µs" +orderer0.example.com | "2019-11-19 05:22:01.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +orderer0.example.com | "2019-11-19 05:22:01.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d00 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-11-19 05:22:01.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d02 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-11-19 05:22:01.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.6µs " +orderer0.example.com | "2019-11-19 05:22:01.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU d01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.1µs " +orderer0.example.com | "2019-11-19 05:22:01.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:01.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d05 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:01.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:01.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +orderer0.example.com | "2019-11-19 05:22:01.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.7µs " +orderer0.example.com | "2019-11-19 05:22:01.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-11-19 05:22:01.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 2 on channel businesschannel took 13.7µs" +orderer0.example.com | "2019-11-19 05:22:01.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129.1µs " +orderer0.example.com | "2019-11-19 05:22:01.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.5µs " +orderer0.example.com | "2019-11-19 05:22:01.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:01.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:02.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:02.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d10 Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +orderer0.example.com | "2019-11-19 05:22:02.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " +orderer0.example.com | "2019-11-19 05:22:02.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 15.3µs" +peer1.org2.example.com | [eec 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [eed 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer1.org2.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer1.org2.example.com | [eee 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer1.org2.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer1.org2.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer1.org2.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer1.org2.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer1.org2.example.com | [eef 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ef0 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ef1 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ef2 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ef3 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [ef4 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [ef5 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ef6 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer1.org2.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer1.org2.example.com | [ef7 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer1.org2.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer1.org2.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer1.org2.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer1.org2.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer1.org2.example.com | [ef8 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ef9 11-19 05:22:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [efa 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [efb 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [efc 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [efd 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [efe 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [eff 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f00 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [f01 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f02 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [f03 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307f620 gate 1574140923481356600 evaluation starts +peer1.org2.example.com | [f04 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307f620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f05 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307f620 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [f06 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307f620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [f07 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307f620 principal evaluation fails +peer1.org2.example.com | [f08 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307f620 gate 1574140923481356600 evaluation fails +peer1.org2.example.com | [f09 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f0a 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f0b 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [f0c 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307fb90 gate 1574140923482806600 evaluation starts +peer1.org2.example.com | [f0d 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307fb90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f0e 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307fb90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [f0f 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307fb90 principal matched by identity 0 +peer1.org2.example.com | [f10 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer1.org2.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer1.org2.example.com | [f11 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer1.org2.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer1.org2.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer1.org2.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer1.org2.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer1.org2.example.com | [f12 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307fb90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f13 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307fb90 gate 1574140923482806600 evaluation succeeds +peer1.org2.example.com | [f14 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f15 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f16 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [f17 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [f18 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f19 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f1a 11-19 05:22:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f1b 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f1c 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f1d 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f1e 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f1f 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f20 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [f21 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [f22 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f23 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f24 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f25 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f26 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f27 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f28 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [f29 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f2a 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [f2b 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [f2c 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [f2d 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [f2e 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f2f 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2419&\361\205\214vYu\337]J\231\330\235\351\365\207\277\026\272\221\002 F\340\013a\246\241\376\335)^\365\245ut\302Px\377\355\014d\224D\3550\266]8\232\263\016\200" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [f30 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\2419&\361\205\214vYu\337]J\231\330\235\351\365\207\277\026\272\221\002 F\340\013a\246\241\376\335)^\365\245ut\302Px\377\355\014d\224D\3550\266]8\232\263\016\200" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [f31 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f32 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2419&\361\205\214vYu\337]J\231\330\235\351\365\207\277\026\272\221\002 F\340\013a\246\241\376\335)^\365\245ut\302Px\377\355\014d\224D\3550\266]8\232\263\016\200" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [f33 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [f34 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 89 53 a7 f7 86 02 31 6a 3a 25 aa c2 d3 2b ad |..S....1j:%...+.| +peer1.org2.example.com | 00000010 c7 c6 6f 04 ad 7c b5 0c ab 0c 0b 06 34 5d ee 21 |..o..|......4].!| +peer1.org2.example.com | [f35 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 e0 d9 b9 62 8f 38 01 b6 39 3a |0E.!.....b.8..9:| +peer1.org2.example.com | 00000010 cd 39 1d 31 6a 62 0a 3c 22 c7 ce 11 c0 81 b0 29 |.9.1jb.<"......)| +peer1.org2.example.com | 00000020 dc cb d3 83 e1 02 20 50 21 f7 2b e2 d6 08 2d 65 |...... P!.+...-e| +peer1.org2.example.com | 00000030 12 a0 3b c6 3d a7 af 82 de 63 c8 47 51 a1 41 bf |..;.=....c.GQ.A.| +peer1.org2.example.com | 00000040 d6 c1 28 d9 f6 87 3c |..(...<| +peer1.org2.example.com | [f36 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [f37 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b c9 74 9a b1 c5 84 8b b8 3e a1 39 |0D. ..t......>.9| +peer1.org2.example.com | 00000010 26 f1 85 8c 76 59 75 df 5d 4a 99 d8 9d e9 f5 87 |&...vYu.]J......| +peer1.org2.example.com | 00000020 bf 16 ba 91 02 20 46 e0 0b 61 a6 a1 fe dd 29 5e |..... F..a....)^| +peer1.org2.example.com | 00000030 f5 a5 75 74 c2 50 78 ff ed 0c 64 94 44 ed 30 b6 |..ut.Px...d.D.0.| +peer1.org2.example.com | 00000040 5d 38 9a b3 0e 80 |]8....| +peer1.org2.example.com | [f38 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [f39 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [f3a 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [f3b 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [f3c 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [f3d 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f3e 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f3f 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f40 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [f41 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f42 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f43 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [f44 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\2419&\361\205\214vYu\337]J\231\330\235\351\365\207\277\026\272\221\002 F\340\013a\246\241\376\335)^\365\245ut\302Px\377\355\014d\224D\3550\266]8\232\263\016\200" > > alive: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [f48 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f49 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [f4a 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [f4b 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f4c 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f4d 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f4e 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f4f 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [f50 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f51 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [f52 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933020 gate 1574140923917936500 evaluation starts +peer1.org2.example.com | [f53 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933020 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f54 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933020 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [f55 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [f56 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933020 principal evaluation fails +peer1.org2.example.com | [f57 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933020 gate 1574140923917936500 evaluation fails +peer0.org1.example.com | [ca5 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ca6 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ca7 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ca8 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ca9 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [caa 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [cab 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 gate 1574140914859160500 evaluation starts +peer0.org1.example.com | [cac 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cad 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [cae 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 principal matched by identity 0 +peer0.org1.example.com | [caf 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 19 8b 85 59 7d 69 4c 24 0d eb f9 6e 6e 19 5d |....Y}iL$...nn.]| +peer0.org1.example.com | 00000010 56 3f 42 5a 39 65 7f 10 b4 3d ef a3 b9 1a 23 14 |V?BZ9e...=....#.| +peer0.org1.example.com | [cb0 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 35 11 38 3f dc 0c 83 3a fb ea |0E.!..5.8?...:..| +peer0.org1.example.com | 00000010 0e 51 7c f2 0a 23 7d 71 7f 6b 28 0d 48 51 81 3b |.Q|..#}q.k(.HQ.;| +peer0.org1.example.com | 00000020 22 09 b5 af e3 02 20 10 d9 9c e7 51 65 4a b5 f7 |"..... ....QeJ..| +peer0.org1.example.com | 00000030 df 51 dc 08 7c e5 e1 24 66 f5 87 2d 6f 68 cb 44 |.Q..|..$f..-oh.D| +peer0.org1.example.com | 00000040 b6 0c ba 96 ca 37 f6 |.....7.| +peer0.org1.example.com | [cb1 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [cb2 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 gate 1574140914859160500 evaluation succeeds +peer0.org1.example.com | [cb3 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cb4 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cb5 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [cb6 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [cb7 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [cb8 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 20 but got ts: inc_num:1574140895405208300 seq_num:12 +peer0.org1.example.com | [cb9 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cba 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cbb 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cbc 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cbd 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [cbe 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [cbf 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cc0 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [cc1 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cc2 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [cc3 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cc4 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [cc5 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [cc6 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [cc7 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cc8 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cc9 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b2f 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer1.org1.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer1.org1.example.com | [b30 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer1.org1.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer1.org1.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer1.org1.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer1.org1.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer1.org1.example.com | [b31 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [b32 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 b6 2e bc 7f 23 c8 f5 29 6b 70 |0E.!......#..)kp| +peer1.org1.example.com | 00000010 d6 19 e0 0a 36 cf 0a 69 88 08 f0 3c 4d d8 a6 e7 |....6..i... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [b34 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [b35 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b36 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b37 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b38 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [b39 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b3a 11-19 05:21:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b3b 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b3c 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b3d 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b3e 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [b3f 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [b40 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b41 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [b42 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [b43 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer1.org1.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer1.org1.example.com | [b44 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer1.org1.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer1.org1.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer1.org1.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer1.org1.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer1.org1.example.com | [b45 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [b46 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b47 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b48 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b49 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [b4a 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer1.org1.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer1.org1.example.com | [b4b 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer1.org1.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer1.org1.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer1.org1.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer1.org1.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer0.org2.example.com | [c91 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c92 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [c93 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c94 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [c95 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [c96 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +peer0.org2.example.com | 00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +peer0.org2.example.com | [c97 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +peer0.org2.example.com | 00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +peer0.org2.example.com | 00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +peer0.org2.example.com | 00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +peer0.org2.example.com | 00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +peer0.org2.example.com | [c98 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c99 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c9a 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [c9b 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer0.org2.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer0.org2.example.com | [c9c 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer0.org2.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer0.org2.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer0.org2.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer0.org2.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer0.org2.example.com | [c9d 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c9e 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c9f 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ca0 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ca1 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [ca2 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ca3 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [ca4 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [ca5 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer0.org2.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer0.org2.example.com | [ca6 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer0.org2.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer0.org2.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer0.org2.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer0.org2.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer0.org2.example.com | [ca7 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ca8 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ca9 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [caa 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [cab 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cac 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [cad 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [cae 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [caf 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [cb0 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [cb1 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [cb2 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0410 gate 1574140915883174800 evaluation starts +peer0.org2.example.com | [cb3 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0410 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [cb4 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0410 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [cb5 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [cb6 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0410 principal evaluation fails +peer0.org2.example.com | [cb7 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0410 gate 1574140915883174800 evaluation fails +peer0.org2.example.com | [cb8 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [cb9 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [cba 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [cbb 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0980 gate 1574140915885090900 evaluation starts +peer0.org2.example.com | [cbc 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0980 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [cbd 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0980 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [cbe 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0980 principal matched by identity 0 +peer0.org2.example.com | [cbf 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer0.org2.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer0.org2.example.com | [cc0 11-19 05:21:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer0.org2.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer0.org2.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer0.org2.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer0.org2.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer0.org2.example.com | [cc1 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0980 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [cc2 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b0980 gate 1574140915885090900 evaluation succeeds +peer0.org2.example.com | [cc3 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [cc4 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [cc5 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [cc6 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [cc7 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [cc8 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cc9 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cca 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [ccb 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ccc 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [ccd 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [cce 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b4c 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b4d 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b4e 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [b4f 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b50 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b51 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b52 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b53 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b54 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b55 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b56 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003caa730 gate 1574140915943991500 evaluation starts +peer1.org1.example.com | [b57 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003caa730 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b58 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003caa730 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [b59 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003caa730 principal matched by identity 0 +peer1.org1.example.com | [b5a 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +peer1.org1.example.com | 00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +peer1.org1.example.com | [b5b 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +peer1.org1.example.com | 00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +peer1.org1.example.com | 00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +peer1.org1.example.com | 00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +peer1.org1.example.com | 00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +peer1.org1.example.com | [b5c 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003caa730 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b5d 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003caa730 gate 1574140915943991500 evaluation succeeds +peer1.org1.example.com | [b5e 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b5f 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b60 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b61 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b62 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [b63 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [b64 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [b65 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [b66 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [b67 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:02.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2019-11-19 05:22:02.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.2µs " +orderer0.example.com | "2019-11-19 05:22:02.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU d15 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:02.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.3µs " +orderer0.example.com | "2019-11-19 05:22:02.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:02.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:02.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-11-19 05:22:02.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.9µs " +orderer0.example.com | "2019-11-19 05:22:02.616 UTC [orderer.common.server] replicateDisabledChains -> DEBU d1b No inactive chains to try to replicate" +orderer0.example.com | "2019-11-19 05:22:02.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 2 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-11-19 05:22:02.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.6µs " +orderer0.example.com | "2019-11-19 05:22:02.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1e Sending msg of 28 bytes to 3 on channel businesschannel took 367.6µs" +orderer0.example.com | "2019-11-19 05:22:02.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +orderer0.example.com | "2019-11-19 05:22:02.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:02.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d21 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:03.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d22 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:03.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d23 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-11-19 05:22:03.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU d24 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +orderer0.example.com | "2019-11-19 05:22:03.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d25 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-11-19 05:22:03.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d27 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +orderer0.example.com | "2019-11-19 05:22:03.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.4µs " +orderer0.example.com | "2019-11-19 05:22:03.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU d26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.6µs " +orderer0.example.com | "2019-11-19 05:22:03.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d29 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:03.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:03.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:03.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2c Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +peer1.org2.example.com | [f58 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f59 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f5a 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [f5b 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933590 gate 1574140923918517900 evaluation starts +peer1.org2.example.com | [f5c 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f5d 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933590 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [f5e 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933590 principal matched by identity 0 +peer1.org2.example.com | [f5f 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 06 4a 57 60 88 12 b0 fc 87 2d 7a f3 e2 3e f2 |..JW`.....-z..>.| +peer1.org2.example.com | 00000010 b8 45 35 64 63 d0 4d d8 46 9f b9 1d c2 f6 b4 43 |.E5dc.M.F......C| +peer1.org2.example.com | [f60 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 1a 44 53 5c 9f c5 25 c9 11 f8 f8 |0D. H.DS\..%....| +peer1.org2.example.com | 00000010 78 f9 ae c6 72 d4 91 5f b4 a5 0b 3b ee 77 bf e1 |x...r.._...;.w..| +peer1.org2.example.com | 00000020 2c 88 bb ae 02 20 45 02 53 3a 46 8a 70 43 0e 97 |,.... E.S:F.pC..| +peer1.org2.example.com | 00000030 f2 8c a4 fd 02 8e 32 5e 77 97 9c aa e5 5f b4 93 |......2^w...._..| +peer1.org2.example.com | 00000040 da 3f 91 8a 01 d9 |.?....| +peer1.org2.example.com | [f61 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933590 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f62 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933590 gate 1574140923918517900 evaluation succeeds +peer1.org2.example.com | [f63 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f64 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [cca 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ccb 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ccc 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ccd 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [cce 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ccf 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [cd0 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 gate 1574140915346492200 evaluation starts +peer0.org1.example.com | [cd1 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cd2 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [cd3 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 principal matched by identity 0 +peer0.org1.example.com | [cd4 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [cd5 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [cd6 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [cd7 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 gate 1574140915346492200 evaluation succeeds +peer0.org1.example.com | [cd8 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cd9 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cda 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [cdb 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [cdc 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [cdd 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [cde 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [cdf 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [ce0 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ce1 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ccf 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [cd0 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [cd1 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [cd2 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [cd3 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [cd4 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [cd5 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003571b50 gate 1574140915930602100 evaluation starts +peer0.org2.example.com | [cd6 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003571b50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [cd7 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003571b50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [cd8 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003571b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [cd9 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003571b50 principal evaluation fails +peer0.org2.example.com | [cda 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003571b50 gate 1574140915930602100 evaluation fails +peer0.org2.example.com | [cdb 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [cdc 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [cdd 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [cde 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d00c0 gate 1574140915930969700 evaluation starts +peer0.org2.example.com | [cdf 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d00c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ce0 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d00c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [ce1 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d00c0 principal matched by identity 0 +peer0.org2.example.com | [ce2 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer0.org2.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer0.org2.example.com | [ce3 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer0.org2.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer0.org2.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer0.org2.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer0.org2.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer0.org2.example.com | [ce4 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d00c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ce5 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d00c0 gate 1574140915930969700 evaluation succeeds +peer0.org2.example.com | [ce6 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ce7 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ce8 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [ce9 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [cea 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ceb 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [cec 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [ced 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [b68 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b69 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b6a 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [b6b 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [b6c 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +peer1.org1.example.com | 00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +peer1.org1.example.com | [b6d 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +peer1.org1.example.com | 00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +peer1.org1.example.com | 00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +peer1.org1.example.com | 00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +peer1.org1.example.com | 00000040 a4 d1 5d 4b 06 5a |..]K.Z| +peer1.org1.example.com | [b6e 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b6f 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b70 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [b71 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b72 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b73 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b74 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b75 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b76 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b77 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b78 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc710 gate 1574140915946073300 evaluation starts +peer1.org1.example.com | [b79 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc710 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b7a 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc710 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [b7b 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc710 principal matched by identity 0 +peer1.org1.example.com | [b7c 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer1.org1.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer1.org1.example.com | [b7d 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer1.org1.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer1.org1.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer1.org1.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer1.org1.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer1.org1.example.com | [b7e 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b7f 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc710 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b80 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc710 gate 1574140915946073300 evaluation succeeds +peer1.org1.example.com | [b81 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b82 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b83 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b84 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b85 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [b86 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b87 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [b88 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer1.org1.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer1.org1.example.com | [b89 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer1.org1.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer1.org1.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer1.org1.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer1.org1.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer1.org1.example.com | [b8a 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b8b 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b8c 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b8d 11-19 05:21:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b8e 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b8f 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b90 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b91 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b92 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b93 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b94 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b95 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b96 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b97 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b98 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b99 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b9a 11-19 05:21:58.65 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]] +peer1.org1.example.com | [b9b 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [b9c 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [b9d 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [b9e 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b9f 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [ba0 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ba1 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [ba2 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [ba3 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +peer1.org1.example.com | 00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +peer1.org1.example.com | [ba4 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +peer1.org1.example.com | 00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +peer1.org1.example.com | 00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +peer1.org1.example.com | 00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +peer1.org1.example.com | 00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +peer1.org1.example.com | [ba5 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [ba6 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c cb 92 9e 31 1f e2 ca fb cb 78 8d |0D. \...1.....x.| +peer1.org1.example.com | 00000010 14 97 fe 0b 13 7c b5 3c c1 46 27 95 0d 6c aa e8 |.....|.<.F'..l..| +peer1.org1.example.com | 00000020 e7 30 d9 52 02 20 75 a3 57 64 7f fe 59 dc 91 4d |.0.R. u.Wd..Y..M| +peer1.org1.example.com | 00000030 ba 98 4d 3d 13 45 bc 6d 31 c4 5a 29 44 67 c2 0c |..M=.E.m1.Z)Dg..| +peer1.org1.example.com | 00000040 40 2e 43 8b 41 43 |@.C.AC| +peer1.org1.example.com | [ba7 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [ba8 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [ba9 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [baa 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [bab 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [bac 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bad 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bae 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [baf 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bb0 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bb1 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [f65 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [f66 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [f67 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f68 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [f69 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [f6a 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [f6b 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [f6c 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f6d 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f6e 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f6f 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [f70 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f71 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f72 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f73 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [f74 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > alive: alive: alive: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f78 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f79 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f7a 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f7b 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f7c 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [f7d 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [f7e 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [f7f 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [f80 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f81 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f82 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f83 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [f84 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f85 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ce2 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ce3 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ce4 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ce5 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ce6 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ce7 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ce8 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 gate 1574140915351158000 evaluation starts +peer0.org1.example.com | [ce9 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cea 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [ceb 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 principal matched by identity 0 +peer0.org1.example.com | [cec 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [ced 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [cee 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [cef 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 gate 1574140915351158000 evaluation succeeds +peer0.org1.example.com | [cf0 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cf1 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cf2 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [cf3 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [cf4 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cf5 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [cf6 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf7 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf8 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf9 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [cfa 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cfb 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [cee 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [cef 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf0 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf1 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf2 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [cf3 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cf4 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cf5 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cf6 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [cf7 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > alive:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > alive:G\266\331\245hf\272Vt=5v\327mO\002 1\205}\213e\353\247F{\022\030\215z\205g\032z\3239\256U\221w+b~$\004\363\327\304{" > +peer0.org2.example.com | [cf8 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [cf9 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cfa 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [cfb 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cfc 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [cfd 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [cfe 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer0.org2.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer0.org2.example.com | [cff 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer0.org2.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer0.org2.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer0.org2.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer0.org2.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer0.org2.example.com | [d00 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [d01 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 97 d8 e6 f8 19 c6 76 94 5a ed |0E.!........v.Z.| +peer0.org2.example.com | 00000010 0a d0 c1 93 f9 35 01 e0 64 a4 3c 5c 56 b6 7a 2a |.....5..d.<\V.z*| +peer0.org2.example.com | 00000020 66 df 1a 9a 22 02 20 27 a5 41 bf 23 ab 0d cf bb |f...". '.A.#....| +peer0.org2.example.com | 00000030 55 8f 6d 8f cf 29 1f 47 0a b4 f0 ff d5 2f 0b 8e |U.m..).G...../..| +peer0.org2.example.com | 00000040 22 ed 95 d7 50 2c d9 |"...P,.| +peer0.org2.example.com | [d02 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [d03 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [d04 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d05 11-19 05:21:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d06 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d07 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d08 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [d09 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0a 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0b 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f86 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f87 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f88 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f89 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f8a 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [f8b 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [f8c 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [f8d 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [f8e 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f8f 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f90 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f91 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f92 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f93 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [f94 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f95 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [f96 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c39c0 gate 1574140924234101700 evaluation starts +peer1.org2.example.com | [f97 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c39c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f98 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c39c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [f99 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c39c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [f9a 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c39c0 principal evaluation fails +peer1.org2.example.com | [f9b 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c39c0 gate 1574140924234101700 evaluation fails +peer1.org2.example.com | [f9c 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f9d 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f9e 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [f9f 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3f30 gate 1574140924235644300 evaluation starts +peer1.org2.example.com | [fa0 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3f30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fa1 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3f30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [fa2 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3f30 principal matched by identity 0 +peer1.org2.example.com | [fa3 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [fa4 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [bb2 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [bb3 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [bb4 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bb5 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bb6 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [bb7 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bb8 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bb9 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bba 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [bbb 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [bbc 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [bbd 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bbe 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [bbf 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [bc0 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [bc1 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bc2 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bc3 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bc4 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bc5 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bc6 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cfc 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [cfd 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [cfe 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [cff 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 gate 1574140915356399700 evaluation starts +peer0.org1.example.com | [d00 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d01 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [d02 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 principal matched by identity 0 +peer0.org1.example.com | [d03 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [d04 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [d05 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [d06 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 gate 1574140915356399700 evaluation succeeds +peer0.org1.example.com | [d07 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d08 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d09 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d0a 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d0b 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [d0c 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [d0d 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d0e 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d0f 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d10 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d11 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d12 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d13 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d14 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d15 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 gate 1574140915360685800 evaluation starts +peer0.org1.example.com | [d16 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d17 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [d18 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 principal matched by identity 0 +peer0.org1.example.com | [d19 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [d1a 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [d0c 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d0d 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0e 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d0f 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [d10 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d11 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d12 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d13 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d14 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d15 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d16 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d17 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d18 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [d19 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a470 gate 1574140915985567700 evaluation starts +peer0.org2.example.com | [d1a 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a470 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d1b 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a470 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [d1c 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [d1d 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a470 principal evaluation fails +peer0.org2.example.com | [d1e 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a470 gate 1574140915985567700 evaluation fails +peer0.org2.example.com | [d1f 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d20 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d21 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [d22 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a9e0 gate 1574140915986039600 evaluation starts +peer0.org2.example.com | [d23 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a9e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d24 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a9e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [d25 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a9e0 principal matched by identity 0 +peer0.org2.example.com | [d26 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [d27 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [d28 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a9e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [d29 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360a9e0 gate 1574140915986039600 evaluation succeeds +peer0.org2.example.com | [d2a 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d2b 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d2c 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [d2d 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d2e 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [fa5 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3f30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [fa6 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3f30 gate 1574140924235644300 evaluation succeeds +peer1.org2.example.com | [fa7 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa8 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [faa 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fab 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [fa9 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [fac 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fad 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [faf 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [fae 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fb0 11-19 05:22:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [fb1 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [fb2 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fb3 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [fb4 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fb5 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fb6 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [fb7 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fb8 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fb9 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [fba 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [fbb 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [fbc 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c70c0 gate 1574140924243946600 evaluation starts +peer1.org2.example.com | [fbd 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c70c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fbe 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c70c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [fbf 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c70c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [fc0 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c70c0 principal evaluation fails +peer1.org2.example.com | [fc1 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c70c0 gate 1574140924243946600 evaluation fails +peer1.org2.example.com | [fc2 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fc3 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fc4 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [fc5 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c7630 gate 1574140924245168200 evaluation starts +peer1.org2.example.com | [fc6 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c7630 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fc7 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c7630 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [fc8 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c7630 principal matched by identity 0 +peer1.org2.example.com | [fc9 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [fca 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +orderer0.example.com | "2019-11-19 05:22:03.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148.8µs " +orderer0.example.com | "2019-11-19 05:22:03.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2e Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2019-11-19 05:22:03.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d30 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-11-19 05:22:03.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU d31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 44.4µs " +orderer0.example.com | "2019-11-19 05:22:03.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.4µs " +orderer0.example.com | "2019-11-19 05:22:03.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU d32 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:03.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU d33 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:04.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU d34 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:04.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d35 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +orderer0.example.com | "2019-11-19 05:22:04.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d36 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 43.3µs " +orderer0.example.com | "2019-11-19 05:22:04.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d37 Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +orderer0.example.com | "2019-11-19 05:22:04.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d38 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2019-11-19 05:22:04.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78µs " +orderer0.example.com | "2019-11-19 05:22:04.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 36µs " +orderer0.example.com | "2019-11-19 05:22:04.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:04.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:04.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:04.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3e Sending msg of 28 bytes to 3 on channel testchainid took 12.1µs" +orderer0.example.com | "2019-11-19 05:22:04.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.2µs " +orderer0.example.com | "2019-11-19 05:22:04.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d40 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2019-11-19 05:22:04.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d41 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +orderer0.example.com | "2019-11-19 05:22:04.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.3µs " +orderer0.example.com | "2019-11-19 05:22:04.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.3µs " +orderer0.example.com | "2019-11-19 05:22:04.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d44 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:04.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d45 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:05.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d46 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:05.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d47 Sending msg of 28 bytes to 3 on channel testchainid took 26.5µs" +orderer0.example.com | "2019-11-19 05:22:05.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141µs " +orderer0.example.com | "2019-11-19 05:22:05.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d49 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-11-19 05:22:05.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4a Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +orderer0.example.com | "2019-11-19 05:22:05.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.4µs " +orderer0.example.com | "2019-11-19 05:22:05.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.9µs " +orderer0.example.com | "2019-11-19 05:22:05.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:05.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:05.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:05.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.9µs " +orderer0.example.com | "2019-11-19 05:22:05.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d50 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2019-11-19 05:22:05.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d52 Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-11-19 05:22:05.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d53 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [fcb 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c7630 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [fcc 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c7630 gate 1574140924245168200 evaluation succeeds +peer1.org2.example.com | [fcd 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [fce 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [fcf 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [fd0 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [fd1 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [fd2 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [fd3 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fd4 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [fd5 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd6 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd7 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd8 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [fd9 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fda 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fdb 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [fdc 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [fdd 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [fde 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291090 gate 1574140924252506000 evaluation starts +peer1.org2.example.com | [fdf 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fe0 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291090 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [fe1 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [fe2 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291090 principal evaluation fails +peer1.org2.example.com | [fe3 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291090 gate 1574140924252506000 evaluation fails +peer1.org2.example.com | [fe4 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fe5 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fe6 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [fe7 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291600 gate 1574140924255003200 evaluation starts +peer1.org2.example.com | [fe8 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fe9 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291600 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [fea 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291600 principal matched by identity 0 +peer1.org2.example.com | [feb 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [d1b 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [d1c 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 gate 1574140915360685800 evaluation succeeds +peer0.org1.example.com | [d1d 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d1e 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d1f 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d20 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d21 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d22 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [d23 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [d24 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [d25 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [d26 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [d27 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [d28 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d29 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d2a 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d2b 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d2c 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d2d 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d2e 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d2f 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d30 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 gate 1574140915370621600 evaluation starts +peer0.org1.example.com | [d31 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d32 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [d33 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 principal matched by identity 0 +peer0.org1.example.com | [d34 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [d35 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [d36 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [fec 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [fed 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291600 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [fee 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000291600 gate 1574140924255003200 evaluation succeeds +peer1.org2.example.com | [fef 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [ff0 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [ff1 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [ff2 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ff3 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff4 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff5 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ff6 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ff7 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ff8 11-19 05:22:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ff9 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ffa 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [ffb 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314c790 gate 1574140924260992700 evaluation starts +peer1.org2.example.com | [ffc 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314c790 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ffd 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314c790 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [ffe 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314c790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [fff 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314c790 principal evaluation fails +peer1.org2.example.com | [1000 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314c790 gate 1574140924260992700 evaluation fails +peer1.org2.example.com | [1001 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1002 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1003 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1004 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314cd00 gate 1574140924263203700 evaluation starts +peer1.org2.example.com | [1005 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314cd00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1006 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314cd00 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1007 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314cd00 principal matched by identity 0 +peer1.org2.example.com | [1008 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1009 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [100a 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314cd00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [100b 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314cd00 gate 1574140924263203700 evaluation succeeds +peer1.org2.example.com | [100c 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [100d 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [d37 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 gate 1574140915370621600 evaluation succeeds +peer0.org1.example.com | [d38 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d39 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d3a 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d3b 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d3c 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d3d 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d3e 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d3f 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [d40 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d41 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d42 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d43 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [d44 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d45 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [d46 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [d47 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d48 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [d49 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d4a 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d4b 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d4c 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d4d 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [d4e 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [d4f 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [d50 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [d52 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d51 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d53 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d54 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d55 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d56 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d57 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d58 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [d59 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc7 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [bc8 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc9 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [bca 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 61 85 00 69 93 30 56 c1 e1 96 ca 66 c5 fe ec |.a..i.0V....f...| +peer1.org1.example.com | 00000010 58 a1 68 b9 88 f2 07 a4 31 d9 72 e4 4f 32 63 ae |X.h.....1.r.O2c.| +peer1.org1.example.com | [bcb 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 d1 25 7d dc 05 3b 14 b2 84 bb |0E.!...%}..;....| +peer1.org1.example.com | 00000010 4d 8b c8 29 ed 3a 16 02 13 fa 64 f5 05 39 66 9e |M..).:....d..9f.| +peer1.org1.example.com | 00000020 59 5f 5c ba 8d 02 20 69 3c 13 56 6e a0 2b 0f c4 |Y_\... i<.Vn.+..| +peer1.org1.example.com | 00000030 05 94 06 28 48 0e a7 a1 5b ee 4a 95 f6 60 8f d2 |...(H...[.J..`..| +peer1.org1.example.com | 00000040 13 a0 59 34 bb 0f 34 |..Y4..4| +peer1.org1.example.com | [bcc 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bcd 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [bce 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer1.org1.example.com | [bcf 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer1.org1.example.com | [bd0 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer1.org1.example.com | [bd1 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [bd2 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [bd3 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bd4 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [bd5 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [bd6 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bd7 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [bd8 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bd9 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bda 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [bdb 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [bdc 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [bdd 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32ab0 gate 1574140919446939000 evaluation starts +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [d2f 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [d30 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [d31 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [d32 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d33 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d34 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d35 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d36 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d37 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d38 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d39 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [d3a 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c870 gate 1574140915991525300 evaluation starts +peer0.org2.example.com | [d3b 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c870 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d3c 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c870 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [d3d 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [d3e 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c870 principal evaluation fails +peer0.org2.example.com | [d3f 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c870 gate 1574140915991525300 evaluation fails +peer0.org2.example.com | [d40 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d41 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d42 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [d43 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cde0 gate 1574140915991930300 evaluation starts +peer0.org2.example.com | [d44 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cde0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d45 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cde0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [d46 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cde0 principal matched by identity 0 +peer0.org2.example.com | [d47 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [d48 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [d49 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cde0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [d4a 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cde0 gate 1574140915991930300 evaluation succeeds +peer0.org2.example.com | [d4b 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d4c 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [d5a 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d5b 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d5c 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d5d 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d5e 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d5f 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d60 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 gate 1574140915412290300 evaluation starts +peer0.org1.example.com | [d61 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d62 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [d63 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 principal matched by identity 0 +peer0.org1.example.com | [d64 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 08 16 77 fb fb 6d 78 00 54 32 2f bf f4 15 c9 |...w..mx.T2/....| +peer0.org1.example.com | 00000010 ae b3 12 79 db 6f c0 44 d7 7e 72 c1 d3 2e 74 d9 |...y.o.D.~r...t.| +peer0.org1.example.com | [d65 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d c7 65 f0 b9 59 a4 06 7d f3 3b 49 |0D. m.e..Y..}.;I| +peer0.org1.example.com | 00000010 5f 28 4d 19 5e 25 7a 95 a3 6a 1c 4a 43 bf c1 ab |_(M.^%z..j.JC...| +peer0.org1.example.com | 00000020 94 5a 1f 08 02 20 1e f6 dc ce d6 94 f8 b1 b0 36 |.Z... .........6| +peer0.org1.example.com | 00000030 c1 56 e7 a9 e5 ec 2c e1 d9 71 6a 45 e9 dc 92 17 |.V....,..qjE....| +peer0.org1.example.com | 00000040 59 dd b8 17 1e 9c |Y.....| +peer0.org1.example.com | [d66 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [d67 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 gate 1574140915412290300 evaluation succeeds +peer0.org1.example.com | [d68 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d69 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d6a 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d6b 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d6c 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d6d 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [d6e 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [d6f 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [d70 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [d71 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d72 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d73 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d74 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d75 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d76 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d77 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d78 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d79 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d7a 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d7b 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bde 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [bdf 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32ab0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [be0 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32ab0 principal matched by identity 0 +peer1.org1.example.com | [be1 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer1.org1.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer1.org1.example.com | [be2 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer1.org1.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer1.org1.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer1.org1.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer1.org1.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer1.org1.example.com | [be3 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32ab0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [be4 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32ab0 gate 1574140919446939000 evaluation succeeds +peer1.org1.example.com | [be5 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [be6 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [be7 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [be8 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [be9 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [bea 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [beb 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [bec 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [bed 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [bee 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bef 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf0 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf1 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [bf2 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bf3 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bf4 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bf5 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [bf6 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [bf7 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [bf8 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf9 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bfa 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bfb 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [bfc 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [bfd 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [100e 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [100f 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1010 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1011 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1012 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1013 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1014 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1015 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [1016 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1017 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1018 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1019 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [101a 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [101b 11-19 05:22:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [101c 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [101d 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [101e 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [101f 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003180de0 gate 1574140924270621500 evaluation starts +peer1.org2.example.com | [1020 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003180de0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1021 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003180de0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1022 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003180de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1023 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003180de0 principal evaluation fails +peer1.org2.example.com | [1024 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003180de0 gate 1574140924270621500 evaluation fails +peer1.org2.example.com | [1025 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1026 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1027 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1028 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003181350 gate 1574140924272718700 evaluation starts +peer1.org2.example.com | [1029 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003181350 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [102a 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003181350 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [102b 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003181350 principal matched by identity 0 +peer1.org2.example.com | [102c 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:22:05.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " +orderer0.example.com | "2019-11-19 05:22:05.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.9µs " +orderer0.example.com | "2019-11-19 05:22:05.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d56 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:05.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d57 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:06.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d58 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:06.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d59 Sending msg of 28 bytes to 3 on channel testchainid took 11.5µs" +orderer0.example.com | "2019-11-19 05:22:06.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.6µs " +orderer0.example.com | "2019-11-19 05:22:06.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5b Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-11-19 05:22:06.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5d Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-11-19 05:22:06.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.4µs " +orderer0.example.com | "2019-11-19 05:22:06.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.8µs " +orderer0.example.com | "2019-11-19 05:22:06.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:06.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d60 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:06.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d61 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:06.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d62 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2019-11-19 05:22:06.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +orderer0.example.com | "2019-11-19 05:22:06.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d64 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-11-19 05:22:06.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d66 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-11-19 05:22:06.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +orderer0.example.com | "2019-11-19 05:22:06.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.3µs " +orderer0.example.com | "2019-11-19 05:22:06.934 UTC [orderer.common.cluster.step] handleMessage -> DEBU d68 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:06.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d69 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:07.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:07.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6b Sending msg of 28 bytes to 3 on channel testchainid took 11.2µs" +orderer0.example.com | "2019-11-19 05:22:07.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.2µs " +orderer0.example.com | "2019-11-19 05:22:07.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6d Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-11-19 05:22:07.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6f Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-11-19 05:22:07.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.7µs " +orderer0.example.com | "2019-11-19 05:22:07.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.1µs " +orderer0.example.com | "2019-11-19 05:22:07.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d71 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:07.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d72 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:07.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d73 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:07.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d74 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2019-11-19 05:22:07.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.1µs " +orderer0.example.com | "2019-11-19 05:22:07.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d76 Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +orderer0.example.com | "2019-11-19 05:22:07.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d78 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +orderer0.example.com | "2019-11-19 05:22:07.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 46µs " +orderer0.example.com | "2019-11-19 05:22:07.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU d77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.2µs " +peer1.org1.example.com | [bfe 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [bff 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c00 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c01 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c02 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [c03 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [c04 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [c05 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c06 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c07 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [c08 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [c09 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c0a 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c0b 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c0c 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c0d 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c0e 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c0f 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d62520 gate 1574140919665658100 evaluation starts +peer1.org1.example.com | [c10 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d62520 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c11 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d62520 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [c12 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d62520 principal matched by identity 0 +peer1.org1.example.com | [c13 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [c14 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [c15 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d62520 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c16 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d62520 gate 1574140919665658100 evaluation succeeds +peer1.org1.example.com | [c17 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c18 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c19 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c1a 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c1b 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c1c 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d7c 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d7d 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d7e 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d7f 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d80 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d82 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d83 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d84 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [d81 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d85 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d86 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d88 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d87 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d89 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [d8a 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d8b 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d8c 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d8d 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d8e 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d8f 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d90 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [d91 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d92 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d93 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d94 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:07.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:07.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:08.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:08.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7d Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +orderer0.example.com | "2019-11-19 05:22:08.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +orderer0.example.com | "2019-11-19 05:22:08.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-11-19 05:22:08.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d81 Sending msg of 28 bytes to 2 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-11-19 05:22:08.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU d82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.3µs " +orderer0.example.com | "2019-11-19 05:22:08.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.4µs " +orderer0.example.com | "2019-11-19 05:22:08.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d83 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:08.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d84 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:08.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d85 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:08.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-11-19 05:22:08.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.3µs " +orderer0.example.com | "2019-11-19 05:22:08.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d88 Sending msg of 28 bytes to 3 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-11-19 05:22:08.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8a Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +orderer0.example.com | "2019-11-19 05:22:08.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.7µs " +orderer0.example.com | "2019-11-19 05:22:08.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.3µs " +orderer0.example.com | "2019-11-19 05:22:08.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:08.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:09.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:09.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8f Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-11-19 05:22:09.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.3µs " +orderer0.example.com | "2019-11-19 05:22:09.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-11-19 05:22:09.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d92 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-11-19 05:22:09.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " +orderer0.example.com | "2019-11-19 05:22:09.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d94 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:09.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.2µs " +orderer0.example.com | "2019-11-19 05:22:09.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d96 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:09.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:09.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d98 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2019-11-19 05:22:09.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.1µs " +orderer0.example.com | "2019-11-19 05:22:09.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9a Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-11-19 05:22:09.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.1µs " +orderer0.example.com | "2019-11-19 05:22:09.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9c Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-11-19 05:22:09.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +orderer0.example.com | "2019-11-19 05:22:09.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:09.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d4d 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [d4e 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d4f 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d50 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [d51 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [d52 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [d53 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d54 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d55 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d56 11-19 05:21:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [d57 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d58 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d59 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [d5a 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [d5b 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d5c 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d5d 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d5e 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d5f 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d60 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d61 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d62 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [d63 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656790 gate 1574140916006269300 evaluation starts +peer0.org2.example.com | [d64 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656790 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d65 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656790 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [d66 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [d67 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656790 principal evaluation fails +peer0.org2.example.com | [d68 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656790 gate 1574140916006269300 evaluation fails +peer0.org2.example.com | [d69 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d6a 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d6b 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [d6c 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656d00 gate 1574140916006750200 evaluation starts +peer0.org2.example.com | [d6d 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656d00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d6e 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656d00 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [d6f 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656d00 principal matched by identity 0 +peer0.org2.example.com | [d70 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [c1d 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c1e 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c1f 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c20 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c21 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c22 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c23 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d636b0 gate 1574140919669173600 evaluation starts +peer1.org1.example.com | [c25 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d636b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c26 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d636b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [c27 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d636b0 principal matched by identity 0 +peer1.org1.example.com | [c28 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [c29 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [c2a 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d636b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c24 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c2b 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d636b0 gate 1574140919669173600 evaluation succeeds +peer1.org1.example.com | [c2d 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c2e 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c2c 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c30 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [c31 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c2f 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c32 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c33 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c34 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [c35 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [c36 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c37 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [c38 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c39 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:10.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU da0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:10.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel testchainid took 339.3µs" +orderer0.example.com | "2019-11-19 05:22:10.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU da2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +orderer0.example.com | "2019-11-19 05:22:10.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da3 Sending msg of 28 bytes to 2 on channel businesschannel took 39.1µs" +orderer0.example.com | "2019-11-19 05:22:10.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.1µs " +orderer0.example.com | "2019-11-19 05:22:10.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da5 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-11-19 05:22:10.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU da6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 42.5µs " +orderer0.example.com | "2019-11-19 05:22:10.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:10.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU da8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:10.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:10.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 3 on channel testchainid took 12µs" +orderer0.example.com | "2019-11-19 05:22:10.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.3µs " +orderer0.example.com | "2019-11-19 05:22:10.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dac Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-11-19 05:22:10.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dae Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-11-19 05:22:10.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU daf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +orderer0.example.com | "2019-11-19 05:22:10.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.7µs " +orderer0.example.com | "2019-11-19 05:22:10.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU db0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:10.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU db1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:11.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:11.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db3 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-11-19 05:22:11.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.5µs " +orderer0.example.com | "2019-11-19 05:22:11.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-11-19 05:22:11.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db6 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-11-19 05:22:11.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU db7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.5µs " +orderer0.example.com | "2019-11-19 05:22:11.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU db8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.3µs " +orderer0.example.com | "2019-11-19 05:22:11.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU db9 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:11.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU dba Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:11.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:11.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbc Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2019-11-19 05:22:11.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.5µs " +orderer0.example.com | "2019-11-19 05:22:11.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2019-11-19 05:22:11.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbf Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-11-19 05:22:11.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " +orderer0.example.com | "2019-11-19 05:22:11.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.9µs " +orderer0.example.com | "2019-11-19 05:22:11.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:11.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:12.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:12.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc5 Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [d71 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [d72 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656d00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [d73 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656d00 gate 1574140916006750200 evaluation succeeds +peer0.org2.example.com | [d74 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d75 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d76 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [d77 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d78 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [d79 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [d7a 11-19 05:21:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d7b 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [d7c 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d7d 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d7e 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d7f 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d80 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d81 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d82 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d83 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d84 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [d85 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676760 gate 1574140916010913100 evaluation starts +peer0.org2.example.com | [d86 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676760 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d87 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676760 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [d88 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [d89 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676760 principal evaluation fails +peer0.org2.example.com | [d8a 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676760 gate 1574140916010913100 evaluation fails +peer0.org2.example.com | [d8b 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d8c 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d8d 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [d8e 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676cd0 gate 1574140916011460800 evaluation starts +peer0.org2.example.com | [d8f 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676cd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d90 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676cd0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [d91 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676cd0 principal matched by identity 0 +peer1.org1.example.com | [c3a 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c3b 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c3c 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c3d 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c3e 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c3f 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c40 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c41 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c42 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d89230 gate 1574140919676096700 evaluation starts +peer1.org1.example.com | [c43 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d89230 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c44 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d89230 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [c45 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d89230 principal matched by identity 0 +peer1.org1.example.com | [c46 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [c47 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [c48 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d89230 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c49 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [c4a 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c4b 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d89230 gate 1574140919676096700 evaluation succeeds +peer1.org1.example.com | [c4c 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c4d 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c4e 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c4f 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c50 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [c51 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [c52 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [c53 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [c54 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c55 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d95 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d96 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d97 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d98 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 gate 1574140915445375600 evaluation starts +peer0.org1.example.com | [d99 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d9a 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [d9b 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 principal matched by identity 0 +peer0.org1.example.com | [d9c 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +peer0.org1.example.com | 00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +peer0.org1.example.com | [d9d 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +peer0.org1.example.com | 00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +peer0.org1.example.com | 00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +peer0.org1.example.com | 00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +peer0.org1.example.com | 00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +peer0.org1.example.com | [d9e 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [d9f 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 gate 1574140915445375600 evaluation succeeds +peer0.org1.example.com | [da0 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [da1 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [da2 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [da3 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [da4 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [da5 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [da6 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [da7 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [da8 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [da9 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [daa 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dab 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dac 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [dad 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dae 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [daf 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db0 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [db1 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > alive:\204\324aB\001@|\233~\326M\240\321-\026\010`\000]\000?u\273\260\n?\034xI" > +peer0.org1.example.com | [db2 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [db3 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [db4 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d92 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [d93 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [d94 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676cd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [d95 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003676cd0 gate 1574140916011460800 evaluation succeeds +peer0.org2.example.com | [d96 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d97 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d98 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [d99 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d9a 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d9b 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d9c 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d9d 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d9e 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d9f 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [da0 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [da1 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [da2 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003677e60 gate 1574140916016112400 evaluation starts +peer0.org2.example.com | [da3 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003677e60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [da4 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003677e60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [da5 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003677e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [da6 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003677e60 principal evaluation fails +peer0.org2.example.com | [da7 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003677e60 gate 1574140916016112400 evaluation fails +peer0.org2.example.com | [da8 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [da9 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [daa 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [dab 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c3d0 gate 1574140916017611500 evaluation starts +peer0.org2.example.com | [dac 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c3d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [dad 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c3d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [dae 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c3d0 principal matched by identity 0 +peer0.org2.example.com | [daf 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [db0 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [db1 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c3d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [db2 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c3d0 gate 1574140916017611500 evaluation succeeds +peer1.org1.example.com | [c56 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c57 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c58 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c59 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c5a 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c5b 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c5c 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da50c0 gate 1574140919682570600 evaluation starts +peer1.org1.example.com | [c5d 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da50c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c5e 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da50c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [c5f 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da50c0 principal matched by identity 0 +peer1.org1.example.com | [c60 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [c61 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [c62 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da50c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c63 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da50c0 gate 1574140919682570600 evaluation succeeds +peer1.org1.example.com | [c64 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c65 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c66 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c67 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c68 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c69 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [c6a 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c6b 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c6c 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:12.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.5µs " +orderer0.example.com | "2019-11-19 05:22:12.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-11-19 05:22:12.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc8 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2019-11-19 05:22:12.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.8µs " +orderer0.example.com | "2019-11-19 05:22:12.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU dca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +orderer0.example.com | "2019-11-19 05:22:12.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcb Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:12.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcc Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:12.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:12.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dce Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2019-11-19 05:22:12.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.4µs " +orderer0.example.com | "2019-11-19 05:22:12.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd0 Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-11-19 05:22:12.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2019-11-19 05:22:12.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.7µs " +orderer0.example.com | "2019-11-19 05:22:12.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.1µs " +orderer0.example.com | "2019-11-19 05:22:12.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:12.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:13.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:13.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd7 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2019-11-19 05:22:13.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.9µs " +orderer0.example.com | "2019-11-19 05:22:13.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +orderer0.example.com | "2019-11-19 05:22:13.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 3 on channel businesschannel took 139µs" +orderer0.example.com | "2019-11-19 05:22:13.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 646.2µs " +orderer0.example.com | "2019-11-19 05:22:13.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +orderer0.example.com | "2019-11-19 05:22:13.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:13.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU dde Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:13.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:13.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de0 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-11-19 05:22:13.530 UTC [orderer.common.cluster.step] sendMessage -> DEBU de1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " +orderer0.example.com | "2019-11-19 05:22:13.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de2 Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-11-19 05:22:13.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2019-11-19 05:22:13.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU de3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.4µs " +orderer0.example.com | "2019-11-19 05:22:13.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU de4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:13.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.6µs " +orderer0.example.com | "2019-11-19 05:22:13.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU de7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:14.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU de8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:14.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de9 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-11-19 05:22:14.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU dea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.8µs " +orderer0.example.com | "2019-11-19 05:22:14.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU deb Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" +peer0.org1.example.com | [db5 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [db6 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db7 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db8 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [db9 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [dba 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [dbb 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [dbc 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [dbd 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dbe 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [dbf 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [dc0 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [dc1 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [dc2 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dc3 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dc4 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dc5 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dc6 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dc7 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [dc8 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 f6 4a 00 cc 7b 1f 2c 43 72 2a df c4 3c 90 65 |U.J..{.,Cr*..<.e| +peer0.org1.example.com | 00000010 e0 e1 fe ae d3 d8 92 56 78 20 b9 26 64 be a5 71 |.......Vx .&d..q| +peer0.org1.example.com | [dc9 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ad 45 3d 3a e8 d9 2d fb ab 71 |0E.!...E=:..-..q| +peer0.org1.example.com | 00000010 72 7a 60 32 e3 24 aa e2 81 51 47 b6 c8 9f 5a 6d |rz`2.$...QG...Zm| +peer0.org1.example.com | 00000020 d7 03 68 c4 4f 02 20 49 db c7 d7 8f cf 48 d1 16 |..h.O. I.....H..| +peer0.org1.example.com | 00000030 ea 63 c9 6e db 26 e5 12 5e 11 c6 5f 94 3a 03 c6 |.c.n.&..^.._.:..| +peer0.org1.example.com | 00000040 db b2 14 8a 0f ae 3c |......<| +peer0.org1.example.com | [dca 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dcb 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [dcc 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [dcd 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [dce 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [dcf 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dd0 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dd1 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dd2 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dd3 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dd4 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dd5 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [dd6 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dd7 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [db3 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [db4 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [db5 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [db6 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [db7 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [db8 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [db9 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [dba 11-19 05:21:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [dbb 11-19 05:21:56.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dbc 11-19 05:21:56.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [dbd 11-19 05:21:56.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [dbe 11-19 05:21:56.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dbf 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [dc0 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dc1 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dc2 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dc3 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [dc4 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [dc5 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [dc6 11-19 05:21:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dc7 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [dc8 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [dc9 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dca 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dcb 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dcc 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dcd 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dce 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dcf 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [dd0 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dd1 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [dd2 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dd3 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [dd4 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [dd5 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c6d 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c6e 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c6f 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c70 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c71 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c72 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c73 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc64a0 gate 1574140919686373800 evaluation starts +peer1.org1.example.com | [c74 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc64a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c75 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc64a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [c76 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc64a0 principal matched by identity 0 +peer1.org1.example.com | [c77 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [c78 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [c79 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc64a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c7a 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc64a0 gate 1574140919686373800 evaluation succeeds +peer1.org1.example.com | [c7b 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c7c 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c7d 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c7e 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c7f 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [c80 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [c81 11-19 05:21:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c82 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c83 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c84 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c85 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c86 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c87 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c88 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c89 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc7cb0 gate 1574140919695635400 evaluation starts +peer1.org1.example.com | [c8a 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc7cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c8b 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc7cb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [dd6 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [dd7 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [dd8 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [dd9 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [dda 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ddb 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [ddc 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ab590 gate 1574140918842535300 evaluation starts +peer0.org2.example.com | [ddd 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ab590 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [dde 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ab590 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [ddf 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ab590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [de0 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ab590 principal evaluation fails +peer0.org2.example.com | [de1 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ab590 gate 1574140918842535300 evaluation fails +peer0.org2.example.com | [de2 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [de3 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [de4 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [de5 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036abb00 gate 1574140918844880700 evaluation starts +peer0.org2.example.com | [de6 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036abb00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [de7 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036abb00 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [de8 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036abb00 principal matched by identity 0 +peer0.org2.example.com | [de9 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +peer0.org2.example.com | 00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +peer0.org2.example.com | [dea 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +peer0.org2.example.com | 00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +peer0.org2.example.com | 00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +peer0.org2.example.com | 00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +peer0.org2.example.com | 00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +peer0.org2.example.com | [deb 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036abb00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [dec 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036abb00 gate 1574140918844880700 evaluation succeeds +peer0.org2.example.com | [ded 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [dee 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [def 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [df0 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [df1 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [df2 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [df3 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [df4 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [df5 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [df6 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [102d 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [102e 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003181350 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [102f 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003181350 gate 1574140924272718700 evaluation succeeds +peer1.org2.example.com | [1030 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1031 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1032 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1033 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1034 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1035 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1036 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1037 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1038 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1039 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [103a 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [103b 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [103c 11-19 05:22:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [103d 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [103e 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [103f 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1040 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031991e0 gate 1574140924280513900 evaluation starts +peer1.org2.example.com | [1041 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031991e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1042 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031991e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1043 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031991e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1044 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031991e0 principal evaluation fails +peer1.org2.example.com | [1045 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031991e0 gate 1574140924280513900 evaluation fails +peer1.org2.example.com | [1046 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1047 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1048 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1049 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199750 gate 1574140924282412000 evaluation starts +peer1.org2.example.com | [104a 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [104b 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199750 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [dd8 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dd9 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dda 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ddb 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ddc 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ddd 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dde 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ddf 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [de0 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [de1 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [de2 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [de3 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [de4 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [de5 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [de6 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [de7 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [de8 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [de9 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dea 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [deb 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [dec 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ded 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [dee 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [def 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [df0 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [df1 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [df7 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [df8 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [df9 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [dfa 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dfb 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dfc 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dfd 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [dfe 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [dff 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e00 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > alive:G\266\331\245hf\272Vt=5v\327mO\002 1\205}\213e\353\247F{\022\030\215z\205g\032z\3239\256U\221w+b~$\004\363\327\304{" > +peer0.org2.example.com | [e01 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [e02 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e03 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e04 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e05 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e06 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e07 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e08 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [e09 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e0a 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [e0b 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e0c 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [e0d 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [e0e 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer0.org2.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer0.org2.example.com | [e0f 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer0.org2.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer0.org2.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer0.org2.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer0.org2.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer0.org2.example.com | [e10 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [e11 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 9e d8 f3 eb 5c 2f fe 86 21 6e |0E.!......\/..!n| +peer1.org2.example.com | [104c 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199750 principal matched by identity 0 +peer1.org2.example.com | [104d 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [104e 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [104f 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199750 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1050 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199750 gate 1574140924282412000 evaluation succeeds +peer1.org2.example.com | [1051 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1052 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1053 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1054 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1055 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1056 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1057 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1058 11-19 05:22:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1059 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [105a 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [105b 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [105c 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [105d 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [105e 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [105f 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1060 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1061 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1062 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1063 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1064 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330e590 gate 1574140924784924100 evaluation starts +peer1.org2.example.com | [1065 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330e590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1066 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330e590 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1067 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330e590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1068 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330e590 principal evaluation fails +peer1.org2.example.com | [1069 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330e590 gate 1574140924784924100 evaluation fails +peer1.org2.example.com | [106a 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c8c 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc7cb0 principal matched by identity 0 +peer1.org1.example.com | [c8d 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [c8e 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [c8f 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc7cb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c90 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc7cb0 gate 1574140919695635400 evaluation succeeds +peer1.org1.example.com | [c91 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c92 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c93 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c94 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c95 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [c96 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [c97 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c98 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [c99 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [c9a 11-19 05:21:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c9b 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [c9c 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c9d 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [c9e 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [c9f 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 65 9a 72 41 3c 3c 0e 41 65 0a 13 fc c7 b6 9d |.e.rA<<.Ae......| +peer1.org1.example.com | 00000010 b7 db 03 e3 e5 3c 4d 7d 5d c9 56 5c 7c 30 9c 38 |..... DEBU Verify: sig = 00000000 30 45 02 21 00 8c 32 84 9b 04 e6 82 0c 2f 8c 8b |0E.!..2....../..| +peer1.org1.example.com | 00000010 49 13 de 4a 24 b0 c5 88 ae f9 0e 90 df 09 fb a9 |I..J$...........| +peer1.org1.example.com | 00000020 96 62 5c bf 73 02 20 31 54 c9 32 7e 57 1d 69 c1 |.b\.s. 1T.2~W.i.| +peer1.org1.example.com | 00000030 83 0f d3 c4 35 7a c9 64 52 04 31 54 cf d1 33 5d |....5z.dR.1T..3]| +peer1.org1.example.com | 00000040 cc be f2 41 e8 35 65 |...A.5e| +peer1.org1.example.com | [ca1 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ca2 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [ca3 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [ca4 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [ca5 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [ca6 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ca7 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ca8 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ca9 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [caa 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cab 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cac 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [cad 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 89 43 5d 36 81 08 42 f4 9c b3 f7 94 c9 6f 53 c4 |.C]6..B......oS.| +peer0.org2.example.com | 00000020 1f d7 98 72 46 02 20 05 fc 29 4c bf c7 82 25 e8 |...rF. ..)L...%.| +peer0.org2.example.com | 00000030 ba 8a e7 04 b4 8f 73 fe a6 31 c1 0f 2e cc c4 b0 |......s..1......| +peer0.org2.example.com | 00000040 cd 0d eb ab 17 27 68 |.....'h| +peer0.org2.example.com | [e12 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [e13 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [e14 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [e15 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [e16 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [e17 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e18 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e19 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e1a 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [e1b 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e1c 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e1d 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e1e 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [e1f 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e20 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:G\266\331\245hf\272Vt=5v\327mO\002 1\205}\213e\353\247F{\022\030\215z\205g\032z\3239\256U\221w+b~$\004\363\327\304{" > +peer0.org2.example.com | [e21 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [e22 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e23 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e24 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e25 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e26 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e27 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e28 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e29 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [e2a 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e2b 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [e2c 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e2d 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e2e 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [e2f 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e30 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [e31 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5770 gate 1574140919778679900 evaluation starts +peer0.org2.example.com | [e32 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5770 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e33 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5770 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [e34 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [e35 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5770 principal evaluation fails +peer0.org2.example.com | [e36 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5770 gate 1574140919778679900 evaluation fails +peer0.org2.example.com | [e37 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e38 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e39 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [e3a 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5ce0 gate 1574140919784934800 evaluation starts +peer0.org2.example.com | [e3b 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e3c 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5ce0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [e3d 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5ce0 principal matched by identity 0 +peer0.org2.example.com | [e3f 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 65 9a 72 41 3c 3c 0e 41 65 0a 13 fc c7 b6 9d |.e.rA<<.Ae......| +peer0.org2.example.com | 00000010 b7 db 03 e3 e5 3c 4d 7d 5d c9 56 5c 7c 30 9c 38 |..... DEBU Verify: sig = 00000000 30 45 02 21 00 8c 32 84 9b 04 e6 82 0c 2f 8c 8b |0E.!..2....../..| +peer0.org2.example.com | 00000010 49 13 de 4a 24 b0 c5 88 ae f9 0e 90 df 09 fb a9 |I..J$...........| +peer0.org2.example.com | 00000020 96 62 5c bf 73 02 20 31 54 c9 32 7e 57 1d 69 c1 |.b\.s. 1T.2~W.i.| +peer0.org2.example.com | 00000030 83 0f d3 c4 35 7a c9 64 52 04 31 54 cf d1 33 5d |....5z.dR.1T..3]| +peer0.org2.example.com | 00000040 cc be f2 41 e8 35 65 |...A.5e| +peer0.org2.example.com | [e3e 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e41 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5ce0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e42 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5ce0 gate 1574140919784934800 evaluation succeeds +peer0.org2.example.com | [e43 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e44 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e45 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [e46 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e47 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e48 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [e49 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [e4a 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [e4b 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [e4c 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e4d 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e4e 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e4f 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e50 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e51 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e52 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [e53 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [e54 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e55 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e56 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e57 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e58 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e59 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e5a 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [e5b 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e5c 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e5d 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e5e 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e5f 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e60 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e61 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e62 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e63 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [e64 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e65 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [e66 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e67 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e68 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e69 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e6a 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e6b 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e6c 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e6d 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e6e 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [e6f 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e70 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [e71 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e73 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e72 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e74 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [e75 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e76 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [e78 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e77 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e79 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e7a 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [e7b 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [e7c 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e7d 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [e7e 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [e7f 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e80 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [e81 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [e82 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e83 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e84 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151015 +peer0.org2.example.com | [e85 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2CBF11708A167A01C965E56C7EE5B28485EA6C430C62255D949D2C97106E870B +peer0.org2.example.com | [e86 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e87 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [e88 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [e89 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e8a 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e8b 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e8c 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e8d 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e8e 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [e8f 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e90 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [e92 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e91 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [e93 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e94 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [e95 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e96 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [e97 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [e98 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c bf 11 70 8a 16 7a 01 c9 65 e5 6c 7e e5 b2 84 |,..p..z..e.l~...| +peer0.org2.example.com | 00000010 85 ea 6c 43 0c 62 25 5d 94 9d 2c 97 10 6e 87 0b |..lC.b%]..,..n..| +peer0.org2.example.com | [e99 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7e 3c 34 08 c3 85 e5 98 45 15 |0E.!..~<4.....E.| +peer0.org2.example.com | 00000010 26 9c 6b 76 29 0e 08 ac 9c a1 f1 f7 c9 4d 77 91 |&.kv)........Mw.| +peer0.org2.example.com | 00000020 c0 72 e4 8f bc 02 20 3b e5 61 fa 2e 3f db 7a 82 |.r.... ;.a..?.z.| +peer0.org2.example.com | 00000030 51 98 4d 9b 47 7b 5e b6 da 14 89 2f 63 06 ac 9f |Q.M.G{^..../c...| +peer0.org2.example.com | 00000040 7a f5 f3 de 42 43 07 |z...BC.| +peer0.org2.example.com | [e9a 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [e9b 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 46 ae 31 8e 0f 4d 7e 6b ad c0 ba |0D. .F.1..M~k...| +peer0.org2.example.com | 00000010 d6 99 95 5b 26 0a dd bd 0a 37 99 40 94 b1 cc 86 |...[&....7.@....| +peer0.org2.example.com | 00000020 da b6 fe bd 02 20 24 27 33 46 6a c7 c0 dc 9c aa |..... $'3Fj.....| +peer0.org2.example.com | 00000030 43 68 fe 4d b9 02 f8 d8 3c a1 80 e4 3d c3 60 91 |Ch.M....<...=.`.| +peer0.org2.example.com | 00000040 74 24 51 ba 43 76 |t$Q.Cv| +peer0.org2.example.com | [e9c 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [e9d 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [e9e 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e9f 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ea0 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [ea1 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ea2 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [ea3 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [ea4 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ea5 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [ea6 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ea7 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ea8 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ea9 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [eaa 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [eab 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376ceb0 gate 1574140919873994300 evaluation starts +peer0.org2.example.com | [eac 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376ceb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ead 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376ceb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [eae 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376ceb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [eaf 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376ceb0 principal evaluation fails +peer0.org2.example.com | [eb0 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376ceb0 gate 1574140919873994300 evaluation fails +peer0.org2.example.com | [eb1 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [eb2 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [eb3 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [eb4 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376d420 gate 1574140919874453100 evaluation starts +peer0.org2.example.com | [eb5 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376d420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [eb6 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376d420 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [eb7 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376d420 principal matched by identity 0 +peer0.org2.example.com | [eb8 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer0.org2.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer0.org2.example.com | [eb9 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer0.org2.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer0.org2.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer0.org2.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer0.org2.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer0.org2.example.com | [eba 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376d420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ebb 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376d420 gate 1574140919874453100 evaluation succeeds +peer0.org2.example.com | [ebc 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ebd 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ebe 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [ebf 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ec0 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ec1 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ec2 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [ec3 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c bf 11 70 8a 16 7a 01 c9 65 e5 6c 7e e5 b2 84 |,..p..z..e.l~...| +peer0.org2.example.com | 00000010 85 ea 6c 43 0c 62 25 5d 94 9d 2c 97 10 6e 87 0b |..lC.b%]..,..n..| +peer0.org2.example.com | [ec4 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7e 3c 34 08 c3 85 e5 98 45 15 |0E.!..~<4.....E.| +peer0.org2.example.com | 00000010 26 9c 6b 76 29 0e 08 ac 9c a1 f1 f7 c9 4d 77 91 |&.kv)........Mw.| +peer0.org2.example.com | 00000020 c0 72 e4 8f bc 02 20 3b e5 61 fa 2e 3f db 7a 82 |.r.... ;.a..?.z.| +peer0.org2.example.com | 00000030 51 98 4d 9b 47 7b 5e b6 da 14 89 2f 63 06 ac 9f |Q.M.G{^..../c...| +peer0.org2.example.com | 00000040 7a f5 f3 de 42 43 07 |z...BC.| +peer0.org2.example.com | [ec5 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ec6 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ec7 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ec8 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [ec9 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [eca 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer0.org2.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer0.org2.example.com | [ecb 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer0.org2.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer0.org2.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer0.org2.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer0.org2.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer0.org2.example.com | [ecc 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ecd 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ece 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ecf 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [ed0 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [cae 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [caf 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [cb0 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cb1 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [cb2 11-19 05:21:59.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cb3 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [cb4 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [cb5 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [cb7 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [cb8 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [cb6 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [cb9 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [cbb 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [cbc 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cbd 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [cbe 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cba 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cbf 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc0 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc1 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cc2 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc3 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc4 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc5 11-19 05:21:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cc6 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [cc7 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:14.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +orderer0.example.com | "2019-11-19 05:22:14.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ded Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.8µs " +orderer0.example.com | "2019-11-19 05:22:14.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU dee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.3µs " +orderer0.example.com | "2019-11-19 05:22:14.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU def Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:14.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU df0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:14.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:14.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df2 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +orderer0.example.com | "2019-11-19 05:22:14.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU df3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.8µs " +orderer0.example.com | "2019-11-19 05:22:14.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 28 bytes to 2 on channel businesschannel took 21.5µs" +orderer0.example.com | "2019-11-19 05:22:14.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2019-11-19 05:22:14.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 477.8µs " +orderer0.example.com | "2019-11-19 05:22:14.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280.6µs " +orderer0.example.com | "2019-11-19 05:22:14.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU df8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:14.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU df9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:15.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:15.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfb Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-11-19 05:22:15.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.7µs " +orderer0.example.com | "2019-11-19 05:22:15.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfd Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-11-19 05:22:15.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-11-19 05:22:15.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU dff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 306.1µs " +orderer0.example.com | "2019-11-19 05:22:15.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 228µs " +orderer0.example.com | "2019-11-19 05:22:15.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e01 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:15.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e02 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:15.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:15.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e04 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2019-11-19 05:22:15.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU e05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " +orderer0.example.com | "2019-11-19 05:22:15.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e06 Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +orderer0.example.com | "2019-11-19 05:22:15.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-11-19 05:22:15.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +orderer0.example.com | "2019-11-19 05:22:15.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs " +orderer0.example.com | "2019-11-19 05:22:15.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:15.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:16.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:16.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0d Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +orderer0.example.com | "2019-11-19 05:22:16.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.1µs " +orderer0.example.com | "2019-11-19 05:22:16.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0f Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +orderer0.example.com | "2019-11-19 05:22:16.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +orderer0.example.com | "2019-11-19 05:22:16.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.7µs " +orderer0.example.com | "2019-11-19 05:22:16.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114µs " +orderer0.example.com | "2019-11-19 05:22:16.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e13 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:16.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:16.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:16.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e16 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2019-11-19 05:22:16.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU e17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.3µs " +orderer0.example.com | "2019-11-19 05:22:16.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e18 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-11-19 05:22:16.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-11-19 05:22:16.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 276.7µs " +orderer0.example.com | "2019-11-19 05:22:16.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.6µs " +orderer0.example.com | "2019-11-19 05:22:16.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:16.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:17.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:17.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1f Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2019-11-19 05:22:17.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU e20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.8µs " +orderer0.example.com | "2019-11-19 05:22:17.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e21 Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +orderer0.example.com | "2019-11-19 05:22:17.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-11-19 05:22:17.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +orderer0.example.com | "2019-11-19 05:22:17.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.5µs " +orderer0.example.com | "2019-11-19 05:22:17.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e25 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:17.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:17.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:17.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e28 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +orderer0.example.com | "2019-11-19 05:22:17.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU e29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +orderer0.example.com | "2019-11-19 05:22:17.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2a Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-11-19 05:22:17.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 3 on channel businesschannel took 119.8µs" +orderer0.example.com | "2019-11-19 05:22:17.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.9µs " +orderer0.example.com | "2019-11-19 05:22:17.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101µs " +orderer0.example.com | "2019-11-19 05:22:17.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:17.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:18.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:18.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e31 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2019-11-19 05:22:18.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU e32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.3µs " +orderer0.example.com | "2019-11-19 05:22:18.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2019-11-19 05:22:18.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2019-11-19 05:22:18.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e35 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.6µs " +orderer0.example.com | "2019-11-19 05:22:18.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 723.3µs " +orderer0.example.com | "2019-11-19 05:22:18.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e37 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:18.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:18.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:18.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3a Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-11-19 05:22:18.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.7µs " +orderer0.example.com | "2019-11-19 05:22:18.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +orderer0.example.com | "2019-11-19 05:22:18.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +orderer0.example.com | "2019-11-19 05:22:18.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +orderer0.example.com | "2019-11-19 05:22:18.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.3µs " +orderer0.example.com | "2019-11-19 05:22:18.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU e40 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:18.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:19.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:19.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e43 Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +orderer0.example.com | "2019-11-19 05:22:19.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU e44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120µs " +orderer0.example.com | "2019-11-19 05:22:19.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e45 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-11-19 05:22:19.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e47 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-11-19 05:22:19.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +orderer0.example.com | "2019-11-19 05:22:19.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.6µs " +orderer0.example.com | "2019-11-19 05:22:19.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e49 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:19.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:19.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:19.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4c Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +orderer0.example.com | "2019-11-19 05:22:19.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.9µs " +orderer0.example.com | "2019-11-19 05:22:19.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4e Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +orderer0.example.com | "2019-11-19 05:22:19.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-11-19 05:22:19.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.8µs " +orderer0.example.com | "2019-11-19 05:22:19.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80µs " +orderer0.example.com | "2019-11-19 05:22:19.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e52 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:19.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU e53 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:20.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU e54 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:20.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e55 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +orderer0.example.com | "2019-11-19 05:22:20.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU e56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +orderer0.example.com | "2019-11-19 05:22:20.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e57 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +orderer0.example.com | "2019-11-19 05:22:20.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 2 on channel businesschannel took 14µs" +orderer0.example.com | "2019-11-19 05:22:20.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54µs " +orderer0.example.com | "2019-11-19 05:22:20.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +orderer0.example.com | "2019-11-19 05:22:20.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:20.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:20.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:20.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5e Sending msg of 28 bytes to 3 on channel testchainid took 97.1µs" +peer0.org1.example.com | [df2 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [df3 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [df4 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [df5 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [df6 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [df7 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [df8 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 gate 1574140915832962900 evaluation starts +peer0.org1.example.com | [df9 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [dfa 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [dfb 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 principal matched by identity 0 +peer0.org1.example.com | [dfc 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3f 7c f1 9a ee 25 79 35 df 74 e5 d3 53 0a 15 |.?|...%y5.t..S..| +peer0.org1.example.com | 00000010 07 6d 27 19 e6 08 67 9a 5b 31 ab df dc c4 ef 6b |.m'...g.[1.....k| +peer0.org1.example.com | [dfd 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 d1 da 29 17 ed a1 99 9d b1 88 d0 |0D. P..)........| +peer0.org1.example.com | 00000010 6a 4c 2e ef 3e 47 b6 d9 a5 68 66 ba 56 74 3d 35 |jL..>G...hf.Vt=5| +peer0.org1.example.com | 00000020 76 d7 6d 4f 02 20 31 85 7d 8b 65 eb a7 46 7b 12 |v.mO. 1.}.e..F{.| +peer0.org1.example.com | 00000030 18 8d 7a 85 67 1a 7a d3 39 ae 55 91 77 2b 62 7e |..z.g.z.9.U.w+b~| +peer0.org1.example.com | 00000040 24 04 f3 d7 c4 7b |$....{| +peer0.org1.example.com | [dfe 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [dff 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 gate 1574140915832962900 evaluation succeeds +peer0.org1.example.com | [e00 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e01 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e02 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [e03 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [e04 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e05 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [e06 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [e07 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [e08 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e09 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [e0a 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [e0b 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e0c 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e0d 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e0e 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e0f 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [e10 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [e11 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [106b 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [106c 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [106d 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330eb00 gate 1574140924786644600 evaluation starts +peer1.org2.example.com | [106e 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330eb00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [106f 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330eb00 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1070 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330eb00 principal matched by identity 0 +peer1.org2.example.com | [1071 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 f0 36 67 b5 a7 8f 67 3a 5c 02 28 70 8e 5a 96 |..6g...g:\.(p.Z.| +peer1.org2.example.com | 00000010 2b 8f db bd a7 87 a0 f7 b9 f9 b9 cc 66 38 16 c2 |+...........f8..| +peer1.org2.example.com | [1072 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 b2 a7 64 54 3c b6 ed 23 55 99 |0E.!....dT<..#U.| +peer1.org2.example.com | 00000010 9c b3 1e b9 89 69 01 2b af 62 ec f1 34 34 db ed |.....i.+.b..44..| +peer1.org2.example.com | 00000020 75 64 58 86 b3 02 20 6e 9e 9e 03 12 6b 39 43 95 |udX... n....k9C.| +peer1.org2.example.com | 00000030 f8 9d 51 b3 9d 13 5b 36 22 de 2a 3f f8 95 96 21 |..Q...[6".*?...!| +peer1.org2.example.com | 00000040 1a 00 91 45 29 f8 85 |...E)..| +peer1.org2.example.com | [1073 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330eb00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1074 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330eb00 gate 1574140924786644600 evaluation succeeds +peer1.org2.example.com | [1075 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1076 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1077 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1078 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1079 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [107a 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [107b 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [107c 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [107d 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [107e 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [107f 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1080 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1081 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1082 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1083 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1084 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1085 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1086 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1087 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1088 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1089 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [108a 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [108b 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [108c 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [108d 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [108e 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [108f 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1090 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1091 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1092 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1093 11-19 05:22:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1094 11-19 05:22:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1095 11-19 05:22:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1096 11-19 05:22:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1097 11-19 05:22:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1098 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer1.org2.example.com | [1099 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [109a 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +peer1.org2.example.com | [109b 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [109c 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [109d 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 af 7e e8 8b ff c9 71 00 72 d5 f2 1c 2d 24 e4 |6.~....q.r...-$.| +peer1.org2.example.com | 00000010 2f bb 00 52 db 87 90 a3 99 16 9e 0e 10 4c 77 95 |/..R.........Lw.| +peer1.org2.example.com | [109e 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 d7 2b 86 2d 63 38 14 0e ee 01 a0 |0D. p.+.-c8.....| +peer1.org2.example.com | 00000010 ef eb 2f e2 29 bf 06 ec 8a eb 25 c8 bd 09 75 06 |../.).....%...u.| +peer1.org2.example.com | 00000020 0b 98 a9 fb 02 20 25 41 c1 71 23 0c b4 b8 6d ec |..... %A.q#...m.| +peer1.org2.example.com | 00000030 1a 63 53 c5 7d 7f a5 b5 a9 8d cb e2 61 97 64 2d |.cS.}.......a.d-| +peer1.org2.example.com | 00000040 cd ad a3 d1 3f a8 |....?.| +peer1.org2.example.com | [109f 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10a0 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [10a1 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [10a2 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [10a3 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15101A +peer1.org2.example.com | [10a4 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8C604F19691E5913B79C6F4CCBE46BEE68BDAD42E215F115B0462456F1B61B92 +peer1.org2.example.com | [10a5 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [10a6 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [10a7 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [10a8 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [10a9 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10aa 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ab 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ac 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [10ad 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ae 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [10af 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [10b0 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10b1 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10b2 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10b3 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10b4 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10b5 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10b6 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10b7 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10b8 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10b9 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [10ba 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10bb 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [10bc 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10bd 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10be 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [10bf 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [10c0 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [10c1 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330b700 gate 1574140925821092200 evaluation starts +peer1.org2.example.com | [10c2 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330b700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10c3 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330b700 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [10c4 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330b700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [10c5 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330b700 principal evaluation fails +peer1.org2.example.com | [10c6 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330b700 gate 1574140925821092200 evaluation fails +peer1.org2.example.com | [10c7 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10c8 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10c9 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [10ca 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330bc70 gate 1574140925822313300 evaluation starts +peer1.org2.example.com | [10cb 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330bc70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10cc 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330bc70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [10cd 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330bc70 principal matched by identity 0 +peer1.org2.example.com | [10ce 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 ee 66 4f d5 e3 fa a9 25 93 b2 89 75 fa 35 6d |..fO....%...u.5m| +peer1.org2.example.com | 00000010 78 38 b0 71 b7 14 c3 6e aa f8 0d dc 62 0a 76 45 |x8.q...n....b.vE| +peer1.org2.example.com | [10cf 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 49 c7 ff 73 b1 2e 2c cf cd 58 74 |0D. 6I..s..,..Xt| +peer1.org2.example.com | 00000010 09 e1 b0 7e a2 f2 e9 1d dc b3 33 82 7b c3 0a 25 |...~......3.{..%| +peer1.org2.example.com | 00000020 2c 7a df a7 02 20 53 b7 9a 15 de 7a 8e 69 a1 ac |,z... S....z.i..| +peer1.org2.example.com | 00000030 31 cb 62 55 50 cd b5 1d d3 c4 ad 6e db 59 e5 e8 |1.bUP......n.Y..| +peer1.org2.example.com | 00000040 3a 4b 1a 97 be 08 |:K....| +peer1.org2.example.com | [10d0 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330bc70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [10d1 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330bc70 gate 1574140925822313300 evaluation succeeds +peer1.org2.example.com | [10d2 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10d3 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10d4 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [10d5 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:20.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +orderer0.example.com | "2019-11-19 05:22:20.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e60 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-11-19 05:22:20.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e61 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2019-11-19 05:22:20.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +orderer0.example.com | "2019-11-19 05:22:20.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.7µs " +orderer0.example.com | "2019-11-19 05:22:20.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU e64 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:20.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e65 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:21.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:21.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e67 Sending msg of 28 bytes to 3 on channel testchainid took 69.2µs" +orderer0.example.com | "2019-11-19 05:22:21.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU e68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.1µs " +orderer0.example.com | "2019-11-19 05:22:21.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-11-19 05:22:21.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6a Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-11-19 05:22:21.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.4µs " +orderer0.example.com | "2019-11-19 05:22:21.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60µs " +orderer0.example.com | "2019-11-19 05:22:21.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:21.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:21.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:21.546 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e70 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-11-19 05:22:21.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU e71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +orderer0.example.com | "2019-11-19 05:22:21.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-11-19 05:22:21.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e73 Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +orderer0.example.com | "2019-11-19 05:22:21.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU e74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.6µs " +orderer0.example.com | "2019-11-19 05:22:21.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.8µs " +orderer0.example.com | "2019-11-19 05:22:21.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU e76 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:21.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU e77 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:22.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:22.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e79 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +orderer0.example.com | "2019-11-19 05:22:22.030 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 593.5µs " +orderer0.example.com | "2019-11-19 05:22:22.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 2 on channel businesschannel took 22.9µs" +orderer0.example.com | "2019-11-19 05:22:22.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7c Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-11-19 05:22:22.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.9µs " +orderer0.example.com | "2019-11-19 05:22:22.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.8µs " +orderer0.example.com | "2019-11-19 05:22:22.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [10d6 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10d7 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [10d8 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [10d9 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [10da 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [10db 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10dc 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10dd 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10de 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10df 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e0 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e1 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e2 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e3 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e4 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [10e5 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e6 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10e7 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10e8 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e9 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [10ea 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10eb 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10ec 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10ed 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10ee 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10ef 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10f0 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10f1 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10f2 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10f3 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10f4 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10f5 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [10f6 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10f7 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 98 11 19 da 40 a9 16 e9 f9 72 f9 b0 11 0d 2d |7....@....r....-| +peer1.org2.example.com | 00000010 ec f7 3e 4f 9c 86 01 65 d4 25 07 6c 9a 14 80 de |..>O...e.%.l....| +peer1.org2.example.com | [10f8 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 d9 e9 99 b7 22 41 0d 07 ef 4c |0E.!......"A...L| +peer1.org2.example.com | 00000010 37 ba 4f 64 ba d8 cd 10 f5 14 cf 72 75 d6 3a bc |7.Od.......ru.:.| +peer1.org1.example.com | [cc8 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [cc9 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cca 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ccc 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ccb 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [ccd 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [cce 11-19 05:21:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ccf 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [cd0 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [cd1 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cd2 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [cd3 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cd4 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [cd5 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [cd6 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [cd7 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cd8 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cd9 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cda 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cdb 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cdc 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cdd 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [cde 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cdf 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [ce0 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [ce1 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ce2 11-19 05:21:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [ce3 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [ce4 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ed1 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c bf 11 70 8a 16 7a 01 c9 65 e5 6c 7e e5 b2 84 |,..p..z..e.l~...| +peer0.org2.example.com | 00000010 85 ea 6c 43 0c 62 25 5d 94 9d 2c 97 10 6e 87 0b |..lC.b%]..,..n..| +peer0.org2.example.com | [ed2 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7e 3c 34 08 c3 85 e5 98 45 15 |0E.!..~<4.....E.| +peer0.org2.example.com | 00000010 26 9c 6b 76 29 0e 08 ac 9c a1 f1 f7 c9 4d 77 91 |&.kv)........Mw.| +peer0.org2.example.com | 00000020 c0 72 e4 8f bc 02 20 3b e5 61 fa 2e 3f db 7a 82 |.r.... ;.a..?.z.| +peer0.org2.example.com | 00000030 51 98 4d 9b 47 7b 5e b6 da 14 89 2f 63 06 ac 9f |Q.M.G{^..../c...| +peer0.org2.example.com | 00000040 7a f5 f3 de 42 43 07 |z...BC.| +peer0.org2.example.com | [ed3 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ed4 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ed6 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ed7 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [ed5 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ed8 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer0.org2.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer0.org2.example.com | [ed9 11-19 05:21:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer0.org2.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer0.org2.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer0.org2.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer0.org2.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer0.org2.example.com | [eda 11-19 05:21:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [edb 11-19 05:21:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [edc 11-19 05:21:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [edd 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [ede 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [edf 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [ee0 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [ee1 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ee2 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [ee3 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 cc 74 14 3c 67 02 20 6e c0 d9 ce d6 4d 61 39 5f |.t. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10fa 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [10fb 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [10fc 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [10fd 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [10fe 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10ff 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1100 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1101 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1103 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1102 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1104 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1105 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1106 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1107 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1108 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1109 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [110a 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [110c 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [110d 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [110b 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [110e 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [110f 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1110 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1111 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1112 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1113 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1114 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1115 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1116 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1117 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1118 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1119 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [111a 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [111b 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [111c 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [111d 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e12 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [e13 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e14 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e15 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e16 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e17 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e18 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e19 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e1a 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e1b 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e1c 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [e1d 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e1e 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [e1f 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e20 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e21 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e22 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e23 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e24 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e25 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [e26 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [e27 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [e28 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 gate 1574140915867869600 evaluation starts +peer0.org1.example.com | [e29 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [e2a 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [e2b 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 principal matched by identity 0 +peer0.org1.example.com | [e2c 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer0.org1.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer0.org1.example.com | [e2d 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer0.org1.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer0.org1.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer0.org1.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer0.org1.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer0.org1.example.com | [e2e 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [e2f 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 gate 1574140915867869600 evaluation succeeds +peer0.org1.example.com | [e30 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e31 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e32 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ce5 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ce6 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ce7 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ce8 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [ce9 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [cea 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ceb 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfda40 gate 1574140919856173800 evaluation starts +peer1.org1.example.com | [cec 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfda40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ced 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfda40 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [cee 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfda40 principal matched by identity 0 +peer1.org1.example.com | [cef 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c bf 11 70 8a 16 7a 01 c9 65 e5 6c 7e e5 b2 84 |,..p..z..e.l~...| +peer1.org1.example.com | 00000010 85 ea 6c 43 0c 62 25 5d 94 9d 2c 97 10 6e 87 0b |..lC.b%]..,..n..| +peer1.org1.example.com | [cf0 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7e 3c 34 08 c3 85 e5 98 45 15 |0E.!..~<4.....E.| +peer1.org1.example.com | 00000010 26 9c 6b 76 29 0e 08 ac 9c a1 f1 f7 c9 4d 77 91 |&.kv)........Mw.| +peer1.org1.example.com | 00000020 c0 72 e4 8f bc 02 20 3b e5 61 fa 2e 3f db 7a 82 |.r.... ;.a..?.z.| +peer1.org1.example.com | 00000030 51 98 4d 9b 47 7b 5e b6 da 14 89 2f 63 06 ac 9f |Q.M.G{^..../c...| +peer1.org1.example.com | 00000040 7a f5 f3 de 42 43 07 |z...BC.| +peer1.org1.example.com | [cf1 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfda40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [cf2 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfda40 gate 1574140919856173800 evaluation succeeds +peer1.org1.example.com | [cf3 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cf4 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cf5 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [cf6 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [cf7 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [cf8 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [cf9 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [cfa 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [cfb 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [cfc 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cfd 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cfe 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [cff 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d00 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d01 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d02 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d03 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [111e 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [111f 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1120 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1121 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1122 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1123 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1124 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1125 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1126 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1127 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1128 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1129 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [112a 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [112b 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e870 gate 1574140926852333500 evaluation starts +peer1.org2.example.com | [112c 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [112d 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e870 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [112e 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [112f 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e870 principal evaluation fails +peer1.org2.example.com | [1130 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e870 gate 1574140926852333500 evaluation fails +peer1.org2.example.com | [1131 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1132 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1133 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1134 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ede0 gate 1574140926858205600 evaluation starts +peer1.org2.example.com | [1135 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ede0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1136 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ede0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1137 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ede0 principal matched by identity 0 +peer1.org2.example.com | [1138 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer1.org2.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer1.org2.example.com | [1139 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer1.org2.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer1.org2.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer1.org2.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +orderer0.example.com | "2019-11-19 05:22:22.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e80 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:22.531 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:22.531 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e82 Sending msg of 28 bytes to 3 on channel testchainid took 103.9µs" +orderer0.example.com | "2019-11-19 05:22:22.532 UTC [orderer.common.cluster.step] sendMessage -> DEBU e83 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.7µs " +orderer0.example.com | "2019-11-19 05:22:22.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e84 Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +orderer0.example.com | "2019-11-19 05:22:22.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e85 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +orderer0.example.com | "2019-11-19 05:22:22.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 519.3µs " +orderer0.example.com | "2019-11-19 05:22:22.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU e87 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:22.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.1µs " +orderer0.example.com | "2019-11-19 05:22:22.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU e89 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:23.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:23.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8b Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-11-19 05:22:23.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.2µs " +orderer0.example.com | "2019-11-19 05:22:23.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8d Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +orderer0.example.com | "2019-11-19 05:22:23.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-11-19 05:22:23.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.4µs " +orderer0.example.com | "2019-11-19 05:22:23.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e91 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:23.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.4µs " +orderer0.example.com | "2019-11-19 05:22:23.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU e92 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:23.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:23.530 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e94 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2019-11-19 05:22:23.531 UTC [orderer.common.cluster.step] sendMessage -> DEBU e95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.6µs " +orderer0.example.com | "2019-11-19 05:22:23.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e96 Sending msg of 28 bytes to 3 on channel businesschannel took 29.8µs" +orderer0.example.com | "2019-11-19 05:22:23.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e97 Sending msg of 28 bytes to 2 on channel businesschannel took 123.6µs" +orderer0.example.com | "2019-11-19 05:22:23.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216µs " +orderer0.example.com | "2019-11-19 05:22:23.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.2µs " +orderer0.example.com | "2019-11-19 05:22:23.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:23.907 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:24.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:24.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9d Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2019-11-19 05:22:24.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.8µs " +orderer0.example.com | "2019-11-19 05:22:24.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9f Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +orderer0.example.com | "2019-11-19 05:22:24.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea0 Sending msg of 28 bytes to 3 on channel businesschannel took 29µs" +orderer0.example.com | "2019-11-19 05:22:24.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.2µs " +orderer0.example.com | "2019-11-19 05:22:24.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.9µs " +orderer0.example.com | "2019-11-19 05:22:24.404 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:24.404 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:24.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:24.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +peer0.org2.example.com | [ee4 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ee5 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ee6 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ee7 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [ee8 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f6b0 gate 1574140919902532800 evaluation starts +peer0.org2.example.com | [ee9 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f6b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [eea 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f6b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [eeb 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [eec 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f6b0 principal evaluation fails +peer0.org2.example.com | [eed 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f6b0 gate 1574140919902532800 evaluation fails +peer0.org2.example.com | [eee 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [eef 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ef0 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [ef1 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374fc20 gate 1574140919903838100 evaluation starts +peer0.org2.example.com | [ef2 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374fc20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ef3 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374fc20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [ef4 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374fc20 principal matched by identity 0 +peer0.org2.example.com | [ef5 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 11 8b 08 45 f7 ca ad 60 ac 50 0d 92 c3 85 9f |....E...`.P.....| +peer0.org2.example.com | 00000010 6d fe 9c a9 48 42 9c 73 0d 80 28 67 b3 b5 8a 94 |m...HB.s..(g....| +peer0.org2.example.com | [ef6 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 cf ee a7 76 61 c8 3a e3 1f ad |0E.!.....va.:...| +peer0.org2.example.com | 00000010 21 a4 83 72 5e d9 37 cb 84 01 6b a6 fb 3e a4 35 |!..r^.7...k..>.5| +peer0.org2.example.com | 00000020 64 50 3a 36 58 02 20 70 81 9c a5 e5 28 32 ea 65 |dP:6X. p....(2.e| +peer0.org2.example.com | 00000030 3a 7c c5 a2 52 c7 51 6c 86 0c 72 d6 5a 7b a2 9c |:|..R.Ql..r.Z{..| +peer0.org2.example.com | 00000040 ae 6b 3c 57 cc 18 19 |.k DEBU 0xc00374fc20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ef8 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374fc20 gate 1574140919903838100 evaluation succeeds +peer0.org2.example.com | [ef9 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [efa 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [efb 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [efc 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [efd 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [efe 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [eff 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [f00 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [f01 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [f02 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f03 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f04 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f05 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [f06 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f07 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f08 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f09 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer1.org2.example.com | [113a 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ede0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [113b 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ede0 gate 1574140926858205600 evaluation succeeds +peer1.org2.example.com | [113c 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [113d 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [113e 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [113f 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1140 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1141 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1142 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1143 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1144 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1145 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1146 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1147 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1148 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [1149 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [114a 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [114b 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [114c 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [114d 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [114e 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [114f 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1150 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1151 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1152 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1153 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1154 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1155 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1156 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1157 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1158 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1159 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [115a 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [115b 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [115c 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:24.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53µs " +orderer0.example.com | "2019-11-19 05:22:24.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea8 Sending msg of 28 bytes to 2 on channel businesschannel took 40µs" +orderer0.example.com | "2019-11-19 05:22:24.903 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel businesschannel took 85.1µs" +orderer0.example.com | "2019-11-19 05:22:24.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.1µs " +orderer0.example.com | "2019-11-19 05:22:24.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.2µs " +orderer0.example.com | "2019-11-19 05:22:24.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU eac Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:24.906 UTC [orderer.common.cluster.step] handleMessage -> DEBU ead Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:25.029 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:25.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaf Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-11-19 05:22:25.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " +orderer0.example.com | "2019-11-19 05:22:25.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb1 Sending msg of 28 bytes to 2 on channel businesschannel took 28.8µs" +orderer0.example.com | "2019-11-19 05:22:25.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-11-19 05:22:25.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb4 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:25.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 267.6µs " +orderer0.example.com | "2019-11-19 05:22:25.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +orderer0.example.com | "2019-11-19 05:22:25.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:25.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:25.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb8 Sending msg of 28 bytes to 3 on channel testchainid took 89.3µs" +orderer0.example.com | "2019-11-19 05:22:25.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56µs " +orderer0.example.com | "2019-11-19 05:22:25.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eba Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +orderer0.example.com | "2019-11-19 05:22:25.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebb Sending msg of 28 bytes to 3 on channel businesschannel took 76µs" +orderer0.example.com | "2019-11-19 05:22:25.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.5µs " +orderer0.example.com | "2019-11-19 05:22:25.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.9µs " +orderer0.example.com | "2019-11-19 05:22:25.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebe Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:25.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:26.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:26.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec1 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-11-19 05:22:26.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.4µs " +orderer0.example.com | "2019-11-19 05:22:26.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec3 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +orderer0.example.com | "2019-11-19 05:22:26.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec4 Sending msg of 28 bytes to 3 on channel businesschannel took 7µs" +orderer0.example.com | "2019-11-19 05:22:26.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.7µs " +orderer0.example.com | "2019-11-19 05:22:26.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.8µs " +orderer0.example.com | "2019-11-19 05:22:26.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:26.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:26.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:26.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eca Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +orderer0.example.com | "2019-11-19 05:22:26.527 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +orderer0.example.com | "2019-11-19 05:22:26.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecc Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +orderer0.example.com | "2019-11-19 05:22:26.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecd Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-11-19 05:22:26.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU ece Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99µs " +orderer0.example.com | "2019-11-19 05:22:26.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.4µs " +orderer0.example.com | "2019-11-19 05:22:26.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:26.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:27.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:27.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed3 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +orderer0.example.com | "2019-11-19 05:22:27.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +orderer0.example.com | "2019-11-19 05:22:27.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed5 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-11-19 05:22:27.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed6 Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-11-19 05:22:27.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +orderer0.example.com | "2019-11-19 05:22:27.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.8µs " +orderer0.example.com | "2019-11-19 05:22:27.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:27.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU eda Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:27.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU edb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:27.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edc Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-11-19 05:22:27.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.3µs " +orderer0.example.com | "2019-11-19 05:22:27.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ede Sending msg of 28 bytes to 2 on channel businesschannel took 28.4µs" +orderer0.example.com | "2019-11-19 05:22:27.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edf Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +orderer0.example.com | "2019-11-19 05:22:27.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.8µs " +orderer0.example.com | "2019-11-19 05:22:27.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.7µs " +orderer0.example.com | "2019-11-19 05:22:27.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:27.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:28.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:28.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee5 Sending msg of 28 bytes to 3 on channel testchainid took 30.7µs" +orderer0.example.com | "2019-11-19 05:22:28.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.3µs " +orderer0.example.com | "2019-11-19 05:22:28.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +orderer0.example.com | "2019-11-19 05:22:28.401 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel businesschannel took 78.9µs" +orderer0.example.com | "2019-11-19 05:22:28.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU eea Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:28.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.5µs " +orderer0.example.com | "2019-11-19 05:22:28.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 351.4µs " +orderer0.example.com | "2019-11-19 05:22:28.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU eec Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:28.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:28.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eee Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2019-11-19 05:22:28.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU eef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.8µs " +orderer0.example.com | "2019-11-19 05:22:28.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef0 Sending msg of 28 bytes to 2 on channel businesschannel took 89.7µs" +orderer0.example.com | "2019-11-19 05:22:28.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef1 Sending msg of 28 bytes to 3 on channel businesschannel took 31.2µs" +orderer0.example.com | "2019-11-19 05:22:28.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.1µs " +orderer0.example.com | "2019-11-19 05:22:28.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.1µs " +orderer0.example.com | "2019-11-19 05:22:28.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:28.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:29.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:29.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef7 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2019-11-19 05:22:29.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +orderer0.example.com | "2019-11-19 05:22:29.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef9 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-11-19 05:22:29.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-11-19 05:22:29.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU efb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.6µs " +orderer0.example.com | "2019-11-19 05:22:29.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.1µs " +orderer0.example.com | "2019-11-19 05:22:29.399 UTC [orderer.common.cluster.step] handleMessage -> DEBU efd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:29.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:29.529 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:29.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +orderer0.example.com | "2019-11-19 05:22:29.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.9µs " +orderer0.example.com | "2019-11-19 05:22:29.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f02 Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-11-19 05:22:29.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f03 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +orderer0.example.com | "2019-11-19 05:22:29.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU f04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.7µs " +orderer0.example.com | "2019-11-19 05:22:29.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.5µs " +orderer0.example.com | "2019-11-19 05:22:29.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU f06 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:29.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU f07 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:30.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:30.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f09 Sending msg of 28 bytes to 3 on channel testchainid took 67.4µs" +orderer0.example.com | "2019-11-19 05:22:30.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.4µs " +orderer0.example.com | "2019-11-19 05:22:30.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0b Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-11-19 05:22:30.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0c Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-11-19 05:22:30.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.6µs " +orderer0.example.com | "2019-11-19 05:22:30.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:30.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:30.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.4µs " +orderer0.example.com | "2019-11-19 05:22:30.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:30.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f12 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-11-19 05:22:30.527 UTC [orderer.common.cluster.step] sendMessage -> DEBU f13 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.8µs " +orderer0.example.com | "2019-11-19 05:22:30.647 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f14 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:51520 with txid 'afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-11-19 05:22:30.647 UTC [policies] Evaluate -> DEBU f15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-11-19 05:22:30.648 UTC [policies] Evaluate -> DEBU f16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:30.648 UTC [policies] Evaluate -> DEBU f17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-11-19 05:22:30.648 UTC [policies] Evaluate -> DEBU f18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:30.649 UTC [policies] Evaluate -> DEBU f19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | [e33 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [e34 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e35 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [e36 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [e37 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e38 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [e39 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e3a 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e3b 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e3c 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [e3d 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e3e 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e3f 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e40 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [e41 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > alive: alive: alive:\204\324aB\001@|\233~\326M\240\321-\026\010`\000]\000?u\273\260\n?\034xI" > +peer0.org1.example.com | [e42 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [e43 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e44 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e45 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e46 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e47 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e48 11-19 05:21:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e49 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e4a 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e4b 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e4c 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [f0a 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k alive: alive:G\266\331\245hf\272Vt=5v\327mO\002 1\205}\213e\353\247F{\022\030\215z\205g\032z\3239\256U\221w+b~$\004\363\327\304{" > +peer0.org2.example.com | [f0b 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [f0c 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f0d 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f0e 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f0f 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [f10 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f11 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f12 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f13 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f14 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f15 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f16 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [f17 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [f18 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [f19 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f1a 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f1b 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f1c 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f1d 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f1e 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f1f 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f20 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f21 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5670 gate 1574140919992454300 evaluation starts +peer0.org2.example.com | [f22 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5670 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f23 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5670 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [f24 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f25 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5670 principal evaluation fails +peer0.org2.example.com | [f26 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5670 gate 1574140919992454300 evaluation fails +peer0.org2.example.com | [f27 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e4d 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e4e 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [e4f 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e50 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e51 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [e52 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [e53 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer0.org1.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer0.org1.example.com | [e54 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer0.org1.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer0.org1.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer0.org1.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer0.org1.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer0.org1.example.com | [e55 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [e56 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 b6 2e bc 7f 23 c8 f5 29 6b 70 |0E.!......#..)kp| +peer0.org1.example.com | 00000010 d6 19 e0 0a 36 cf 0a 69 88 08 f0 3c 4d d8 a6 e7 |....6..i... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [e58 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [e59 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [e5a 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e5b 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [e5c 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e5d 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e5e 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e5f 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e60 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e61 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e62 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [e63 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e64 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e65 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [115d 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [115e 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [115f 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1160 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1161 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1162 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1163 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1164 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1165 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1166 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1167 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1168 11-19 05:22:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1169 11-19 05:22:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [116a 11-19 05:22:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [116b 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [116c 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15101B +peer1.org2.example.com | [116d 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 52B311F1FDAA3751A417E38B0151B3EE2E6C193557076DBD58D835BF287513CB +peer1.org2.example.com | [116e 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [116f 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1170 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1171 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1172 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1173 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1174 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:30.649 UTC [msp] DeserializeIdentity -> DEBU f1a Obtaining identity" +orderer0.example.com | "2019-11-19 05:22:30.649 UTC [msp.identity] newIdentity -> DEBU f1b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +orderer0.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +orderer0.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +orderer0.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +orderer0.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:30.650 UTC [cauthdsl] func1 -> DEBU f1c 0xc000a825d0 gate 1574140950650662900 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:30.651 UTC [cauthdsl] func2 -> DEBU f1d 0xc000a825d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:30.651 UTC [cauthdsl] func2 -> DEBU f1e 0xc000a825d0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:30.651 UTC [cauthdsl] func2 -> DEBU f1f 0xc000a825d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-11-19 05:22:30.651 UTC [cauthdsl] func2 -> DEBU f20 0xc000a825d0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:30.652 UTC [cauthdsl] func1 -> DEBU f21 0xc000a825d0 gate 1574140950650662900 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:30.652 UTC [policies] Evaluate -> DEBU f22 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:30.652 UTC [policies] Evaluate -> DEBU f23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:30.653 UTC [policies] Evaluate -> DEBU f24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:22:30.653 UTC [cauthdsl] func1 -> DEBU f25 0xc000a83750 gate 1574140950653251500 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:30.653 UTC [cauthdsl] func2 -> DEBU f26 0xc000a83750 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:30.654 UTC [cauthdsl] func2 -> DEBU f27 0xc000a83750 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:30.654 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU f28 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-11-19 05:22:30.654 UTC [msp] Validate -> DEBU f29 MSP Org1MSP validating identity" +orderer0.example.com | "2019-11-19 05:22:30.655 UTC [msp] getCertificationChain -> DEBU f2a MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:22:30.655 UTC [cauthdsl] func2 -> DEBU f2b 0xc000a83750 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:30.655 UTC [msp.identity] Verify -> DEBU f2c Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +orderer0.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?|" +orderer0.example.com | "2019-11-19 05:22:30.656 UTC [msp.identity] Verify -> DEBU f2d Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +orderer0.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +orderer0.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +orderer0.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +orderer0.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR|" +orderer0.example.com | "2019-11-19 05:22:30.656 UTC [cauthdsl] func2 -> DEBU f2e 0xc000a83750 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:30.657 UTC [cauthdsl] func1 -> DEBU f2f 0xc000a83750 gate 1574140950653251500 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:30.657 UTC [policies] Evaluate -> DEBU f30 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:30.657 UTC [policies] Evaluate -> DEBU f31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:30.658 UTC [policies] Evaluate -> DEBU f32 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:30.658 UTC [policies] Evaluate -> DEBU f33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:30.658 UTC [policies] Evaluate -> DEBU f34 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:30.658 UTC [policies] Evaluate -> DEBU f35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:30.658 UTC [orderer.common.blockcutter] Ordered -> DEBU f36 Enqueuing message into batch" +orderer0.example.com | "2019-11-19 05:22:30.658 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f37 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:51520" +orderer0.example.com | "2019-11-19 05:22:30.661 UTC [orderer.common.broadcast] Handle -> WARN f38 Error reading from 172.18.0.5:51520: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:30.661 UTC [orderer.common.server] func1 -> DEBU f39 Closing Broadcast stream" +orderer0.example.com | "2019-11-19 05:22:30.661 UTC [comm.grpc.server] 1 -> INFO f3a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51520 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.355524s +orderer0.example.com | "2019-11-19 05:22:30.661 UTC [grpc] infof -> DEBU f3b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:30.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3c Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-11-19 05:22:30.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3d Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +orderer0.example.com | "2019-11-19 05:22:30.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.2µs " +orderer0.example.com | "2019-11-19 05:22:30.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.5µs " +orderer0.example.com | "2019-11-19 05:22:30.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:30.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU f41 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:31.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:31.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +peer0.org1.example.com | [e66 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\204\324aB\001@|\233~\326M\240\321-\026\010`\000]\000?u\273\260\n?\034xI" > +peer0.org1.example.com | [e67 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [e68 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e69 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e6a 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e6b 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e6c 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e6d 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e6e 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e6f 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e70 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e71 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e72 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e73 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e74 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e75 11-19 05:21:56.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45600 +peer0.org1.example.com | [e76 11-19 05:21:56.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040aad20 +peer0.org1.example.com | [e77 11-19 05:21:56.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [e78 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [e79 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [e7a 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e7b 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [e7c 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [e7d 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [e7e 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [e7f 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [e80 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 6e da ad 35 f8 e1 66 00 12 1c 37 31 69 a2 b0 |%n..5..f...71i..| +peer0.org1.example.com | 00000010 dc 6e bc b6 b6 40 45 85 96 44 ac 8e cd 58 1c ab |.n...@E..D...X..| +peer0.org1.example.com | [e81 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 56 40 5b a2 d6 11 6d e3 48 d5 f5 |0D. QV@[...m.H..| +peer0.org1.example.com | 00000010 7b a3 22 af b9 3d 9f 29 15 21 fe 24 2e 82 e2 f2 |{."..=.).!.$....| +peer0.org1.example.com | 00000020 6f f6 76 05 02 20 27 e9 0e 27 43 59 16 45 7f a7 |o.v.. '..'CY.E..| +peer0.org1.example.com | 00000030 9a e3 68 90 34 ee 4e f6 21 3a 59 9c 64 59 f1 4a |..h.4.N.!:Y.dY.J| +peer0.org1.example.com | 00000040 74 93 50 a8 c1 07 |t.P...| +peer0.org1.example.com | [e82 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [e83 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004134000, header 0xc0040ab130 +peer0.org1.example.com | [e84 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [e85 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] processing txid: afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b +peer0.org1.example.com | [e86 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +peer0.org1.example.com | [e87 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [e88 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +peer0.org1.example.com | [e89 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] Entry chaincode: name:"lscc" +peer0.org1.example.com | [e8a 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][afc2f7b1] Entry chaincode: name:"lscc" +peer0.org1.example.com | [e8b 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [e8c 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [e8d 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] handling GET_STATE from chaincode +peer0.org1.example.com | [e8e 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [e8f 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [e90 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] No state associated with key: exp02. Sending RESPONSE with an empty payload +peer1.org2.example.com | [1175 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1176 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1177 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1178 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1179 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [117a 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [117b 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [117c 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [117d 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [117e 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [117f 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1180 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1181 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +peer1.org2.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +peer1.org2.example.com | [1182 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +peer1.org2.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +peer1.org2.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer1.org2.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer1.org2.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer1.org2.example.com | [1183 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1184 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 03 aa 2a 11 d0 85 d9 91 2b 0f |0E.!....*.....+.| +peer1.org2.example.com | 00000010 69 4e fb ed 38 63 d3 4c 89 61 82 b3 04 b2 d1 43 |iN..8c.L.a.....C| +peer1.org2.example.com | 00000020 03 51 89 f2 5a 02 20 14 a3 06 0e 93 87 a3 c4 70 |.Q..Z. ........p| +peer1.org2.example.com | 00000030 0d 64 d7 f2 38 da b1 dc 19 56 89 e1 e5 cb 05 1d |.d..8....V......| +peer1.org2.example.com | 00000040 b9 6f 62 32 5f 70 31 |.ob2_p1| +peer1.org2.example.com | [1185 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1186 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1187 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1188 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1189 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [118a 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [118b 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [118c 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [118d 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +peer1.org2.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +peer1.org2.example.com | [118e 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +peer1.org2.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +peer1.org2.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer1.org2.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer1.org1.example.com | [d04 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [d05 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [d06 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d07 11-19 05:21:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [d08 11-19 05:21:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151018 +peer1.org1.example.com | [d09 11-19 05:21:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A6118B0845F7CAAD60AC500D92C3859F6DFE9CA948429C730D802867B3B58A94 +peer1.org1.example.com | [d0a 11-19 05:21:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [d0b 11-19 05:21:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [d0c 11-19 05:21:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [d0d 11-19 05:21:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d0e 11-19 05:21:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [d0f 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [d10 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [d12 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d13 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [d15 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [d16 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d14 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [d11 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d17 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d18 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [d19 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [d1a 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d1b 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:31.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 640.8µs " +orderer0.example.com | "2019-11-19 05:22:31.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 2 on channel businesschannel took 73.7µs" +orderer0.example.com | "2019-11-19 05:22:31.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f46 Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +orderer0.example.com | "2019-11-19 05:22:31.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU f47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.5µs " +orderer0.example.com | "2019-11-19 05:22:31.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU f48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.3µs " +orderer0.example.com | "2019-11-19 05:22:31.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:31.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:31.529 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:31.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 3 on channel testchainid took 29.7µs" +orderer0.example.com | "2019-11-19 05:22:31.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101µs " +orderer0.example.com | "2019-11-19 05:22:31.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +orderer0.example.com | "2019-11-19 05:22:31.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4f Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-11-19 05:22:31.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU f50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.6µs " +orderer0.example.com | "2019-11-19 05:22:31.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU f51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +orderer0.example.com | "2019-11-19 05:22:31.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU f52 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:31.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +orderer0.example.com | "2019-11-19 05:22:32.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116µs " +orderer0.example.com | "2019-11-19 05:22:32.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f57 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +orderer0.example.com | "2019-11-19 05:22:32.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f58 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +orderer0.example.com | "2019-11-19 05:22:32.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU f59 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +orderer0.example.com | "2019-11-19 05:22:32.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.7µs " +orderer0.example.com | "2019-11-19 05:22:32.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +orderer0.example.com | "2019-11-19 05:22:32.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +orderer0.example.com | "2019-11-19 05:22:32.662 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU f60 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:32.663 UTC [orderer.consensus.etcdraft] propose -> INFO f61 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:32.664 UTC [orderer.consensus.etcdraft] 2 -> DEBU f62 Proposed block [3] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:32.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f63 Sending msg of 3644 bytes to 2 on channel businesschannel took 25µs" +orderer0.example.com | "2019-11-19 05:22:32.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU f64 Send of ConsensusRequest for channel businesschannel with payload of size 3644 to orderer1.example.com(orderer1.example.com:7050) took 125.5µs " +orderer0.example.com | "2019-11-19 05:22:32.668 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f65 Sending msg of 3644 bytes to 3 on channel businesschannel took 1.5718ms" +orderer0.example.com | "2019-11-19 05:22:32.669 UTC [orderer.common.cluster.step] sendMessage -> DEBU f66 Send of ConsensusRequest for channel businesschannel with payload of size 3644 to orderer2.example.com(orderer2.example.com:7050) took 479.7µs " +orderer0.example.com | "2019-11-19 05:22:32.671 UTC [orderer.common.cluster.step] handleMessage -> DEBU f67 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.672 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f68 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-11-19 05:22:32.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f69 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2019-11-19 05:22:32.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.6µs " +peer0.org1.example.com | [e91 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [e92 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [e93 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 gate 1574140916344331900 evaluation starts +peer0.org1.example.com | [e94 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [e95 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [e96 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [e97 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [e98 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [e99 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [e9a 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [e9b 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [e9c 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 principal matched by identity 0 +peer0.org1.example.com | [e9d 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 6e da ad 35 f8 e1 66 00 12 1c 37 31 69 a2 b0 |%n..5..f...71i..| +peer0.org1.example.com | 00000010 dc 6e bc b6 b6 40 45 85 96 44 ac 8e cd 58 1c ab |.n...@E..D...X..| +peer0.org1.example.com | [e9e 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 56 40 5b a2 d6 11 6d e3 48 d5 f5 |0D. QV@[...m.H..| +peer0.org1.example.com | 00000010 7b a3 22 af b9 3d 9f 29 15 21 fe 24 2e 82 e2 f2 |{."..=.).!.$....| +peer0.org1.example.com | 00000020 6f f6 76 05 02 20 27 e9 0e 27 43 59 16 45 7f a7 |o.v.. '..'CY.E..| +peer0.org1.example.com | 00000030 9a e3 68 90 34 ee 4e f6 21 3a 59 9c 64 59 f1 4a |..h.4.N.!:Y.dY.J| +peer0.org1.example.com | 00000040 74 93 50 a8 c1 07 |t.P...| +peer0.org1.example.com | [e9f 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ea0 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [ea1 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 skipping identity 0 because it has already been used +peer0.org1.example.com | [ea2 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 principal evaluation fails +peer0.org1.example.com | [ea3 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 gate 1574140916344331900 evaluation succeeds +peer0.org1.example.com | [ea4 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [ea5 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] handling PUT_STATE from chaincode +peer0.org1.example.com | [ea6 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [ea7 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU No collection configuration specified +peer0.org1.example.com | [ea8 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [ea9 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] notifying Txid:afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, channelID:businesschannel +peer0.org1.example.com | [eaa 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [eab 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [eac 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:1.0 +peer0.org1.example.com | [ead 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [eae 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02:1.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [eaf 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +peer0.org1.example.com | [eb0 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +peer0.org1.example.com | [eb1 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [eb2 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [eb3 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [eb4 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [eb5 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [eb6 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [eb7 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [eb8 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [eb9 11-19 05:21:56.36 UTC] [%{longpkg}] %{callpath} -> DEBU +peer0.org1.example.com | FROM hyperledger/fabric-baseos:amd64-0.4.18 +peer0.org1.example.com | ADD binpackage.tar /usr/local/bin +peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ +peer0.org1.example.com | org.hyperledger.fabric.version="1.4.4" \ +peer0.org1.example.com | org.hyperledger.fabric.base.version="0.4.18" +peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=1.4.4 +peer0.org1.example.com | [eba 11-19 05:21:56.36 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [ebb 11-19 05:21:56.37 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +peer0.org1.example.com | [ebc 11-19 05:21:56.37 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:latest +peer1.org1.example.com | [d1c 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [d1d 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d1e 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d1f 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d20 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d21 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d22 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [d23 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d24 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6c060 gate 1574140919919983500 evaluation starts +peer1.org1.example.com | [d25 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6c060 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d26 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6c060 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [d27 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6c060 principal matched by identity 0 +peer1.org1.example.com | [d28 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer1.org1.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer1.org1.example.com | [d29 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer1.org1.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer1.org1.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer1.org1.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer1.org1.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer1.org1.example.com | [d2a 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6c060 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d2b 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6c060 gate 1574140919919983500 evaluation succeeds +peer1.org1.example.com | [d2c 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d2d 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d2e 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d2f 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [d30 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d31 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d32 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d33 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [d34 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [d35 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 11 8b 08 45 f7 ca ad 60 ac 50 0d 92 c3 85 9f |....E...`.P.....| +peer1.org1.example.com | 00000010 6d fe 9c a9 48 42 9c 73 0d 80 28 67 b3 b5 8a 94 |m...HB.s..(g....| +peer1.org1.example.com | [d36 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 cf ee a7 76 61 c8 3a e3 1f ad |0E.!.....va.:...| +peer1.org1.example.com | 00000010 21 a4 83 72 5e d9 37 cb 84 01 6b a6 fb 3e a4 35 |!..r^.7...k..>.5| +peer1.org1.example.com | 00000020 64 50 3a 36 58 02 20 70 81 9c a5 e5 28 32 ea 65 |dP:6X. p....(2.e| +peer1.org1.example.com | 00000030 3a 7c c5 a2 52 c7 51 6c 86 0c 72 d6 5a 7b a2 9c |:|..R.Ql..r.Z{..| +peer1.org1.example.com | 00000040 ae 6b 3c 57 cc 18 19 |.k DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [f28 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f29 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [f2a 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5be0 gate 1574140919993503600 evaluation starts +peer0.org2.example.com | [f2b 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5be0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f2c 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5be0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [f2d 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5be0 principal matched by identity 0 +peer0.org2.example.com | [f2e 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [f2f 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [f30 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5be0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f31 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5be0 gate 1574140919993503600 evaluation succeeds +peer0.org2.example.com | [f32 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f33 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f34 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f35 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f36 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [f37 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [f38 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f39 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f3a 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f3b 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f3c 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f3d 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f3e 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f3f 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f40 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f93f0 gate 1574140919997406100 evaluation starts +peer0.org2.example.com | [f41 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f93f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f42 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f93f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [f43 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f93f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f44 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f93f0 principal evaluation fails +peer0.org2.example.com | [f45 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f93f0 gate 1574140919997406100 evaluation fails +peer0.org2.example.com | [f46 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f47 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f48 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [ebd 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [ebe 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ebf 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [ec0 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [ec1 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ec2 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ec3 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [ec4 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [ec5 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [ec6 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ec7 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [ec8 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [eca 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ec9 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ecb 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [ecc 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ecd 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [ece 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [ecf 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [ed1 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ed0 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [ed2 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [ed3 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [ed4 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ed5 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:22:32.674 UTC [orderer.consensus.etcdraft] writeBlock -> INFO f6b Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:32.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60µs " +orderer0.example.com | "2019-11-19 05:22:32.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.676 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU f6f [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-11-19 05:22:32.678 UTC [msp] GetDefaultSigningIdentity -> DEBU f70 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:32.678 UTC [msp] GetDefaultSigningIdentity -> DEBU f71 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:32.679 UTC [msp.identity] Sign -> DEBU f72 Sign: plaintext: 0A020802120B0A090A03010203100418...A27EC7EEEF94B7CA9B6422427D820D98 " +orderer0.example.com | "2019-11-19 05:22:32.680 UTC [msp.identity] Sign -> DEBU f73 Sign: digest: 14B4668976D394B732A78A0CC2D037228E65F080B679BDCBC1EA755E7E255A24 " +orderer0.example.com | "2019-11-19 05:22:32.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.685 UTC [fsblkstorage] indexBlock -> DEBU f75 Indexing block [blockNum=3, blockHash=[]byte{0xaf, 0xe8, 0x73, 0x33, 0x36, 0xd, 0xf9, 0x12, 0x19, 0x79, 0xd, 0x24, 0x42, 0x5b, 0x7d, 0xa9, 0x98, 0xab, 0xce, 0xdc, 0x98, 0x36, 0x45, 0x6e, 0x26, 0x2b, 0x86, 0x76, 0x6a, 0x37, 0x47, 0x75} txOffsets= +orderer0.example.com | txId=afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b locPointer=offset=70, bytesLength=3516 +orderer0.example.com | ]" +orderer0.example.com | "2019-11-19 05:22:32.699 UTC [fsblkstorage] updateCheckpoint -> DEBU f76 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81290], isChainEmpty=[false], lastBlockNumber=[3]" +orderer0.example.com | "2019-11-19 05:22:32.700 UTC [orderer.commmon.multichannel] commitBlock -> DEBU f77 [channel: businesschannel] Wrote block [3]" +orderer0.example.com | "2019-11-19 05:22:32.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f78 Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +orderer0.example.com | "2019-11-19 05:22:32.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU f79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 175.9µs " +orderer0.example.com | "2019-11-19 05:22:32.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7a Sending msg of 28 bytes to 3 on channel businesschannel took 220.9µs" +orderer0.example.com | "2019-11-19 05:22:32.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117µs " +orderer0.example.com | "2019-11-19 05:22:32.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:32.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:33.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:33.030 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7f Sending msg of 28 bytes to 3 on channel testchainid took 82.2µs" +orderer0.example.com | "2019-11-19 05:22:33.031 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 216.1µs " +orderer0.example.com | "2019-11-19 05:22:33.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f81 Sending msg of 28 bytes to 3 on channel businesschannel took 29.8µs" +orderer0.example.com | "2019-11-19 05:22:33.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-11-19 05:22:33.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU f83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.8µs " +orderer0.example.com | "2019-11-19 05:22:33.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.3µs " +orderer0.example.com | "2019-11-19 05:22:33.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU f85 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:33.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:33.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:33.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f88 Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" +orderer0.example.com | "2019-11-19 05:22:33.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 800.9µs " +orderer0.example.com | "2019-11-19 05:22:33.587 UTC [orderer.common.server] Broadcast -> DEBU f8a Starting new Broadcast handler" +orderer0.example.com | "2019-11-19 05:22:33.587 UTC [orderer.common.broadcast] Handle -> DEBU f8b Starting new broadcast loop for 172.18.0.5:51542" +orderer0.example.com | "2019-11-19 05:22:33.601 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f8c [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:51542 with txid 'e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-11-19 05:22:33.602 UTC [policies] Evaluate -> DEBU f8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-11-19 05:22:33.602 UTC [policies] Evaluate -> DEBU f8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:33.602 UTC [policies] Evaluate -> DEBU f8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-11-19 05:22:33.602 UTC [policies] Evaluate -> DEBU f90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:33.603 UTC [policies] Evaluate -> DEBU f91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:22:33.603 UTC [cauthdsl] func1 -> DEBU f92 0xc000e5dd00 gate 1574140953603612800 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:33.603 UTC [cauthdsl] func2 -> DEBU f93 0xc000e5dd00 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [d38 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d39 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d3a 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d3b 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d3c 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [d3d 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [d3e 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [d3f 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 11 8b 08 45 f7 ca ad 60 ac 50 0d 92 c3 85 9f |....E...`.P.....| +peer1.org1.example.com | 00000010 6d fe 9c a9 48 42 9c 73 0d 80 28 67 b3 b5 8a 94 |m...HB.s..(g....| +peer1.org1.example.com | [d40 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 cf ee a7 76 61 c8 3a e3 1f ad |0E.!.....va.:...| +peer1.org1.example.com | 00000010 21 a4 83 72 5e d9 37 cb 84 01 6b a6 fb 3e a4 35 |!..r^.7...k..>.5| +peer1.org1.example.com | 00000020 64 50 3a 36 58 02 20 70 81 9c a5 e5 28 32 ea 65 |dP:6X. p....(2.e| +peer1.org1.example.com | 00000030 3a 7c c5 a2 52 c7 51 6c 86 0c 72 d6 5a 7b a2 9c |:|..R.Ql..r.Z{..| +peer1.org1.example.com | 00000040 ae 6b 3c 57 cc 18 19 |.k DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [d42 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb db 6b 2b 02 ef 3e 0f e4 95 fa |0E.!...k+..>....| +peer1.org1.example.com | 00000010 5b 0a af 72 2d a9 dd 68 9e 1a b2 a6 e3 58 af e9 |[..r-..h.....X..| +peer1.org1.example.com | 00000020 8c 28 b9 22 28 02 20 20 96 61 3a e8 31 ab 5b d8 |.(."(. .a:.1.[.| +peer1.org1.example.com | 00000030 13 58 80 0b f3 a9 90 fd 4f 35 23 16 6c da 33 00 |.X......O5#.l.3.| +peer1.org1.example.com | 00000040 df 21 ff 15 0c 15 8f |.!.....| +peer1.org1.example.com | [d43 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [d44 11-19 05:21:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [d45 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d46 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d47 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [d48 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d49 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [d4a 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 11 8b 08 45 f7 ca ad 60 ac 50 0d 92 c3 85 9f |....E...`.P.....| +peer1.org1.example.com | 00000010 6d fe 9c a9 48 42 9c 73 0d 80 28 67 b3 b5 8a 94 |m...HB.s..(g....| +peer1.org1.example.com | [d4b 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 cf ee a7 76 61 c8 3a e3 1f ad |0E.!.....va.:...| +peer1.org1.example.com | 00000010 21 a4 83 72 5e d9 37 cb 84 01 6b a6 fb 3e a4 35 |!..r^.7...k..>.5| +peer1.org1.example.com | 00000020 64 50 3a 36 58 02 20 70 81 9c a5 e5 28 32 ea 65 |dP:6X. p....(2.e| +peer1.org1.example.com | 00000030 3a 7c c5 a2 52 c7 51 6c 86 0c 72 d6 5a 7b a2 9c |:|..R.Ql..r.Z{..| +peer1.org1.example.com | 00000040 ae 6b 3c 57 cc 18 19 |.k DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d4d 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d4e 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d4f 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [d50 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer1.org2.example.com | [118f 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1190 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1191 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1192 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1193 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1194 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1195 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1196 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1197 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1198 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1199 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [119a 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [119b 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [119c 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [119d 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [119e 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8670 gate 1574140927481302900 evaluation starts +peer1.org2.example.com | [119f 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8670 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11a0 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8670 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [11a1 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [11a2 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8670 principal evaluation fails +peer1.org2.example.com | [11a3 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8670 gate 1574140927481302900 evaluation fails +peer1.org2.example.com | [11a4 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11a5 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11a6 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [11a7 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8be0 gate 1574140927482647400 evaluation starts +peer1.org2.example.com | [11a8 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8be0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11a9 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8be0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [11aa 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8be0 principal matched by identity 0 +peer1.org2.example.com | [11ab 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer1.org2.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer1.org2.example.com | [11ac 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer1.org2.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer1.org2.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer1.org2.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +peer1.org2.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer1.org2.example.com | [11ad 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8be0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ed6 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151013 +peer0.org1.example.com | [ed7 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4957A1C0A579B77D97CBB5A1ED1957782CB41331D7FD79CAE2599CACD6140AAE +peer0.org1.example.com | [ed8 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [ed9 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [eda 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [edb 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [edc 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [edd 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ede 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [edf 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ee0 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [ee1 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ee2 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [ee3 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ee4 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [ee5 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ee6 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ee7 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ee8 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ee9 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [eea 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [eeb 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +peer0.org1.example.com | 00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +peer0.org1.example.com | [eec 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +peer0.org1.example.com | 00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +peer0.org1.example.com | 00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +peer0.org1.example.com | 00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +peer0.org1.example.com | 00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +peer0.org1.example.com | [eed 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [eee 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:33.604 UTC [cauthdsl] func2 -> DEBU f94 0xc000e5dd00 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:33.604 UTC [cauthdsl] func2 -> DEBU f95 0xc000e5dd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-11-19 05:22:33.604 UTC [cauthdsl] func2 -> DEBU f96 0xc000e5dd00 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:33.604 UTC [cauthdsl] func1 -> DEBU f97 0xc000e5dd00 gate 1574140953603612800 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:33.605 UTC [policies] Evaluate -> DEBU f98 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:33.605 UTC [policies] Evaluate -> DEBU f99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:33.605 UTC [policies] Evaluate -> DEBU f9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:22:33.606 UTC [cauthdsl] func1 -> DEBU f9b 0xc000972540 gate 1574140953606070300 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:33.606 UTC [cauthdsl] func2 -> DEBU f9c 0xc000972540 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:33.606 UTC [cauthdsl] func2 -> DEBU f9d 0xc000972540 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:33.606 UTC [cauthdsl] func2 -> DEBU f9e 0xc000972540 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:33.607 UTC [msp.identity] Verify -> DEBU f9f Verify: digest = 00000000 f6 c0 b3 ab 85 aa 28 ac a0 48 cd eb e0 3f c0 10 |......(..H...?..| +orderer0.example.com | 00000010 fa ba 63 4b 4c 70 86 bb ba 67 f9 8c 83 44 7d da |..cKLp...g...D}.|" +orderer0.example.com | "2019-11-19 05:22:33.607 UTC [msp.identity] Verify -> DEBU fa0 Verify: sig = 00000000 30 44 02 20 2b ba 1f e0 56 b8 c9 8f 25 b9 ac a3 |0D. +...V...%...| +orderer0.example.com | 00000010 12 3b e9 8e 83 b7 ad 48 2a a8 cc bc a2 c1 8d f1 |.;.....H*.......| +orderer0.example.com | 00000020 a6 e6 65 91 02 20 10 fb c7 3f ec 92 df 9d 88 d2 |..e.. ...?......| +orderer0.example.com | 00000030 a5 4a 4a 02 63 87 22 e8 5c dd d5 12 ce 57 f2 ab |.JJ.c.".\....W..| +orderer0.example.com | 00000040 85 6b 5f 12 56 05 |.k_.V.|" +orderer0.example.com | "2019-11-19 05:22:33.607 UTC [cauthdsl] func2 -> DEBU fa1 0xc000972540 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:33.608 UTC [cauthdsl] func1 -> DEBU fa2 0xc000972540 gate 1574140953606070300 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:33.608 UTC [policies] Evaluate -> DEBU fa3 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:33.608 UTC [policies] Evaluate -> DEBU fa4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:33.609 UTC [policies] Evaluate -> DEBU fa5 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:33.609 UTC [policies] Evaluate -> DEBU fa6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:33.609 UTC [policies] Evaluate -> DEBU fa7 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:33.609 UTC [policies] Evaluate -> DEBU fa8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:33.610 UTC [orderer.common.blockcutter] Ordered -> DEBU fa9 Enqueuing message into batch" +orderer0.example.com | "2019-11-19 05:22:33.610 UTC [orderer.common.broadcast] ProcessMessage -> DEBU faa [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:51542" +orderer0.example.com | "2019-11-19 05:22:33.613 UTC [grpc] infof -> DEBU fab transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:33.615 UTC [orderer.common.broadcast] Handle -> WARN fac Error reading from 172.18.0.5:51542: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:33.617 UTC [orderer.common.server] func1 -> DEBU fad Closing Broadcast stream" +orderer0.example.com | "2019-11-19 05:22:33.618 UTC [comm.grpc.server] 1 -> INFO fae streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51542 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.5088ms +orderer0.example.com | "2019-11-19 05:22:33.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 2 on channel businesschannel took 30.9µs" +orderer0.example.com | "2019-11-19 05:22:33.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb1 Sending msg of 28 bytes to 3 on channel businesschannel took 30.9µs" +orderer0.example.com | "2019-11-19 05:22:33.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:33.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.9µs " +orderer0.example.com | "2019-11-19 05:22:33.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85µs " +orderer0.example.com | "2019-11-19 05:22:33.905 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:34.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:34.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb6 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-11-19 05:22:34.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +orderer0.example.com | "2019-11-19 05:22:34.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +orderer0.example.com | "2019-11-19 05:22:34.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb9 Sending msg of 28 bytes to 3 on channel businesschannel took 34µs" +orderer0.example.com | "2019-11-19 05:22:34.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU fba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +orderer0.example.com | "2019-11-19 05:22:34.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:34.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.7471ms " +orderer0.example.com | "2019-11-19 05:22:34.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:34.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:34.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbf Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +peer0.org1.example.com | [eef 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ef0 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ef1 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ef2 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [ef3 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ef4 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ef5 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ef6 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ef7 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ef8 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ef9 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [efa 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [efb 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 gate 1574140918872701400 evaluation starts +peer0.org1.example.com | [efc 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [efd 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [efe 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 principal matched by identity 0 +peer0.org1.example.com | [eff 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +peer0.org1.example.com | 00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +peer0.org1.example.com | [f00 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +peer0.org1.example.com | 00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +peer0.org1.example.com | 00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +peer0.org1.example.com | 00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +peer0.org1.example.com | 00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +peer0.org1.example.com | [f01 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f02 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 gate 1574140918872701400 evaluation succeeds +peer0.org1.example.com | [f03 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f04 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f05 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f06 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f07 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [f08 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f09 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [f0a 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer0.org1.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer0.org1.example.com | [f0b 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer0.org1.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer0.org1.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer0.org1.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer0.org1.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer1.org1.example.com | [d51 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d52 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d53 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d54 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d55 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [d56 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d57 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89830 gate 1574140919943967700 evaluation starts +peer1.org1.example.com | [d58 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89830 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d59 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89830 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [d5a 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89830 principal matched by identity 0 +peer1.org1.example.com | [d5b 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c bf 11 70 8a 16 7a 01 c9 65 e5 6c 7e e5 b2 84 |,..p..z..e.l~...| +peer1.org1.example.com | 00000010 85 ea 6c 43 0c 62 25 5d 94 9d 2c 97 10 6e 87 0b |..lC.b%]..,..n..| +peer1.org1.example.com | [d5c 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7e 3c 34 08 c3 85 e5 98 45 15 |0E.!..~<4.....E.| +peer1.org1.example.com | 00000010 26 9c 6b 76 29 0e 08 ac 9c a1 f1 f7 c9 4d 77 91 |&.kv)........Mw.| +peer1.org1.example.com | 00000020 c0 72 e4 8f bc 02 20 3b e5 61 fa 2e 3f db 7a 82 |.r.... ;.a..?.z.| +peer1.org1.example.com | 00000030 51 98 4d 9b 47 7b 5e b6 da 14 89 2f 63 06 ac 9f |Q.M.G{^..../c...| +peer1.org1.example.com | 00000040 7a f5 f3 de 42 43 07 |z...BC.| +peer1.org1.example.com | [d5d 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89830 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d5e 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89830 gate 1574140919943967700 evaluation succeeds +peer1.org1.example.com | [d5f 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d60 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d61 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d62 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d63 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d64 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d65 11-19 05:21:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d66 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [d67 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [d68 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d69 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d6a 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d6b 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d6c 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [d6d 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [d6e 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d6f 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d70 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d71 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d72 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d73 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d74 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d75 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d76 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [d77 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f0c 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [f0d 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f0e 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f0f 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f10 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [f11 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [f12 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [f13 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +peer0.org1.example.com | 00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +peer0.org1.example.com | [f14 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +peer0.org1.example.com | 00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +peer0.org1.example.com | 00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +peer0.org1.example.com | 00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +peer0.org1.example.com | 00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +peer0.org1.example.com | [f15 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [f16 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c cb 92 9e 31 1f e2 ca fb cb 78 8d |0D. \...1.....x.| +peer0.org1.example.com | 00000010 14 97 fe 0b 13 7c b5 3c c1 46 27 95 0d 6c aa e8 |.....|.<.F'..l..| +peer0.org1.example.com | 00000020 e7 30 d9 52 02 20 75 a3 57 64 7f fe 59 dc 91 4d |.0.R. u.Wd..Y..M| +peer0.org1.example.com | 00000030 ba 98 4d 3d 13 45 bc 6d 31 c4 5a 29 44 67 c2 0c |..M=.E.m1.Z)Dg..| +peer0.org1.example.com | 00000040 40 2e 43 8b 41 43 |@.C.AC| +peer0.org1.example.com | [f17 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [f18 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [f19 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f1a 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f1c 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f1b 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [f1d 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [f1e 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +peer0.org1.example.com | 00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +peer0.org1.example.com | [f1f 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +peer0.org1.example.com | 00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +peer0.org1.example.com | 00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +peer0.org1.example.com | 00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +peer0.org1.example.com | 00000040 4e 82 17 b1 de 42 |N....B| +peer0.org1.example.com | [f20 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [f21 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f22 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [f23 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +peer0.org1.example.com | 00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +peer0.org1.example.com | [f24 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +peer0.org1.example.com | 00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +peer0.org1.example.com | 00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +peer0.org1.example.com | 00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +peer0.org1.example.com | 00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +peer0.org1.example.com | [f25 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [f26 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [f27 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f28 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [f29 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f49 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f9960 gate 1574140919998343700 evaluation starts +peer0.org2.example.com | [f4a 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f9960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f4b 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f9960 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [f4c 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f9960 principal matched by identity 0 +peer0.org2.example.com | [f4d 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [f4e 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [f4f 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f9960 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f50 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f9960 gate 1574140919998343700 evaluation succeeds +peer0.org2.example.com | [f51 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f52 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f53 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f54 11-19 05:21:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f55 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f56 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [f57 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f58 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f59 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f5a 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f5b 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f5c 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f5d 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f5e 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f5f 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f60 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816d40 gate 1574140920001231500 evaluation starts +peer0.org2.example.com | [f61 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816d40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f62 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816d40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [f63 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f64 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816d40 principal evaluation fails +peer0.org2.example.com | [f65 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816d40 gate 1574140920001231500 evaluation fails +peer0.org2.example.com | [f66 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f67 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f68 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [f69 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038172b0 gate 1574140920002190600 evaluation starts +peer0.org2.example.com | [f6a 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038172b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f6b 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038172b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [f6c 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038172b0 principal matched by identity 0 +peer1.org2.example.com | [11ae 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f8be0 gate 1574140927482647400 evaluation succeeds +peer1.org2.example.com | [11af 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11b0 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11b1 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [11b2 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [11b3 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11b4 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11b5 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [11b6 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +peer1.org2.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +peer1.org2.example.com | [11b7 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +peer1.org2.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +peer1.org2.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer1.org2.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer1.org2.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer1.org2.example.com | [11b8 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11b9 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11ba 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11bb 11-19 05:22:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11bc 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [11bd 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11be 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11bf 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11c0 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11c1 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [11c2 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [11c3 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11c4 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11c5 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11c6 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11c7 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11c8 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11c9 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [11ca 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11cb 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [11cc 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [11cd 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [11ce 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [11cf 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11d0 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [f2a 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f2b 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f2c 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f2d 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f2e 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f2f 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f30 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 gate 1574140918884616500 evaluation starts +peer0.org1.example.com | [f31 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f32 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [f33 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 principal matched by identity 0 +peer0.org1.example.com | [f34 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +peer0.org1.example.com | 00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +peer0.org1.example.com | [f35 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +peer0.org1.example.com | 00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +peer0.org1.example.com | 00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +peer0.org1.example.com | 00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +peer0.org1.example.com | 00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +peer0.org1.example.com | [f36 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f37 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 gate 1574140918884616500 evaluation succeeds +peer0.org1.example.com | [f38 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f39 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f3a 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f3b 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f3c 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [f3d 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f3e 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f3f 11-19 05:21:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f40 11-19 05:21:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f41 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [f42 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [f43 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f44 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [f45 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f46 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [f47 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f48 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [f49 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [f4a 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f4b 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f6d 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [f6e 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [f6f 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038172b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f70 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038172b0 gate 1574140920002190600 evaluation succeeds +peer0.org2.example.com | [f71 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f72 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f73 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f74 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f75 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [f76 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [f77 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f78 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [f79 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [f7a 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f7b 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [f7c 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f7d 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f7e 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f7f 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f80 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f81 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f82 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f84 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f83 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [f85 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f86 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f87 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f88 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f89 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003833140 gate 1574140920004523800 evaluation starts +peer0.org2.example.com | [f8a 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003833140 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:34.530 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.8µs " +orderer0.example.com | "2019-11-19 05:22:34.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 2 on channel businesschannel took 39.6µs" +orderer0.example.com | "2019-11-19 05:22:34.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-11-19 05:22:34.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60µs " +orderer0.example.com | "2019-11-19 05:22:34.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.9µs " +orderer0.example.com | "2019-11-19 05:22:34.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:34.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc6 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc8 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2019-11-19 05:22:35.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " +orderer0.example.com | "2019-11-19 05:22:35.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-11-19 05:22:35.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +orderer0.example.com | "2019-11-19 05:22:35.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.3µs " +orderer0.example.com | "2019-11-19 05:22:35.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 40.1µs " +orderer0.example.com | "2019-11-19 05:22:35.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU fce Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd1 Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +orderer0.example.com | "2019-11-19 05:22:35.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.5µs " +orderer0.example.com | "2019-11-19 05:22:35.611 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU fd3 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:35.611 UTC [orderer.consensus.etcdraft] propose -> INFO fd4 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:35.612 UTC [orderer.consensus.etcdraft] 2 -> DEBU fd5 Proposed block [4] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:35.614 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd6 Sending msg of 3105 bytes to 2 on channel businesschannel took 35.9µs" +orderer0.example.com | "2019-11-19 05:22:35.615 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd7 Sending msg of 3105 bytes to 3 on channel businesschannel took 19.2µs" +orderer0.example.com | "2019-11-19 05:22:35.615 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd8 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " +orderer0.example.com | "2019-11-19 05:22:35.615 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd9 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer1.example.com(orderer1.example.com:7050) took 81.6µs " +orderer0.example.com | "2019-11-19 05:22:35.619 UTC [orderer.common.cluster.step] handleMessage -> DEBU fda Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.619 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdb Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-11-19 05:22:35.620 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdc Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +orderer0.example.com | "2019-11-19 05:22:35.620 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.3µs " +orderer0.example.com | "2019-11-19 05:22:35.620 UTC [orderer.consensus.etcdraft] writeBlock -> INFO fde Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:35.620 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU fdf [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-11-19 05:22:35.620 UTC [msp] GetDefaultSigningIdentity -> DEBU fe0 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:35.620 UTC [msp] GetDefaultSigningIdentity -> DEBU fe1 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:35.620 UTC [msp.identity] Sign -> DEBU fe2 Sign: plaintext: 0A020802120B0A090A03010203100418...A1A8727743F6E000026689E4F6CEC658 " +orderer0.example.com | "2019-11-19 05:22:35.621 UTC [msp.identity] Sign -> DEBU fe3 Sign: digest: 086621CFC79801F97E487D1899BCD0B36104F062BBDAD30F4551528040AD3E02 " +orderer0.example.com | "2019-11-19 05:22:35.621 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.4µs " +orderer0.example.com | "2019-11-19 05:22:35.623 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.623 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.623 UTC [fsblkstorage] indexBlock -> DEBU fe7 Indexing block [blockNum=4, blockHash=[]byte{0x4, 0xe7, 0xc, 0x85, 0x3a, 0x49, 0x30, 0x52, 0x72, 0xab, 0xdb, 0xa8, 0x7b, 0x33, 0xba, 0x1c, 0xf9, 0x58, 0x99, 0xbf, 0x89, 0xa6, 0x5d, 0x1d, 0xca, 0x40, 0x6d, 0xa0, 0xbc, 0x4d, 0x3d, 0x62} txOffsets= +orderer0.example.com | txId=e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff locPointer=offset=70, bytesLength=2977 +orderer0.example.com | ]" +orderer0.example.com | "2019-11-19 05:22:35.624 UTC [fsblkstorage] updateCheckpoint -> DEBU fe8 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85274], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2019-11-19 05:22:35.625 UTC [orderer.commmon.multichannel] commitBlock -> DEBU fe9 [channel: businesschannel] Wrote block [4]" +orderer0.example.com | "2019-11-19 05:22:35.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU fea Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU feb Sending msg of 28 bytes to 2 on channel businesschannel took 135.4µs" +orderer0.example.com | "2019-11-19 05:22:35.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fec Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2019-11-19 05:22:35.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU fed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +orderer0.example.com | "2019-11-19 05:22:35.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU fee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.4µs " +orderer0.example.com | "2019-11-19 05:22:35.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU fef Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:35.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff0 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:36.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:36.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-11-19 05:22:36.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.9µs " +orderer0.example.com | "2019-11-19 05:22:36.365 UTC [orderer.common.server] Broadcast -> DEBU ff4 Starting new Broadcast handler" +orderer0.example.com | "2019-11-19 05:22:36.365 UTC [orderer.common.broadcast] Handle -> DEBU ff5 Starting new broadcast loop for 172.18.0.5:51556" +orderer0.example.com | "2019-11-19 05:22:36.392 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ff6 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:51556 with txid '2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ff7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ff8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ff9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ffa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ffb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:22:36.392 UTC [msp] DeserializeIdentity -> DEBU ffc Obtaining identity" +orderer0.example.com | "2019-11-19 05:22:36.393 UTC [msp.identity] newIdentity -> DEBU ffd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +orderer0.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +orderer0.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +orderer0.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +orderer0.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:36.393 UTC [cauthdsl] func1 -> DEBU ffe 0xc00109fc20 gate 1574140956393397100 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:36.393 UTC [cauthdsl] func2 -> DEBU fff 0xc00109fc20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:36.393 UTC [cauthdsl] func2 -> DEBU 1000 0xc00109fc20 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:36.393 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1001 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-11-19 05:22:36.393 UTC [msp] Validate -> DEBU 1002 MSP Org2MSP validating identity" +orderer0.example.com | "2019-11-19 05:22:36.393 UTC [msp] getCertificationChain -> DEBU 1003 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:22:36.394 UTC [cauthdsl] func2 -> DEBU 1004 0xc00109fc20 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:36.394 UTC [msp.identity] Verify -> DEBU 1005 Verify: digest = 00000000 99 26 b8 08 96 42 20 b0 93 90 db 47 bf fd 5f 64 |.&...B ....G.._d| +orderer0.example.com | 00000010 20 57 2e 37 e4 32 9f 5f 80 0a 2f a1 39 a6 64 68 | W.7.2._../.9.dh|" +orderer0.example.com | "2019-11-19 05:22:36.394 UTC [msp.identity] Verify -> DEBU 1006 Verify: sig = 00000000 30 44 02 20 27 8d 3f de 4b 30 dd 90 ff 5a ac b4 |0D. '.?.K0...Z..| +orderer0.example.com | 00000010 19 80 38 1a bd c5 6c 25 03 c3 a8 82 3a b5 ca de |..8...l%....:...| +orderer0.example.com | 00000020 5a 99 a0 c1 02 20 06 0a 45 ed 9e bd e8 83 cb ea |Z.... ..E.......| +orderer0.example.com | 00000030 86 34 5d 26 b1 55 76 12 05 30 94 60 26 6d b2 47 |.4]&.Uv..0.`&m.G| +orderer0.example.com | 00000040 52 6c 09 15 27 0e |Rl..'.|" +orderer0.example.com | "2019-11-19 05:22:36.394 UTC [cauthdsl] func2 -> DEBU 1007 0xc00109fc20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:36.394 UTC [cauthdsl] func1 -> DEBU 1008 0xc00109fc20 gate 1574140956393397100 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:36.394 UTC [policies] Evaluate -> DEBU 1009 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100b Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100d Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:36.396 UTC [orderer.common.blockcutter] Ordered -> DEBU 100f Enqueuing message into batch" +orderer0.example.com | "2019-11-19 05:22:36.396 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1010 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:51556" +orderer0.example.com | "2019-11-19 05:22:36.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1011 Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +orderer0.example.com | "2019-11-19 05:22:36.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1012 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-11-19 05:22:36.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1013 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.1µs " +orderer0.example.com | "2019-11-19 05:22:36.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1014 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 309.7µs " +orderer0.example.com | "2019-11-19 05:22:36.401 UTC [orderer.common.broadcast] Handle -> WARN 1015 Error reading from 172.18.0.5:51556: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:36.401 UTC [orderer.common.server] func1 -> DEBU 1016 Closing Broadcast stream" +orderer0.example.com | "2019-11-19 05:22:36.401 UTC [comm.grpc.server] 1 -> INFO 1017 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51556 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.2685ms +orderer0.example.com | "2019-11-19 05:22:36.401 UTC [grpc] infof -> DEBU 1018 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:36.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:36.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:36.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:36.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101c Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +orderer0.example.com | "2019-11-19 05:22:36.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.5µs " +orderer0.example.com | "2019-11-19 05:22:36.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101e Sending msg of 28 bytes to 2 on channel businesschannel took 71.9µs" +orderer0.example.com | "2019-11-19 05:22:36.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101f Sending msg of 28 bytes to 3 on channel businesschannel took 33.1µs" +orderer0.example.com | "2019-11-19 05:22:36.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1020 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.7µs " +orderer0.example.com | "2019-11-19 05:22:36.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1021 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.7µs " +orderer0.example.com | "2019-11-19 05:22:36.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1022 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:36.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1023 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:37.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:37.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +orderer0.example.com | "2019-11-19 05:22:37.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1026 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.8µs " +orderer0.example.com | "2019-11-19 05:22:37.401 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1027 Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +orderer0.example.com | "2019-11-19 05:22:37.403 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1029 Sending msg of 28 bytes to 3 on channel businesschannel took 72.8µs" +orderer0.example.com | "2019-11-19 05:22:37.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:37.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1028 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.2µs " +orderer0.example.com | "2019-11-19 05:22:37.403 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.7µs " +orderer0.example.com | "2019-11-19 05:22:37.405 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:37.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:37.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102e Sending msg of 28 bytes to 3 on channel testchainid took 34µs" +orderer0.example.com | "2019-11-19 05:22:37.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.3µs " +orderer0.example.com | "2019-11-19 05:22:37.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1030 Sending msg of 28 bytes to 2 on channel businesschannel took 32µs" +orderer0.example.com | "2019-11-19 05:22:37.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1031 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147µs " +orderer0.example.com | "2019-11-19 05:22:37.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1032 Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +orderer0.example.com | "2019-11-19 05:22:37.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1033 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:37.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +orderer0.example.com | "2019-11-19 05:22:37.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1035 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.029 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1036 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1037 Sending msg of 28 bytes to 3 on channel testchainid took 28.6µs" +orderer0.example.com | "2019-11-19 05:22:38.030 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1038 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260µs " +orderer0.example.com | "2019-11-19 05:22:38.398 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1039 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:38.399 UTC [orderer.consensus.etcdraft] propose -> INFO 103a Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:38.400 UTC [orderer.consensus.etcdraft] 2 -> DEBU 103b Proposed block [5] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:38.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.7µs " +orderer0.example.com | "2019-11-19 05:22:38.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103d Sending msg of 28 bytes to 2 on channel businesschannel took 957.9µs" +orderer0.example.com | "2019-11-19 05:22:38.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.403 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103f Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +orderer0.example.com | "2019-11-19 05:22:38.403 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1040 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " +orderer0.example.com | "2019-11-19 05:22:38.405 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1041 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1042 Sending msg of 3105 bytes to 3 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-11-19 05:22:38.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1044 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer2.example.com(orderer2.example.com:7050) took 376.1µs " +orderer0.example.com | "2019-11-19 05:22:38.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1043 Sending msg of 3105 bytes to 2 on channel businesschannel took 70.5µs" +orderer0.example.com | "2019-11-19 05:22:38.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1045 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer1.example.com(orderer1.example.com:7050) took 379.8µs " +orderer0.example.com | "2019-11-19 05:22:38.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1046 Sending msg of 28 bytes to 2 on channel businesschannel took 1.6691ms" +orderer0.example.com | "2019-11-19 05:22:38.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-11-19 05:22:38.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1048 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 276.3µs " +orderer0.example.com | "2019-11-19 05:22:38.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.7µs " +orderer0.example.com | "2019-11-19 05:22:38.414 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104b Sending msg of 28 bytes to 2 on channel businesschannel took 14.2µs" +orderer0.example.com | "2019-11-19 05:22:38.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104c Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-11-19 05:22:38.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.6µs " +orderer0.example.com | "2019-11-19 05:22:38.416 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 104e Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:38.416 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 104f [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-11-19 05:22:38.417 UTC [msp] GetDefaultSigningIdentity -> DEBU 1050 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:38.417 UTC [msp] GetDefaultSigningIdentity -> DEBU 1051 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:38.417 UTC [msp.identity] Sign -> DEBU 1052 Sign: plaintext: 0A020802120B0A090A03010203100418...D868E4050A27D5834C3C64F80CACA885 " +orderer0.example.com | "2019-11-19 05:22:38.417 UTC [msp.identity] Sign -> DEBU 1053 Sign: digest: 5917B87AB26D3CE233682F6C43B6C8F4ABC97E1AB8FAA5738D1D9DD56F705263 " +orderer0.example.com | "2019-11-19 05:22:38.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1054 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.1µs " +orderer0.example.com | "2019-11-19 05:22:38.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1055 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1056 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1057 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1058 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.422 UTC [fsblkstorage] indexBlock -> DEBU 1059 Indexing block [blockNum=5, blockHash=[]byte{0x44, 0xdf, 0xb3, 0x3, 0x50, 0x9, 0x8b, 0x23, 0x1f, 0xc8, 0xd4, 0xb0, 0xc3, 0x60, 0xd3, 0x21, 0x24, 0x37, 0xaf, 0x67, 0x75, 0x46, 0xbe, 0x57, 0x44, 0x26, 0x16, 0x7c, 0x26, 0x99, 0x8e, 0xa7} txOffsets= +orderer0.example.com | txId=2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 locPointer=offset=70, bytesLength=2977 +orderer0.example.com | ]" +orderer0.example.com | "2019-11-19 05:22:38.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.439 UTC [fsblkstorage] updateCheckpoint -> DEBU 105b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89259], isChainEmpty=[false], lastBlockNumber=[5]" +orderer0.example.com | "2019-11-19 05:22:38.439 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 105c [channel: businesschannel] Wrote block [5]" +orderer0.example.com | "2019-11-19 05:22:38.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105e Sending msg of 28 bytes to 3 on channel testchainid took 40.7µs" +orderer0.example.com | "2019-11-19 05:22:38.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226µs " +orderer0.example.com | "2019-11-19 05:22:38.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1060 Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +orderer0.example.com | "2019-11-19 05:22:38.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1061 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2019-11-19 05:22:38.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1062 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63µs " +orderer0.example.com | "2019-11-19 05:22:38.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1063 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.5µs " +orderer0.example.com | "2019-11-19 05:22:38.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1064 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:38.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1065 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:39.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1066 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:39.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1067 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-11-19 05:22:39.027 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1068 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.5µs " +orderer0.example.com | "2019-11-19 05:22:39.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1069 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-11-19 05:22:39.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106a Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2019-11-19 05:22:39.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.8µs " +peer0.org1.example.com | [f4c 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f4d 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f4e 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f4f 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f50 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f51 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f52 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f53 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 gate 1574140919349499300 evaluation starts +peer0.org1.example.com | [f54 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f55 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [f56 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 principal matched by identity 0 +peer0.org1.example.com | [f57 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [f58 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [f59 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f5a 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 gate 1574140919349499300 evaluation succeeds +peer0.org1.example.com | [f5b 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f5c 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f5d 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f5e 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f5f 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [f60 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [f61 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f62 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f63 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f64 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f65 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f66 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f67 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f68 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f69 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 gate 1574140919354135100 evaluation starts +peer0.org1.example.com | [f6a 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f6b 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [f6c 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 principal matched by identity 0 +peer0.org1.example.com | [f6d 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [f6e 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [f6f 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f70 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 gate 1574140919354135100 evaluation succeeds +peer0.org1.example.com | [f71 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f72 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f73 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f74 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f75 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [f76 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [f77 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f78 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [f79 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [f7a 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [f7b 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f7c 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f7d 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f7e 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f7f 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f80 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f81 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f82 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f83 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f84 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 gate 1574140919360641000 evaluation starts +peer0.org1.example.com | [f85 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f86 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [f87 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 principal matched by identity 0 +peer0.org1.example.com | [f88 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [f89 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [f8a 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f8b 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 gate 1574140919360641000 evaluation succeeds +peer0.org1.example.com | [f8c 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f8d 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f8e 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f8f 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f90 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [f91 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [f92 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [f93 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [f94 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f95 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f96 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f97 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f98 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f99 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f9a 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f8b 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003833140 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [f8c 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003833140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f8d 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003833140 principal evaluation fails +peer0.org2.example.com | [f8e 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003833140 gate 1574140920004523800 evaluation fails +peer0.org2.example.com | [f8f 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f90 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f91 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [f92 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038336b0 gate 1574140920007921800 evaluation starts +peer0.org2.example.com | [f93 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038336b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f94 11-19 05:22:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038336b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [f95 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038336b0 principal matched by identity 0 +peer0.org2.example.com | [f96 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [f97 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [f98 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038336b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f99 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038336b0 gate 1574140920007921800 evaluation succeeds +peer0.org2.example.com | [f9a 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f9b 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f9c 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f9d 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f9e 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f9f 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [fa0 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fa1 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fa2 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fa3 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [fa4 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [fa5 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [fa6 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [fa7 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [fa8 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [fa9 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003854a90 gate 1574140920012738900 evaluation starts +peer0.org2.example.com | [faa 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003854a90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fab 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003854a90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [fac 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003854a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [fad 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003854a90 principal evaluation fails +peer0.org2.example.com | [fae 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003854a90 gate 1574140920012738900 evaluation fails +peer1.org1.example.com | [d78 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d79 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d7a 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d7b 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d7c 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [d7d 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d7e 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5db70 gate 1574140920410345300 evaluation starts +peer1.org1.example.com | [d7f 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5db70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d80 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5db70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [d81 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5db70 principal matched by identity 0 +peer1.org1.example.com | [d82 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5d dc cd a9 f5 28 47 a3 a2 f2 d2 7d 60 a3 f2 |.]....(G....}`..| +peer1.org1.example.com | 00000010 8f 5d cb 61 c8 90 58 1f f4 f5 ea 94 8b c7 05 3e |.].a..X........>| +peer1.org1.example.com | [d83 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 7f 98 81 e5 b9 23 a7 ac 42 a8 b4 |0D. ......#..B..| +peer1.org1.example.com | 00000010 e9 73 a8 35 bc 11 d7 e1 a4 14 d0 0c 89 00 ec 27 |.s.5...........'| +peer1.org1.example.com | 00000020 42 cb 23 f0 02 20 52 a4 cf 86 56 5d b4 f3 da 16 |B.#.. R...V]....| +peer1.org1.example.com | 00000030 7c 6b eb d8 65 3f b5 08 40 5d 00 9a 09 db fc 6e ||k..e?..@].....n| +peer1.org1.example.com | 00000040 db f6 cd ca 2c 3d |....,=| +peer1.org1.example.com | [d84 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5db70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d85 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5db70 gate 1574140920410345300 evaluation succeeds +peer1.org1.example.com | [d86 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d87 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d88 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d89 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d8a 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d8b 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [d8c 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [d8d 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [d8e 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [d8f 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d90 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d91 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d92 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d93 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d94 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d95 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d96 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d97 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d98 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d99 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d9a 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d9b 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d9c 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [d9d 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d9e 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d9f 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da0 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da1 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [da2 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [da3 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da4 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [da5 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [da6 11-19 05:22:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da7 11-19 05:22:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [da8 11-19 05:22:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da9 11-19 05:22:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [daa 11-19 05:22:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [dab 11-19 05:22:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151019 +peer1.org1.example.com | [dac 11-19 05:22:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D8AE8DB1BE1CE0968BEEDBE6BCB19CBC8584A8301F3EC423E86CA1B81183F945 +peer1.org1.example.com | [dad 11-19 05:22:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [dae 11-19 05:22:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [daf 11-19 05:22:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [db0 11-19 05:22:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [db1 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [db2 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [db3 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [db4 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [db5 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [db7 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [db6 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [db8 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [db9 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [dba 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dbb 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:39.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 173.7µs " +orderer0.example.com | "2019-11-19 05:22:39.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:39.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:39.529 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:39.530 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1070 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +orderer0.example.com | "2019-11-19 05:22:39.530 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1071 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.6µs " +orderer0.example.com | "2019-11-19 05:22:39.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1072 Sending msg of 28 bytes to 2 on channel businesschannel took 121.8µs" +orderer0.example.com | "2019-11-19 05:22:39.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1073 Sending msg of 28 bytes to 3 on channel businesschannel took 295.9µs" +orderer0.example.com | "2019-11-19 05:22:39.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1074 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 854.7µs " +orderer0.example.com | "2019-11-19 05:22:39.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1075 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 711.8µs " +orderer0.example.com | "2019-11-19 05:22:39.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1076 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:39.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1077 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:40.032 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1078 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:40.033 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1079 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2019-11-19 05:22:40.033 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.3µs " +orderer0.example.com | "2019-11-19 05:22:40.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107b Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-11-19 05:22:40.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.8µs " +orderer0.example.com | "2019-11-19 05:22:40.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.2µs " +orderer0.example.com | "2019-11-19 05:22:40.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:40.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:40.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1080 Sending msg of 28 bytes to 2 on channel businesschannel took 122.1µs" +orderer0.example.com | "2019-11-19 05:22:40.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1081 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:40.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1082 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +peer0.org2.example.com | [faf 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [fb0 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [fb1 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [fb2 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003855000 gate 1574140920013545100 evaluation starts +peer0.org2.example.com | [fb3 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003855000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fb4 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003855000 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [fb5 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003855000 principal matched by identity 0 +peer0.org2.example.com | [fb6 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [fb7 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [fb8 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003855000 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [fb9 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003855000 gate 1574140920013545100 evaluation succeeds +peer0.org2.example.com | [fba 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fbb 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fbc 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [fbd 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [fbe 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fbf 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fc0 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [fc1 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [fc2 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [fc3 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [fc4 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [fc5 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [fc6 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876190 gate 1574140920015763800 evaluation starts +peer0.org2.example.com | [fc7 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fc8 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876190 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [fc9 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [fca 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876190 principal evaluation fails +peer0.org2.example.com | [fcb 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876190 gate 1574140920015763800 evaluation fails +peer0.org2.example.com | [fcc 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [fcd 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [fce 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [fcf 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876700 gate 1574140920016729600 evaluation starts +peer0.org2.example.com | [fd0 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fd1 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876700 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [fd2 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876700 principal matched by identity 0 +peer0.org2.example.com | [fd3 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [fd4 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [fd5 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876700 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [fd6 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876700 gate 1574140920016729600 evaluation succeeds +peer0.org2.example.com | [fd7 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fd8 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fd9 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [fda 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [fdb 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [fdc 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [fdd 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [fde 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [fdf 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe0 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [fe1 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [fe2 11-19 05:22:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe3 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [fe4 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [fe5 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [fe6 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510041801 +peer0.org2.example.com | [fe7 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B83D4A09700EDE4FEB3B2A979BC89C5D0946E053A597FDDA8250D4E0D75BCA85 +peer0.org2.example.com | [fe8 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [fe9 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fea 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [feb 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fec 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fed 11-19 05:22:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [fee 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fef 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff0 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [ff1 11-19 05:22:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dbc 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dbd 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dbe 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dbf 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dc0 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dc1 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dc2 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [dc3 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dc4 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [dc5 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [dc6 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [dc7 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [dc8 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [dc9 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [dca 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfee0 gate 1574140920843346700 evaluation starts +peer1.org1.example.com | [dcb 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfee0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [dcc 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfee0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [dcd 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfee0 principal matched by identity 0 +peer1.org1.example.com | [dce 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 79 57 a8 8d 6c 20 cc 56 64 3f c0 d2 1d 97 b7 |.yW..l .Vd?.....| +peer1.org1.example.com | 00000010 1a 51 37 63 a4 98 d6 b9 27 2d a9 ed 50 b7 57 24 |.Q7c....'-..P.W$| +peer1.org1.example.com | [dcf 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 fc 10 eb 1f 45 49 75 a3 39 70 05 |0D. G....EIu.9p.| +peer1.org1.example.com | 00000010 9f 1a d2 51 51 be 64 bd f3 e5 04 6f f0 ba 1d 42 |...QQ.d....o...B| +peer1.org1.example.com | 00000020 0a 0d 51 4a 02 20 0a c0 ea 8c 86 e9 af 8a 43 90 |..QJ. ........C.| +peer1.org1.example.com | 00000030 c6 15 d3 3d 15 d0 b0 71 a2 b1 6f af 57 7f 40 a6 |...=...q..o.W.@.| +peer1.org1.example.com | 00000040 7f 77 2a 8a 18 08 |.w*...| +peer1.org1.example.com | [dd0 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfee0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [dd1 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfee0 gate 1574140920843346700 evaluation succeeds +peer1.org1.example.com | [dd2 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [dd3 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [dd4 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [dd5 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [dd6 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dd7 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [dd8 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [dd9 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [dda 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [ddb 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ddc 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ddd 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dde 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ddf 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de0 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de1 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de2 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de3 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de4 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [de5 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de6 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de7 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [de8 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [de9 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dea 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [deb 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dec 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ded 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dee 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [def 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [df0 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [df1 11-19 05:22:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [df2 11-19 05:22:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [df3 11-19 05:22:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [df4 11-19 05:22:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [df5 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [df6 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [df7 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [df8 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [df9 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" secret_envelope:\353\206z3\037\014$u\036\321\002 Q\177\017\232q\370\367\241\023\024\217\376\356^R\217\253O\264Qv\306\023\247\376\261;\276\234\203^\350" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [11d1 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [11d2 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [11d3 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11d4 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [11d5 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 6a 7d 56 6d 5f fc 25 72 1b 99 d9 a8 44 d4 44 |tj}Vm_.%r....D.D| +peer1.org2.example.com | 00000010 5d c4 92 fb 3a b5 13 80 a3 d2 61 9b 4f 79 aa 45 |]...:.....a.Oy.E| +peer1.org2.example.com | [11d6 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 85 39 6f b5 de 76 75 fc 97 99 |0E.!...9o..vu...| +peer1.org2.example.com | 00000010 15 7b e0 90 65 38 a5 e4 60 ac db 2a 07 c6 19 25 |.{..e8..`..*...%| +peer1.org2.example.com | 00000020 8d a3 a7 74 f7 02 20 0b 88 0a 99 85 41 a5 5d 2b |...t.. .....A.]+| +peer1.org2.example.com | 00000030 b0 91 2d 11 d0 13 bb b5 5e 0c 94 5b 87 b2 bb cd |..-.....^..[....| +peer1.org2.example.com | 00000040 f4 59 5a 82 0b 92 e8 |.YZ....| +peer1.org2.example.com | [11d7 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [11d8 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 3d 7e 08 a7 d3 b7 2c 5b 75 19 |0E.!..=~....,[u.| +peer1.org2.example.com | 00000010 d8 fd 54 2f 3d 78 09 40 9c 01 21 6b 31 d9 54 30 |..T/=x.@..!k1.T0| +peer1.org2.example.com | 00000020 07 a5 c1 65 50 02 20 40 2b 8e f1 4b 69 39 4f da |...eP. @+..Ki9O.| +peer1.org2.example.com | 00000030 81 45 6c e8 af 2a e5 d3 56 dc 87 4e d9 09 ae e2 |.El..*..V..N....| +peer1.org2.example.com | 00000040 2c 70 c9 09 fa 7d 78 |,p...}x| +peer1.org2.example.com | [11d9 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [11da 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [11db 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [11dc 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [11dd 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [11de 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11df 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11e0 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11e1 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [11e2 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11e3 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11e4 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [11e5 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [11e6 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11e7 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [11e8 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff2 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff3 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff4 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff5 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ff6 11-19 05:22:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff7 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff8 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [ff9 11-19 05:22:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ffa 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ffb 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ffc 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ffd 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [ffe 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5d dc cd a9 f5 28 47 a3 a2 f2 d2 7d 60 a3 f2 |.]....(G....}`..| +peer0.org2.example.com | 00000010 8f 5d cb 61 c8 90 58 1f f4 f5 ea 94 8b c7 05 3e |.].a..X........>| +peer0.org2.example.com | [fff 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 7f 98 81 e5 b9 23 a7 ac 42 a8 b4 |0D. ......#..B..| +peer0.org2.example.com | 00000010 e9 73 a8 35 bc 11 d7 e1 a4 14 d0 0c 89 00 ec 27 |.s.5...........'| +peer0.org2.example.com | 00000020 42 cb 23 f0 02 20 52 a4 cf 86 56 5d b4 f3 da 16 |B.#.. R...V]....| +peer0.org2.example.com | 00000030 7c 6b eb d8 65 3f b5 08 40 5d 00 9a 09 db fc 6e ||k..e?..@].....n| +peer0.org2.example.com | 00000040 db f6 cd ca 2c 3d |....,=| +peer0.org2.example.com | [1000 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1001 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1002 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1003 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1004 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1005 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1006 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1007 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1008 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1009 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [100a 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [100b 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [100c 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [100d 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [100e 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [100f 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1010 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1011 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1012 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1013 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f9b 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f9c 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 gate 1574140919370802900 evaluation starts +peer0.org1.example.com | [f9d 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f9e 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [f9f 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 principal matched by identity 0 +peer0.org1.example.com | [fa0 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [fa1 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [fa2 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [fa3 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 gate 1574140919370802900 evaluation succeeds +peer0.org1.example.com | [fa4 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fa5 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fa6 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [fa7 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [fa8 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fa9 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [faa 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [fab 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [fac 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [fad 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [fae 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [faf 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fb0 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [fb1 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fb2 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fb3 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [fb4 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [fb5 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [fb6 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 gate 1574140919378217000 evaluation starts +peer0.org1.example.com | [fb7 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [dfa 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" secret_envelope:\353\206z3\037\014$u\036\321\002 Q\177\017\232q\370\367\241\023\024\217\376\356^R\217\253O\264Qv\306\023\247\376\261;\276\234\203^\350" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [dfb 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [dfc 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer1.org1.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer1.org1.example.com | [dfd 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer1.org1.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer1.org1.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer1.org1.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer1.org1.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer1.org1.example.com | [dfe 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [dff 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 fb 20 98 a1 28 4d b7 21 cd b2 |0E.!... ..(M.!..| +peer1.org1.example.com | 00000010 7a 1b a4 61 a8 e8 d0 f1 5a 53 3e eb 86 7a 33 1f |z..a....ZS>..z3.| +peer1.org1.example.com | 00000020 0c 24 75 1e d1 02 20 51 7f 0f 9a 71 f8 f7 a1 13 |.$u... Q...q....| +peer1.org1.example.com | 00000030 14 8f fe ee 5e 52 8f ab 4f b4 51 76 c6 13 a7 fe |....^R..O.Qv....| +peer1.org1.example.com | 00000040 b1 3b be 9c 83 5e e8 |.;...^.| +peer1.org1.example.com | [e00 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [e01 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [e02 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [e03 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [e04 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [e05 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e06 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e07 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e08 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [e09 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e0a 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e0b 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e0c 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" secret_envelope:\353\206z3\037\014$u\036\321\002 Q\177\017\232q\370\367\241\023\024\217\376\356^R\217\253O\264Qv\306\023\247\376\261;\276\234\203^\350" > > alive: +peer1.org1.example.com | [e0d 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [e0e 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e0f 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e10 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e11 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e12 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e13 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e14 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1014 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1015 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1016 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1017 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1018 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1019 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [101a 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [101b 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [101c 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [101d 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [101e 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [101f 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1020 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1021 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1022 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1023 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1024 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1025 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1026 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4850 gate 1574140920810100500 evaluation starts +peer0.org2.example.com | [1027 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4850 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1028 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4850 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1029 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [102a 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4850 principal evaluation fails +peer0.org2.example.com | [102b 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4850 gate 1574140920810100500 evaluation fails +peer0.org2.example.com | [102c 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [102d 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [102e 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [102f 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4dc0 gate 1574140920813811000 evaluation starts +peer0.org2.example.com | [1030 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1031 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4dc0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1032 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4dc0 principal matched by identity 0 +peer0.org1.example.com | [fb8 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [fb9 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 principal matched by identity 0 +peer0.org1.example.com | [fba 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [fbb 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [fbc 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [fbd 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 gate 1574140919378217000 evaluation succeeds +peer0.org1.example.com | [fbe 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fbf 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fc0 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [fc1 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [fc2 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fc3 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fc4 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [fc5 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fc6 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fc7 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [fc8 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [fc9 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [fca 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 gate 1574140919383074100 evaluation starts +peer0.org1.example.com | [fcb 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [fcc 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [fcd 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 principal matched by identity 0 +peer0.org1.example.com | [fce 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [fcf 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [fd0 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [fd1 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 gate 1574140919383074100 evaluation succeeds +peer0.org1.example.com | [fd2 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fd3 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fd4 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [fd5 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [fd6 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd7 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fd8 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fd9 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [fda 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:40.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1083 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.1µs " +orderer0.example.com | "2019-11-19 05:22:40.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1084 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-11-19 05:22:40.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1085 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-11-19 05:22:40.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1086 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.1µs " +orderer0.example.com | "2019-11-19 05:22:40.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:40.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1088 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:40.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1089 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 294.3µs " +orderer0.example.com | "2019-11-19 05:22:41.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:41.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108b Sending msg of 28 bytes to 3 on channel testchainid took 169.5µs" +orderer0.example.com | "2019-11-19 05:22:41.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.5µs " +orderer0.example.com | "2019-11-19 05:22:41.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108d Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-11-19 05:22:41.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108e Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +orderer0.example.com | "2019-11-19 05:22:41.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " +orderer0.example.com | "2019-11-19 05:22:41.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1090 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.9µs " +orderer0.example.com | "2019-11-19 05:22:41.399 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1091 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:41.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1092 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:41.529 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1093 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:41.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2019-11-19 05:22:41.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1095 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.2µs " +orderer0.example.com | "2019-11-19 05:22:41.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1096 Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-11-19 05:22:41.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1097 Sending msg of 28 bytes to 3 on channel businesschannel took 8.7µs" +orderer0.example.com | "2019-11-19 05:22:41.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1098 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +orderer0.example.com | "2019-11-19 05:22:41.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1099 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.8µs " +orderer0.example.com | "2019-11-19 05:22:41.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:41.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:42.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:42.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-11-19 05:22:42.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +orderer0.example.com | "2019-11-19 05:22:42.166 UTC [orderer.common.server] Deliver -> DEBU 109f Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:42.166 UTC [common.deliver] Handle -> DEBU 10a0 Starting new deliver loop for 172.18.0.5:51602" +orderer0.example.com | "2019-11-19 05:22:42.166 UTC [common.deliver] Handle -> DEBU 10a1 Attempting to read seek info message from 172.18.0.5:51602" +orderer0.example.com | "2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.167 UTC [msp] DeserializeIdentity -> DEBU 10a7 Obtaining identity" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [msp.identity] newIdentity -> DEBU 10a8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | [fdb 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fdc 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [fdd 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [fde 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fdf 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [fe0 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [fe1 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [fe2 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fe3 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [fe4 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [fe5 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [fe6 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510041801 +peer0.org1.example.com | [fe7 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9261850069933056C1E196CA66C5FEEC58A168B988F207A431D972E44F3263AE +peer0.org1.example.com | [fe8 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [fe9 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [fea 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [feb 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [fec 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fed 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fee 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fef 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff0 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff1 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff2 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff3 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff4 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff5 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [ff6 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff7 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff8 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [ff9 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ffa 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ffb 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [ffc 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ffd 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [ffe 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [fff 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1000 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1001 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1002 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11e9 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11ea 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [11eb 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [11ec 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11ed 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [11ee 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [11ef 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [11f0 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [11f1 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [11f2 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [11f3 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031a5c0 gate 1574140927919891100 evaluation starts +peer1.org2.example.com | [11f4 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031a5c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11f5 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031a5c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [11f6 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031a5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [11f7 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031a5c0 principal evaluation fails +peer1.org2.example.com | [11f8 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031a5c0 gate 1574140927919891100 evaluation fails +peer1.org2.example.com | [11f9 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11fa 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11fb 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [11fc 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ab30 gate 1574140927921762800 evaluation starts +peer1.org2.example.com | [11fd 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ab30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11fe 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ab30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [11ff 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ab30 principal matched by identity 0 +peer1.org2.example.com | [1200 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 94 a5 97 d0 fd 59 99 e5 57 ca 0c 06 a2 c6 a7 |S.....Y..W......| +peer1.org2.example.com | 00000010 f9 2c 3a 87 c5 72 d1 50 d9 51 96 15 35 6f 9b c3 |.,:..r.P.Q..5o..| +peer1.org2.example.com | [1201 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc ad 80 5b 80 12 1b 17 4e f6 85 |0E.!....[....N..| +peer1.org2.example.com | 00000010 1e 06 1f f1 67 f9 54 1f ab 07 6b 18 0e 65 4a e5 |....g.T...k..eJ.| +peer1.org2.example.com | 00000020 0f 78 5e 27 70 02 20 4d 5d e7 56 e4 16 10 a8 96 |.x^'p. M].V.....| +peer1.org2.example.com | 00000030 29 ec b5 f7 29 87 31 5b d9 65 b2 0a 77 54 1a fb |)...).1[.e..wT..| +peer1.org2.example.com | 00000040 40 58 2d fc 41 d7 2d |@X-.A.-| +peer1.org2.example.com | [1202 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ab30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1203 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ab30 gate 1574140927921762800 evaluation succeeds +peer1.org2.example.com | [1204 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1205 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1206 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1207 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [e15 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [e16 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [e17 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e18 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [e19 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [e1a 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [e1b 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1c 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1d 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1e 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1f 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e20 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e21 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [e22 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e23 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [e24 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [e25 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e26 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [e27 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [e28 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e29 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e2a 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e2b 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e2c 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e2d 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e2e 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e2f 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39e40 gate 1574140923453594100 evaluation starts +peer1.org1.example.com | [e30 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39e40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1003 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1004 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1005 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1006 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1007 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1008 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1009 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 gate 1574140919450412300 evaluation starts +peer0.org1.example.com | [100a 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [100b 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [100c 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 principal matched by identity 0 +peer0.org1.example.com | [100d 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +peer0.org1.example.com | 00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +peer0.org1.example.com | [100e 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +peer0.org1.example.com | 00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +peer0.org1.example.com | 00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +peer0.org1.example.com | 00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +peer0.org1.example.com | 00000040 6e 72 3d 80 4d da |nr=.M.| +peer0.org1.example.com | [100f 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1010 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 gate 1574140919450412300 evaluation succeeds +peer0.org1.example.com | [1011 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1012 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1013 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1014 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1015 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1016 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1017 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1018 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1019 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [101a 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [101b 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [101c 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [101d 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [101e 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [101f 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1020 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1208 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1209 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [120a 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [120b 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [120c 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [120d 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [120e 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [120f 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1210 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [1211 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1212 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1213 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1214 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1215 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1216 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1217 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1218 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1219 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [121a 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [121b 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [121c 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [121d 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [121e 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [121f 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1220 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [1221 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1222 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1223 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1224 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1225 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1226 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1227 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1033 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 ae 8d b1 be 1c e0 96 8b ee db e6 bc b1 9c bc |................| +peer0.org2.example.com | 00000010 85 84 a8 30 1f 3e c4 23 e8 6c a1 b8 11 83 f9 45 |...0.>.#.l.....E| +peer0.org2.example.com | [1034 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 86 36 6f 0f e4 4c 65 bc dc 89 |0E.!...6o..Le...| +peer0.org2.example.com | 00000010 9e ec 88 dc 5b 3b f3 da 71 a5 0c c4 65 ba 2d 42 |....[;..q...e.-B| +peer0.org2.example.com | 00000020 06 23 8d 8a 4f 02 20 30 8c 04 ce 94 08 61 05 28 |.#..O. 0.....a.(| +peer0.org2.example.com | 00000030 bd 27 d6 5b 78 74 94 20 93 53 d1 d2 60 63 91 bb |.'.[xt. .S..`c..| +peer0.org2.example.com | 00000040 c3 89 5a 8a bb be 3f |..Z...?| +peer0.org2.example.com | [1035 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4dc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1036 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4dc0 gate 1574140920813811000 evaluation succeeds +peer0.org2.example.com | [1037 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1038 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1039 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [103b 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151016 +peer0.org2.example.com | [103c 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B77957A88D6C20CC56643FC0D21D97B71A513763A498D6B9272DA9ED50B75724 +peer0.org2.example.com | [103d 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [103e 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [103a 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [103f 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1041 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1040 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1042 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1043 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1044 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1045 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1046 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1047 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1048 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1049 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [104a 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [104b 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [104c 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [104d 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [104e 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [104f 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1050 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1051 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1052 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1053 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1054 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1055 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1056 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1057 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1059 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [105a 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [105b 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [105c 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1021 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1022 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\204\324aB\001@|\233~\326M\240\321-\026\010`\000]\000?u\273\260\n?\034xI" > +peer0.org1.example.com | [1023 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1024 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1025 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1026 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1027 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1028 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1029 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [102a 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [102b 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [102c 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [102d 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [102e 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [102f 11-19 05:21:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [1030 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1031 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151014 +peer0.org1.example.com | [1032 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B659A72413C3C0E41650A13FCC7B69DB7DB03E3E53C4D7D5DC9565C7C309C38 +peer0.org1.example.com | [1033 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1034 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1035 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1036 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1037 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1038 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1039 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [103a 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [103b 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [103c 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [103d 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [103e 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [103f 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1040 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1041 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func1 -> DEBU 10a9 0xc000e21b30 gate 1574140962168283700 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10aa 0xc000e21b30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10ab 0xc000e21b30 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10ac 0xc000e21b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10ad 0xc000e21b30 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func1 -> DEBU 10ae 0xc000e21b30 gate 1574140962168283700 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [policies] Evaluate -> DEBU 10af Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [policies] Evaluate -> DEBU 10b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [policies] Evaluate -> DEBU 10b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func1 -> DEBU 10b2 0xc000da0c70 gate 1574140962168594200 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10b3 0xc000da0c70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10b4 0xc000da0c70 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10b5 0xc000da0c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10b6 0xc000da0c70 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [cauthdsl] func1 -> DEBU 10b7 0xc000da0c70 gate 1574140962168594200 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10b8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [policies] func1 -> DEBU 10ba Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10bb Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10bf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [cauthdsl] func1 -> DEBU 10c0 0xc000da1980 gate 1574140962169448000 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [cauthdsl] func2 -> DEBU 10c1 0xc000da1980 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [cauthdsl] func2 -> DEBU 10c2 0xc000da1980 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 10c3 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [msp] Validate -> DEBU 10c4 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [cauthdsl] func2 -> DEBU 10c5 0xc000da1980 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [msp.identity] Verify -> DEBU 10c6 Verify: digest = 00000000 85 f3 2f 6a 7d 8a 3d da 82 c9 89 cc 4c 09 99 2c |../j}.=.....L..,| +orderer0.example.com | 00000010 d3 57 04 ab b4 8c 6e c9 a6 ab b3 f7 56 1d eb 51 |.W....n.....V..Q|" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [msp.identity] Verify -> DEBU 10c7 Verify: sig = 00000000 30 44 02 20 2d af bb 5a 01 42 ac af 24 a2 ae fc |0D. -..Z.B..$...| +orderer0.example.com | 00000010 b1 92 ed 6c 87 f3 57 99 ce fa 9e a3 25 be 6e 7b |...l..W.....%.n{| +orderer0.example.com | 00000020 c9 e0 e2 39 02 20 5f 81 13 a3 f1 5c e1 b3 ba be |...9. _....\....| +orderer0.example.com | 00000030 14 89 41 eb 9e cd c5 8a 3f db 8c d5 ca e0 c5 33 |..A.....?......3| +orderer0.example.com | 00000040 0a 1f f0 61 ca 56 |...a.V|" +orderer0.example.com | "2019-11-19 05:22:42.169 UTC [cauthdsl] func2 -> DEBU 10c8 0xc000da1980 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [cauthdsl] func1 -> DEBU 10c9 0xc000da1980 gate 1574140962169448000 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10ca Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10cb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10cc Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10ce Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [common.deliver] deliverBlocks -> DEBU 10d0 [channel: businesschannel] Received seekInfo (0xc00125b540) start: > stop: > from 172.18.0.5:51602" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [fsblkstorage] Next -> DEBU 10d1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [fsblkstorage] newBlockfileStream -> DEBU 10d2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85274]" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10d3 Remaining bytes=[3985], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10d4 Returning blockbytes - length=[3983], placementInfo={fileNum=[0], startOffset=[85274], bytesOffset=[85276]}" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10d5 blockbytes [3983] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [common.deliver] deliverBlocks -> DEBU 10d6 [channel: businesschannel] Delivering block for (0xc00125b540) for 172.18.0.5:51602" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [common.deliver] deliverBlocks -> DEBU 10d7 [channel: businesschannel] Done delivering to 172.18.0.5:51602 for (0xc00125b540)" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [common.deliver] Handle -> DEBU 10d8 Waiting for new SeekInfo from 172.18.0.5:51602" +orderer0.example.com | "2019-11-19 05:22:42.170 UTC [common.deliver] Handle -> DEBU 10d9 Attempting to read seek info message from 172.18.0.5:51602" +peer0.org2.example.com | [105d 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [105e 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [105f 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1060 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1063 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1061 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1064 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1066 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1065 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1058 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1062 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1067 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1068 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [106a 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1069 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [106b 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [106c 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [106d 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [106e 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [106f 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1070 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1071 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1072 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1073 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [1074 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1075 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1076 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1077 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1078 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1079 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:42.175 UTC [common.deliver] Handle -> WARN 10db Error reading from 172.18.0.5:51602: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:42.176 UTC [orderer.common.server] func1 -> DEBU 10dc Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:42.175 UTC [grpc] infof -> DEBU 10da transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:42.177 UTC [comm.grpc.server] 1 -> INFO 10dd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51602 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.6878ms +orderer0.example.com | "2019-11-19 05:22:42.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10de Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2019-11-19 05:22:42.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10df Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2019-11-19 05:22:42.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " +orderer0.example.com | "2019-11-19 05:22:42.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.3µs " +orderer0.example.com | "2019-11-19 05:22:42.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:42.422 UTC [orderer.common.server] Deliver -> DEBU 10e4 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:42.422 UTC [common.deliver] Handle -> DEBU 10e5 Starting new deliver loop for 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.422 UTC [common.deliver] Handle -> DEBU 10e6 Attempting to read seek info message from 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func1 -> DEBU 10ec 0xc0008b2180 gate 1574140962423376300 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10ed 0xc0008b2180 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10ee 0xc0008b2180 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10ef 0xc0008b2180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f0 0xc0008b2180 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func1 -> DEBU 10f1 0xc0008b2180 gate 1574140962423376300 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10f2 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func1 -> DEBU 10f5 0xc0008b29c0 gate 1574140962423675100 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f6 0xc0008b29c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0008b29c0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0008b29c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0008b29c0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [cauthdsl] func1 -> DEBU 10fa 0xc0008b29c0 gate 1574140962423675100 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] func1 -> DEBU 10fd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10fe Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.424 UTC [policies] Evaluate -> DEBU 1100 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 1101 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 1102 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [cauthdsl] func1 -> DEBU 1103 0xc0008b36b0 gate 1574140962425131300 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [cauthdsl] func2 -> DEBU 1104 0xc0008b36b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [cauthdsl] func2 -> DEBU 1105 0xc0008b36b0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [cauthdsl] func2 -> DEBU 1106 0xc0008b36b0 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [msp.identity] Verify -> DEBU 1107 Verify: digest = 00000000 e7 53 83 a9 ce 7a 8d 5b f7 59 08 43 52 97 b6 c4 |.S...z.[.Y.CR...| +orderer0.example.com | 00000010 17 44 e0 9f ba 8c f7 91 57 65 f9 b9 97 dd a0 ac |.D......We......|" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [msp.identity] Verify -> DEBU 1108 Verify: sig = 00000000 30 44 02 20 37 e4 b8 5b ee 17 f2 7b b5 3a b9 a6 |0D. 7..[...{.:..| +orderer0.example.com | 00000010 53 3c af 42 4d 98 b4 d6 57 1d da f3 82 b8 02 d6 |S<.BM...W.......| +orderer0.example.com | 00000020 c7 f2 e0 37 02 20 40 af cb 9e 91 32 ab a4 9d 67 |...7. @....2...g| +orderer0.example.com | 00000030 03 3c d1 15 cf 71 f2 ba 6d 33 2a 66 4e 34 b0 fe |.<...q..m3*fN4..| +orderer0.example.com | 00000040 04 5e b5 dc fc de |.^....|" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [cauthdsl] func2 -> DEBU 1109 0xc0008b36b0 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [1228 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [122a 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1229 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [122b 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [122c 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [122d 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [122e 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [122f 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1230 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1231 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1232 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1233 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1234 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1235 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1236 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1237 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad240 gate 1574140928231484400 evaluation starts +peer1.org2.example.com | [1238 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad240 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1239 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad240 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [123a 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [123b 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad240 principal evaluation fails +peer1.org2.example.com | [123c 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad240 gate 1574140928231484400 evaluation fails +peer1.org2.example.com | [123d 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [123e 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [123f 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1240 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad7b0 gate 1574140928232900500 evaluation starts +peer1.org2.example.com | [1241 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad7b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1242 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad7b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1243 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad7b0 principal matched by identity 0 +peer1.org2.example.com | [1244 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1245 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1246 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad7b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1247 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ad7b0 gate 1574140928232900500 evaluation succeeds +peer0.org1.example.com | [1042 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1043 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1044 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1045 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1046 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1047 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [1048 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1049 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [104a 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [104b 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [104c 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [104d 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [104e 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [104f 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1050 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1051 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1052 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [1053 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1054 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1055 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1056 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1058 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1059 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1248 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1249 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [124a 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [124b 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [124c 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [124d 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [124e 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [124f 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1250 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1251 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1252 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1253 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1254 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca940 gate 1574140928236752300 evaluation starts +peer1.org2.example.com | [1255 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1256 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca940 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1257 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1258 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca940 principal evaluation fails +peer1.org2.example.com | [1259 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca940 gate 1574140928236752300 evaluation fails +peer1.org2.example.com | [125a 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [125b 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [125c 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [125d 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037caeb0 gate 1574140928238193900 evaluation starts +peer1.org2.example.com | [125e 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037caeb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [125f 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037caeb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1260 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037caeb0 principal matched by identity 0 +peer1.org2.example.com | [1261 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [1262 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [1263 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037caeb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1264 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037caeb0 gate 1574140928238193900 evaluation succeeds +peer1.org2.example.com | [1265 11-19 05:22:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1266 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1267 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1268 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [126a 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1269 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [126b 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [126c 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [126d 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [107a 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [107b 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [107c 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [107d 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [107e 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [107f 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1080 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ca60 gate 1574140922850102100 evaluation starts +peer0.org2.example.com | [1081 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ca60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1082 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ca60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1083 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ca60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1084 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ca60 principal evaluation fails +peer0.org2.example.com | [1085 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ca60 gate 1574140922850102100 evaluation fails +peer0.org2.example.com | [1086 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1087 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1088 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1089 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391cfd0 gate 1574140922850408800 evaluation starts +peer0.org2.example.com | [108a 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391cfd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [108b 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391cfd0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [108c 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391cfd0 principal matched by identity 0 +peer0.org2.example.com | [108d 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer0.org2.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer0.org2.example.com | [108e 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer0.org2.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer0.org2.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer0.org2.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer0.org2.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer0.org2.example.com | [108f 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391cfd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1090 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391cfd0 gate 1574140922850408800 evaluation succeeds +peer0.org2.example.com | [1091 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1092 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1093 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1094 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1095 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1096 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1097 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1098 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1099 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [109a 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [109b 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [109c 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [109d 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [109e 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e31 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39e40 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [e32 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39e40 principal matched by identity 0 +peer1.org1.example.com | [e33 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer1.org1.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer1.org1.example.com | [e34 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer1.org1.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer1.org1.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer1.org1.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer1.org1.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer1.org1.example.com | [e35 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39e40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e36 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39e40 gate 1574140923453594100 evaluation succeeds +peer1.org1.example.com | [e37 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e38 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e39 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [e3a 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [e3b 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e3c 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [e3d 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [e3e 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [e3f 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [e40 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e41 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e42 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e43 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [e44 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e45 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e46 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e47 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e48 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [e49 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e4a 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > alive: +peer1.org1.example.com | [e4b 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e4c 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e4d 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [e4e 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4f 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e50 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [109f 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a0 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a1 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [10a2 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [10a3 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10a4 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > alive: +peer0.org2.example.com | [10a5 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [10a6 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a7 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a8 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a9 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10aa 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [10ab 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [10ac 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [10ad 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10ae 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:n\322r\267W\037\000\251\200\206(\322Sg\257f?\335Y\021)\000F2\022\371\233\220\341\315\002 U\260_V\212P%\020bRb?\007\276d\026\237\246\370`\017\327\t\253\207\334P!\270e\255\013" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [10af 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10b0 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n\322r\267W\037\000\251\200\206(\322Sg\257f?\335Y\021)\000F2\022\371\233\220\341\315\002 U\260_V\212P%\020bRb?\007\276d\026\237\246\370`\017\327\t\253\207\334P!\270e\255\013" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [10b1 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [10b2 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer0.org2.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer0.org2.example.com | [10b3 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer0.org2.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer0.org2.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer0.org2.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer0.org2.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer0.org2.example.com | [10b4 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [10b5 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 3e 6e d2 72 b7 57 1f 00 a9 80 |0E.!..>n.r.W....| +peer0.org2.example.com | 00000010 86 28 d2 53 67 af 66 3f dd 59 11 29 00 46 32 12 |.(.Sg.f?.Y.).F2.| +peer0.org2.example.com | 00000020 f9 9b 90 e1 cd 02 20 55 b0 5f 56 8a 50 25 10 62 |...... U._V.P%.b| +peer0.org2.example.com | 00000030 52 62 3f 07 be 64 16 9f a6 f8 60 0f d7 09 ab 87 |Rb?..d....`.....| +peer0.org2.example.com | 00000040 dc 50 21 b8 65 ad 0b |.P!.e..| +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [cauthdsl] func1 -> DEBU 110a 0xc0008b36b0 gate 1574140962425131300 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 1110 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.426 UTC [common.deliver] deliverBlocks -> DEBU 1111 [channel: businesschannel] Received seekInfo (0xc000fc6c00) start: > stop: > from 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.426 UTC [fsblkstorage] Next -> DEBU 1112 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:42.426 UTC [fsblkstorage] newBlockfileStream -> DEBU 1113 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85274]" +orderer0.example.com | "2019-11-19 05:22:42.426 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1114 Remaining bytes=[3985], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:42.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1115 Returning blockbytes - length=[3983], placementInfo={fileNum=[0], startOffset=[85274], bytesOffset=[85276]}" +orderer0.example.com | "2019-11-19 05:22:42.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1116 blockbytes [3983] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:42.392 UTC [common.deliver] deliverBlocks -> DEBU 1117 [channel: businesschannel] Delivering block for (0xc000fc6c00) for 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.392 UTC [common.deliver] deliverBlocks -> DEBU 1118 [channel: businesschannel] Done delivering to 172.18.0.5:51604 for (0xc000fc6c00)" +orderer0.example.com | "2019-11-19 05:22:42.392 UTC [common.deliver] Handle -> DEBU 1119 Waiting for new SeekInfo from 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.392 UTC [common.deliver] Handle -> DEBU 111a Attempting to read seek info message from 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.396 UTC [policies] Evaluate -> DEBU 111b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.396 UTC [policies] Evaluate -> DEBU 111c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.397 UTC [policies] Evaluate -> DEBU 111d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.397 UTC [policies] Evaluate -> DEBU 111e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.398 UTC [policies] Evaluate -> DEBU 111f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.398 UTC [cauthdsl] func1 -> DEBU 1120 0xc000db7f10 gate 1574140962398476200 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.399 UTC [cauthdsl] func2 -> DEBU 1121 0xc000db7f10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.399 UTC [cauthdsl] func2 -> DEBU 1122 0xc000db7f10 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.400 UTC [cauthdsl] func2 -> DEBU 1123 0xc000db7f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.400 UTC [cauthdsl] func2 -> DEBU 1124 0xc000db7f10 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.400 UTC [cauthdsl] func1 -> DEBU 1125 0xc000db7f10 gate 1574140962398476200 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.401 UTC [policies] Evaluate -> DEBU 1126 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.401 UTC [policies] Evaluate -> DEBU 1127 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 1128 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [cauthdsl] func1 -> DEBU 1129 0xc000b1c750 gate 1574140962402691500 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [cauthdsl] func2 -> DEBU 112a 0xc000b1c750 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [cauthdsl] func2 -> DEBU 112b 0xc000b1c750 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [cauthdsl] func2 -> DEBU 112c 0xc000b1c750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [cauthdsl] func2 -> DEBU 112d 0xc000b1c750 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [cauthdsl] func1 -> DEBU 112e 0xc000b1c750 gate 1574140962402691500 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 112f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 1130 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [policies] func1 -> DEBU 1131 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 1132 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 1133 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1134 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1135 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1136 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [cauthdsl] func1 -> DEBU 1137 0xc000b1d440 gate 1574140962403081100 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [cauthdsl] func2 -> DEBU 1138 0xc000b1d440 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [cauthdsl] func2 -> DEBU 1139 0xc000b1d440 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [cauthdsl] func2 -> DEBU 113a 0xc000b1d440 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [msp.identity] Verify -> DEBU 113b Verify: digest = 00000000 95 1e e1 36 8d ec 05 2f 46 e6 84 2e 7a bb ee 51 |...6.../F...z..Q| +orderer0.example.com | 00000010 93 5d 97 61 82 79 f4 90 6a ab 21 51 fc 34 5d 8d |.].a.y..j.!Q.4].|" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [msp.identity] Verify -> DEBU 113c Verify: sig = 00000000 30 44 02 20 54 0c c6 89 dc 64 de e3 49 c3 32 bd |0D. T....d..I.2.| +orderer0.example.com | 00000010 fb 89 74 c2 f2 2f 9d 9e e7 f4 e2 c0 7d 0a 56 a9 |..t../......}.V.| +orderer0.example.com | 00000020 67 1b c4 df 02 20 57 a2 2b c6 f8 08 a0 3c b7 46 |g.... W.+....<.F| +peer1.org2.example.com | [126e 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [126f 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1270 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1271 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1272 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1273 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1274 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [1275 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1276 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1277 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1278 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1279 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [127a 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [127b 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [127c 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [127d 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [127e 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [127f 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ea910 gate 1574140928252114700 evaluation starts +peer1.org2.example.com | [1280 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ea910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1281 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ea910 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1282 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ea910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1283 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ea910 principal evaluation fails +peer1.org2.example.com | [1284 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ea910 gate 1574140928252114700 evaluation fails +peer1.org2.example.com | [1285 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1286 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1287 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1288 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037eae80 gate 1574140928253489400 evaluation starts +peer1.org2.example.com | [1289 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037eae80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [128a 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037eae80 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [128b 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037eae80 principal matched by identity 0 +peer1.org2.example.com | [128c 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [128d 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [10b6 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [10b7 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [10b8 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [10b9 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [10ba 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [10bb 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10bc 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10bd 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10be 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [10bf 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c0 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c1 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [10c2 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:n\322r\267W\037\000\251\200\206(\322Sg\257f?\335Y\021)\000F2\022\371\233\220\341\315\002 U\260_V\212P%\020bRb?\007\276d\026\237\246\370`\017\327\t\253\207\334P!\270e\255\013" > > alive: +peer0.org2.example.com | [10c3 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [10c4 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10c5 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [10c6 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c7 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c8 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c9 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10ca 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [10cb 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [10cc 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10cd 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10ce 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10cf 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d0 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d1 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d2 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [10d3 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10d4 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [10d5 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [10d6 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [10d7 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [10d8 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [10d9 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [10da 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [10db 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e51 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e52 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e53 11-19 05:22:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e54 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [e55 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [e56 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [e57 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [e58 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e59 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [e5a 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e5b 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e5c 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e5d 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e5e 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e5f 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e60 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e61 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa2b10 gate 1574140923668761400 evaluation starts +peer1.org1.example.com | [e62 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa2b10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e63 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa2b10 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [e64 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa2b10 principal matched by identity 0 +peer1.org1.example.com | [e65 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [e66 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [e67 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa2b10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e68 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa2b10 gate 1574140923668761400 evaluation succeeds +peer1.org1.example.com | [e69 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e6a 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e6b 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [e6c 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [e6d 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e6e 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [105a 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [105b 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [105c 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [105d 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [105e 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [105f 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1060 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 gate 1574140919856036000 evaluation starts +peer0.org1.example.com | [1061 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1062 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1063 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 principal matched by identity 0 +peer0.org1.example.com | [1064 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c bf 11 70 8a 16 7a 01 c9 65 e5 6c 7e e5 b2 84 |,..p..z..e.l~...| +peer0.org1.example.com | 00000010 85 ea 6c 43 0c 62 25 5d 94 9d 2c 97 10 6e 87 0b |..lC.b%]..,..n..| +peer0.org1.example.com | [1065 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7e 3c 34 08 c3 85 e5 98 45 15 |0E.!..~<4.....E.| +peer0.org1.example.com | 00000010 26 9c 6b 76 29 0e 08 ac 9c a1 f1 f7 c9 4d 77 91 |&.kv)........Mw.| +peer0.org1.example.com | 00000020 c0 72 e4 8f bc 02 20 3b e5 61 fa 2e 3f db 7a 82 |.r.... ;.a..?.z.| +peer0.org1.example.com | 00000030 51 98 4d 9b 47 7b 5e b6 da 14 89 2f 63 06 ac 9f |Q.M.G{^..../c...| +peer0.org1.example.com | 00000040 7a f5 f3 de 42 43 07 |z...BC.| +peer0.org1.example.com | [1066 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1067 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 gate 1574140919856036000 evaluation succeeds +peer0.org1.example.com | [1068 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1069 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [106a 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1057 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [106b 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [106c 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [106d 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [106e 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [106f 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1070 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1071 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1072 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1073 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1074 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [1075 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1076 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1077 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1078 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1079 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [107a 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [107b 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [10dc 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [10dd 11-19 05:22:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10de 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [10df 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e0 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [10e1 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [10e2 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e3 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [10e4 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [10e5 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e6 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [10e7 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [10e8 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e9 11-19 05:22:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [10ea 11-19 05:22:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151017 +peer0.org2.example.com | [10eb 11-19 05:22:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E88953A7F78602316A3A25AAC2D32BADC7C66F04AD7CB50CAB0C0B06345DEE21 +peer0.org2.example.com | [10ec 11-19 05:22:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [10ed 11-19 05:22:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [10ee 11-19 05:22:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [10ef 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10f0 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [10f1 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10f2 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [10f3 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10f4 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [10f5 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\2419&\361\205\214vYu\337]J\231\330\235\351\365\207\277\026\272\221\002 F\340\013a\246\241\376\335)^\365\245ut\302Px\377\355\014d\224D\3550\266]8\232\263\016\200" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [10f6 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [10f8 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10f7 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\2419&\361\205\214vYu\337]J\231\330\235\351\365\207\277\026\272\221\002 F\340\013a\246\241\376\335)^\365\245ut\302Px\377\355\014d\224D\3550\266]8\232\263\016\200" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [10f9 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10fa 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [10fb 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10fc 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [10fd 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [10fe 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 89 53 a7 f7 86 02 31 6a 3a 25 aa c2 d3 2b ad |..S....1j:%...+.| +peer0.org2.example.com | 00000010 c7 c6 6f 04 ad 7c b5 0c ab 0c 0b 06 34 5d ee 21 |..o..|......4].!| +peer0.org2.example.com | [10ff 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 e0 d9 b9 62 8f 38 01 b6 39 3a |0E.!.....b.8..9:| +peer0.org2.example.com | 00000010 cd 39 1d 31 6a 62 0a 3c 22 c7 ce 11 c0 81 b0 29 |.9.1jb.<"......)| +peer0.org2.example.com | 00000020 dc cb d3 83 e1 02 20 50 21 f7 2b e2 d6 08 2d 65 |...... P!.+...-e| +peer0.org2.example.com | 00000030 12 a0 3b c6 3d a7 af 82 de 63 c8 47 51 a1 41 bf |..;.=....c.GQ.A.| +peer0.org2.example.com | 00000040 d6 c1 28 d9 f6 87 3c |..(...<| +peer0.org2.example.com | [1100 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1101 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b c9 74 9a b1 c5 84 8b b8 3e a1 39 |0D. ..t......>.9| +peer0.org2.example.com | 00000010 26 f1 85 8c 76 59 75 df 5d 4a 99 d8 9d e9 f5 87 |&...vYu.]J......| +peer0.org2.example.com | 00000020 bf 16 ba 91 02 20 46 e0 0b 61 a6 a1 fe dd 29 5e |..... F..a....)^| +peer0.org2.example.com | 00000030 f5 a5 75 74 c2 50 78 ff ed 0c 64 94 44 ed 30 b6 |..ut.Px...d.D.0.| +peer0.org2.example.com | 00000040 5d 38 9a b3 0e 80 |]8....| +peer0.org2.example.com | [1102 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1103 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1104 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1105 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1106 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1107 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1108 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1109 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [110a 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 89 53 a7 f7 86 02 31 6a 3a 25 aa c2 d3 2b ad |..S....1j:%...+.| +peer0.org2.example.com | 00000010 c7 c6 6f 04 ad 7c b5 0c ab 0c 0b 06 34 5d ee 21 |..o..|......4].!| +peer0.org2.example.com | [110b 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 e0 d9 b9 62 8f 38 01 b6 39 3a |0E.!.....b.8..9:| +peer0.org2.example.com | 00000010 cd 39 1d 31 6a 62 0a 3c 22 c7 ce 11 c0 81 b0 29 |.9.1jb.<"......)| +peer0.org2.example.com | 00000020 dc cb d3 83 e1 02 20 50 21 f7 2b e2 d6 08 2d 65 |...... P!.+...-e| +peer0.org2.example.com | 00000030 12 a0 3b c6 3d a7 af 82 de 63 c8 47 51 a1 41 bf |..;.=....c.GQ.A.| +peer0.org2.example.com | 00000040 d6 c1 28 d9 f6 87 3c |..(...<| +peer0.org2.example.com | [110c 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [110d 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [110e 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [110f 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1110 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer0.org2.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer0.org2.example.com | [1111 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer0.org2.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer0.org2.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer0.org2.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer0.org2.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer0.org2.example.com | [1112 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1113 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1114 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1115 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1116 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1117 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1118 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [1119 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 89 53 a7 f7 86 02 31 6a 3a 25 aa c2 d3 2b ad |..S....1j:%...+.| +peer0.org2.example.com | 00000010 c7 c6 6f 04 ad 7c b5 0c ab 0c 0b 06 34 5d ee 21 |..o..|......4].!| +peer0.org2.example.com | [111a 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 e0 d9 b9 62 8f 38 01 b6 39 3a |0E.!.....b.8..9:| +peer0.org2.example.com | 00000010 cd 39 1d 31 6a 62 0a 3c 22 c7 ce 11 c0 81 b0 29 |.9.1jb.<"......)| +peer0.org2.example.com | 00000020 dc cb d3 83 e1 02 20 50 21 f7 2b e2 d6 08 2d 65 |...... P!.+...-e| +peer0.org2.example.com | 00000030 12 a0 3b c6 3d a7 af 82 de 63 c8 47 51 a1 41 bf |..;.=....c.GQ.A.| +peer0.org2.example.com | 00000040 d6 c1 28 d9 f6 87 3c |..(...<| +peer0.org2.example.com | [111b 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [111c 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [111d 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [111e 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [111f 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1120 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1121 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1122 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1123 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000030 7d a3 1b bb 45 99 a6 9a a3 f6 24 30 a3 37 f1 31 |}...E.....$0.7.1| +orderer0.example.com | 00000040 b3 2b d1 95 02 f8 |.+....|" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [cauthdsl] func2 -> DEBU 113d 0xc000b1d440 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [cauthdsl] func1 -> DEBU 113e 0xc000b1d440 gate 1574140962403081100 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 113f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1140 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1141 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1142 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1143 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1144 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [common.deliver] deliverBlocks -> DEBU 1145 [channel: businesschannel] Received seekInfo (0xc00125bbc0) start: > stop: > from 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [fsblkstorage] Next -> DEBU 1146 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [fsblkstorage] newBlockfileStream -> DEBU 1147 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51284]" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1148 Remaining bytes=[37975], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1149 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51284], bytesOffset=[51287]}" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 114a blockbytes [25480] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:42.403 UTC [common.deliver] deliverBlocks -> DEBU 114b [channel: businesschannel] Delivering block for (0xc00125bbc0) for 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.405 UTC [common.deliver] deliverBlocks -> DEBU 114c [channel: businesschannel] Done delivering to 172.18.0.5:51604 for (0xc00125bbc0)" +orderer0.example.com | "2019-11-19 05:22:42.405 UTC [common.deliver] Handle -> DEBU 114d Waiting for new SeekInfo from 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.406 UTC [common.deliver] Handle -> DEBU 114e Attempting to read seek info message from 172.18.0.5:51604" +orderer0.example.com | "2019-11-19 05:22:42.413 UTC [common.deliver] Handle -> WARN 114f Error reading from 172.18.0.5:51604: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:42.413 UTC [orderer.common.server] func1 -> DEBU 1150 Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:42.413 UTC [comm.grpc.server] 1 -> INFO 1151 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51604 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.2486ms +orderer0.example.com | "2019-11-19 05:22:42.413 UTC [grpc] infof -> DEBU 1152 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:42.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1153 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:42.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1154 Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +orderer0.example.com | "2019-11-19 05:22:42.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1155 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.7µs " +orderer0.example.com | "2019-11-19 05:22:42.535 UTC [orderer.common.server] Deliver -> DEBU 1156 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:42.535 UTC [common.deliver] Handle -> DEBU 1157 Starting new deliver loop for 172.18.0.5:51606" +orderer0.example.com | "2019-11-19 05:22:42.535 UTC [common.deliver] Handle -> DEBU 1158 Attempting to read seek info message from 172.18.0.5:51606" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1159 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 115a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 115b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 115c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 115d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func1 -> DEBU 115e 0xc000b27c80 gate 1574140962536193800 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 115f 0xc000b27c80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1160 0xc000b27c80 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1161 0xc000b27c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1162 0xc000b27c80 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func1 -> DEBU 1163 0xc000b27c80 gate 1574140962536193800 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1164 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1165 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1166 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func1 -> DEBU 1167 0xc0010aa4c0 gate 1574140962536514400 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1168 0xc0010aa4c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1169 0xc0010aa4c0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 116a 0xc0010aa4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 116b 0xc0010aa4c0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [cauthdsl] func1 -> DEBU 116c 0xc0010aa4c0 gate 1574140962536514400 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 116d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 116e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [e6f 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e70 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e71 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e72 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e73 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e74 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e75 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa3ca0 gate 1574140923671811300 evaluation starts +peer1.org1.example.com | [e76 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa3ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e77 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa3ca0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [e78 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa3ca0 principal matched by identity 0 +peer1.org1.example.com | [e79 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [e7a 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [e7b 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa3ca0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e7c 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa3ca0 gate 1574140923671811300 evaluation succeeds +peer1.org1.example.com | [e7d 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e7e 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e7f 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [e80 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [e81 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [e82 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [e83 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e84 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [e85 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e86 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e87 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e88 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [128e 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037eae80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [128f 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037eae80 gate 1574140928253489400 evaluation succeeds +peer1.org2.example.com | [1290 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1291 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1292 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1293 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1294 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1295 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1296 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1297 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1298 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1299 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [129a 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [129b 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [129c 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [129d 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [129e 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [129f 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [12a0 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003808d10 gate 1574140928258376800 evaluation starts +peer1.org2.example.com | [12a1 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003808d10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12a2 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003808d10 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [12a3 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003808d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [12a4 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003808d10 principal evaluation fails +peer1.org2.example.com | [12a5 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003808d10 gate 1574140928258376800 evaluation fails +peer1.org2.example.com | [12a6 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12a7 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12a8 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [12a9 11-19 05:22:08.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003809280 gate 1574140928259664700 evaluation starts +peer1.org2.example.com | [12aa 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003809280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12ab 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003809280 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [12ac 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003809280 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] func1 -> DEBU 116f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1170 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1171 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1172 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1173 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 1174 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [cauthdsl] func1 -> DEBU 1175 0xc0010ab1b0 gate 1574140962537035100 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [cauthdsl] func2 -> DEBU 1176 0xc0010ab1b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [cauthdsl] func2 -> DEBU 1177 0xc0010ab1b0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [cauthdsl] func2 -> DEBU 1178 0xc0010ab1b0 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [msp.identity] Verify -> DEBU 1179 Verify: digest = 00000000 c7 b3 28 3f 0d 9b b8 72 78 d1 58 8c 47 be 50 b3 |..(?...rx.X.G.P.| +orderer0.example.com | 00000010 71 0a 1d 89 a3 ec 30 5d 03 05 96 87 e3 d0 3f f8 |q.....0]......?.|" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [msp.identity] Verify -> DEBU 117a Verify: sig = 00000000 30 45 02 21 00 a9 9a e2 bb 09 ae c2 fb ad 2a 34 |0E.!..........*4| +orderer0.example.com | 00000010 11 64 c6 64 75 f0 79 1e a6 15 90 bb 96 fb a5 ce |.d.du.y.........| +orderer0.example.com | 00000020 8c 14 9a a6 c2 02 20 04 1e 21 a7 89 e0 59 93 68 |...... ..!...Y.h| +orderer0.example.com | 00000030 c2 8d 66 14 5d 2b 0e db 96 57 4b ac 47 04 f2 ef |..f.]+...WK.G...| +orderer0.example.com | 00000040 f1 55 cd 5e ee 77 9a |.U.^.w.|" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [cauthdsl] func2 -> DEBU 117b 0xc0010ab1b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [cauthdsl] func1 -> DEBU 117c 0xc0010ab1b0 gate 1574140962537035100 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 117d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 117f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 1180 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 1181 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 1182 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [common.deliver] deliverBlocks -> DEBU 1183 [channel: businesschannel] Received seekInfo (0xc000d56280) start: > stop: > from 172.18.0.5:51606" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [fsblkstorage] Next -> DEBU 1184 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [fsblkstorage] newBlockfileStream -> DEBU 1185 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1186 Remaining bytes=[89259], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1187 Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1188 blockbytes [25803] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [common.deliver] deliverBlocks -> DEBU 1189 [channel: businesschannel] Delivering block for (0xc000d56280) for 172.18.0.5:51606" +orderer0.example.com | "2019-11-19 05:22:42.537 UTC [common.deliver] deliverBlocks -> DEBU 118a [channel: businesschannel] Done delivering to 172.18.0.5:51606 for (0xc000d56280)" +orderer0.example.com | "2019-11-19 05:22:42.538 UTC [common.deliver] Handle -> DEBU 118b Waiting for new SeekInfo from 172.18.0.5:51606" +orderer0.example.com | "2019-11-19 05:22:42.538 UTC [common.deliver] Handle -> DEBU 118c Attempting to read seek info message from 172.18.0.5:51606" +orderer0.example.com | "2019-11-19 05:22:42.545 UTC [grpc] infof -> DEBU 118d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:42.547 UTC [orderer.common.server] replicateDisabledChains -> DEBU 118f No inactive chains to try to replicate" +orderer0.example.com | "2019-11-19 05:22:42.546 UTC [common.deliver] Handle -> WARN 118e Error reading from 172.18.0.5:51606: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:42.548 UTC [orderer.common.server] func1 -> DEBU 1190 Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:42.549 UTC [comm.grpc.server] 1 -> INFO 1191 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51606 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6542ms +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [orderer.common.server] Deliver -> DEBU 1192 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [common.deliver] Handle -> DEBU 1193 Starting new deliver loop for 172.18.0.5:51608" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [common.deliver] Handle -> DEBU 1194 Attempting to read seek info message from 172.18.0.5:51608" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1195 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1196 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1197 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1198 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1199 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [cauthdsl] func1 -> DEBU 119a 0xc00113c2f0 gate 1574140962706852800 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [cauthdsl] func2 -> DEBU 119b 0xc00113c2f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [cauthdsl] func2 -> DEBU 119c 0xc00113c2f0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.706 UTC [cauthdsl] func2 -> DEBU 119d 0xc00113c2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 119e 0xc00113c2f0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 119f 0xc00113c2f0 gate 1574140962706852800 evaluation fails" +peer1.org2.example.com | [12ad 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [12ae 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [12af 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003809280 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [12b0 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003809280 gate 1574140928259664700 evaluation succeeds +peer1.org2.example.com | [12b1 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12b2 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12b3 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [12b4 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [12b5 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12b6 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [12b7 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12b8 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12b9 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12ba 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [12bb 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12bc 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12bd 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [12be 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [12bf 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [12c0 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826660 gate 1574140928265542700 evaluation starts +peer1.org2.example.com | [12c1 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12c2 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826660 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [12c3 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [12c4 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826660 principal evaluation fails +peer1.org2.example.com | [12c5 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826660 gate 1574140928265542700 evaluation fails +peer1.org2.example.com | [12c6 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12c7 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12c8 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [12c9 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826bd0 gate 1574140928266436900 evaluation starts +peer1.org2.example.com | [12ca 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12cb 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826bd0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [12cc 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826bd0 principal matched by identity 0 +peer1.org2.example.com | [12cd 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [12ce 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [e89 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e8a 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e8b 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e8c 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e8d 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e8e 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e8f 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e90 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3700 gate 1574140923677147400 evaluation starts +peer1.org1.example.com | [e92 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3700 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e91 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [e93 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3700 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [e94 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e95 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3700 principal matched by identity 0 +peer1.org1.example.com | [e96 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e97 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e98 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [e99 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [e9a 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [e9b 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e9c 11-19 05:22:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3700 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e9d 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3700 gate 1574140923677147400 evaluation succeeds +peer1.org1.example.com | [e9e 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e9f 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ea0 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ea1 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ea2 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [ea3 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [ea4 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [ea5 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [ea6 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ea7 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11a0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 11a3 0xc00113cb30 gate 1574140962707183700 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11a4 0xc00113cb30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11a5 0xc00113cb30 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11a6 0xc00113cb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11a7 0xc00113cb30 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 11a8 0xc00113cb30 gate 1574140962707183700 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] func1 -> DEBU 11ab Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11ac Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11b0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 11b1 0xc00113d820 gate 1574140962707621200 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11b2 0xc00113d820 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11b3 0xc00113d820 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11b4 0xc00113d820 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [msp.identity] Verify -> DEBU 11b5 Verify: digest = 00000000 1a 35 00 d1 97 1f 99 3a 0c 59 62 7b d1 f0 13 80 |.5.....:.Yb{....| +orderer0.example.com | 00000010 f3 2e 18 d5 e8 81 ea 81 bd 0b b0 21 22 e5 32 6a |...........!".2j|" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [msp.identity] Verify -> DEBU 11b6 Verify: sig = 00000000 30 45 02 21 00 a9 68 94 56 62 15 b0 14 8b f4 5f |0E.!..h.Vb....._| +orderer0.example.com | 00000010 57 38 f8 37 6f 0b fd 51 61 0a 3d b0 76 c7 70 f3 |W8.7o..Qa.=.v.p.| +orderer0.example.com | 00000020 61 b0 71 9f 02 02 20 58 ea 30 c8 d4 c4 bb 1e 4a |a.q... X.0.....J| +orderer0.example.com | 00000030 9d 1c a3 97 93 8d 99 72 70 f5 3f 6a c2 78 a6 9f |.......rp.?j.x..| +orderer0.example.com | 00000040 bc c0 74 d6 bd bf 70 |..t...p|" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11b7 0xc00113d820 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 11b8 0xc00113d820 gate 1574140962707621200 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11b9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11ba == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11bb Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11bd Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11be == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [common.deliver] deliverBlocks -> DEBU 11bf [channel: businesschannel] Received seekInfo (0xc000fc74c0) start: > stop: > from 172.18.0.5:51608" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [fsblkstorage] Next -> DEBU 11c0 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [fsblkstorage] newBlockfileStream -> DEBU 11c1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25806]" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c2 Remaining bytes=[63453], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c3 Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25806], bytesOffset=[25809]}" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c4 blockbytes [25475] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [common.deliver] deliverBlocks -> DEBU 11c5 [channel: businesschannel] Delivering block for (0xc000fc74c0) for 172.18.0.5:51608" +orderer0.example.com | "2019-11-19 05:22:42.708 UTC [common.deliver] deliverBlocks -> DEBU 11c6 [channel: businesschannel] Done delivering to 172.18.0.5:51608 for (0xc000fc74c0)" +orderer0.example.com | "2019-11-19 05:22:42.709 UTC [common.deliver] Handle -> DEBU 11c7 Waiting for new SeekInfo from 172.18.0.5:51608" +orderer0.example.com | "2019-11-19 05:22:42.709 UTC [common.deliver] Handle -> DEBU 11c8 Attempting to read seek info message from 172.18.0.5:51608" +orderer0.example.com | "2019-11-19 05:22:42.717 UTC [grpc] infof -> DEBU 11c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:42.718 UTC [common.deliver] Handle -> WARN 11ca Error reading from 172.18.0.5:51608: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:42.719 UTC [orderer.common.server] func1 -> DEBU 11cb Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:42.719 UTC [comm.grpc.server] 1 -> INFO 11cc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51608 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2443ms +orderer0.example.com | "2019-11-19 05:22:42.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cd Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +orderer0.example.com | "2019-11-19 05:22:42.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ce Sending msg of 28 bytes to 3 on channel businesschannel took 28.7µs" +orderer0.example.com | "2019-11-19 05:22:42.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.1µs " +peer0.org1.example.com | [107c 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [107d 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [107e 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [107f 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1080 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1081 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 11 8b 08 45 f7 ca ad 60 ac 50 0d 92 c3 85 9f |....E...`.P.....| +peer0.org1.example.com | 00000010 6d fe 9c a9 48 42 9c 73 0d 80 28 67 b3 b5 8a 94 |m...HB.s..(g....| +peer0.org1.example.com | [1082 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 cf ee a7 76 61 c8 3a e3 1f ad |0E.!.....va.:...| +peer0.org1.example.com | 00000010 21 a4 83 72 5e d9 37 cb 84 01 6b a6 fb 3e a4 35 |!..r^.7...k..>.5| +peer0.org1.example.com | 00000020 64 50 3a 36 58 02 20 70 81 9c a5 e5 28 32 ea 65 |dP:6X. p....(2.e| +peer0.org1.example.com | 00000030 3a 7c c5 a2 52 c7 51 6c 86 0c 72 d6 5a 7b a2 9c |:|..R.Ql..r.Z{..| +peer0.org1.example.com | 00000040 ae 6b 3c 57 cc 18 19 |.k DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1084 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb db 6b 2b 02 ef 3e 0f e4 95 fa |0E.!...k+..>....| +peer0.org1.example.com | 00000010 5b 0a af 72 2d a9 dd 68 9e 1a b2 a6 e3 58 af e9 |[..r-..h.....X..| +peer0.org1.example.com | 00000020 8c 28 b9 22 28 02 20 20 96 61 3a e8 31 ab 5b d8 |.(."(. .a:.1.[.| +peer0.org1.example.com | 00000030 13 58 80 0b f3 a9 90 fd 4f 35 23 16 6c da 33 00 |.X......O5#.l.3.| +peer0.org1.example.com | 00000040 df 21 ff 15 0c 15 8f |.!.....| +peer0.org1.example.com | [1085 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1086 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [1087 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1088 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1089 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [108a 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [108b 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [108c 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [108d 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [108e 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [108f 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1090 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1091 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1092 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1124 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1125 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1126 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d3250 gate 1574140923894765800 evaluation starts +peer0.org2.example.com | [1127 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d3250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [12cf 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826bd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [12d0 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826bd0 gate 1574140928266436900 evaluation succeeds +peer1.org2.example.com | [12d1 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12d2 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12d3 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [12d4 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [12d5 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d6 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d7 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [12d8 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12d9 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12da 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [12db 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [12dc 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [12dd 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827d60 gate 1574140928269597600 evaluation starts +peer1.org2.example.com | [12de 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827d60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12df 11-19 05:22:08.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827d60 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [12e0 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [12e1 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827d60 principal evaluation fails +peer1.org2.example.com | [12e2 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827d60 gate 1574140928269597600 evaluation fails +peer1.org2.example.com | [12e3 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12e4 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12e5 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [12e6 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038402d0 gate 1574140928271569500 evaluation starts +peer1.org2.example.com | [12e7 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038402d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12e8 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038402d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [12e9 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038402d0 principal matched by identity 0 +peer1.org2.example.com | [12ea 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [12eb 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [12ec 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038402d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [12ed 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038402d0 gate 1574140928271569500 evaluation succeeds +peer1.org2.example.com | [12ee 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12ef 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12f0 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [12f1 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1093 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > alive: +peer0.org1.example.com | [1094 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1095 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1096 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1097 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1098 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1099 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [109a 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [109b 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [109c 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [109d 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [109e 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [109f 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10a0 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10a1 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10a2 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10a3 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10a4 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [10a5 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10a6 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [10a7 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10a8 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10a9 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [10aa 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [10ab 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [10ac 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 gate 1574140920411024800 evaluation starts +peer0.org1.example.com | [10ad 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [10ae 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:42.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.347ms " +orderer0.example.com | "2019-11-19 05:22:42.871 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:42.872 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:42.931 UTC [orderer.common.server] Deliver -> DEBU 11d3 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:42.932 UTC [common.deliver] Handle -> DEBU 11d4 Starting new deliver loop for 172.18.0.5:51610" +orderer0.example.com | "2019-11-19 05:22:42.932 UTC [common.deliver] Handle -> DEBU 11d5 Attempting to read seek info message from 172.18.0.5:51610" +orderer0.example.com | "2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.933 UTC [cauthdsl] func1 -> DEBU 11db 0xc00101e060 gate 1574140962933980700 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.934 UTC [cauthdsl] func2 -> DEBU 11dc 0xc00101e060 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.934 UTC [cauthdsl] func2 -> DEBU 11dd 0xc00101e060 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.934 UTC [cauthdsl] func2 -> DEBU 11de 0xc00101e060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.934 UTC [cauthdsl] func2 -> DEBU 11df 0xc00101e060 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.935 UTC [cauthdsl] func1 -> DEBU 11e0 0xc00101e060 gate 1574140962933980700 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.935 UTC [policies] Evaluate -> DEBU 11e1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.935 UTC [policies] Evaluate -> DEBU 11e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.936 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.936 UTC [cauthdsl] func1 -> DEBU 11e4 0xc00101e8a0 gate 1574140962936423700 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.936 UTC [cauthdsl] func2 -> DEBU 11e5 0xc00101e8a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.936 UTC [cauthdsl] func2 -> DEBU 11e6 0xc00101e8a0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.937 UTC [cauthdsl] func2 -> DEBU 11e7 0xc00101e8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:42.937 UTC [cauthdsl] func2 -> DEBU 11e8 0xc00101e8a0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.937 UTC [cauthdsl] func1 -> DEBU 11e9 0xc00101e8a0 gate 1574140962936423700 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:42.937 UTC [policies] Evaluate -> DEBU 11ea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.937 UTC [policies] Evaluate -> DEBU 11eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:42.938 UTC [policies] func1 -> DEBU 11ec Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:42.938 UTC [policies] Evaluate -> DEBU 11ed Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.938 UTC [policies] Evaluate -> DEBU 11ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:42.939 UTC [policies] Evaluate -> DEBU 11ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.939 UTC [policies] Evaluate -> DEBU 11f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:42.939 UTC [policies] Evaluate -> DEBU 11f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:42.940 UTC [cauthdsl] func1 -> DEBU 11f2 0xc00101f590 gate 1574140962939672600 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:42.940 UTC [cauthdsl] func2 -> DEBU 11f3 0xc00101f590 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:42.940 UTC [cauthdsl] func2 -> DEBU 11f4 0xc00101f590 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:42.941 UTC [cauthdsl] func2 -> DEBU 11f5 0xc00101f590 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:42.941 UTC [msp.identity] Verify -> DEBU 11f6 Verify: digest = 00000000 9d 58 07 a0 3a 0b 15 0c c5 f4 34 7d 15 35 3c a6 |.X..:.....4}.5<.| +orderer0.example.com | 00000010 0e b6 10 62 a5 57 78 48 a7 79 a7 e0 08 b0 09 08 |...b.WxH.y......|" +orderer0.example.com | "2019-11-19 05:22:42.941 UTC [msp.identity] Verify -> DEBU 11f7 Verify: sig = 00000000 30 45 02 21 00 fc 73 f2 17 b3 13 6a 55 b2 c5 dc |0E.!..s....jU...| +orderer0.example.com | 00000010 55 3a 1c b5 d2 15 7e 55 3b 80 07 cc b3 f9 e8 cd |U:....~U;.......| +orderer0.example.com | 00000020 f7 47 c9 a0 8d 02 20 13 6d 79 f2 98 45 90 5b ba |.G.... .my..E.[.| +orderer0.example.com | 00000030 72 46 f9 18 1a 9d 80 8f cc b5 6a c2 1e 48 fd 66 |rF........j..H.f| +orderer0.example.com | 00000040 d3 f3 a5 d0 22 16 e3 |...."..|" +orderer0.example.com | "2019-11-19 05:22:42.942 UTC [cauthdsl] func2 -> DEBU 11f8 0xc00101f590 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:42.942 UTC [cauthdsl] func1 -> DEBU 11f9 0xc00101f590 gate 1574140962939672600 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:42.942 UTC [policies] Evaluate -> DEBU 11fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.943 UTC [policies] Evaluate -> DEBU 11fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:42.943 UTC [policies] Evaluate -> DEBU 11fc Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.943 UTC [policies] Evaluate -> DEBU 11fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:42.943 UTC [policies] Evaluate -> DEBU 11fe Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.945 UTC [policies] Evaluate -> DEBU 11ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:42.945 UTC [common.deliver] deliverBlocks -> DEBU 1200 [channel: businesschannel] Received seekInfo (0xc000fc7cc0) start: > stop: > from 172.18.0.5:51610" +peer0.org2.example.com | [1128 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d3250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1129 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d3250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [112a 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d3250 principal evaluation fails +peer0.org2.example.com | [112b 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d3250 gate 1574140923894765800 evaluation fails +peer0.org2.example.com | [112c 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [112d 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [112e 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [112f 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d37c0 gate 1574140923897067000 evaluation starts +peer0.org2.example.com | [1130 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d37c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1131 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d37c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1132 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d37c0 principal matched by identity 0 +peer0.org2.example.com | [1133 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer0.org2.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer0.org2.example.com | [1134 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer0.org2.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer0.org2.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer0.org2.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer0.org2.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer0.org2.example.com | [1135 11-19 05:22:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d37c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1136 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d37c0 gate 1574140923897067000 evaluation succeeds +peer0.org2.example.com | [1137 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1138 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1139 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [113a 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [113b 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [113d 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [113c 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [113e 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [113f 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer0.org2.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer0.org2.example.com | [1140 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer0.org2.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer0.org2.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer0.org2.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer0.org2.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer0.org2.example.com | [1141 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1142 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1143 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1144 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1145 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [1146 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ea8 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ea9 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [eaa 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [eab 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [eac 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [ead 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [eae 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3590 gate 1574140923688738500 evaluation starts +peer1.org1.example.com | [eaf 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3590 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [eb0 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3590 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [eb1 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3590 principal matched by identity 0 +peer1.org1.example.com | [eb2 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [eb3 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [eb4 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3590 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [eb5 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3590 gate 1574140923688738500 evaluation succeeds +peer1.org1.example.com | [eb6 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [eb7 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [eb8 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [eb9 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [eba 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ebb 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [ebc 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ebd 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ebe 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ebf 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ec0 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ec1 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ec2 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [10af 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 principal matched by identity 0 +peer0.org1.example.com | [10b0 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5d dc cd a9 f5 28 47 a3 a2 f2 d2 7d 60 a3 f2 |.]....(G....}`..| +peer0.org1.example.com | 00000010 8f 5d cb 61 c8 90 58 1f f4 f5 ea 94 8b c7 05 3e |.].a..X........>| +peer0.org1.example.com | [10b1 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 7f 98 81 e5 b9 23 a7 ac 42 a8 b4 |0D. ......#..B..| +peer0.org1.example.com | 00000010 e9 73 a8 35 bc 11 d7 e1 a4 14 d0 0c 89 00 ec 27 |.s.5...........'| +peer0.org1.example.com | 00000020 42 cb 23 f0 02 20 52 a4 cf 86 56 5d b4 f3 da 16 |B.#.. R...V]....| +peer0.org1.example.com | 00000030 7c 6b eb d8 65 3f b5 08 40 5d 00 9a 09 db fc 6e ||k..e?..@].....n| +peer0.org1.example.com | 00000040 db f6 cd ca 2c 3d |....,=| +peer0.org1.example.com | [10b2 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [10b3 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 gate 1574140920411024800 evaluation succeeds +peer0.org1.example.com | [10b4 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10b5 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10b6 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [10b7 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [10b8 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10b9 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [10ba 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [10bb 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [10bc 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [10bd 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10be 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10bf 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10c0 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c1 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c2 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c3 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c4 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c5 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c6 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c7 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [10c8 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c9 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [10ca 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10cb 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10cc 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10cd 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ce 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10cf 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10d0 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10d1 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10d2 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10d3 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12f2 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [12f3 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [12f4 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [12f5 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [12f6 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12f7 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [12f8 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [12f9 11-19 05:22:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12fa 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12fb 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12fd 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [12fe 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12fc 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12ff 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1300 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1301 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1302 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1303 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1304 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1305 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038584d0 gate 1574140929777457600 evaluation starts +peer1.org2.example.com | [1306 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038584d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1307 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038584d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1308 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038584d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1309 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038584d0 principal evaluation fails +peer1.org2.example.com | [130a 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038584d0 gate 1574140929777457600 evaluation fails +peer1.org2.example.com | [130b 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [130c 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [130d 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [ec3 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [ec4 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ec5 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffc970 gate 1574140923696387200 evaluation starts +peer1.org1.example.com | [ec6 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffc970 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ec7 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffc970 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [ec8 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffc970 principal matched by identity 0 +peer1.org1.example.com | [ec9 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [eca 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [ecb 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffc970 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ecc 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffc970 gate 1574140923696387200 evaluation succeeds +peer1.org1.example.com | [ecd 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ece 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ecf 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ed0 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ed1 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [ed2 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [ed3 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed4 11-19 05:22:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed5 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ed6 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ed7 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ed8 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [ed9 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [eda 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [edb 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020180 gate 1574140923701042600 evaluation starts +peer1.org1.example.com | [edc 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020180 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [edd 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020180 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [ede 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020180 principal matched by identity 0 +peer1.org1.example.com | [edf 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [ee0 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [10d4 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10d5 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10d6 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10d7 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10d8 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10d9 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10da 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10db 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10dc 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [10dd 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 ae 8d b1 be 1c e0 96 8b ee db e6 bc b1 9c bc |................| +peer0.org1.example.com | 00000010 85 84 a8 30 1f 3e c4 23 e8 6c a1 b8 11 83 f9 45 |...0.>.#.l.....E| +peer0.org1.example.com | [10de 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 86 36 6f 0f e4 4c 65 bc dc 89 |0E.!...6o..Le...| +peer0.org1.example.com | 00000010 9e ec 88 dc 5b 3b f3 da 71 a5 0c c4 65 ba 2d 42 |....[;..q...e.-B| +peer0.org1.example.com | 00000020 06 23 8d 8a 4f 02 20 30 8c 04 ce 94 08 61 05 28 |.#..O. 0.....a.(| +peer0.org1.example.com | 00000030 bd 27 d6 5b 78 74 94 20 93 53 d1 d2 60 63 91 bb |.'.[xt. .S..`c..| +peer0.org1.example.com | 00000040 c3 89 5a 8a bb be 3f |..Z...?| +peer0.org1.example.com | [10df 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10e0 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [10e1 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [10e2 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [10e3 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [10e4 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10e5 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10e6 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10e7 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10e8 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10e9 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ea 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10eb 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ec 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10ed 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10ee 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10ef 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [10f0 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10f1 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1147 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1148 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1149 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [114a 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [114b 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [114c 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [114d 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [114e 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7310 gate 1574140923920207300 evaluation starts +peer0.org2.example.com | [114f 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7310 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1150 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7310 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1151 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1152 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7310 principal evaluation fails +peer0.org2.example.com | [1153 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7310 gate 1574140923920207300 evaluation fails +peer0.org2.example.com | [1154 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1155 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1156 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1157 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7880 gate 1574140923920552100 evaluation starts +peer0.org2.example.com | [1158 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7880 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1159 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7880 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [115a 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7880 principal matched by identity 0 +peer0.org2.example.com | [115b 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 06 4a 57 60 88 12 b0 fc 87 2d 7a f3 e2 3e f2 |..JW`.....-z..>.| +peer0.org2.example.com | 00000010 b8 45 35 64 63 d0 4d d8 46 9f b9 1d c2 f6 b4 43 |.E5dc.M.F......C| +peer0.org2.example.com | [115c 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 1a 44 53 5c 9f c5 25 c9 11 f8 f8 |0D. H.DS\..%....| +peer0.org2.example.com | 00000010 78 f9 ae c6 72 d4 91 5f b4 a5 0b 3b ee 77 bf e1 |x...r.._...;.w..| +peer0.org2.example.com | 00000020 2c 88 bb ae 02 20 45 02 53 3a 46 8a 70 43 0e 97 |,.... E.S:F.pC..| +peer0.org2.example.com | 00000030 f2 8c a4 fd 02 8e 32 5e 77 97 9c aa e5 5f b4 93 |......2^w...._..| +peer0.org2.example.com | 00000040 da 3f 91 8a 01 d9 |.?....| +peer0.org2.example.com | [115d 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7880 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [115e 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7880 gate 1574140923920552100 evaluation succeeds +peer0.org2.example.com | [115f 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1160 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1161 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1162 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1163 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1164 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1165 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1166 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1167 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1168 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1169 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [116a 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [116b 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [116c 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [116d 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [116e 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [116f 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1170 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > alive: alive: +peer0.org2.example.com | [1171 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1172 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1173 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1174 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1175 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1176 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1178 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1179 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117a 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1177 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [117b 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117c 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [117d 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [ee1 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020180 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ee2 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020180 gate 1574140923701042600 evaluation succeeds +peer1.org1.example.com | [ee3 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ee4 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ee5 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ee6 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ee7 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [ee8 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [ee9 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [eea 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [eeb 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [eec 11-19 05:22:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [eed 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [eee 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [eef 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [ef0 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [ef1 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [ef3 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ef4 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ef5 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ef2 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [ef6 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [ef7 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [ef8 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ef9 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [efa 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [efb 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [efc 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [efd 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [efe 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [eff 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:42.946 UTC [fsblkstorage] Next -> DEBU 1201 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:42.946 UTC [fsblkstorage] newBlockfileStream -> DEBU 1202 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51284]" +orderer0.example.com | "2019-11-19 05:22:42.946 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1203 Remaining bytes=[37975], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:42.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1204 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51284], bytesOffset=[51287]}" +orderer0.example.com | "2019-11-19 05:22:42.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1205 blockbytes [25480] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:42.947 UTC [common.deliver] deliverBlocks -> DEBU 1206 [channel: businesschannel] Delivering block for (0xc000fc7cc0) for 172.18.0.5:51610" +orderer0.example.com | "2019-11-19 05:22:42.948 UTC [common.deliver] deliverBlocks -> DEBU 1207 [channel: businesschannel] Done delivering to 172.18.0.5:51610 for (0xc000fc7cc0)" +orderer0.example.com | "2019-11-19 05:22:42.952 UTC [common.deliver] Handle -> DEBU 1208 Waiting for new SeekInfo from 172.18.0.5:51610" +orderer0.example.com | "2019-11-19 05:22:42.952 UTC [common.deliver] Handle -> DEBU 1209 Attempting to read seek info message from 172.18.0.5:51610" +orderer0.example.com | "2019-11-19 05:22:42.958 UTC [common.deliver] Handle -> WARN 120a Error reading from 172.18.0.5:51610: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:42.958 UTC [orderer.common.server] func1 -> DEBU 120b Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:42.958 UTC [comm.grpc.server] 1 -> INFO 120c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51610 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.7716ms +orderer0.example.com | "2019-11-19 05:22:42.959 UTC [grpc] infof -> DEBU 120d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:43.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:43.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120f Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +orderer0.example.com | "2019-11-19 05:22:43.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1210 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 12.0875ms " +orderer0.example.com | "2019-11-19 05:22:43.158 UTC [orderer.common.server] Deliver -> DEBU 1211 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:43.158 UTC [common.deliver] Handle -> DEBU 1212 Starting new deliver loop for 172.18.0.5:51612" +orderer0.example.com | "2019-11-19 05:22:43.158 UTC [common.deliver] Handle -> DEBU 1213 Attempting to read seek info message from 172.18.0.5:51612" +orderer0.example.com | "2019-11-19 05:22:43.160 UTC [policies] Evaluate -> DEBU 1214 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.160 UTC [policies] Evaluate -> DEBU 1215 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.161 UTC [policies] Evaluate -> DEBU 1216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.161 UTC [policies] Evaluate -> DEBU 1217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.161 UTC [policies] Evaluate -> DEBU 1218 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.162 UTC [cauthdsl] func1 -> DEBU 1219 0xc00102f810 gate 1574140963162251000 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.162 UTC [cauthdsl] func2 -> DEBU 121a 0xc00102f810 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.163 UTC [cauthdsl] func2 -> DEBU 121b 0xc00102f810 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.163 UTC [cauthdsl] func2 -> DEBU 121c 0xc00102f810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:43.163 UTC [cauthdsl] func2 -> DEBU 121d 0xc00102f810 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.164 UTC [cauthdsl] func1 -> DEBU 121e 0xc00102f810 gate 1574140963162251000 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.164 UTC [policies] Evaluate -> DEBU 121f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.164 UTC [policies] Evaluate -> DEBU 1220 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.164 UTC [policies] Evaluate -> DEBU 1221 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.165 UTC [cauthdsl] func1 -> DEBU 1222 0xc0012bc050 gate 1574140963165237700 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.165 UTC [cauthdsl] func2 -> DEBU 1223 0xc0012bc050 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.165 UTC [cauthdsl] func2 -> DEBU 1224 0xc0012bc050 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.166 UTC [cauthdsl] func2 -> DEBU 1225 0xc0012bc050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:43.166 UTC [cauthdsl] func2 -> DEBU 1226 0xc0012bc050 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.166 UTC [cauthdsl] func1 -> DEBU 1227 0xc0012bc050 gate 1574140963165237700 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.166 UTC [policies] Evaluate -> DEBU 1228 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.166 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.167 UTC [policies] func1 -> DEBU 122a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:43.167 UTC [policies] Evaluate -> DEBU 122b Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:43.167 UTC [policies] Evaluate -> DEBU 122c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:43.167 UTC [policies] Evaluate -> DEBU 122d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.167 UTC [policies] Evaluate -> DEBU 122e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.168 UTC [policies] Evaluate -> DEBU 122f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.168 UTC [cauthdsl] func1 -> DEBU 1230 0xc0012bcd40 gate 1574140963168070200 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.168 UTC [cauthdsl] func2 -> DEBU 1231 0xc0012bcd40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.168 UTC [cauthdsl] func2 -> DEBU 1232 0xc0012bcd40 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.168 UTC [cauthdsl] func2 -> DEBU 1233 0xc0012bcd40 principal matched by identity 0" +peer1.org1.example.com | [f00 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [f01 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [f02 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [f03 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f04 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [f05 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [f06 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [f07 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f08 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f09 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f0a 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f0b 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f0c 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f0d 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [f0e 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f0f 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [f10 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [f11 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f12 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [f13 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [f14 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [130e 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858a40 gate 1574140929781727700 evaluation starts +peer1.org2.example.com | [130f 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858a40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1310 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858a40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1311 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858a40 principal matched by identity 0 +peer1.org2.example.com | [1312 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 72 da 73 f9 eb a4 ae df de c2 56 08 db 91 4b | DEBU Verify: sig = 00000000 30 44 02 20 18 63 bf 52 f7 e4 99 d5 a6 3c e9 5f |0D. .c.R.....<._| +peer1.org2.example.com | 00000010 c9 a9 d1 dd 70 bb 2d 03 ce 2e 15 74 8e 90 ec d5 |....p.-....t....| +peer1.org2.example.com | 00000020 ce 08 7d 80 02 20 7d 0d cf 18 f9 15 59 88 d4 55 |..}.. }.....Y..U| +peer1.org2.example.com | 00000030 0f e8 2c f9 b1 d1 89 44 0d d3 a1 fa c5 6e 61 cf |..,....D.....na.| +peer1.org2.example.com | 00000040 6a e0 c1 e1 2b 69 |j...+i| +peer1.org2.example.com | [1314 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858a40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1315 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858a40 gate 1574140929781727700 evaluation succeeds +peer1.org2.example.com | [1316 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1317 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1318 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1319 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [131a 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [131b 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [131c 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [131d 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [131e 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [131f 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1320 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1321 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1322 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1323 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1324 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1325 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1326 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1327 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1328 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1329 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [132a 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [132b 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [132c 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [132d 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [132e 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [132f 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1330 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1332 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1331 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1333 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1334 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10f2 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10f3 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10f4 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10f5 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10f6 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10f7 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10f8 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10f9 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10fa 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10fb 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10fc 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10fd 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10fe 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10ff 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1100 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1101 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1102 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1103 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1104 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1105 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1106 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1107 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 gate 1574140920853114500 evaluation starts +peer0.org1.example.com | [1108 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1109 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [110a 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 principal matched by identity 0 +peer0.org1.example.com | [110b 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 79 57 a8 8d 6c 20 cc 56 64 3f c0 d2 1d 97 b7 |.yW..l .Vd?.....| +peer0.org1.example.com | 00000010 1a 51 37 63 a4 98 d6 b9 27 2d a9 ed 50 b7 57 24 |.Q7c....'-..P.W$| +peer0.org1.example.com | [110c 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 fc 10 eb 1f 45 49 75 a3 39 70 05 |0D. G....EIu.9p.| +peer0.org1.example.com | 00000010 9f 1a d2 51 51 be 64 bd f3 e5 04 6f f0 ba 1d 42 |...QQ.d....o...B| +peer0.org1.example.com | 00000020 0a 0d 51 4a 02 20 0a c0 ea 8c 86 e9 af 8a 43 90 |..QJ. ........C.| +peer0.org1.example.com | 00000030 c6 15 d3 3d 15 d0 b0 71 a2 b1 6f af 57 7f 40 a6 |...=...q..o.W.@.| +peer0.org1.example.com | 00000040 7f 77 2a 8a 18 08 |.w*...| +peer0.org1.example.com | [110d 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [110e 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 gate 1574140920853114500 evaluation succeeds +peer0.org1.example.com | [110f 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1110 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1111 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1112 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1113 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1114 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1115 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1116 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1117 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1118 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1119 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [111a 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [111b 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [111c 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [111d 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [111f 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [111e 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1120 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1121 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1122 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1123 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1124 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1125 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1126 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1127 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1128 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1129 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [112a 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [112b 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [112c 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [112d 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [112e 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [112f 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1130 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1335 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1336 11-19 05:22:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1337 11-19 05:22:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1338 11-19 05:22:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1339 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [133a 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [133b 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 bb 90 5e a8 b3 09 cf 8e 11 4e 15 04 2a 3a 83 |...^......N..*:.| +peer1.org2.example.com | 00000010 ed 82 b9 35 e0 f4 36 b1 ea 4e 48 76 73 76 81 1a |...5..6..NHvsv..| +peer1.org2.example.com | [133c 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 ec 4f 4c 8f 29 da 2d ff dd f4 |0E.!...OL.).-...| +peer1.org2.example.com | 00000010 87 87 fc d8 29 2a 12 be 8e 2b c9 68 09 09 70 71 |....)*...+.h..pq| +peer1.org2.example.com | 00000020 f2 aa d3 fd 32 02 20 15 8e 1a 38 bf b4 cd c5 14 |....2. ...8.....| +peer1.org2.example.com | 00000030 36 eb 53 7a 19 2c d9 3d 77 1c d7 8c d6 74 ca 1e |6.Sz.,.=w....t..| +peer1.org2.example.com | 00000040 ed 77 5f 47 cb ef 38 |.w_G..8| +peer1.org2.example.com | [133d 11-19 05:22:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [133e 11-19 05:22:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [133f 11-19 05:22:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [1340 11-19 05:22:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1341 11-19 05:22:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15101C +peer1.org2.example.com | [1342 11-19 05:22:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E6C98E0F98F614A216AEC098FE60511849CC88BCD0D0037D3945B23A347B77A5 +peer1.org2.example.com | [1343 11-19 05:22:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1344 11-19 05:22:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1345 11-19 05:22:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1346 11-19 05:22:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1347 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1348 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1349 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [134a 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [134b 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [134c 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [134d 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [134e 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [134f 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1350 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1351 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1352 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1353 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1354 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1355 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1356 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1357 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1358 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1359 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [135a 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [135b 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [135c 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [135d 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [135e 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [135f 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1360 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1361 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1362 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1363 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1364 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1365 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1366 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1368 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1369 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [136a 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387fba0 gate 1574140930817047900 evaluation starts +peer1.org2.example.com | [1367 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [136b 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387fba0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [136c 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387fba0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [136d 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387fba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [136e 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387fba0 principal evaluation fails +peer1.org2.example.com | [136f 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387fba0 gate 1574140930817047900 evaluation fails +peer1.org2.example.com | [1370 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1371 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1372 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1373 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc110 gate 1574140930818496900 evaluation starts +peer1.org2.example.com | [1374 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc110 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1375 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc110 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1376 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc110 principal matched by identity 0 +peer1.org2.example.com | [1377 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 6b 81 25 70 d6 89 94 08 a1 b7 66 df 9e e2 ee |.k.%p......f....| +peer1.org2.example.com | 00000010 06 17 e5 c1 b2 2c 2f 01 b1 e7 57 c7 40 22 c4 46 |.....,/...W.@".F| +peer1.org2.example.com | [1378 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a ce 86 02 c4 ab 30 56 82 a4 50 a4 |0D. :.....0V..P.| +peer1.org2.example.com | 00000010 65 13 c1 61 99 46 e1 61 ca c2 99 47 6b 9f a3 3e |e..a.F.a...Gk..>| +peer1.org2.example.com | 00000020 34 12 af 0d 02 20 59 be fd 77 59 28 0c f2 31 3c |4.... Y..wY(..1<| +orderer0.example.com | "2019-11-19 05:22:43.168 UTC [msp.identity] Verify -> DEBU 1234 Verify: digest = 00000000 c5 c3 15 80 7a e8 2b 96 9c 3c 7b ed f2 55 9d 37 |....z.+..<{..U.7| +orderer0.example.com | 00000010 f4 2d 23 a3 da a5 b4 aa 74 a4 c0 c2 34 39 29 c1 |.-#.....t...49).|" +orderer0.example.com | "2019-11-19 05:22:43.168 UTC [msp.identity] Verify -> DEBU 1235 Verify: sig = 00000000 30 45 02 21 00 80 6d 3d 3b 86 67 cd 10 6f a0 74 |0E.!..m=;.g..o.t| +orderer0.example.com | 00000010 c9 09 81 94 af 2a b6 b1 e0 92 bb ef cb aa 53 4d |.....*........SM| +orderer0.example.com | 00000020 a3 3c 51 06 51 02 20 09 1d e5 d9 2d 72 db 3c be |. DEBU 1236 0xc0012bcd40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:43.169 UTC [cauthdsl] func1 -> DEBU 1237 0xc0012bcd40 gate 1574140963168070200 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:43.169 UTC [policies] Evaluate -> DEBU 1238 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:43.169 UTC [policies] Evaluate -> DEBU 1239 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:43.169 UTC [policies] Evaluate -> DEBU 123a Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:43.170 UTC [policies] Evaluate -> DEBU 123b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:43.170 UTC [policies] Evaluate -> DEBU 123c Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:43.170 UTC [policies] Evaluate -> DEBU 123d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:43.170 UTC [common.deliver] deliverBlocks -> DEBU 123e [channel: businesschannel] Received seekInfo (0xc0012aa200) start: > stop: > from 172.18.0.5:51612" +orderer0.example.com | "2019-11-19 05:22:43.171 UTC [fsblkstorage] Next -> DEBU 123f Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:43.171 UTC [fsblkstorage] newBlockfileStream -> DEBU 1240 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76767]" +orderer0.example.com | "2019-11-19 05:22:43.171 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1241 Remaining bytes=[12492], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:43.171 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1242 Returning blockbytes - length=[4521], placementInfo={fileNum=[0], startOffset=[76767], bytesOffset=[76769]}" +orderer0.example.com | "2019-11-19 05:22:43.171 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1243 blockbytes [4521] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:43.172 UTC [common.deliver] deliverBlocks -> DEBU 1244 [channel: businesschannel] Delivering block for (0xc0012aa200) for 172.18.0.5:51612" +orderer0.example.com | "2019-11-19 05:22:43.172 UTC [common.deliver] deliverBlocks -> DEBU 1245 [channel: businesschannel] Done delivering to 172.18.0.5:51612 for (0xc0012aa200)" +orderer0.example.com | "2019-11-19 05:22:43.172 UTC [common.deliver] Handle -> DEBU 1246 Waiting for new SeekInfo from 172.18.0.5:51612" +orderer0.example.com | "2019-11-19 05:22:43.172 UTC [common.deliver] Handle -> DEBU 1247 Attempting to read seek info message from 172.18.0.5:51612" +orderer0.example.com | "2019-11-19 05:22:43.180 UTC [grpc] infof -> DEBU 1248 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:43.181 UTC [common.deliver] Handle -> WARN 1249 Error reading from 172.18.0.5:51612: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:43.181 UTC [orderer.common.server] func1 -> DEBU 124a Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:43.181 UTC [comm.grpc.server] 1 -> INFO 124b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51612 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.7474ms +orderer0.example.com | "2019-11-19 05:22:43.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124c Sending msg of 28 bytes to 2 on channel businesschannel took 57.9µs" +orderer0.example.com | "2019-11-19 05:22:43.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124d Sending msg of 28 bytes to 3 on channel businesschannel took 74.5µs" +orderer0.example.com | "2019-11-19 05:22:43.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 568.5µs " +orderer0.example.com | "2019-11-19 05:22:43.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.5µs " +orderer0.example.com | "2019-11-19 05:22:43.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1250 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:43.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1251 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:43.474 UTC [orderer.common.server] Deliver -> DEBU 1252 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:43.474 UTC [common.deliver] Handle -> DEBU 1253 Starting new deliver loop for 172.18.0.5:51614" +orderer0.example.com | "2019-11-19 05:22:43.474 UTC [common.deliver] Handle -> DEBU 1254 Attempting to read seek info message from 172.18.0.5:51614" +orderer0.example.com | "2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1255 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1256 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1257 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1258 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1259 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.475 UTC [cauthdsl] func1 -> DEBU 125a 0xc0012dce70 gate 1574140963475775200 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.476 UTC [cauthdsl] func2 -> DEBU 125b 0xc0012dce70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.476 UTC [cauthdsl] func2 -> DEBU 125c 0xc0012dce70 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.476 UTC [cauthdsl] func2 -> DEBU 125d 0xc0012dce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:43.476 UTC [cauthdsl] func2 -> DEBU 125e 0xc0012dce70 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.476 UTC [cauthdsl] func1 -> DEBU 125f 0xc0012dce70 gate 1574140963475775200 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.476 UTC [policies] Evaluate -> DEBU 1260 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.477 UTC [policies] Evaluate -> DEBU 1261 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.477 UTC [policies] Evaluate -> DEBU 1262 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.477 UTC [cauthdsl] func1 -> DEBU 1263 0xc0012dd6b0 gate 1574140963477288300 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.477 UTC [cauthdsl] func2 -> DEBU 1264 0xc0012dd6b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.477 UTC [cauthdsl] func2 -> DEBU 1265 0xc0012dd6b0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.477 UTC [cauthdsl] func2 -> DEBU 1266 0xc0012dd6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:43.477 UTC [cauthdsl] func2 -> DEBU 1267 0xc0012dd6b0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.477 UTC [cauthdsl] func1 -> DEBU 1268 0xc0012dd6b0 gate 1574140963477288300 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.478 UTC [policies] Evaluate -> DEBU 1269 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.478 UTC [policies] Evaluate -> DEBU 126a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.478 UTC [policies] func1 -> DEBU 126b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:43.478 UTC [policies] Evaluate -> DEBU 126c Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:43.478 UTC [policies] Evaluate -> DEBU 126d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:43.480 UTC [policies] Evaluate -> DEBU 126e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.480 UTC [policies] Evaluate -> DEBU 126f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.480 UTC [policies] Evaluate -> DEBU 1270 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.481 UTC [cauthdsl] func1 -> DEBU 1271 0xc0013083b0 gate 1574140963481013900 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.481 UTC [cauthdsl] func2 -> DEBU 1272 0xc0013083b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.481 UTC [cauthdsl] func2 -> DEBU 1273 0xc0013083b0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.481 UTC [cauthdsl] func2 -> DEBU 1274 0xc0013083b0 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:43.481 UTC [msp.identity] Verify -> DEBU 1275 Verify: digest = 00000000 f2 3a 47 a4 82 97 bd 21 58 b3 e8 af 06 b2 bf 00 |.:G....!X.......| +orderer0.example.com | 00000010 64 a1 d5 1e 0b 4b 83 37 08 c6 b8 a4 e5 41 5d a2 |d....K.7.....A].|" +orderer0.example.com | "2019-11-19 05:22:43.482 UTC [msp.identity] Verify -> DEBU 1276 Verify: sig = 00000000 30 45 02 21 00 fe c8 66 3d a4 55 6e 7d 84 65 55 |0E.!...f=.Un}.eU| +orderer0.example.com | 00000010 c8 d6 ba 94 8c e0 ab 3a 95 35 42 98 83 01 43 f1 |.......:.5B...C.| +orderer0.example.com | 00000020 77 0d 99 c4 a1 02 20 7b b2 1a e5 30 2b 9f 25 1b |w..... {...0+.%.| +orderer0.example.com | 00000030 46 e4 fe 1a 91 dc 9d 35 b8 69 f1 03 68 8d 13 5a |F......5.i..h..Z| +orderer0.example.com | 00000040 38 85 25 a9 95 73 c7 |8.%..s.|" +orderer0.example.com | "2019-11-19 05:22:43.482 UTC [cauthdsl] func2 -> DEBU 1277 0xc0013083b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:43.482 UTC [cauthdsl] func1 -> DEBU 1278 0xc0013083b0 gate 1574140963481013900 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:43.482 UTC [policies] Evaluate -> DEBU 1279 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:43.483 UTC [policies] Evaluate -> DEBU 127a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:43.483 UTC [policies] Evaluate -> DEBU 127b Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:43.483 UTC [policies] Evaluate -> DEBU 127c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:43.484 UTC [policies] Evaluate -> DEBU 127d Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:43.484 UTC [policies] Evaluate -> DEBU 127e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:43.484 UTC [common.deliver] deliverBlocks -> DEBU 127f [channel: businesschannel] Received seekInfo (0xc000d56e40) start: > stop: > from 172.18.0.5:51614" +orderer0.example.com | "2019-11-19 05:22:43.485 UTC [fsblkstorage] Next -> DEBU 1280 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:43.486 UTC [fsblkstorage] newBlockfileStream -> DEBU 1281 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[81290]" +orderer0.example.com | "2019-11-19 05:22:43.487 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1282 Remaining bytes=[7969], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:43.487 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1283 Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81290], bytesOffset=[81292]}" +orderer0.example.com | "2019-11-19 05:22:43.487 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1284 blockbytes [3982] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:43.487 UTC [common.deliver] deliverBlocks -> DEBU 1285 [channel: businesschannel] Delivering block for (0xc000d56e40) for 172.18.0.5:51614" +orderer0.example.com | "2019-11-19 05:22:43.487 UTC [common.deliver] deliverBlocks -> DEBU 1286 [channel: businesschannel] Done delivering to 172.18.0.5:51614 for (0xc000d56e40)" +orderer0.example.com | "2019-11-19 05:22:43.487 UTC [common.deliver] Handle -> DEBU 1287 Waiting for new SeekInfo from 172.18.0.5:51614" +orderer0.example.com | "2019-11-19 05:22:43.487 UTC [common.deliver] Handle -> DEBU 1288 Attempting to read seek info message from 172.18.0.5:51614" +orderer0.example.com | "2019-11-19 05:22:43.497 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1289 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:43.498 UTC [common.deliver] Handle -> WARN 128a Error reading from 172.18.0.5:51614: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:43.498 UTC [orderer.common.server] func1 -> DEBU 128b Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:43.498 UTC [comm.grpc.server] 1 -> INFO 128d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51614 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.8595ms +orderer0.example.com | "2019-11-19 05:22:43.500 UTC [grpc] infof -> DEBU 128e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:43.498 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128c Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs" +orderer0.example.com | "2019-11-19 05:22:43.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.4261ms " +orderer0.example.com | "2019-11-19 05:22:43.694 UTC [orderer.common.server] Deliver -> DEBU 1290 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:43.694 UTC [common.deliver] Handle -> DEBU 1291 Starting new deliver loop for 172.18.0.5:51616" +orderer0.example.com | "2019-11-19 05:22:43.694 UTC [common.deliver] Handle -> DEBU 1292 Attempting to read seek info message from 172.18.0.5:51616" +peer1.org2.example.com | 00000030 12 7f e7 ad a3 e5 87 b4 73 e1 52 10 f5 98 68 4a |........s.R...hJ| +peer1.org2.example.com | 00000040 54 d0 ad 6e 5c 61 |T..n\a| +peer1.org2.example.com | [1379 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [137a 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc110 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [137b 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc110 gate 1574140930818496900 evaluation succeeds +peer1.org2.example.com | [137c 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [137d 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [137e 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [137f 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1380 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1381 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1382 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1383 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1384 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1385 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1386 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1387 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1388 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1389 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [138a 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [138b 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [138c 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [138d 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [138e 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [138f 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1390 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1391 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1392 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1393 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1394 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 6f 8d 4a 96 49 d1 06 03 a4 de d5 ec af 66 0f |\o.J.I........f.| +peer1.org2.example.com | 00000010 6f ff 5c dc 9b 2d 5a 10 f4 14 4f 9b 44 dd b2 77 |o.\..-Z...O.D..w| +peer1.org2.example.com | [1395 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 0c f8 10 43 b3 a9 50 81 42 21 |0E.!.....C..P.B!| +peer1.org2.example.com | 00000010 30 0b 1a 69 52 7e e0 0d ea 10 73 82 25 5f 42 2b |0..iR~....s.%_B+| +peer1.org2.example.com | 00000020 1f 81 89 1d 1e 02 20 0d 07 4b c6 b4 5c 2f 65 17 |...... ..K..\/e.| +peer1.org2.example.com | 00000030 5c 61 0a ac d4 3f e3 fa 63 e2 40 58 af 81 97 db |\a...?..c.@X....| +peer1.org2.example.com | 00000040 84 c0 4f ad f4 f0 ab |..O....| +peer1.org2.example.com | [1396 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1397 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [f15 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f16 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f17 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f18 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f19 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f1a 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f1b 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054940 gate 1574140923854159400 evaluation starts +peer1.org1.example.com | [f1c 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f1d 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054940 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [f1e 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054940 principal matched by identity 0 +peer1.org1.example.com | [f1f 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 89 53 a7 f7 86 02 31 6a 3a 25 aa c2 d3 2b ad |..S....1j:%...+.| +peer1.org1.example.com | 00000010 c7 c6 6f 04 ad 7c b5 0c ab 0c 0b 06 34 5d ee 21 |..o..|......4].!| +peer1.org1.example.com | [f20 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 e0 d9 b9 62 8f 38 01 b6 39 3a |0E.!.....b.8..9:| +peer1.org1.example.com | 00000010 cd 39 1d 31 6a 62 0a 3c 22 c7 ce 11 c0 81 b0 29 |.9.1jb.<"......)| +peer1.org1.example.com | 00000020 dc cb d3 83 e1 02 20 50 21 f7 2b e2 d6 08 2d 65 |...... P!.+...-e| +peer1.org1.example.com | 00000030 12 a0 3b c6 3d a7 af 82 de 63 c8 47 51 a1 41 bf |..;.=....c.GQ.A.| +peer1.org1.example.com | 00000040 d6 c1 28 d9 f6 87 3c |..(...<| +peer1.org1.example.com | [f21 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f22 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054940 gate 1574140923854159400 evaluation succeeds +peer1.org1.example.com | [f23 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f24 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f25 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f26 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f27 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f28 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [f29 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [f2a 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [f2b 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [f2c 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f2d 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f2e 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f2f 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [f30 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f31 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f32 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f33 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f34 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [f35 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:43.695 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.695 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.696 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.696 UTC [policies] Evaluate -> DEBU 1296 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.696 UTC [policies] Evaluate -> DEBU 1297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.696 UTC [cauthdsl] func1 -> DEBU 1298 0xc000a832d0 gate 1574140963696818900 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.697 UTC [cauthdsl] func2 -> DEBU 1299 0xc000a832d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.697 UTC [cauthdsl] func2 -> DEBU 129a 0xc000a832d0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.697 UTC [cauthdsl] func2 -> DEBU 129b 0xc000a832d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:43.698 UTC [cauthdsl] func2 -> DEBU 129c 0xc000a832d0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.698 UTC [cauthdsl] func1 -> DEBU 129d 0xc000a832d0 gate 1574140963696818900 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.698 UTC [policies] Evaluate -> DEBU 129e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.698 UTC [policies] Evaluate -> DEBU 129f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.699 UTC [policies] Evaluate -> DEBU 12a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.699 UTC [cauthdsl] func1 -> DEBU 12a1 0xc000a83b10 gate 1574140963699426200 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.699 UTC [cauthdsl] func2 -> DEBU 12a2 0xc000a83b10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.699 UTC [cauthdsl] func2 -> DEBU 12a3 0xc000a83b10 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.700 UTC [cauthdsl] func2 -> DEBU 12a4 0xc000a83b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:43.700 UTC [cauthdsl] func2 -> DEBU 12a5 0xc000a83b10 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.701 UTC [cauthdsl] func1 -> DEBU 12a6 0xc000a83b10 gate 1574140963699426200 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:43.701 UTC [policies] Evaluate -> DEBU 12a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.701 UTC [policies] Evaluate -> DEBU 12a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:43.702 UTC [policies] func1 -> DEBU 12a9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-11-19 05:22:43.702 UTC [policies] Evaluate -> DEBU 12aa Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:43.702 UTC [policies] Evaluate -> DEBU 12ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:43.702 UTC [policies] Evaluate -> DEBU 12ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.703 UTC [policies] Evaluate -> DEBU 12ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:43.703 UTC [policies] Evaluate -> DEBU 12ae == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:43.703 UTC [cauthdsl] func1 -> DEBU 12af 0xc00125c810 gate 1574140963703568800 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:43.703 UTC [cauthdsl] func2 -> DEBU 12b0 0xc00125c810 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:43.703 UTC [cauthdsl] func2 -> DEBU 12b1 0xc00125c810 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:43.704 UTC [cauthdsl] func2 -> DEBU 12b2 0xc00125c810 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:43.704 UTC [msp.identity] Verify -> DEBU 12b3 Verify: digest = 00000000 5b 7b aa 88 8b 8b 3f 5e 2f 8a 06 7b 41 f4 33 34 |[{....?^/..{A.34| +orderer0.example.com | 00000010 31 99 6e e8 5a 18 34 f6 2f f8 2d a5 af a4 c5 4c |1.n.Z.4./.-....L|" +orderer0.example.com | "2019-11-19 05:22:43.704 UTC [msp.identity] Verify -> DEBU 12b4 Verify: sig = 00000000 30 44 02 20 68 6c 85 47 e9 53 7e 01 fc d2 65 2a |0D. hl.G.S~...e*| +orderer0.example.com | 00000010 ad b3 72 f5 9d 5a b1 68 18 7d 5d c5 a3 83 b9 a7 |..r..Z.h.}].....| +orderer0.example.com | 00000020 61 e8 89 2c 02 20 3f a7 34 7d 91 a4 0c 9a 0c bc |a..,. ?.4}......| +orderer0.example.com | 00000030 1f 84 66 1f 6d b5 be e1 45 6a 66 63 b1 ef e1 f2 |..f.m...Ejfc....| +orderer0.example.com | 00000040 47 aa 6c f3 49 91 |G.l.I.|" +orderer0.example.com | "2019-11-19 05:22:43.705 UTC [cauthdsl] func2 -> DEBU 12b5 0xc00125c810 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:43.705 UTC [cauthdsl] func1 -> DEBU 12b6 0xc00125c810 gate 1574140963703568800 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:43.705 UTC [policies] Evaluate -> DEBU 12b7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12b9 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12bb Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:43.707 UTC [common.deliver] deliverBlocks -> DEBU 12bd [channel: businesschannel] Received seekInfo (0xc00125a4c0) start: > stop: > from 172.18.0.5:51616" +orderer0.example.com | "2019-11-19 05:22:43.707 UTC [fsblkstorage] Next -> DEBU 12be Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-11-19 05:22:43.707 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85274]" +orderer0.example.com | "2019-11-19 05:22:43.707 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c0 Remaining bytes=[3985], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:43.707 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c1 Returning blockbytes - length=[3983], placementInfo={fileNum=[0], startOffset=[85274], bytesOffset=[85276]}" +orderer0.example.com | "2019-11-19 05:22:43.707 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c2 blockbytes [3983] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:43.708 UTC [common.deliver] deliverBlocks -> DEBU 12c3 [channel: businesschannel] Delivering block for (0xc00125a4c0) for 172.18.0.5:51616" +peer1.org1.example.com | [f36 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > alive: alive: +peer1.org1.example.com | [f37 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [f38 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15101A +peer1.org1.example.com | [f39 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BE064A57608812B0FC872D7AF3E23EF2B845356463D04DD8469FB91DC2F6B443 +peer1.org1.example.com | [f3a 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [f3b 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [f3c 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [f3d 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f3e 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f3f 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f40 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f41 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f42 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [f43 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f44 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [f45 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f46 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [f47 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f48 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [f49 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f4a 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1398 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1399 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [139a 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [139b 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [139c 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [139d 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [139e 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [139f 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13a0 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13a1 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13a2 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13a3 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13a4 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [13a5 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [13a6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13a7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [13a8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13a9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [13aa 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [13ab 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ac 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [13ad 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13ae 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13af 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [13b0 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [13b1 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [13b2 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e6d30 gate 1574140930852454500 evaluation starts +peer1.org2.example.com | [13b3 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e6d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [13b4 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e6d30 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1131 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1132 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1133 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1134 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1135 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1136 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1137 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1138 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1139 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [113a 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [113b 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [113c 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [113e 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [113f 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1140 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1141 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [113d 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1142 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1143 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1144 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1145 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1146 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1147 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1148 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f4b 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [f4c 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 06 4a 57 60 88 12 b0 fc 87 2d 7a f3 e2 3e f2 |..JW`.....-z..>.| +peer1.org1.example.com | 00000010 b8 45 35 64 63 d0 4d d8 46 9f b9 1d c2 f6 b4 43 |.E5dc.M.F......C| +peer1.org1.example.com | [f4d 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 1a 44 53 5c 9f c5 25 c9 11 f8 f8 |0D. H.DS\..%....| +peer1.org1.example.com | 00000010 78 f9 ae c6 72 d4 91 5f b4 a5 0b 3b ee 77 bf e1 |x...r.._...;.w..| +peer1.org1.example.com | 00000020 2c 88 bb ae 02 20 45 02 53 3a 46 8a 70 43 0e 97 |,.... E.S:F.pC..| +peer1.org1.example.com | 00000030 f2 8c a4 fd 02 8e 32 5e 77 97 9c aa e5 5f b4 93 |......2^w...._..| +peer1.org1.example.com | 00000040 da 3f 91 8a 01 d9 |.?....| +peer1.org1.example.com | [f4e 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [f4f 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b cb f4 d7 14 87 e2 77 9f 5e 3c 37 |0D. k......w.^<7| +peer1.org1.example.com | 00000010 f8 35 39 2c 98 bc da 94 b2 4b d0 35 62 d8 b0 97 |.59,.....K.5b...| +peer1.org1.example.com | 00000020 97 c0 ce 7c 02 20 74 c6 b3 9d 6c 8e 18 32 3b c0 |...|. t...l..2;.| +peer1.org1.example.com | 00000030 b9 83 91 fe 4b 3d 72 2e e6 db e3 19 23 d3 cb ba |....K=r.....#...| +peer1.org1.example.com | 00000040 12 cc 53 35 16 97 |..S5..| +peer1.org1.example.com | [f50 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [f51 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [f52 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f53 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f54 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [f55 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [f56 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f57 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [f58 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [f59 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer1.org1.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer1.org1.example.com | [f5a 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [f5b 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [f5c 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer1.org1.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer1.org1.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer1.org1.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer1.org1.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer1.org1.example.com | [f5d 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f5e 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f5f 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [f60 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e6d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [13b7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e6d30 principal evaluation fails +peer1.org2.example.com | [13b8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e6d30 gate 1574140930852454500 evaluation fails +peer1.org2.example.com | [13b9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13ba 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13bb 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [13bc 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e72a0 gate 1574140930854904500 evaluation starts +peer1.org2.example.com | [13bd 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e72a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [13be 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e72a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [13bf 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e72a0 principal matched by identity 0 +peer1.org2.example.com | [13c0 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer1.org2.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer1.org2.example.com | [13c1 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer1.org2.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer1.org2.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer1.org2.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer1.org2.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer1.org2.example.com | [13c2 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e72a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [13c3 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e72a0 gate 1574140930854904500 evaluation succeeds +peer1.org2.example.com | [13c4 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13c5 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13c6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [13c7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [13c8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [13c9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [13ca 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [13cb 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [13cc 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [13cd 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ce 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13cf 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d0 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [13d1 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d2 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d3 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d4 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13b5 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d5 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > alive:3\333[o\270f\271L\2015\260\034#\320\"\311\321\322" > +peer1.org2.example.com | [13d6 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [13d7 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d8 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1149 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [114a 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [114b 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [114c 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151015 +peer0.org1.example.com | [114d 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 80B4BA26E5FE762BED894C9B8F2C459974EE13CB278025A02F014CF2DE4B9709 +peer0.org1.example.com | [114e 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [114f 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1150 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1151 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" secret_envelope:\353\206z3\037\014$u\036\321\002 Q\177\017\232q\370\367\241\023\024\217\376\356^R\217\253O\264Qv\306\023\247\376\261;\276\234\203^\350" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1152 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1153 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" secret_envelope:\353\206z3\037\014$u\036\321\002 Q\177\017\232q\370\367\241\023\024\217\376\356^R\217\253O\264Qv\306\023\247\376\261;\276\234\203^\350" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1154 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1155 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1156 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1157 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1158 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [115a 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1159 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [115b 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [115c 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [115d 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [115e 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [115f 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1160 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1161 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1162 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer0.org1.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer0.org1.example.com | [1163 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer0.org1.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer0.org1.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer0.org1.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer0.org1.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer1.org1.example.com | [f61 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f62 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f63 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f64 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f65 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f66 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f67 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a05e0 gate 1574140923928858000 evaluation starts +peer1.org1.example.com | [f68 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a05e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f69 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a05e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [f6a 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a05e0 principal matched by identity 0 +peer1.org1.example.com | [f6b 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 89 53 a7 f7 86 02 31 6a 3a 25 aa c2 d3 2b ad |..S....1j:%...+.| +peer1.org1.example.com | 00000010 c7 c6 6f 04 ad 7c b5 0c ab 0c 0b 06 34 5d ee 21 |..o..|......4].!| +peer1.org1.example.com | [f6c 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 e0 d9 b9 62 8f 38 01 b6 39 3a |0E.!.....b.8..9:| +peer1.org1.example.com | 00000010 cd 39 1d 31 6a 62 0a 3c 22 c7 ce 11 c0 81 b0 29 |.9.1jb.<"......)| +peer1.org1.example.com | 00000020 dc cb d3 83 e1 02 20 50 21 f7 2b e2 d6 08 2d 65 |...... P!.+...-e| +peer1.org1.example.com | 00000030 12 a0 3b c6 3d a7 af 82 de 63 c8 47 51 a1 41 bf |..;.=....c.GQ.A.| +peer1.org1.example.com | 00000040 d6 c1 28 d9 f6 87 3c |..(...<| +peer1.org1.example.com | [f6d 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a05e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f6e 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a05e0 gate 1574140923928858000 evaluation succeeds +peer1.org1.example.com | [f6f 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f70 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f71 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f72 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f73 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f74 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f75 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [f76 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 06 4a 57 60 88 12 b0 fc 87 2d 7a f3 e2 3e f2 |..JW`.....-z..>.| +peer1.org1.example.com | 00000010 b8 45 35 64 63 d0 4d d8 46 9f b9 1d c2 f6 b4 43 |.E5dc.M.F......C| +peer1.org1.example.com | [f77 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 1a 44 53 5c 9f c5 25 c9 11 f8 f8 |0D. H.DS\..%....| +peer1.org1.example.com | 00000010 78 f9 ae c6 72 d4 91 5f b4 a5 0b 3b ee 77 bf e1 |x...r.._...;.w..| +peer1.org1.example.com | 00000020 2c 88 bb ae 02 20 45 02 53 3a 46 8a 70 43 0e 97 |,.... E.S:F.pC..| +peer1.org1.example.com | 00000030 f2 8c a4 fd 02 8e 32 5e 77 97 9c aa e5 5f b4 93 |......2^w...._..| +peer1.org1.example.com | 00000040 da 3f 91 8a 01 d9 |.?....| +peer1.org1.example.com | [f78 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f79 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f7a 11-19 05:22:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f7b 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f7c 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [f7d 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [f7f 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 06 4a 57 60 88 12 b0 fc 87 2d 7a f3 e2 3e f2 |..JW`.....-z..>.| +peer1.org1.example.com | 00000010 b8 45 35 64 63 d0 4d d8 46 9f b9 1d c2 f6 b4 43 |.E5dc.M.F......C| +peer1.org1.example.com | [f80 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 1a 44 53 5c 9f c5 25 c9 11 f8 f8 |0D. H.DS\..%....| +peer1.org1.example.com | 00000010 78 f9 ae c6 72 d4 91 5f b4 a5 0b 3b ee 77 bf e1 |x...r.._...;.w..| +peer1.org1.example.com | 00000020 2c 88 bb ae 02 20 45 02 53 3a 46 8a 70 43 0e 97 |,.... E.S:F.pC..| +peer1.org1.example.com | 00000030 f2 8c a4 fd 02 8e 32 5e 77 97 9c aa e5 5f b4 93 |......2^w...._..| +peer1.org1.example.com | 00000040 da 3f 91 8a 01 d9 |.?....| +peer1.org1.example.com | [f7e 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f81 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f82 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f83 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f84 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1164 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1165 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1166 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1167 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1168 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1169 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [116a 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [116b 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer0.org1.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer0.org1.example.com | [116c 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer0.org1.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer0.org1.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer0.org1.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer0.org1.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer0.org1.example.com | [116d 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [116e 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [116f 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1170 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1171 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1172 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1173 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1174 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1175 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1176 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1177 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer0.org1.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer0.org1.example.com | [1178 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer0.org1.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer0.org1.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer0.org1.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer0.org1.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer0.org1.example.com | [1179 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [117a 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 fb 20 98 a1 28 4d b7 21 cd b2 |0E.!... ..(M.!..| +peer0.org1.example.com | 00000010 7a 1b a4 61 a8 e8 d0 f1 5a 53 3e eb 86 7a 33 1f |z..a....ZS>..z3.| +peer0.org1.example.com | 00000020 0c 24 75 1e d1 02 20 51 7f 0f 9a 71 f8 f7 a1 13 |.$u... Q...q....| +peer0.org1.example.com | 00000030 14 8f fe ee 5e 52 8f ab 4f b4 51 76 c6 13 a7 fe |....^R..O.Qv....| +peer0.org1.example.com | 00000040 b1 3b be 9c 83 5e e8 |.;...^.| +peer0.org1.example.com | [117b 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [117c 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [117d 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [117e 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [117f 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1180 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1181 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1182 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1183 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d9 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [13da 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13db 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13dc 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13de 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13df 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13dd 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [13e0 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [13e1 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13e2 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13e3 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [13e4 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13e5 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13e6 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13e7 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13e8 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13e9 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ea 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13eb 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ec 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [13ed 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ee 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ef 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13f0 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13f1 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [13f2 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13f3 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [13f4 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [13f5 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13f6 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13f7 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [13f8 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13f9 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [13fa 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13fb 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [13fc 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117e 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [117f 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1180 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1181 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1182 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1183 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1184 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1185 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1186 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1187 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c190 gate 1574140923991383100 evaluation starts +peer0.org2.example.com | [1188 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1189 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c190 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [118a 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [118b 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c190 principal evaluation fails +peer0.org2.example.com | [118c 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c190 gate 1574140923991383100 evaluation fails +peer0.org2.example.com | [118d 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [118e 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [118f 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1190 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c700 gate 1574140923992423400 evaluation starts +peer0.org2.example.com | [1191 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1192 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c700 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1193 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c700 principal matched by identity 0 +peer0.org2.example.com | [1194 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1195 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1196 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c700 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1197 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c700 gate 1574140923992423400 evaluation succeeds +peer0.org2.example.com | [1198 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1199 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [119a 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [119b 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [119c 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [119d 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [119e 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [119f 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11a0 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [11a1 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11a2 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13fd 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [13fe 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [13ff 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1400 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1401 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1402 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1403 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1404 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1405 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1406 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1407 11-19 05:22:11.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1408 11-19 05:22:11.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15101D +peer1.org2.example.com | [1409 11-19 05:22:11.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3F52BE765F2D420713A6E0C5859C4344570FBCE119FB2A81ECD14F75118CD366 +peer1.org2.example.com | [140a 11-19 05:22:11.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [140b 11-19 05:22:11.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [140c 11-19 05:22:11.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [140d 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [140e 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [140f 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1410 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1411 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1412 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:43.708 UTC [common.deliver] deliverBlocks -> DEBU 12c4 [channel: businesschannel] Done delivering to 172.18.0.5:51616 for (0xc00125a4c0)" +orderer0.example.com | "2019-11-19 05:22:43.709 UTC [common.deliver] Handle -> DEBU 12c5 Waiting for new SeekInfo from 172.18.0.5:51616" +orderer0.example.com | "2019-11-19 05:22:43.709 UTC [common.deliver] Handle -> DEBU 12c6 Attempting to read seek info message from 172.18.0.5:51616" +orderer0.example.com | "2019-11-19 05:22:43.714 UTC [common.deliver] Handle -> WARN 12c7 Error reading from 172.18.0.5:51616: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:43.714 UTC [grpc] infof -> DEBU 12c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:43.715 UTC [orderer.common.server] func1 -> DEBU 12c9 Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:43.715 UTC [comm.grpc.server] 1 -> INFO 12ca streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51616 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.5087ms +orderer0.example.com | "2019-11-19 05:22:43.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cb Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +orderer0.example.com | "2019-11-19 05:22:43.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cc Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +orderer0.example.com | "2019-11-19 05:22:43.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.5µs " +orderer0.example.com | "2019-11-19 05:22:43.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0208ms " +orderer0.example.com | "2019-11-19 05:22:43.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cf Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:43.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:43.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:43.995 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d2 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +orderer0.example.com | "2019-11-19 05:22:43.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +orderer0.example.com | "2019-11-19 05:22:44.019 UTC [orderer.common.server] Deliver -> DEBU 12d4 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:44.020 UTC [common.deliver] Handle -> DEBU 12d5 Starting new deliver loop for 172.18.0.5:51618" +orderer0.example.com | "2019-11-19 05:22:44.021 UTC [common.deliver] Handle -> DEBU 12d6 Attempting to read seek info message from 172.18.0.5:51618" +orderer0.example.com | "2019-11-19 05:22:44.022 UTC [policies] Evaluate -> DEBU 12d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.023 UTC [policies] Evaluate -> DEBU 12d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.023 UTC [policies] Evaluate -> DEBU 12d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.024 UTC [policies] Evaluate -> DEBU 12da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.024 UTC [policies] Evaluate -> DEBU 12db == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.024 UTC [msp] DeserializeIdentity -> DEBU 12dc Obtaining identity" +orderer0.example.com | "2019-11-19 05:22:44.025 UTC [msp.identity] newIdentity -> DEBU 12dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:44.025 UTC [cauthdsl] func1 -> DEBU 12de 0xc001247450 gate 1574140964025684900 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:44.025 UTC [cauthdsl] func2 -> DEBU 12df 0xc001247450 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:44.025 UTC [cauthdsl] func2 -> DEBU 12e0 0xc001247450 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:44.026 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 12e1 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-11-19 05:22:44.026 UTC [msp] Validate -> DEBU 12e2 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:22:44.026 UTC [cauthdsl] func2 -> DEBU 12e3 0xc001247450 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:44.026 UTC [msp.identity] Verify -> DEBU 12e4 Verify: digest = 00000000 25 0a 6f c7 6e 07 2a d9 5d 32 ea 85 0f 68 d0 e4 |%.o.n.*.]2...h..| +orderer0.example.com | 00000010 d0 bd 75 6e 85 0c d8 cc 54 11 7f f9 ad 9c 31 c2 |..un....T.....1.|" +orderer0.example.com | "2019-11-19 05:22:44.027 UTC [msp.identity] Verify -> DEBU 12e5 Verify: sig = 00000000 30 44 02 20 26 c8 81 e5 0f 31 65 e4 36 33 30 e5 |0D. &....1e.630.| +orderer0.example.com | 00000010 ac 61 88 bc 16 e1 10 85 8a 9f ef c2 cb c4 d2 71 |.a.............q| +orderer0.example.com | 00000020 9b 12 c5 fb 02 20 08 2f b4 0f 9c 16 5d 80 fe 5b |..... ./....]..[| +orderer0.example.com | 00000030 15 73 3a 58 13 47 0b ff 1c c4 c9 65 6b 09 3e d9 |.s:X.G.....ek.>.| +orderer0.example.com | 00000040 85 3f 5c 3e 05 6f |.?\>.o|" +orderer0.example.com | "2019-11-19 05:22:44.027 UTC [cauthdsl] func2 -> DEBU 12e6 0xc001247450 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:44.027 UTC [cauthdsl] func1 -> DEBU 12e7 0xc001247450 gate 1574140964025684900 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:44.027 UTC [policies] Evaluate -> DEBU 12e8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12ea Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12ec Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [f85 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +peer1.org1.example.com | 00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +peer1.org1.example.com | [f86 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +peer1.org1.example.com | 00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +peer1.org1.example.com | 00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +peer1.org1.example.com | 00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +peer1.org1.example.com | 00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +peer1.org1.example.com | [f87 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f88 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f89 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [f8a 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f8b 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f8c 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f8d 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f8e 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f8f 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f90 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f91 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b94b0 gate 1574140923931422500 evaluation starts +peer1.org1.example.com | [f92 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b94b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f93 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b94b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [f94 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b94b0 principal matched by identity 0 +peer1.org1.example.com | [f95 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer1.org1.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer1.org1.example.com | [f96 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer1.org1.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer1.org1.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer1.org1.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer1.org1.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer1.org1.example.com | [f97 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b94b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f98 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b94b0 gate 1574140923931422500 evaluation succeeds +peer1.org1.example.com | [f99 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f9a 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f9b 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f9c 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f9d 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f9e 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f9f 11-19 05:22:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fa0 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [fa1 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [fa2 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fa3 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fa4 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fa5 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fa6 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [fa7 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [fa8 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fa9 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [faa 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fab 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fac 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [fad 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 a9 69 12 ec e4 82 74 59 cd 5b 7d fb a8 50 36 |F.i....tY.[}..P6| +peer1.org1.example.com | 00000010 02 b6 64 8b ed 50 f8 dc 9f 76 51 b1 f5 d7 fe 7a |..d..P...vQ....z| +peer1.org1.example.com | [fae 11-19 05:22:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 50 8d e5 04 65 26 d5 c7 a2 bb |0E.!..P...e&....| +peer1.org1.example.com | 00000010 16 0d a3 14 f5 74 d2 40 b2 be 90 6e 8a 71 f1 11 |.....t.@...n.q..| +peer1.org1.example.com | 00000020 53 11 65 5f 7f 02 20 1b 26 fd a6 ab 34 86 aa 18 |S.e_.. .&...4...| +peer1.org1.example.com | 00000030 a3 26 e4 fc 3b b9 b8 7a eb 8b 1e 06 3e 4d ad 27 |.&..;..z....>M.'| +peer1.org1.example.com | 00000040 b6 0b 01 e5 f1 62 54 |.....bT| +peer1.org1.example.com | [faf 11-19 05:22:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fb0 11-19 05:22:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [fb1 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fb2 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fb3 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fb4 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [fb5 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 f0 36 67 b5 a7 8f 67 3a 5c 02 28 70 8e 5a 96 |..6g...g:\.(p.Z.| +peer1.org1.example.com | 00000010 2b 8f db bd a7 87 a0 f7 b9 f9 b9 cc 66 38 16 c2 |+...........f8..| +peer1.org1.example.com | [fb6 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 b2 a7 64 54 3c b6 ed 23 55 99 |0E.!....dT<..#U.| +peer1.org1.example.com | 00000010 9c b3 1e b9 89 69 01 2b af 62 ec f1 34 34 db ed |.....i.+.b..44..| +peer1.org1.example.com | 00000020 75 64 58 86 b3 02 20 6e 9e 9e 03 12 6b 39 43 95 |udX... n....k9C.| +peer1.org1.example.com | 00000030 f8 9d 51 b3 9d 13 5b 36 22 de 2a 3f f8 95 96 21 |..Q...[6".*?...!| +peer1.org1.example.com | 00000040 1a 00 91 45 29 f8 85 |...E)..| +peer1.org1.example.com | [fb7 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fb8 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [fb9 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [fba 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [fbb 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [fbc 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fbd 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fbe 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fbf 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fc0 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fc1 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fc2 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1413 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1414 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1415 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1416 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1417 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1418 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1419 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [141a 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [141b 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [141c 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer1.org2.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org2.example.com | [141d 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer1.org2.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer1.org2.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer1.org2.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer1.org2.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org2.example.com | [141e 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [141f 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1420 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1421 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1422 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1423 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1424 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1425 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1426 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1427 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1428 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer1.org2.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org2.example.com | [1429 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer1.org2.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer1.org2.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer1.org2.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer1.org2.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org2.example.com | [142a 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [142b 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a cc ff 46 15 e2 3f ab 02 46 54 55 |0D. :..F..?..FTU| +peer1.org2.example.com | 00000010 72 f5 f0 bc 62 39 72 39 9c 2d f2 fc c5 60 b9 5d |r...b9r9.-...`.]| +peer1.org2.example.com | 00000020 98 b1 5c 21 02 20 04 f8 7a 7f aa 98 5a 20 88 19 |..\!. ..z...Z ..| +peer1.org2.example.com | 00000030 13 ae 6e 36 72 62 f8 52 62 2f dd 7c 9a ef 09 ac |..n6rb.Rb/.|....| +peer1.org2.example.com | 00000040 ba 3d 8d 2d 34 13 |.=.-4.| +peer1.org2.example.com | [142c 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [142d 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:44.028 UTC [common.deliver] deliverBlocks -> DEBU 12ee [channel: testchainid] Received seekInfo (0xc00125ac40) start: > stop: > from 172.18.0.5:51618" +orderer0.example.com | "2019-11-19 05:22:44.029 UTC [fsblkstorage] Next -> DEBU 12ef Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-11-19 05:22:44.029 UTC [fsblkstorage] newBlockfileStream -> DEBU 12f0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +orderer0.example.com | "2019-11-19 05:22:44.029 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f1 Remaining bytes=[27692], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:44.029 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f2 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +orderer0.example.com | "2019-11-19 05:22:44.029 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f3 blockbytes [27689] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:44.029 UTC [common.deliver] deliverBlocks -> DEBU 12f4 [channel: testchainid] Delivering block for (0xc00125ac40) for 172.18.0.5:51618" +orderer0.example.com | "2019-11-19 05:22:44.030 UTC [common.deliver] deliverBlocks -> DEBU 12f5 [channel: testchainid] Done delivering to 172.18.0.5:51618 for (0xc00125ac40)" +orderer0.example.com | "2019-11-19 05:22:44.030 UTC [common.deliver] Handle -> DEBU 12f6 Waiting for new SeekInfo from 172.18.0.5:51618" +orderer0.example.com | "2019-11-19 05:22:44.030 UTC [common.deliver] Handle -> DEBU 12f7 Attempting to read seek info message from 172.18.0.5:51618" +orderer0.example.com | "2019-11-19 05:22:44.042 UTC [grpc] warningf -> DEBU 12f8 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.5:51618: read: connection reset by peer" +orderer0.example.com | "2019-11-19 05:22:44.042 UTC [common.deliver] Handle -> WARN 12f9 Error reading from 172.18.0.5:51618: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:44.042 UTC [orderer.common.server] func1 -> DEBU 12fa Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:44.042 UTC [comm.grpc.server] 1 -> INFO 12fb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51618 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.2486ms +orderer0.example.com | "2019-11-19 05:22:44.042 UTC [grpc] infof -> DEBU 12fc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:44.265 UTC [orderer.common.server] Deliver -> DEBU 12fd Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:44.265 UTC [common.deliver] Handle -> DEBU 12fe Starting new deliver loop for 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.265 UTC [common.deliver] Handle -> DEBU 12ff Attempting to read seek info message from 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.265 UTC [policies] Evaluate -> DEBU 1300 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.266 UTC [policies] Evaluate -> DEBU 1301 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.266 UTC [policies] Evaluate -> DEBU 1302 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.266 UTC [policies] Evaluate -> DEBU 1303 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.266 UTC [policies] Evaluate -> DEBU 1304 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.266 UTC [cauthdsl] func1 -> DEBU 1305 0xc0011fe680 gate 1574140964266540400 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:44.266 UTC [cauthdsl] func2 -> DEBU 1306 0xc0011fe680 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:44.266 UTC [cauthdsl] func2 -> DEBU 1307 0xc0011fe680 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:44.266 UTC [cauthdsl] func2 -> DEBU 1308 0xc0011fe680 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:44.267 UTC [msp.identity] Verify -> DEBU 1309 Verify: digest = 00000000 c5 22 73 be eb f6 3b 86 94 f4 f5 a4 27 3b e0 a6 |."s...;.....';..| +orderer0.example.com | 00000010 ae d1 dd 33 af 40 84 c6 18 47 d6 00 c0 c8 01 ed |...3.@...G......|" +orderer0.example.com | "2019-11-19 05:22:44.267 UTC [msp.identity] Verify -> DEBU 130a Verify: sig = 00000000 30 45 02 21 00 ee 7d 24 80 69 61 99 15 d8 4d d3 |0E.!..}$.ia...M.| +orderer0.example.com | 00000010 b2 8b 0d 03 66 27 58 0d 73 d4 9e ac b3 9f e5 43 |....f'X.s......C| +orderer0.example.com | 00000020 cf 59 4b 21 d5 02 20 58 f5 8c 74 86 71 a3 bd 10 |.YK!.. X..t.q...| +orderer0.example.com | 00000030 30 cf 0b 5b 72 62 5b 0d d4 d6 fc 54 74 56 93 7e |0..[rb[....TtV.~| +orderer0.example.com | 00000040 75 a8 2e 0d 16 1d 7f |u......|" +orderer0.example.com | "2019-11-19 05:22:44.268 UTC [cauthdsl] func2 -> DEBU 130b 0xc0011fe680 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:44.268 UTC [cauthdsl] func1 -> DEBU 130c 0xc0011fe680 gate 1574140964266540400 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 130d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 130e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 130f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 1310 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 1311 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:44.269 UTC [policies] Evaluate -> DEBU 1312 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:44.269 UTC [common.deliver] deliverBlocks -> DEBU 1313 [channel: testchainid] Received seekInfo (0xc0012aaac0) start: > stop: > from 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.269 UTC [fsblkstorage] Next -> DEBU 1314 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-11-19 05:22:44.269 UTC [fsblkstorage] newBlockfileStream -> DEBU 1315 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +orderer0.example.com | "2019-11-19 05:22:44.270 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1316 Remaining bytes=[27692], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:44.270 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1317 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +orderer0.example.com | "2019-11-19 05:22:44.270 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1318 blockbytes [27689] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:44.270 UTC [common.deliver] deliverBlocks -> DEBU 1319 [channel: testchainid] Delivering block for (0xc0012aaac0) for 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.270 UTC [common.deliver] deliverBlocks -> DEBU 131a [channel: testchainid] Done delivering to 172.18.0.5:51620 for (0xc0012aaac0)" +orderer0.example.com | "2019-11-19 05:22:44.271 UTC [common.deliver] Handle -> DEBU 131b Waiting for new SeekInfo from 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.271 UTC [common.deliver] Handle -> DEBU 131c Attempting to read seek info message from 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.278 UTC [policies] Evaluate -> DEBU 131d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [1184 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1185 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1186 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1187 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1188 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1189 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [118a 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [118b 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [118c 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [118d 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [118e 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [118f 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1190 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1191 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1192 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1193 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1194 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1195 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 gate 1574140923349934600 evaluation starts +peer0.org1.example.com | [1196 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1197 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1198 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 principal matched by identity 0 +peer0.org1.example.com | [1199 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [119a 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [119b 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [119c 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 gate 1574140923349934600 evaluation succeeds +peer0.org1.example.com | [119d 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [119e 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [119f 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11a0 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [11a1 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [11a2 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [142e 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [142f 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1430 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1431 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1432 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1433 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1434 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1435 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1436 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1437 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1438 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1439 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [143a 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395f550 gate 1574140931476198500 evaluation starts +peer1.org2.example.com | [143b 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395f550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [143c 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395f550 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [143d 11-19 05:22:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395f550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [143e 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395f550 principal evaluation fails +peer1.org2.example.com | [143f 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395f550 gate 1574140931476198500 evaluation fails +peer1.org2.example.com | [1440 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1441 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1442 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1443 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395fac0 gate 1574140931481995300 evaluation starts +peer1.org2.example.com | [1444 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395fac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1445 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395fac0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1446 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395fac0 principal matched by identity 0 +peer1.org2.example.com | [1447 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer1.org2.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer1.org2.example.com | [1448 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer1.org2.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer1.org2.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer1.org2.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer1.org2.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer1.org2.example.com | [1449 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395fac0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [144a 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395fac0 gate 1574140931481995300 evaluation succeeds +peer1.org2.example.com | [144b 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [144c 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [144d 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [144e 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [144f 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1450 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1451 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1452 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer1.org2.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org2.example.com | [1453 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer1.org2.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer1.org2.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer1.org2.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer1.org2.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org2.example.com | [1454 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1455 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1456 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1457 11-19 05:22:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1458 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1459 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [145a 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [145b 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [145c 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [145d 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [145e 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [145f 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1460 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1461 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1462 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1463 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1464 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1465 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [1466 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1467 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1468 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1469 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [146a 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [146b 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [146c 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [146d 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [146e 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [146f 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1470 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1471 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer1.org2.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer1.org2.example.com | [1472 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer1.org2.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer1.org2.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer1.org2.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer1.org2.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer1.org2.example.com | [1473 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1474 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 30 23 a6 3a ea f0 b7 9a c4 fe 78 |0D. =0#.:......x| +peer1.org2.example.com | 00000010 c4 7b ae 3b 95 c6 ca fa e2 66 2e db ae 03 1b f7 |.{.;.....f......| +peer1.org2.example.com | 00000020 c4 a1 3a f7 02 20 1e 61 8d 7c 42 7e 10 da 32 b4 |..:.. .a.|B~..2.| +peer1.org2.example.com | 00000030 75 89 86 a2 75 3d f4 74 de 1f 0b f8 bb 92 b3 b7 |u...u=.t........| +peer1.org2.example.com | 00000040 ad 5d 71 b9 a4 57 |.]q..W| +peer1.org2.example.com | [1475 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1476 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [1477 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1478 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1479 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [147a 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [147b 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [147c 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [147d 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [147e 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [147f 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1480 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1481 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1483 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1482 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" secret_envelope: > alive:3\333[o\270f\271L\2015\260\034#\320\"\311\321\322" > +peer1.org2.example.com | [1484 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1485 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1486 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1487 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1488 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11a3 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [11a4 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [11a5 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [11a6 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3df40 gate 1574140923996363500 evaluation starts +peer0.org2.example.com | [11a7 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3df40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [11a8 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3df40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [11a9 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3df40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [11aa 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3df40 principal evaluation fails +peer0.org2.example.com | [11ab 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3df40 gate 1574140923996363500 evaluation fails +peer0.org2.example.com | [11ac 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11ad 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11ae 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [11af 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a524b0 gate 1574140923998622000 evaluation starts +peer0.org2.example.com | [11b0 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a524b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [11b1 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a524b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [11b2 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a524b0 principal matched by identity 0 +peer0.org2.example.com | [11b3 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [11b4 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [11b5 11-19 05:22:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a524b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [11b6 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a524b0 gate 1574140923998622000 evaluation succeeds +peer0.org2.example.com | [11b7 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [11b8 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [11b9 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [11ba 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [11bb 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11bc 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [11bd 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11be 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11bf 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11c0 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [11c1 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11c2 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11c3 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [11c4 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [11c5 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [11c6 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53890 gate 1574140924004047800 evaluation starts +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [11a3 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11a4 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11a5 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [11a6 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11a7 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11a8 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11a9 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [11aa 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [11ab 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 gate 1574140923355916600 evaluation starts +peer0.org1.example.com | [11ac 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [11ad 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [11ae 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 principal matched by identity 0 +peer0.org1.example.com | [11af 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [11b0 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [11b1 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11b2 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 gate 1574140923355916600 evaluation succeeds +peer0.org1.example.com | [11b3 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11b4 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11b5 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11b6 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [11b7 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [11b8 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [11b9 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11ba 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [11bb 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [11bc 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [11bd 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [11be 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:22:44.278 UTC [policies] Evaluate -> DEBU 131e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.278 UTC [policies] Evaluate -> DEBU 131f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.279 UTC [policies] Evaluate -> DEBU 1320 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.279 UTC [policies] Evaluate -> DEBU 1321 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.279 UTC [cauthdsl] func1 -> DEBU 1322 0xc0011e2580 gate 1574140964279831800 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:44.280 UTC [cauthdsl] func2 -> DEBU 1323 0xc0011e2580 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:44.280 UTC [cauthdsl] func2 -> DEBU 1324 0xc0011e2580 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:44.282 UTC [cauthdsl] func2 -> DEBU 1325 0xc0011e2580 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:44.284 UTC [msp.identity] Verify -> DEBU 1326 Verify: digest = 00000000 59 13 e0 e1 4e 0d 71 17 bc 1b 97 d4 fc 81 3f fb |Y...N.q.......?.| +orderer0.example.com | 00000010 e5 87 7f 8d 08 92 76 2d b7 92 7c d1 ab ad 3e 25 |......v-..|...>%|" +orderer0.example.com | "2019-11-19 05:22:44.297 UTC [msp.identity] Verify -> DEBU 1327 Verify: sig = 00000000 30 45 02 21 00 f7 1f 1c bf 2e 2e 18 65 b0 cf c8 |0E.!........e...| +orderer0.example.com | 00000010 f9 23 c1 44 5f a4 10 2d 16 82 d0 58 c0 20 58 4b |.#.D_..-...X. XK| +orderer0.example.com | 00000020 62 13 4f 83 e2 02 20 06 19 81 1e c2 58 25 b2 25 |b.O... .....X%.%| +orderer0.example.com | 00000030 ec 6b 08 97 01 74 e1 40 a9 c4 29 17 33 9b 6e d5 |.k...t.@..).3.n.| +orderer0.example.com | 00000040 09 e2 35 5a a0 37 a9 |..5Z.7.|" +orderer0.example.com | "2019-11-19 05:22:44.298 UTC [cauthdsl] func2 -> DEBU 1328 0xc0011e2580 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:44.298 UTC [cauthdsl] func1 -> DEBU 1329 0xc0011e2580 gate 1574140964279831800 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:44.298 UTC [policies] Evaluate -> DEBU 132a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:44.298 UTC [policies] Evaluate -> DEBU 132b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:44.298 UTC [policies] Evaluate -> DEBU 132c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.299 UTC [policies] Evaluate -> DEBU 132d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.299 UTC [policies] Evaluate -> DEBU 132e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:44.299 UTC [policies] Evaluate -> DEBU 132f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:44.299 UTC [common.deliver] deliverBlocks -> DEBU 1330 [channel: testchainid] Received seekInfo (0xc00125b180) start: > stop: > from 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.300 UTC [fsblkstorage] Next -> DEBU 1331 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-11-19 05:22:44.300 UTC [fsblkstorage] newBlockfileStream -> DEBU 1332 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-11-19 05:22:44.300 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1333 Remaining bytes=[47979], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:44.300 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1334 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-11-19 05:22:44.301 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1335 blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:44.301 UTC [common.deliver] deliverBlocks -> DEBU 1336 [channel: testchainid] Delivering block for (0xc00125b180) for 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.301 UTC [common.deliver] deliverBlocks -> DEBU 1337 [channel: testchainid] Done delivering to 172.18.0.5:51620 for (0xc00125b180)" +orderer0.example.com | "2019-11-19 05:22:44.302 UTC [common.deliver] Handle -> DEBU 1338 Waiting for new SeekInfo from 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.304 UTC [common.deliver] Handle -> DEBU 1339 Attempting to read seek info message from 172.18.0.5:51620" +orderer0.example.com | "2019-11-19 05:22:44.309 UTC [common.deliver] Handle -> WARN 133a Error reading from 172.18.0.5:51620: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:44.310 UTC [orderer.common.server] func1 -> DEBU 133c Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:44.309 UTC [grpc] infof -> DEBU 133b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:44.310 UTC [comm.grpc.server] 1 -> INFO 133d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51620 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.2188ms +orderer0.example.com | "2019-11-19 05:22:44.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133e Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +orderer0.example.com | "2019-11-19 05:22:44.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133f Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2019-11-19 05:22:44.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1340 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.2µs " +orderer0.example.com | "2019-11-19 05:22:44.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1341 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 170.4µs " +orderer0.example.com | "2019-11-19 05:22:44.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1342 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:44.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1343 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:44.449 UTC [orderer.common.server] Deliver -> DEBU 1344 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [common.deliver] Handle -> DEBU 1345 Starting new deliver loop for 172.18.0.5:51622" +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [common.deliver] Handle -> DEBU 1346 Attempting to read seek info message from 172.18.0.5:51622" +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 1347 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 1348 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 1349 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 134a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 134b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [cauthdsl] func1 -> DEBU 134c 0xc000fe7010 gate 1574140964450932400 evaluation starts" +peer1.org2.example.com | [1489 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [148a 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [148b 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [148c 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [148d 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [148e 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [148f 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b4a90 gate 1574140931918637100 evaluation starts +peer1.org2.example.com | [1490 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b4a90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1491 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b4a90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1492 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b4a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1493 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b4a90 principal evaluation fails +peer1.org2.example.com | [1494 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b4a90 gate 1574140931918637100 evaluation fails +peer1.org2.example.com | [1495 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1496 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1497 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1498 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b5000 gate 1574140931923362800 evaluation starts +peer1.org2.example.com | [1499 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b5000 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [149a 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b5000 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [149b 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b5000 principal matched by identity 0 +peer1.org2.example.com | [149c 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer1.org2.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer1.org2.example.com | [149d 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer1.org2.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer1.org2.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer1.org2.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer1.org2.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer1.org2.example.com | [149e 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b5000 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [149f 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b5000 gate 1574140931923362800 evaluation succeeds +peer1.org2.example.com | [14a0 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14a1 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14a2 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [14a3 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [14a4 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [14a5 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [14a6 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [11c7 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [11c8 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53890 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [11c9 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [11ca 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53890 principal evaluation fails +peer0.org2.example.com | [11cb 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53890 gate 1574140924004047800 evaluation fails +peer0.org2.example.com | [11cc 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11cd 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11ce 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11cf 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11d0 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [11d1 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11d2 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11d3 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11d4 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [11d5 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11d6 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [11d7 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53e00 gate 1574140924009250900 evaluation starts +peer0.org2.example.com | [11d8 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53e00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [11d9 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53e00 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [11da 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53e00 principal matched by identity 0 +peer0.org2.example.com | [11db 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [11dc 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [11dd 11-19 05:22:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53e00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [11de 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53e00 gate 1574140924009250900 evaluation succeeds +peer0.org2.example.com | [11df 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [11e0 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [11e1 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [11e2 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [11e3 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [11e4 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [11e5 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [11e6 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [11e7 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11e8 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:44.450 UTC [cauthdsl] func2 -> DEBU 134d 0xc000fe7010 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:44.451 UTC [cauthdsl] func2 -> DEBU 134e 0xc000fe7010 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:44.451 UTC [cauthdsl] func2 -> DEBU 134f 0xc000fe7010 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:44.451 UTC [msp.identity] Verify -> DEBU 1350 Verify: digest = 00000000 ea 18 52 e9 6a 9b ff b1 de 32 dc 96 46 38 db a0 |..R.j....2..F8..| +orderer0.example.com | 00000010 cb 55 52 0e 94 45 3c a4 23 0f 1b 8a ba 8c 95 c4 |.UR..E<.#.......|" +orderer0.example.com | "2019-11-19 05:22:44.451 UTC [msp.identity] Verify -> DEBU 1351 Verify: sig = 00000000 30 44 02 20 1a 01 54 a7 e7 f2 ec 36 20 2b c2 a8 |0D. ..T....6 +..| +orderer0.example.com | 00000010 3f 88 0e 5a ef 7e 87 a6 d3 a2 1f 63 a9 a8 35 02 |?..Z.~.....c..5.| +orderer0.example.com | 00000020 c3 de fb cb 02 20 31 6a 8f 85 68 e6 38 87 9e a5 |..... 1j..h.8...| +orderer0.example.com | 00000030 2b dc 87 c4 28 00 10 89 61 1a 45 c0 6b 81 f7 74 |+...(...a.E.k..t| +orderer0.example.com | 00000040 b2 69 91 3f e5 b5 |.i.?..|" +orderer0.example.com | "2019-11-19 05:22:44.451 UTC [cauthdsl] func2 -> DEBU 1352 0xc000fe7010 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:44.451 UTC [cauthdsl] func1 -> DEBU 1353 0xc000fe7010 gate 1574140964450932400 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:44.452 UTC [policies] Evaluate -> DEBU 1354 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:44.452 UTC [policies] Evaluate -> DEBU 1355 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:44.453 UTC [policies] Evaluate -> DEBU 1356 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.453 UTC [policies] Evaluate -> DEBU 1357 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.453 UTC [policies] Evaluate -> DEBU 1358 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:44.453 UTC [policies] Evaluate -> DEBU 1359 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:44.453 UTC [common.deliver] deliverBlocks -> DEBU 135a [channel: testchainid] Received seekInfo (0xc0012ab300) start: > stop: > from 172.18.0.5:51622" +orderer0.example.com | "2019-11-19 05:22:44.454 UTC [fsblkstorage] Next -> DEBU 135b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-11-19 05:22:44.454 UTC [fsblkstorage] newBlockfileStream -> DEBU 135c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-11-19 05:22:44.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 135d Remaining bytes=[47979], Going to peek [8] bytes" +orderer0.example.com | "2019-11-19 05:22:44.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 135e Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-11-19 05:22:44.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 135f blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-11-19 05:22:44.454 UTC [common.deliver] deliverBlocks -> DEBU 1360 [channel: testchainid] Delivering block for (0xc0012ab300) for 172.18.0.5:51622" +orderer0.example.com | "2019-11-19 05:22:44.455 UTC [common.deliver] deliverBlocks -> DEBU 1361 [channel: testchainid] Done delivering to 172.18.0.5:51622 for (0xc0012ab300)" +orderer0.example.com | "2019-11-19 05:22:44.455 UTC [common.deliver] Handle -> DEBU 1362 Waiting for new SeekInfo from 172.18.0.5:51622" +orderer0.example.com | "2019-11-19 05:22:44.455 UTC [common.deliver] Handle -> DEBU 1363 Attempting to read seek info message from 172.18.0.5:51622" +orderer0.example.com | "2019-11-19 05:22:44.462 UTC [common.deliver] Handle -> WARN 1364 Error reading from 172.18.0.5:51622: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:44.462 UTC [orderer.common.server] func1 -> DEBU 1365 Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:44.463 UTC [comm.grpc.server] 1 -> INFO 1366 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51622 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.3634ms +orderer0.example.com | "2019-11-19 05:22:44.463 UTC [grpc] infof -> DEBU 1367 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:44.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1368 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:44.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1369 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2019-11-19 05:22:44.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +orderer0.example.com | "2019-11-19 05:22:44.788 UTC [orderer.common.server] Deliver -> DEBU 136b Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:44.788 UTC [common.deliver] Handle -> DEBU 136c Starting new deliver loop for 172.18.0.5:51624" +orderer0.example.com | "2019-11-19 05:22:44.788 UTC [common.deliver] Handle -> DEBU 136d Attempting to read seek info message from 172.18.0.5:51624" +orderer0.example.com | "2019-11-19 05:22:44.791 UTC [policies] Evaluate -> DEBU 136e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.791 UTC [policies] Evaluate -> DEBU 136f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.792 UTC [policies] Evaluate -> DEBU 1370 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.793 UTC [policies] Evaluate -> DEBU 1371 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:44.793 UTC [policies] Evaluate -> DEBU 1372 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-11-19 05:22:44.794 UTC [cauthdsl] func1 -> DEBU 1373 0xc0011d1a10 gate 1574140964794431200 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:44.794 UTC [cauthdsl] func2 -> DEBU 1374 0xc0011d1a10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:44.795 UTC [cauthdsl] func2 -> DEBU 1375 0xc0011d1a10 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:44.796 UTC [cauthdsl] func2 -> DEBU 1376 0xc0011d1a10 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:44.796 UTC [msp.identity] Verify -> DEBU 1377 Verify: digest = 00000000 29 b2 d7 78 15 1c 42 39 0e 63 41 8a 69 8b cb b7 |)..x..B9.cA.i...| +orderer0.example.com | 00000010 cf 75 ba b1 70 54 f0 0d 18 78 2b a3 e1 7b f2 d2 |.u..pT...x+..{..|" +peer1.org2.example.com | [14a7 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [14a8 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [14a9 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14aa 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14ab 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14ac 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [14ad 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14ae 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14af 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b0 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14b2 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > alive: alive: alive:3\333[o\270f\271L\2015\260\034#\320\"\311\321\322" > +peer1.org2.example.com | [14b1 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b3 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14b4 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b5 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b6 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b7 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b8 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14b9 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [14ba 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [14bb 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [14bc 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [14bd 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14be 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14bf 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14c0 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [14c1 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14c2 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14c3 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14c4 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14c5 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14c6 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14c7 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [14c8 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [14c9 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [14ca 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [14cb 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14cc 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14cd 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [14ce 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14cf 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14d0 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [14d1 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [14d2 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [14d3 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039df8d0 gate 1574140932231906800 evaluation starts +peer1.org2.example.com | [14d4 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039df8d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [14d5 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039df8d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [14d6 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039df8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [14d7 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039df8d0 principal evaluation fails +peer1.org2.example.com | [14d8 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039df8d0 gate 1574140932231906800 evaluation fails +peer1.org2.example.com | [14d9 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14da 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14db 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [14dc 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dfe40 gate 1574140932233318700 evaluation starts +peer1.org2.example.com | [14dd 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dfe40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [14de 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dfe40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [14df 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dfe40 principal matched by identity 0 +peer1.org2.example.com | [14e0 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [14e1 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [14e2 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dfe40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [14e3 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dfe40 gate 1574140932233318700 evaluation succeeds +peer1.org2.example.com | [14e4 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14e5 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14e6 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [14e7 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [14e8 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14e9 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14ea 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [14eb 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14ec 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14ed 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [14ee 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [14ef 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [14f0 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0cfd0 gate 1574140932239501000 evaluation starts +peer1.org2.example.com | [14f1 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0cfd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [14f2 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0cfd0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [14f3 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0cfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [14f4 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0cfd0 principal evaluation fails +peer1.org2.example.com | [14f5 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0cfd0 gate 1574140932239501000 evaluation fails +peer1.org2.example.com | [14f6 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14f7 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14f8 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [fc3 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11e9 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [11ea 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:44.797 UTC [msp.identity] Verify -> DEBU 1378 Verify: sig = 00000000 30 44 02 20 27 07 e3 24 f5 30 1d 09 3a 02 90 5f |0D. '..$.0..:.._| +orderer0.example.com | 00000010 88 bf cd b0 db 8b 3c 84 17 83 26 eb b9 eb 4a ea |......<...&...J.| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [fc4 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [11eb 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000020 c3 af 8c 49 02 20 56 c0 01 df 29 32 33 47 4d a0 |...I. V...)23GM.| +peer1.org2.example.com | [14f9 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d540 gate 1574140932240969900 evaluation starts +peer1.org2.example.com | [14fa 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [fc5 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11ec 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000030 fe 84 96 e1 ae ed ea d4 46 44 1b 36 4f a0 a5 d5 |........FD.6O...| +orderer0.example.com | 00000040 d4 24 2c 63 4f 6a |.$,cOj|" +peer1.org2.example.com | [14fb 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d540 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [fc6 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11ed 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:44.797 UTC [cauthdsl] func2 -> DEBU 1379 0xc0011d1a10 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [14fc 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d540 principal matched by identity 0 +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [fc7 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fc8 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:44.797 UTC [cauthdsl] func1 -> DEBU 137a 0xc0011d1a10 gate 1574140964794431200 evaluation succeeds" +peer1.org2.example.com | [14fd 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [fc9 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11ee 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:44.798 UTC [policies] Evaluate -> DEBU 137b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [14fe 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [fca 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11ef 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75c90 gate 1574140924014712000 evaluation starts +orderer0.example.com | "2019-11-19 05:22:44.798 UTC [policies] Evaluate -> DEBU 137c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [11bf 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fcb 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11f0 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75c90 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:44.799 UTC [policies] Evaluate -> DEBU 137d Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [11c0 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fcc 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11f1 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75c90 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:44.799 UTC [policies] Evaluate -> DEBU 137e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:44.799 UTC [policies] Evaluate -> DEBU 137f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:44.799 UTC [policies] Evaluate -> DEBU 1380 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [fcd 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11f2 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:44.799 UTC [common.deliver] deliverBlocks -> DEBU 1381 [channel: testchainid] Received seekInfo (0xc00125b9c0) start: > stop: > from 172.18.0.5:51624" +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [11f3 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75c90 principal evaluation fails +peer0.org1.example.com | [11c1 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [fce 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11f4 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75c90 gate 1574140924014712000 evaluation fails +peer1.org2.example.com | [14ff 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d540 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:44.799 UTC [fsblkstorage] Next -> DEBU 1382 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org1.example.com | [fcf 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11f5 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1500 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d540 gate 1574140932240969900 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:44.799 UTC [fsblkstorage] newBlockfileStream -> DEBU 1383 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +peer0.org1.example.com | [11c2 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [fd0 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fd1 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1501 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1503 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:44.800 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1384 Remaining bytes=[27692], Going to peek [8] bytes" +peer1.org1.example.com | [fd2 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1504 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [11f6 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11f7 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [11f8 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94200 gate 1574140924015849600 evaluation starts +peer0.org2.example.com | [11f9 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94200 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1505 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [11fa 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94200 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [fd3 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fd4 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fd5 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:44.800 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1385 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +peer0.org2.example.com | [11fb 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94200 principal matched by identity 0 +peer1.org1.example.com | [fd6 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1502 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11c3 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11c4 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [11fc 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [fd7 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1506 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11c5 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:44.800 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1386 blockbytes [27689] read from file [0]" +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [fd8 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1507 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [11c6 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:44.800 UTC [common.deliver] deliverBlocks -> DEBU 1387 [channel: testchainid] Delivering block for (0xc00125b9c0) for 172.18.0.5:51624" +peer0.org2.example.com | [11fd 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [fd9 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1508 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11c7 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 gate 1574140923365007800 evaluation starts +peer0.org1.example.com | [11c8 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [fda 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1509 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +orderer0.example.com | "2019-11-19 05:22:44.800 UTC [common.deliver] deliverBlocks -> DEBU 1388 [channel: testchainid] Done delivering to 172.18.0.5:51624 for (0xc00125b9c0)" +peer1.org1.example.com | [fdb 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [150b 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [11c9 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [fdc 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [11ca 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:44.800 UTC [common.deliver] Handle -> DEBU 1389 Waiting for new SeekInfo from 172.18.0.5:51624" +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [fdd 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [fde 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [11fe 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94200 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:44.800 UTC [common.deliver] Handle -> DEBU 138a Attempting to read seek info message from 172.18.0.5:51624" +peer1.org1.example.com | [fdf 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd8e0 gate 1574140925405516200 evaluation starts +peer0.org2.example.com | [11ff 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94200 gate 1574140924015849600 evaluation succeeds +peer0.org1.example.com | [11cb 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:22:44.807 UTC [grpc] infof -> DEBU 138b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | [fe0 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd8e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +orderer0.example.com | "2019-11-19 05:22:44.807 UTC [common.deliver] Handle -> WARN 138c Error reading from 172.18.0.5:51624: rpc error: code = Canceled desc = context canceled" +peer1.org1.example.com | [fe1 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd8e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [1200 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:22:44.808 UTC [orderer.common.server] func1 -> DEBU 138d Closing Deliver stream" +peer1.org1.example.com | [fe2 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd8e0 principal matched by identity 0 +peer1.org2.example.com | [150c 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1201 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [11cc 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:22:44.810 UTC [comm.grpc.server] 1 -> INFO 138e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51624 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.5442ms +peer1.org1.example.com | [fe3 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c 60 4f 19 69 1e 59 13 b7 9c 6f 4c cb e4 6b ee |.`O.i.Y...oL..k.| +peer1.org2.example.com | [150a 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1202 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 68 bd ad 42 e2 15 f1 15 b0 46 24 56 f1 b6 1b 92 |h..B.....F$V....| +peer1.org2.example.com | [150d 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1203 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [fe4 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 c3 58 2d c8 1d de 2b bc fd 62 |0E.!...X-...+..b| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [150e 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1204 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 66 d2 e1 58 3b 8d a9 fb 0d b6 c8 93 51 f3 78 49 |f..X;.......Q.xI| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:22:44.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 138f Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +peer1.org2.example.com | [1510 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1205 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 06 b8 e2 99 f1 02 20 28 6c c5 ee 26 57 11 2d 03 |...... (l..&W.-.| +peer1.org1.example.com | 00000030 9f 6b 56 9e 4d a3 78 f3 8e 4f 42 c4 80 64 04 c6 |.kV.M.x..OB..d..| +peer0.org2.example.com | [1206 11-19 05:22:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 85 b1 42 8c 3b 28 b7 |..B.;(.| +peer0.org2.example.com | [1207 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | "2019-11-19 05:22:44.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1390 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +peer1.org1.example.com | [fe5 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd8e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [150f 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1208 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:22:44.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1391 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +peer1.org1.example.com | [fe6 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd8e0 gate 1574140925405516200 evaluation succeeds +peer1.org1.example.com | [fe7 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1209 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [fe8 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [120a 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11cd 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1511 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1512 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fe9 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [120b 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11ce 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 gate 1574140923365007800 evaluation succeeds +peer1.org2.example.com | [1513 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fea 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:44.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1392 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.8µs " +peer0.org2.example.com | [120c 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11cf 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1514 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [feb 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:44.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1393 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:44.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1394 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [11d0 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11d1 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [fec 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:22:44.998 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1395 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [120d 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [11d2 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1515 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [fed 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:45.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1396 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +peer0.org2.example.com | [120e 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1516 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [fee 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:45.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1397 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.2µs " +peer0.org2.example.com | [120f 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a955e0 gate 1574140924021262400 evaluation starts +peer1.org1.example.com | [fef 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:45.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1398 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +peer0.org2.example.com | [1210 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a955e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ff0 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1517 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1211 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a955e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [ff1 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1519 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [11d3 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ff2 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [151a 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [11d4 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:45.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1399 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +peer0.org2.example.com | [1212 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a955e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [ff3 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [151b 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a24fa0 gate 1574140932251835600 evaluation starts +peer0.org1.example.com | [11d5 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [11d6 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1213 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a955e0 principal evaluation fails +peer1.org1.example.com | [ff4 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [151c 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a24fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [11d7 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11d8 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:45.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 139a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.1µs " +peer1.org1.example.com | [ff5 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d9 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:45.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 139b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203µs " +orderer0.example.com | "2019-11-19 05:22:45.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [ff6 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1518 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [11da 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ff7 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1214 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a955e0 gate 1574140924021262400 evaluation fails +peer1.org2.example.com | [151d 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a24fa0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [151e 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a24fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [11db 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 gate 1574140923373616800 evaluation starts +orderer0.example.com | "2019-11-19 05:22:45.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [11dc 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ff8 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:45.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [ff9 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [151f 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a24fa0 principal evaluation fails +peer1.org2.example.com | [1520 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a24fa0 gate 1574140932251835600 evaluation fails +peer1.org1.example.com | [ffa 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1215 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11dd 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1521 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ffb 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:45.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139f Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2019-11-19 05:22:45.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.8µs " +peer0.org2.example.com | [1216 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1522 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ffc 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:45.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a1 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +peer0.org2.example.com | [1217 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1218 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95b50 gate 1574140924022312600 evaluation starts +peer1.org1.example.com | [ffd 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:45.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +peer0.org2.example.com | [1219 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95b50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1523 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [ffe 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fff 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11de 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 principal matched by identity 0 +peer0.org2.example.com | [121a 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95b50 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1524 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25510 gate 1574140932255621300 evaluation starts +peer1.org1.example.com | [1000 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11df 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +orderer0.example.com | "2019-11-19 05:22:45.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +peer0.org2.example.com | [121b 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95b50 principal matched by identity 0 +peer0.org2.example.com | [121c 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1001 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1002 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [121d 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1003 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [11e0 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +orderer0.example.com | "2019-11-19 05:22:45.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.4µs " +peer1.org2.example.com | [1525 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1004 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1005 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1006 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1007 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1009 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1008 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [100a 11-19 05:22:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [100b 11-19 05:22:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15101B +peer1.org1.example.com | [100c 11-19 05:22:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 12EE664FD5E3FAA92593B28975FA356D7838B071B714C36EAAF80DDC620A7645 +peer1.org1.example.com | [100d 11-19 05:22:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [100e 11-19 05:22:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [100f 11-19 05:22:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1010 11-19 05:22:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1011 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1012 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1013 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1014 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1015 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1017 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1018 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1016 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1019 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [101a 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [101b 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [101c 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [101d 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [101e 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [101f 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1020 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1021 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1022 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1023 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1024 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:45.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1526 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25510 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1025 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:45.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1527 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25510 principal matched by identity 0 +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1026 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:45.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1528 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [11e1 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1027 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:45.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a8 Sending msg of 28 bytes to 3 on channel testchainid took 45.7µs" +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [121e 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95b50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1028 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:45.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.7µs " +peer1.org2.example.com | [1529 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [121f 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95b50 gate 1574140924022312600 evaluation succeeds +peer1.org1.example.com | [1029 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [11e2 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 gate 1574140923373616800 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:46.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13aa Sending msg of 28 bytes to 3 on channel businesschannel took 45.5µs" +orderer0.example.com | "2019-11-19 05:22:46.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ab Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [102a 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142f30 gate 1574140925841596000 evaluation starts +peer0.org1.example.com | [11e3 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:46.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.3µs " +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [102b 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142f30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [11e4 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:46.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.6µs " +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1220 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [102c 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142f30 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [11e5 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11e6 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [11e7 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1221 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [102d 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142f30 principal matched by identity 0 +peer0.org1.example.com | [11e8 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:46.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ae Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1222 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1223 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [102e 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 98 11 19 da 40 a9 16 e9 f9 72 f9 b0 11 0d 2d |7....@....r....-| +peer0.org1.example.com | [11e9 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:46.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13af Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1224 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ec f7 3e 4f 9c 86 01 65 d4 25 07 6c 9a 14 80 de |..>O...e.%.l....| +peer1.org1.example.com | [102f 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 d9 e9 99 b7 22 41 0d 07 ef 4c |0E.!......"A...L| +peer1.org1.example.com | 00000010 37 ba 4f 64 ba d8 cd 10 f5 14 cf 72 75 d6 3a bc |7.Od.......ru.:.| +orderer0.example.com | "2019-11-19 05:22:46.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1225 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 cc 74 14 3c 67 02 20 6e c0 d9 ce d6 4d 61 39 5f |.t. DEBU 0xc003a25510 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11ea 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:46.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b1 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +peer0.org2.example.com | [1226 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 56 e7 05 7f 51 ae 9c 31 64 c0 31 5e e1 eb 0a 71 |V...Q..1d.1^...q| +peer0.org1.example.com | [11eb 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11ec 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 c5 25 24 6e df df c4 |.%$n...| +peer0.org1.example.com | [11ed 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [152b 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25510 gate 1574140932255621300 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:46.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58µs " +peer1.org1.example.com | [1030 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142f30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1227 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11ee 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [152c 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:46.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +peer1.org1.example.com | [1031 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142f30 gate 1574140925841596000 evaluation succeeds +peer0.org2.example.com | [1228 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1229 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11ef 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11f0 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:46.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b4 Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +peer0.org2.example.com | [122a 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:46.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " +peer1.org1.example.com | [1032 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11f1 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [152d 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [122b 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:46.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.3µs " +peer1.org1.example.com | [1033 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:46.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [152e 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [122c 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaece0 gate 1574140924024364600 evaluation starts +peer1.org1.example.com | [1034 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:46.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:46.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:46.992 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ba Sending msg of 28 bytes to 3 on channel testchainid took 10.7µs" +orderer0.example.com | "2019-11-19 05:22:46.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13bb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.1µs " +peer0.org1.example.com | [11f2 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 gate 1574140923378256400 evaluation starts +peer1.org1.example.com | [1035 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1036 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [152f 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [122d 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaece0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1037 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:22:47.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bc Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-11-19 05:22:47.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bd Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +peer1.org2.example.com | [1530 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11f3 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1038 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:47.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.5µs " +peer1.org2.example.com | [1531 11-19 05:22:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1532 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1533 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1039 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:47.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.7µs " +peer1.org2.example.com | [1534 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [103a 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [122e 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaece0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [11f4 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:47.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1535 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [103b 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [122f 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaece0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [11f5 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:47.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1536 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [103c 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1230 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaece0 principal evaluation fails +peer0.org1.example.com | [11f6 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:22:47.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1537 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [103d 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1231 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaece0 gate 1574140924024364600 evaluation fails +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:22:47.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c3 Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +peer1.org2.example.com | [1538 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4a6a0 gate 1574140932260969900 evaluation starts +peer1.org1.example.com | [103e 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1232 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11f7 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:22:47.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.5µs " +peer1.org2.example.com | [1539 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4a6a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [103f 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1233 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | "2019-11-19 05:22:47.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c5 Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +peer1.org2.example.com | [153a 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4a6a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1040 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1234 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:22:47.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c6 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +peer1.org2.example.com | [153b 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4a6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1041 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1235 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf250 gate 1574140924024628900 evaluation starts +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | "2019-11-19 05:22:47.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.6µs " +peer1.org2.example.com | [153c 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4a6a0 principal evaluation fails +peer1.org1.example.com | [1042 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1236 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf250 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:22:47.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192.7µs " +peer1.org2.example.com | [153d 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4a6a0 gate 1574140932260969900 evaluation fails +peer1.org1.example.com | [1043 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1237 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf250 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:47.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c9 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [153e 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1044 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1238 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf250 principal matched by identity 0 +peer0.org1.example.com | [11f8 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:47.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ca Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [153f 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1239 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1045 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1540 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:47.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13cb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1046 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [123a 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [11f9 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 gate 1574140923378256400 evaluation succeeds +peer1.org2.example.com | [1541 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ac10 gate 1574140932262406400 evaluation starts +orderer0.example.com | "2019-11-19 05:22:47.992 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cc Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +peer1.org1.example.com | [1047 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1048 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1049 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [104a 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [104b 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [104c 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [11fa 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1542 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ac10 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:47.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +peer1.org1.example.com | [104d 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [11fb 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1543 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ac10 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:48.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ce Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" +peer1.org1.example.com | [104f 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1544 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ac10 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:48.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cf Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +peer1.org1.example.com | [104e 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [123b 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf250 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11fc 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1545 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:22:48.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.7µs " +peer1.org1.example.com | [1050 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [123c 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf250 gate 1574140924024628900 evaluation succeeds +peer0.org1.example.com | [11fd 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:22:48.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +peer1.org1.example.com | [1051 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [123d 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [11fe 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [1546 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:22:48.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1052 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [123e 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:22:48.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1053 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [123f 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11ff 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:22:48.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1054 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1240 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:22:48.495 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.9µs " +peer1.org1.example.com | [1055 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1241 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:22:48.497 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d6 Sending msg of 28 bytes to 3 on channel testchainid took 177.8µs" +peer1.org1.example.com | [1056 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [1547 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ac10 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:48.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d7 Sending msg of 28 bytes to 2 on channel businesschannel took 36.9µs" +peer1.org1.example.com | [1057 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [1242 11-19 05:22:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1548 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ac10 gate 1574140932262406400 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:48.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d8 Sending msg of 28 bytes to 3 on channel businesschannel took 27.1µs" +peer1.org1.example.com | [1058 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1200 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [1549 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:48.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.3µs " +peer1.org1.example.com | [1059 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [105a 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [154a 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:48.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.7µs " +peer1.org1.example.com | [105b 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1243 11-19 05:22:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [105c 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1244 11-19 05:22:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [105d 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [154b 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [154c 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [154d 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer0.org1.example.com | [1201 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [105e 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer1.org1.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer1.org1.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [154e 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +orderer0.example.com | "2019-11-19 05:22:48.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dc Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:48.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13db Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +orderer0.example.com | "2019-11-19 05:22:49.016 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [105f 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +orderer0.example.com | "2019-11-19 05:22:49.016 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13de Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +orderer0.example.com | "2019-11-19 05:22:49.016 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.4µs " +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1060 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd d3 b1 20 7c af f4 51 61 4b c7 |0E.!.... |..QaK.| +orderer0.example.com | "2019-11-19 05:22:49.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e0 Sending msg of 28 bytes to 2 on channel businesschannel took 34.3µs" +peer0.org2.example.com | [1245 11-19 05:22:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1202 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [154f 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 24 39 3b ca e3 29 d3 b7 30 9e f1 a7 e9 70 7e 9b |$9;..)..0....p~.| +peer1.org1.example.com | 00000020 c8 45 3b 88 18 02 20 51 75 8f 47 dc 4d 1a d8 3c |.E;... Qu.G.M..<| +peer0.org2.example.com | [1246 11-19 05:22:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1203 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | 00000030 ab 44 9c 2a 73 0e 1a a1 43 e3 27 8e a7 15 1c ac |.D.*s...C.'.....| +peer0.org2.example.com | [1247 11-19 05:22:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:49.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e1 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-11-19 05:22:49.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.2µs " +peer1.org1.example.com | 00000040 da ce 81 76 13 67 b9 |...v.g.| +peer1.org2.example.com | [1550 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [1248 11-19 05:22:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:49.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.9µs " +peer0.org1.example.com | [1204 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1061 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [1249 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:49.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1205 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1062 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [124a 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:49.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1206 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1063 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [124b 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:49.497 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1207 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1064 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [124c 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:49.498 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e7 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +peer0.org1.example.com | [1208 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1065 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1551 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [124d 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:49.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.6µs " +peer0.org1.example.com | [1209 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1066 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1552 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [124e 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:49.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e9 Sending msg of 28 bytes to 3 on channel businesschannel took 44µs" +peer0.org1.example.com | [120a 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 gate 1574140923383794800 evaluation starts +peer1.org1.example.com | [1067 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1553 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [124f 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +orderer0.example.com | "2019-11-19 05:22:49.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ea Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +peer0.org1.example.com | [120b 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1068 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1554 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1250 11-19 05:22:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:49.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " +peer0.org1.example.com | [120c 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1069 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [1555 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1251 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:49.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.2µs " +peer0.org1.example.com | [120d 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 principal matched by identity 0 +peer1.org1.example.com | [106a 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1556 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1252 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:49.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ed Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [120e 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [106b 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [106c 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:49.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ee Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [106d 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | "2019-11-19 05:22:49.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ef Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1557 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1253 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [106e 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:49.995 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f0 Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" +peer1.org2.example.com | [1558 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1254 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [106f 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [120f 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1559 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:49.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.4µs " +peer0.org2.example.com | [1255 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1070 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [155a 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [155b 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1071 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [1256 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [155c 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6acf0 gate 1574140932269381800 evaluation starts +peer1.org1.example.com | [1072 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [1257 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [155d 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6acf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1073 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:50.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f2 Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +peer0.org2.example.com | [1258 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [155e 11-19 05:22:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6acf0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1074 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:50.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f4 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [1210 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1211 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 gate 1574140923383794800 evaluation succeeds +peer1.org1.example.com | [1075 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:50.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.5µs " +peer0.org1.example.com | [1212 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1076 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [155f 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6acf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:50.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.3µs " +peer0.org2.example.com | [1259 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1213 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1077 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1560 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6acf0 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:50.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [125a 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1214 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1078 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1561 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6acf0 gate 1574140932269381800 evaluation fails +orderer0.example.com | "2019-11-19 05:22:50.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [125b 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1215 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1079 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1562 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:50.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [125c 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3970 gate 1574140924787292900 evaluation starts +peer0.org1.example.com | [1216 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [107a 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1563 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:50.495 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f9 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +peer0.org2.example.com | [125d 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3970 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1217 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [107b 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1564 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:50.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.7µs " +peer0.org2.example.com | [125e 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3970 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1218 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [107c 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1565 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6b260 gate 1574140932271194800 evaluation starts +peer1.org2.example.com | [1566 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6b260 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1567 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6b260 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [107d 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:50.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fb Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +peer1.org2.example.com | [1568 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6b260 principal matched by identity 0 +peer1.org1.example.com | [107e 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [125f 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1219 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2019-11-19 05:22:50.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fc Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +peer1.org2.example.com | [1569 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [107f 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1260 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3970 principal evaluation fails +peer0.org1.example.com | [121a 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [121b 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [121c 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1080 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [121d 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1081 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [121e 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:50.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.1µs " +peer0.org2.example.com | [1261 11-19 05:22:04.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3970 gate 1574140924787292900 evaluation fails +peer1.org1.example.com | [1082 11-19 05:22:07.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [156a 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [121f 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:50.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.4µs " +orderer0.example.com | "2019-11-19 05:22:50.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ff Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1083 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [1220 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1084 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1085 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1262 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1086 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:50.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1400 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1263 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1087 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1221 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:50.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1401 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1264 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1088 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1222 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:50.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1402 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +orderer0.example.com | "2019-11-19 05:22:50.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1403 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.5µs " +peer1.org1.example.com | [1089 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1223 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:51.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1404 Sending msg of 28 bytes to 2 on channel businesschannel took 29.4µs" +peer0.org2.example.com | [1265 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3ee0 gate 1574140924790384100 evaluation starts +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [108a 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1224 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:51.366 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1406 Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs" +peer0.org2.example.com | [1266 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [156b 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6b260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [108b 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1225 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:51.367 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1407 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.8µs " +peer0.org2.example.com | [1267 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3ee0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [156c 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6b260 gate 1574140932271194800 evaluation succeeds +peer1.org1.example.com | [108c 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1226 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:51.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1405 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.6µs " +peer0.org2.example.com | [1268 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [156d 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [108d 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1227 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:51.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1408 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1269 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3ee0 principal matched by identity 0 +peer1.org2.example.com | [156e 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [108e 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1228 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:51.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1409 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [126a 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 f0 36 67 b5 a7 8f 67 3a 5c 02 28 70 8e 5a 96 |..6g...g:\.(p.Z.| +peer1.org2.example.com | [156f 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [108f 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048d30 gate 1574140927471811600 evaluation starts +peer0.org1.example.com | [1229 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:51.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000010 2b 8f db bd a7 87 a0 f7 b9 f9 b9 cc 66 38 16 c2 |+...........f8..| +peer1.org2.example.com | [1570 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1090 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048d30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [122a 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:51.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140b Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +peer0.org2.example.com | [126b 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 b2 a7 64 54 3c b6 ed 23 55 99 |0E.!....dT<..#U.| +peer1.org1.example.com | [1091 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048d30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1571 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [122b 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [122c 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [122d 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1092 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048d30 principal matched by identity 0 +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [122e 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1093 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +orderer0.example.com | "2019-11-19 05:22:51.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +peer0.org2.example.com | 00000010 9c b3 1e b9 89 69 01 2b af 62 ec f1 34 34 db ed |.....i.+.b..44..| +peer1.org2.example.com | [1572 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [122f 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +orderer0.example.com | "2019-11-19 05:22:51.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140d Sending msg of 28 bytes to 2 on channel businesschannel took 69.4µs" +peer0.org2.example.com | 00000020 75 64 58 86 b3 02 20 6e 9e 9e 03 12 6b 39 43 95 |udX... n....k9C.| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [1230 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1094 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +orderer0.example.com | "2019-11-19 05:22:51.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140e Sending msg of 28 bytes to 3 on channel businesschannel took 109.2µs" +peer0.org2.example.com | 00000030 f8 9d 51 b3 9d 13 5b 36 22 de 2a 3f f8 95 96 21 |..Q...[6".*?...!| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +orderer0.example.com | "2019-11-19 05:22:51.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.1µs " +peer0.org2.example.com | 00000040 1a 00 91 45 29 f8 85 |...E)..| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer0.org1.example.com | [1231 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1232 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer0.org1.example.com | [1233 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [126c 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3ee0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer1.org2.example.com | [1573 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:22:51.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1410 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.4µs " +peer0.org1.example.com | [1234 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [126d 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3ee0 gate 1574140924790384100 evaluation succeeds +peer1.org1.example.com | [1095 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048d30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:22:51.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1411 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1235 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [126e 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1096 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048d30 gate 1574140927471811600 evaluation succeeds +peer1.org2.example.com | [1574 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:22:51.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1412 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1236 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [126f 11-19 05:22:04.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1097 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | "2019-11-19 05:22:51.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1413 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1237 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1270 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1098 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:22:51.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1414 Sending msg of 28 bytes to 3 on channel testchainid took 8.6µs" +peer1.org1.example.com | [1099 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1575 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1576 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [109a 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1577 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [109b 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1578 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:51.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1415 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 533µs " +peer0.org1.example.com | [1238 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1271 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [109c 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1579 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:52.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1416 Sending msg of 28 bytes to 3 on channel businesschannel took 27.4µs" +peer0.org1.example.com | [1239 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1272 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [157a 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [109d 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:52.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1417 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +peer0.org1.example.com | [123a 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 gate 1574140923453764100 evaluation starts +peer0.org2.example.com | [1273 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [157b 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [109e 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:52.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1418 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.2µs " +peer0.org1.example.com | [123b 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1274 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [157c 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [109f 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:52.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1419 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +peer0.org1.example.com | [123c 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1275 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [157d 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f0f0 gate 1574140932277963000 evaluation starts +peer1.org1.example.com | [10a0 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:52.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [123d 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 principal matched by identity 0 +peer0.org2.example.com | [1276 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [157e 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [10a1 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:52.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:52.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:52.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141d Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +orderer0.example.com | "2019-11-19 05:22:52.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " +peer1.org1.example.com | [10a2 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [157f 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f0f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [10a3 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [123e 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +peer0.org1.example.com | 00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +peer0.org2.example.com | [1277 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:52.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +peer1.org1.example.com | [10a4 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [123f 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +peer1.org2.example.com | [1580 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1278 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:52.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1420 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +peer1.org1.example.com | [10a5 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +peer1.org2.example.com | [1581 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f0f0 principal evaluation fails +peer0.org2.example.com | [1279 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:52.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1421 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.5µs " +peer1.org1.example.com | [10a6 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +peer1.org2.example.com | [1582 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f0f0 gate 1574140932277963000 evaluation fails +peer0.org2.example.com | [127a 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:52.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1422 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.8µs " +peer1.org1.example.com | [10a7 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +peer1.org2.example.com | [1583 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [127b 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:52.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1423 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [10a8 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | 00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +peer1.org2.example.com | [1584 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [127c 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:52.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1424 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [10a9 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1240 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1585 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [127d 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:52.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1425 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [10aa 11-19 05:22:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1241 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 gate 1574140923453764100 evaluation succeeds +peer1.org2.example.com | [1586 11-19 05:22:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f660 gate 1574140932279839100 evaluation starts +peer0.org2.example.com | [127e 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:52.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1426 Sending msg of 28 bytes to 3 on channel testchainid took 37µs" +peer1.org1.example.com | [10ab 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1242 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1587 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [127f 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:52.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1427 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 250.9µs " +peer1.org1.example.com | [10ac 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:53.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1428 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.5µs " +peer1.org2.example.com | [1588 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f660 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1280 11-19 05:22:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10ad 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +orderer0.example.com | "2019-11-19 05:22:53.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1429 Sending msg of 28 bytes to 2 on channel businesschannel took 33.8µs" +peer0.org1.example.com | [1243 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1589 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f660 principal matched by identity 0 +peer0.org2.example.com | [1281 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ae 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:53.369 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142a Sending msg of 28 bytes to 3 on channel businesschannel took 30.4µs" +peer0.org1.example.com | [1244 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [158a 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1282 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10af 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:53.369 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +peer0.org1.example.com | [1245 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1283 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10b0 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:53.376 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1246 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [158b 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1284 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10b1 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:53.376 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1247 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1285 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10b2 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:53.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1248 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [10b3 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:53.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142f Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +peer0.org1.example.com | [1249 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [124a 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [10b4 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b5 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [124b 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10b6 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [124c 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1286 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:53.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1430 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.7µs " +peer1.org1.example.com | [10b7 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [124d 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [158c 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f660 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1287 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:53.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1431 Sending msg of 28 bytes to 2 on channel businesschannel took 98.2µs" +peer1.org1.example.com | [10b8 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [124e 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org2.example.com | [158d 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7f660 gate 1574140932279839100 evaluation succeeds +peer0.org2.example.com | [1288 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:53.869 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1434 Sending msg of 28 bytes to 3 on channel businesschannel took 426.1µs" +peer1.org1.example.com | [10b9 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [124f 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [158e 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:53.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1432 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.5µs " +peer1.org1.example.com | [10ba 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1250 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1251 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10bb 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1252 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [10bd 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [10be 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [10bf 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [10c0 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f310 gate 1574140927664903700 evaluation starts +peer1.org1.example.com | [10c1 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f310 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [10c2 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f310 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [10c3 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f310 principal matched by identity 0 +peer1.org1.example.com | [10c4 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [10c5 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [10c6 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f310 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [10c7 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f310 gate 1574140927664903700 evaluation succeeds +peer1.org1.example.com | [10c8 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10bc 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [10c9 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10ca 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [10cb 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [10cc 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [10cd 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [10ce 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10cf 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10d0 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [10d1 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1289 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [128a 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [128b 11-19 05:22:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [128c 11-19 05:22:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [128d 11-19 05:22:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [128e 11-19 05:22:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [128f 11-19 05:22:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [1290 11-19 05:22:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [1291 11-19 05:22:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1292 11-19 05:22:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510051801 +peer0.org2.example.com | [1293 11-19 05:22:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 36AF7EE88BFFC9710072D5F21C2D24E42FBB0052DB8790A399169E0E104C7795 +peer0.org2.example.com | [1294 11-19 05:22:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [1295 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1296 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1297 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1298 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:53.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1433 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:53.872 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1435 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.3µs " +orderer0.example.com | "2019-11-19 05:22:53.873 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1436 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:53.925 UTC [orderer.common.server] Deliver -> DEBU 1437 Starting new Deliver handler" +orderer0.example.com | "2019-11-19 05:22:53.926 UTC [common.deliver] Handle -> DEBU 1438 Starting new deliver loop for 172.18.0.5:51626" +orderer0.example.com | "2019-11-19 05:22:53.926 UTC [common.deliver] Handle -> DEBU 1439 Attempting to read seek info message from 172.18.0.5:51626" +orderer0.example.com | "2019-11-19 05:22:53.940 UTC [orderer.common.server] Broadcast -> DEBU 143a Starting new Broadcast handler" +orderer0.example.com | "2019-11-19 05:22:53.940 UTC [orderer.common.broadcast] Handle -> DEBU 143b Starting new broadcast loop for 172.18.0.5:51628" +orderer0.example.com | "2019-11-19 05:22:53.941 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 143c [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:51628" +orderer0.example.com | "2019-11-19 05:22:53.942 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 143d Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2019-11-19 05:22:53.942 UTC [policies] Evaluate -> DEBU 143e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer1.org1.example.com | [10d2 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10d3 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [10d4 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [10d5 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [10d6 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001aabc0 gate 1574140927669740100 evaluation starts +peer1.org1.example.com | [10d7 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001aabc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [10d8 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001aabc0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [10d9 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001aabc0 principal matched by identity 0 +peer1.org1.example.com | [10da 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [10db 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [10dc 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001aabc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [10dd 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001aabc0 gate 1574140927669740100 evaluation succeeds +peer1.org1.example.com | [10de 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10df 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10e0 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [10e1 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [10e2 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [10e3 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [10e4 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10e5 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [10e6 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [10e7 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [10e8 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10e9 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ea 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [10eb 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10ec 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10ed 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [10ee 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [158f 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1590 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1591 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1592 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1593 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1594 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1595 11-19 05:22:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1596 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1597 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1598 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1599 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [159a 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [159b 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [159c 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [159d 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [159e 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [159f 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [15a0 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [15a1 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa0b70 gate 1574140934753200600 evaluation starts +peer1.org2.example.com | [15a2 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa0b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15a3 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa0b70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [15a4 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa0b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [15a5 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa0b70 principal evaluation fails +peer1.org2.example.com | [15a6 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa0b70 gate 1574140934753200600 evaluation fails +peer1.org2.example.com | [15a7 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15a8 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15a9 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [15aa 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa10e0 gate 1574140934758475600 evaluation starts +peer1.org2.example.com | [15ab 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa10e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15ac 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa10e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [15ad 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [15ae 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [15b0 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa10e0 principal matched by identity 0 +peer0.org2.example.com | [1299 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [129a 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [129b 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [129c 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [129d 11-19 05:22:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [129e 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [129f 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12a0 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12a1 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [12a2 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c 60 4f 19 69 1e 59 13 b7 9c 6f 4c cb e4 6b ee |.`O.i.Y...oL..k.| +peer0.org2.example.com | 00000010 68 bd ad 42 e2 15 f1 15 b0 46 24 56 f1 b6 1b 92 |h..B.....F$V....| +peer0.org2.example.com | [12a3 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 c3 58 2d c8 1d de 2b bc fd 62 |0E.!...X-...+..b| +peer0.org2.example.com | 00000010 66 d2 e1 58 3b 8d a9 fb 0d b6 c8 93 51 f3 78 49 |f..X;.......Q.xI| +peer0.org2.example.com | 00000020 06 b8 e2 99 f1 02 20 28 6c c5 ee 26 57 11 2d 03 |...... (l..&W.-.| +peer0.org2.example.com | 00000030 9f 6b 56 9e 4d a3 78 f3 8e 4f 42 c4 80 64 04 c6 |.kV.M.x..OB..d..| +peer0.org2.example.com | 00000040 85 b1 42 8c 3b 28 b7 |..B.;(.| +peer0.org2.example.com | [12a4 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12a5 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [12a6 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [12a7 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [12a8 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [12a9 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12aa 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ab 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ac 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12ad 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12ae 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12af 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [12b0 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12b1 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [12b2 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12b3 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12b4 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12b5 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12b6 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12b7 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12b8 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12b9 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1253 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1254 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [policies] Evaluate -> DEBU 143f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [policies] Evaluate -> DEBU 1440 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [policies] Evaluate -> DEBU 1441 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [policies] Evaluate -> DEBU 1442 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [cauthdsl] func1 -> DEBU 1443 0xc00024cdb0 gate 1574140973943453700 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [cauthdsl] func2 -> DEBU 1444 0xc00024cdb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [cauthdsl] func2 -> DEBU 1445 0xc00024cdb0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [cauthdsl] func2 -> DEBU 1446 0xc00024cdb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [cauthdsl] func2 -> DEBU 1447 0xc00024cdb0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:53.943 UTC [cauthdsl] func1 -> DEBU 1448 0xc00024cdb0 gate 1574140973943453700 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [policies] Evaluate -> DEBU 1449 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [policies] Evaluate -> DEBU 144a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [policies] Evaluate -> DEBU 144b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [cauthdsl] func1 -> DEBU 144c 0xc00024d740 gate 1574140973944298600 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [cauthdsl] func2 -> DEBU 144d 0xc00024d740 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [cauthdsl] func2 -> DEBU 144e 0xc00024d740 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [cauthdsl] func2 -> DEBU 144f 0xc00024d740 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [msp.identity] Verify -> DEBU 1450 Verify: digest = 00000000 61 40 0c 25 40 2d 90 6d 19 c0 0b 83 e7 a4 59 1f |a@.%@-.m......Y.| +orderer0.example.com | 00000010 fc 71 90 a7 f5 e4 dc 78 6f 90 8d 04 67 26 10 02 |.q.....xo...g&..|" +orderer0.example.com | "2019-11-19 05:22:53.944 UTC [msp.identity] Verify -> DEBU 1451 Verify: sig = 00000000 30 45 02 21 00 93 0c 4b a4 23 73 34 d3 a9 2f ea |0E.!...K.#s4../.| +orderer0.example.com | 00000010 e6 52 07 1e fd 49 e2 bc e4 e9 30 7b a0 a2 c4 89 |.R...I....0{....| +orderer0.example.com | 00000020 44 8f 13 ef 5d 02 20 03 5e 66 a7 fa a7 90 fc 6c |D...]. .^f.....l| +orderer0.example.com | 00000030 ce 0c bd df 63 de bd bc 16 81 03 40 11 64 49 3e |....c......@.dI>| +orderer0.example.com | 00000040 93 01 d3 49 f2 4b b3 |...I.K.|" +orderer0.example.com | "2019-11-19 05:22:53.945 UTC [cauthdsl] func2 -> DEBU 1452 0xc00024d740 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:53.945 UTC [cauthdsl] func1 -> DEBU 1453 0xc00024d740 gate 1574140973944298600 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:53.945 UTC [policies] Evaluate -> DEBU 1454 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.945 UTC [policies] Evaluate -> DEBU 1455 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.945 UTC [policies] Evaluate -> DEBU 1456 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:53.946 UTC [policies] Evaluate -> DEBU 1457 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:53.946 UTC [policies] Evaluate -> DEBU 1458 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:53.947 UTC [policies] Evaluate -> DEBU 1459 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:53.947 UTC [common.configtx] addToMap -> DEBU 145a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:22:53.948 UTC [common.configtx] addToMap -> DEBU 145b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.948 UTC [common.configtx] addToMap -> DEBU 145c Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.948 UTC [common.configtx] addToMap -> DEBU 145d Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.949 UTC [common.configtx] addToMap -> DEBU 145e Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:22:53.949 UTC [common.configtx] addToMap -> DEBU 145f Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:22:53.949 UTC [common.configtx] addToMap -> DEBU 1460 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:53.949 UTC [common.configtx] addToMap -> DEBU 1461 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1462 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1463 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1464 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1465 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1466 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.951 UTC [common.configtx] addToMap -> DEBU 1467 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.951 UTC [common.configtx] addToMap -> DEBU 1468 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.951 UTC [common.configtx] addToMap -> DEBU 1469 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.951 UTC [common.configtx] addToMap -> DEBU 146a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:53.952 UTC [common.configtx] addToMap -> DEBU 146b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.952 UTC [common.configtx] addToMap -> DEBU 146c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:53.952 UTC [common.configtx] addToMap -> DEBU 146d Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.952 UTC [common.configtx] addToMap -> DEBU 146e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.953 UTC [common.configtx] addToMap -> DEBU 146f Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:22:53.953 UTC [common.configtx] addToMap -> DEBU 1470 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:22:53.953 UTC [common.configtx] addToMap -> DEBU 1471 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:53.954 UTC [common.configtx] addToMap -> DEBU 1472 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.954 UTC [common.configtx] addToMap -> DEBU 1473 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org1.example.com | [10ef 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [10f0 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f8200 gate 1574140927678643100 evaluation starts +peer1.org1.example.com | [10f1 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f8200 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [10f2 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f8200 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [10f3 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f8200 principal matched by identity 0 +peer1.org1.example.com | [10f4 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [10f5 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [10f6 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f8200 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [10f7 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f8200 gate 1574140927678643100 evaluation succeeds +peer1.org1.example.com | [10f8 11-19 05:22:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10f9 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10fa 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [10fb 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [10fc 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10fd 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10fe 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [10ff 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1100 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1101 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1102 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1103 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1104 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f9400 gate 1574140927682146400 evaluation starts +peer1.org1.example.com | [1105 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f9400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1106 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f9400 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1107 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f9400 principal matched by identity 0 +peer1.org1.example.com | [1108 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1109 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [110a 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f9400 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [110b 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f9400 gate 1574140927682146400 evaluation succeeds +peer1.org1.example.com | [110c 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [110d 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [110e 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [110f 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [15af 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15b1 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15b2 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15b3 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15b4 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15b5 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15b6 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [15b7 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15b8 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 b5 bd 86 fb ee c1 43 cf 99 73 ed fa 58 1f 27 |.......C..s..X.'| +peer1.org2.example.com | 00000010 4a da cd 1a 1d 02 b5 f6 04 f7 22 e2 50 ce 7a 76 |J.........".P.zv| +peer1.org2.example.com | [15b9 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 9e 0a eb b1 dc be ba 54 86 5b |0E.!.........T.[| +peer1.org2.example.com | 00000010 dc db 11 72 c0 2b 49 10 36 36 3f 4c 3b 27 f4 13 |...r.+I.66?L;'..| +peer1.org2.example.com | 00000020 21 3b ad 13 c5 02 20 2e 79 c0 9f bf ef ae d0 bc |!;.... .y.......| +peer1.org2.example.com | 00000030 5c 4f c8 5e c6 09 9a 75 d1 38 51 ed 4c 4b 78 a2 |\O.^...u.8Q.LKx.| +peer1.org2.example.com | 00000040 a6 5b 11 fb 0b f7 4e |.[....N| +peer1.org2.example.com | [15ba 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa10e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [15bb 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa10e0 gate 1574140934758475600 evaluation succeeds +peer1.org2.example.com | [15bc 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15bd 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15be 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [15bf 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [15c0 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15c1 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [15c2 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [15c3 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [15c4 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [15c5 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15c6 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15c7 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15c8 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15c9 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ca 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15cb 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15cc 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15cd 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ce 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [15cf 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15d0 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15d1 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [15d2 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15d3 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15d4 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15d5 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15d6 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15d7 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:53.954 UTC [common.configtx] addToMap -> DEBU 1474 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:53.954 UTC [common.configtx] addToMap -> DEBU 1475 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:53.954 UTC [common.configtx] verifyDeltaSet -> DEBU 1476 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 1477 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 1478 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 1479 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 147a Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 147b Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.956 UTC [common.configtx] policyForItem -> DEBU 147c Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-11-19 05:22:53.956 UTC [policies] Manager -> DEBU 147d Manager Channel looking up path []" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 147e Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 147f Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1480 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1481 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1482 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1483 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1484 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1485 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Evaluate -> DEBU 1486 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Evaluate -> DEBU 1487 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [policies] Evaluate -> DEBU 1488 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [cauthdsl] deduplicate -> WARN 1489 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [cauthdsl] func1 -> DEBU 148a 0xc000c482d0 gate 1574140973957724600 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [cauthdsl] func2 -> DEBU 148b 0xc000c482d0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [cauthdsl] func2 -> DEBU 148c 0xc000c482d0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [cauthdsl] func2 -> DEBU 148d 0xc000c482d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [cauthdsl] func2 -> DEBU 148e 0xc000c482d0 processing identity 1 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 148f Checking if identity has been named explicitly as an admin for Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1490 Checking if identity carries the admin ou for Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.957 UTC [msp] Validate -> DEBU 1491 MSP Org2MSP validating identity" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp] getCertificationChain -> DEBU 1492 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp] hasOURole -> DEBU 1493 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp] getCertificationChain -> DEBU 1494 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [cauthdsl] func2 -> DEBU 1495 0xc000c482d0 principal matched by identity 1" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp.identity] Verify -> DEBU 1496 Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +orderer0.example.com | 00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...|" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp.identity] Verify -> DEBU 1497 Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +orderer0.example.com | 00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +orderer0.example.com | 00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +orderer0.example.com | 00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +orderer0.example.com | 00000040 46 bf 84 1c 8c 35 |F....5|" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [cauthdsl] func2 -> DEBU 1498 0xc000c482d0 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [cauthdsl] func1 -> DEBU 1499 0xc000c482d0 gate 1574140973957724600 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [policies] Evaluate -> DEBU 149a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [policies] Evaluate -> DEBU 149b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [policies] Evaluate -> DEBU 149c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [cauthdsl] deduplicate -> WARN 149d De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [cauthdsl] func1 -> DEBU 149e 0xc000c48c00 gate 1574140973958630200 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [cauthdsl] func2 -> DEBU 149f 0xc000c48c00 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [cauthdsl] func2 -> DEBU 14a0 0xc000c48c00 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 14a1 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 14a2 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp] Validate -> DEBU 14a3 MSP Org1MSP validating identity" +orderer0.example.com | "2019-11-19 05:22:53.958 UTC [msp] getCertificationChain -> DEBU 14a4 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [msp] hasOURole -> DEBU 14a5 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [msp] getCertificationChain -> DEBU 14a6 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [cauthdsl] func2 -> DEBU 14a7 0xc000c48c00 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [msp.identity] Verify -> DEBU 14a8 Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +peer1.org1.example.com | [1110 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1111 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1112 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1113 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1114 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1115 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1116 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1117 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1118 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1119 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [111a 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [111b 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [111c 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [111d 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5180 gate 1574140927688173400 evaluation starts +peer1.org1.example.com | [111e 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5180 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [111f 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5180 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1120 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5180 principal matched by identity 0 +peer1.org1.example.com | [1121 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1122 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1123 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5180 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1124 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5180 gate 1574140927688173400 evaluation succeeds +peer1.org1.example.com | [1125 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1126 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1127 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1128 11-19 05:22:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1129 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [112a 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [112b 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [112c 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [15d8 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15d9 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15da 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15db 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15dc 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15dd 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15de 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15df 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [15e0 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15e1 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [15e2 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [15e3 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15e4 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [15e5 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15e6 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15e7 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [15e8 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [15e9 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [15ea 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3840 gate 1574140934827940200 evaluation starts +peer1.org2.example.com | [15eb 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3840 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15ec 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3840 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [15ed 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [15ee 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3840 principal evaluation fails +peer1.org2.example.com | [15ef 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3840 gate 1574140934827940200 evaluation fails +peer1.org2.example.com | [15f0 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15f1 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15f2 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [15f3 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3db0 gate 1574140934831046600 evaluation starts +peer0.org2.example.com | [12ba 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12bb 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12bc 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12bd 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12be 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12bf 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12c0 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12c1 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [12c2 11-19 05:22:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12c3 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [12c4 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12c5 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12c6 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [12c7 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [12c8 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [12c9 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42a70 gate 1574140925811222800 evaluation starts +peer0.org2.example.com | [12ca 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42a70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [12cb 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42a70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [12cc 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [12cd 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42a70 principal evaluation fails +peer0.org2.example.com | [12ce 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42a70 gate 1574140925811222800 evaluation fails +peer0.org2.example.com | [12cf 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [12d0 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [12d1 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [12d2 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42fe0 gate 1574140925812965600 evaluation starts +peer0.org2.example.com | [12d3 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [12d4 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42fe0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [12d5 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42fe0 principal matched by identity 0 +peer0.org2.example.com | [12d6 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 ee 66 4f d5 e3 fa a9 25 93 b2 89 75 fa 35 6d |..fO....%...u.5m| +peer0.org2.example.com | 00000010 78 38 b0 71 b7 14 c3 6e aa f8 0d dc 62 0a 76 45 |x8.q...n....b.vE| +peer0.org2.example.com | [12d7 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 49 c7 ff 73 b1 2e 2c cf cd 58 74 |0D. 6I..s..,..Xt| +peer0.org2.example.com | 00000010 09 e1 b0 7e a2 f2 e9 1d dc b3 33 82 7b c3 0a 25 |...~......3.{..%| +peer0.org2.example.com | 00000020 2c 7a df a7 02 20 53 b7 9a 15 de 7a 8e 69 a1 ac |,z... S....z.i..| +peer1.org2.example.com | [15f4 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3db0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15f5 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3db0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [15f6 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3db0 principal matched by identity 0 +peer1.org2.example.com | [15f7 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +peer1.org2.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +peer1.org2.example.com | [15f8 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +peer1.org2.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +peer1.org2.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +peer1.org2.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU 0xc003ad3db0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [15fa 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad3db0 gate 1574140934831046600 evaluation succeeds +peer1.org2.example.com | [15fb 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15fc 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15fd 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [15fe 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [15ff 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1600 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1601 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1602 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1603 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1604 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1605 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1606 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [1607 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1608 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1609 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [160a 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [160b 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > alive: alive:3\333[o\270f\271L\2015\260\034#\320\"\311\321\322" > +peer1.org2.example.com | [160c 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [160d 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [160e 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [160f 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer1.org2.example.com | [1610 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [1611 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +peer1.org2.example.com | [1612 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [1613 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 31 cb 62 55 50 cd b5 1d d3 c4 ad 6e db 59 e5 e8 |1.bUP......n.Y..| +peer0.org2.example.com | 00000040 3a 4b 1a 97 be 08 |:K....| +peer0.org2.example.com | [12d8 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42fe0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [12d9 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b42fe0 gate 1574140925812965600 evaluation succeeds +peer0.org2.example.com | [12da 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12db 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12dc 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [12dd 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [12de 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12df 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [12e0 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [12e1 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [12e2 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [12e3 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12e4 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12e5 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12e6 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [12e7 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151018 +peer0.org2.example.com | [12e8 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37981119DA40A916E9F972F9B0110D2DECF73E4F9C860165D425076C9A1480DE +peer0.org2.example.com | [12e9 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [12ea 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [12eb 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [12ec 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [12ed 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12ee 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12ef 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f0 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f1 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f2 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f3 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [12f4 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f5 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f6 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [12f7 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12f9 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12fb 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12fa 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12f8 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [12fc 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12fe 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [12ff 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1300 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1614 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 40 26 4a ca ec 42 40 0d 47 21 41 1d ca 87 4f 96 |@&J..B@.G!A...O.| +peer1.org2.example.com | 00000010 95 23 f1 91 30 b6 55 8c 87 88 33 7b 2b 7c 35 c5 |.#..0.U...3{+|5.| +peer1.org2.example.com | [1615 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 2c 96 7e 39 e3 f6 3e c5 10 aa 7f |0D. .,.~9..>....| +peer1.org2.example.com | 00000010 f5 2f cd ef 2d 6a 32 5e 80 2d 76 86 91 a0 24 c7 |./..-j2^.-v...$.| +peer1.org2.example.com | 00000020 ca 41 a6 8a 02 20 5d f6 60 f2 d9 8b 41 b0 8b 58 |.A... ].`...A..X| +peer1.org2.example.com | 00000030 78 3a 9e 32 ee a5 ae 26 19 45 96 53 68 75 9a b9 |x:.2...&.E.Shu..| +peer1.org2.example.com | 00000040 be 26 0a 84 d5 45 |.&...E| +peer1.org2.example.com | [1616 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1617 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [1618 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [1619 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [161a 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [161b 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [161c 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [161d 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [161e 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [161f 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15101E +peer1.org2.example.com | [1620 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6BF5F230490CF6FE8000B9AA7C14F0A4A5DDDF75B5039621AF1EC844BDFE56DF +peer1.org2.example.com | [1621 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1622 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1623 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1624 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1625 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1626 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1627 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1628 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1629 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [162a 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [162b 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [162c 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [162d 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [162e 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [162f 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1630 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1631 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1632 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1633 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1634 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1636 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1635 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1637 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1638 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1639 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [163a 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [163b 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [163c 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [163d 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [163e 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [163f 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1640 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1641 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1642 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1643 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1644 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1645 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1646 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1255 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1256 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1257 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1258 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1259 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [125a 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [125b 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [125c 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [125d 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [125e 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [125f 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1260 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1261 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1262 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1263 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [1264 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1265 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1266 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1267 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1268 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1269 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126a 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126b 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126c 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126d 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126e 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [126f 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1270 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1271 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1272 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR|" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [msp.identity] Verify -> DEBU 14a9 Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +orderer0.example.com | 00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +orderer0.example.com | 00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +orderer0.example.com | 00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +orderer0.example.com | 00000040 28 40 4c 89 f5 38 |(@L..8|" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [cauthdsl] func2 -> DEBU 14aa 0xc000c48c00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [cauthdsl] func1 -> DEBU 14ab 0xc000c48c00 gate 1574140973958630200 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [policies] Evaluate -> DEBU 14ac Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.959 UTC [policies] Evaluate -> DEBU 14ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.960 UTC [policies] Evaluate -> DEBU 14ae Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:53.960 UTC [policies] Evaluate -> DEBU 14af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:53.960 UTC [common.configtx] verifyDeltaSet -> DEBU 14b0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.960 UTC [common.configtx] recurseConfigMap -> DEBU 14b1 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.961 UTC [common.configtx] recurseConfigMap -> DEBU 14b2 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.961 UTC [common.configtx] recurseConfigMap -> DEBU 14b3 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.962 UTC [common.configtx] recurseConfigMap -> DEBU 14b4 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.962 UTC [common.configtx] recurseConfigMap -> DEBU 14b5 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.962 UTC [common.configtx] recurseConfigMap -> DEBU 14b6 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.963 UTC [common.configtx] recurseConfigMap -> DEBU 14b7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.963 UTC [common.configtx] recurseConfigMap -> DEBU 14b8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.964 UTC [common.configtx] recurseConfigMap -> DEBU 14b9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.965 UTC [common.configtx] recurseConfigMap -> DEBU 14ba Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.965 UTC [common.configtx] recurseConfigMap -> DEBU 14bb Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.965 UTC [common.configtx] recurseConfigMap -> DEBU 14bc Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.966 UTC [common.configtx] recurseConfigMap -> DEBU 14bd Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.966 UTC [common.configtx] recurseConfigMap -> DEBU 14be Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.967 UTC [common.configtx] recurseConfigMap -> DEBU 14bf Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.967 UTC [common.configtx] recurseConfigMap -> DEBU 14c0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.967 UTC [common.configtx] recurseConfigMap -> DEBU 14c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.967 UTC [common.configtx] recurseConfigMap -> DEBU 14c2 Setting policy for key Admins to " +orderer0.example.com | "2019-11-19 05:22:53.968 UTC [common.configtx] recurseConfigMap -> DEBU 14c3 Setting policy for key Endorsement to " +orderer0.example.com | "2019-11-19 05:22:53.968 UTC [common.configtx] recurseConfigMap -> DEBU 14c4 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-11-19 05:22:53.968 UTC [common.configtx] recurseConfigMap -> DEBU 14c5 Setting policy for key Readers to " +orderer0.example.com | "2019-11-19 05:22:53.968 UTC [common.configtx] recurseConfigMap -> DEBU 14c6 Setting policy for key Writers to " +orderer0.example.com | "2019-11-19 05:22:53.969 UTC [common.configtx] recurseConfigMap -> DEBU 14c7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.969 UTC [common.configtx] recurseConfigMap -> DEBU 14c8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.969 UTC [common.configtx] recurseConfigMap -> DEBU 14c9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:53.969 UTC [common.channelconfig] NewStandardValues -> DEBU 14ca Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:22:53.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14cb Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:22:53.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14cc Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:22:53.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14cd Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:22:53.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14ce Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14cf Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] NewStandardValues -> DEBU 14d0 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d1 Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d2 Processing field: BatchSize" +peer0.org1.example.com | [1273 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1274 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1275 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1276 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1277 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1278 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1279 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [127a 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [127b 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [127c 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 gate 1574140923856837500 evaluation starts +peer0.org1.example.com | [127d 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [127e 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [127f 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 principal matched by identity 0 +peer0.org1.example.com | [1280 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 89 53 a7 f7 86 02 31 6a 3a 25 aa c2 d3 2b ad |..S....1j:%...+.| +peer0.org1.example.com | 00000010 c7 c6 6f 04 ad 7c b5 0c ab 0c 0b 06 34 5d ee 21 |..o..|......4].!| +peer0.org1.example.com | [1281 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 e0 d9 b9 62 8f 38 01 b6 39 3a |0E.!.....b.8..9:| +peer0.org1.example.com | 00000010 cd 39 1d 31 6a 62 0a 3c 22 c7 ce 11 c0 81 b0 29 |.9.1jb.<"......)| +peer0.org1.example.com | 00000020 dc cb d3 83 e1 02 20 50 21 f7 2b e2 d6 08 2d 65 |...... P!.+...-e| +peer0.org1.example.com | 00000030 12 a0 3b c6 3d a7 af 82 de 63 c8 47 51 a1 41 bf |..;.=....c.GQ.A.| +peer0.org1.example.com | 00000040 d6 c1 28 d9 f6 87 3c |..(...<| +peer0.org1.example.com | [1282 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1283 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 gate 1574140923856837500 evaluation succeeds +peer0.org1.example.com | [1284 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1285 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1286 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1287 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1288 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1289 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [128a 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [128b 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [128c 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d3 Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d4 Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d5 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d6 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] NewStandardValues -> DEBU 14d7 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d8 Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] NewStandardValues -> DEBU 14d9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14da Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [common.channelconfig] validateMSP -> DEBU 14db Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [msp] newBccspMsp -> DEBU 14dc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [msp] New -> DEBU 14dd Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [msp] Setup -> DEBU 14de Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [msp.identity] newIdentity -> DEBU 14df Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:53.971 UTC [msp.identity] newIdentity -> DEBU 14e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [msp] Validate -> DEBU 14e1 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] NewStandardValues -> DEBU 14e2 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e3 Processing field: ACLs" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e4 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] NewStandardValues -> DEBU 14e5 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e6 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] NewStandardValues -> DEBU 14e7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e8 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] Validate -> DEBU 14e9 Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [common.channelconfig] validateMSP -> DEBU 14ea Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.972 UTC [msp] newBccspMsp -> DEBU 14eb Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:53.973 UTC [msp] New -> DEBU 14ec Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:53.973 UTC [msp] Setup -> DEBU 14ed Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.973 UTC [msp.identity] newIdentity -> DEBU 14ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +orderer0.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +orderer0.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [112d 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [112e 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [112f 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1130 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1131 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1132 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1133 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1134 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1135 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1136 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1137 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1138 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1139 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [113a 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [113b 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025bb170 gate 1574140927697036100 evaluation starts +peer1.org1.example.com | [113c 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025bb170 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [113d 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025bb170 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [113e 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025bb170 principal matched by identity 0 +peer1.org1.example.com | [113f 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [1140 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1141 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1142 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1143 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025bb170 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1144 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025bb170 gate 1574140927697036100 evaluation succeeds +peer1.org1.example.com | [1145 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1146 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1147 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1148 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1149 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [114a 11-19 05:22:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [114b 11-19 05:22:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [114c 11-19 05:22:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [114d 11-19 05:22:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [128d 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [128e 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [128f 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1290 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [1291 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1292 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1293 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1294 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1295 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1296 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1297 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1298 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1299 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [129a 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [129b 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [129c 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [129d 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 06 4a 57 60 88 12 b0 fc 87 2d 7a f3 e2 3e f2 |..JW`.....-z..>.| +peer0.org1.example.com | 00000010 b8 45 35 64 63 d0 4d d8 46 9f b9 1d c2 f6 b4 43 |.E5dc.M.F......C| +peer0.org1.example.com | [129e 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 1a 44 53 5c 9f c5 25 c9 11 f8 f8 |0D. H.DS\..%....| +peer0.org1.example.com | 00000010 78 f9 ae c6 72 d4 91 5f b4 a5 0b 3b ee 77 bf e1 |x...r.._...;.w..| +peer0.org1.example.com | 00000020 2c 88 bb ae 02 20 45 02 53 3a 46 8a 70 43 0e 97 |,.... E.S:F.pC..| +peer0.org1.example.com | 00000030 f2 8c a4 fd 02 8e 32 5e 77 97 9c aa e5 5f b4 93 |......2^w...._..| +peer0.org1.example.com | 00000040 da 3f 91 8a 01 d9 |.?....| +peer0.org1.example.com | [129f 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [12a0 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b cb f4 d7 14 87 e2 77 9f 5e 3c 37 |0D. k......w.^<7| +peer0.org1.example.com | 00000010 f8 35 39 2c 98 bc da 94 b2 4b d0 35 62 d8 b0 97 |.59,.....K.5b...| +peer0.org1.example.com | 00000020 97 c0 ce 7c 02 20 74 c6 b3 9d 6c 8e 18 32 3b c0 |...|. t...l..2;.| +peer0.org1.example.com | 00000030 b9 83 91 fe 4b 3d 72 2e e6 db e3 19 23 d3 cb ba |....K=r.....#...| +peer0.org1.example.com | 00000040 12 cc 53 35 16 97 |..S5..| +peer0.org2.example.com | [1301 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1303 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1304 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1305 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12fd 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1302 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1306 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1307 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1308 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1309 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [130a 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [130b 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [130c 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [130d 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [130e 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [130f 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1310 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1311 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1312 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1313 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1314 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1315 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1316 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [1317 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1318 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1319 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [131a 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [131b 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:53.974 UTC [common.channelconfig] NewStandardValues -> DEBU 14ef Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:53.974 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14f0 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:53.974 UTC [common.channelconfig] NewStandardValues -> DEBU 14f1 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:53.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14f2 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:53.975 UTC [common.channelconfig] Validate -> DEBU 14f3 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:22:53.975 UTC [common.channelconfig] validateMSP -> DEBU 14f4 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.975 UTC [msp] newBccspMsp -> DEBU 14f5 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:53.976 UTC [msp] New -> DEBU 14f6 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:53.976 UTC [msp] Setup -> DEBU 14f7 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.976 UTC [msp.identity] newIdentity -> DEBU 14f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [12a1 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [12a2 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [12a3 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [12a4 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [12a5 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [12a6 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12a7 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12a8 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12a9 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [12aa 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ab 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ac 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [12ad 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [12ae 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [12af 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12b0 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [12b1 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [12b2 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12b3 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12b4 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12b5 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12b6 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [12b7 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [12b8 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12b9 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ba 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12bb 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12bc 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [12bd 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [12be 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [12bf 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510051801 +peer0.org1.example.com | [12c0 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 46A96912ECE4827459CD5B7DFBA8503602B6648BED50F8DC9F7651B1F5D7FE7A +peer0.org1.example.com | [12c1 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [12c2 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c3 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c4 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c5 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c6 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [12c7 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c8 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1647 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1648 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1649 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15101F +peer1.org2.example.com | [164a 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 93101836360433FA467518FCAB4296BB2B21FC28C50D328E5E834B18D111EF6F +peer1.org2.example.com | [164b 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [164c 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [164d 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [164e 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [164f 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1650 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1651 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1652 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1653 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1654 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1655 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1656 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1657 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1658 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1659 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [165a 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [165b 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [165c 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [165d 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [165e 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +peer1.org2.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +peer1.org2.example.com | [165f 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer1.org2.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer1.org2.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer1.org2.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer1.org2.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer1.org2.example.com | [1660 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1661 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 4f a2 24 1a 1c 4e 61 6d e2 18 e8 |0D. .O.$..Nam...| +peer1.org2.example.com | 00000010 08 b0 ec a2 ba db 59 81 16 01 77 76 51 e8 99 08 |......Y...wvQ...| +peer1.org2.example.com | 00000020 a2 b0 d1 06 02 20 41 16 ef 6a 19 95 07 b0 54 9e |..... A..j....T.| +peer1.org2.example.com | 00000030 ab 55 ec 21 08 97 e1 bb 98 06 83 4d b6 9f bf 68 |.U.!.......M...h| +peer1.org2.example.com | 00000040 36 40 42 27 8e 68 |6@B'.h| +peer1.org2.example.com | [1662 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1663 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1664 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1665 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1666 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1667 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1668 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1669 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:53.977 UTC [common.channelconfig] NewStandardValues -> DEBU 14f9 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:53.977 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14fa Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:53.977 UTC [common.channelconfig] NewStandardValues -> DEBU 14fb Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:53.978 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14fc Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:53.978 UTC [common.channelconfig] Validate -> DEBU 14fd Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:22:53.978 UTC [common.channelconfig] validateMSP -> DEBU 14fe Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.978 UTC [msp] newBccspMsp -> DEBU 14ff Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:53.979 UTC [msp] New -> DEBU 1500 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:53.979 UTC [msp] Setup -> DEBU 1501 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.979 UTC [msp.identity] newIdentity -> DEBU 1502 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:53.980 UTC [msp] Setup -> DEBU 1503 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-11-19 05:22:53.980 UTC [msp] Setup -> DEBU 1504 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-11-19 05:22:53.980 UTC [policies] NewManagerImpl -> DEBU 1505 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.981 UTC [policies] NewManagerImpl -> DEBU 1506 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.981 UTC [policies] NewManagerImpl -> DEBU 1507 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.981 UTC [policies] NewManagerImpl -> DEBU 1508 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.981 UTC [policies] NewManagerImpl -> DEBU 1509 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.982 UTC [policies] NewManagerImpl -> DEBU 150a Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.982 UTC [policies] NewManagerImpl -> DEBU 150b Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.982 UTC [policies] NewManagerImpl -> DEBU 150c Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.983 UTC [policies] NewManagerImpl -> DEBU 150d Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.983 UTC [policies] NewManagerImpl -> DEBU 150e Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.983 UTC [policies] NewManagerImpl -> DEBU 150f Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.983 UTC [policies] GetPolicy -> DEBU 1510 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.983 UTC [policies] GetPolicy -> DEBU 1511 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.983 UTC [policies] NewManagerImpl -> DEBU 1512 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.983 UTC [policies] GetPolicy -> DEBU 1513 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] GetPolicy -> DEBU 1514 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1515 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1516 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1517 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1518 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1519 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151e Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151f Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1520 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1521 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1522 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1523 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1524 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1525 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1526 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1527 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org2.example.com | [131c 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [131d 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [131e 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [131f 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1320 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1321 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1322 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86080 gate 1574140926849416800 evaluation starts +peer0.org2.example.com | [1323 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86080 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1324 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86080 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1325 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1326 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86080 principal evaluation fails +peer0.org2.example.com | [1327 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86080 gate 1574140926849416800 evaluation fails +peer0.org2.example.com | [1328 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1329 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [132a 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [132b 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [132c 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aebff0 gate 1574140926852653400 evaluation starts +peer0.org2.example.com | [132d 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aebff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [132e 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aebff0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [132f 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aebff0 principal matched by identity 0 +peer0.org2.example.com | [1330 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer0.org2.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer0.org2.example.com | [1331 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer0.org2.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer0.org2.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer0.org2.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +peer0.org2.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer0.org2.example.com | [1332 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aebff0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1333 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aebff0 gate 1574140926852653400 evaluation succeeds +peer0.org2.example.com | [1334 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1335 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1336 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1337 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1338 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1339 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [133a 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [133b 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [133c 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [133d 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [133e 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [133f 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1340 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [1341 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1342 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1343 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1344 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [12c9 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [12ca 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12cb 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [12cc 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151016 +peer0.org1.example.com | [12cd 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 88F03667B5A78F673A5C0228708E5A962B8FDBBDA787A0F7B9F9B9CC663816C2 +peer0.org1.example.com | [12ce 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [12cf 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [12d0 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [12d1 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [12d2 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12d3 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12d4 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12d5 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [12d6 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12d7 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12d8 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12d9 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [12da 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [12db 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12dc 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12dd 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12de 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12df 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12e0 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12e1 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12e2 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12e3 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [12e4 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [166a 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [166b 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [166c 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [166d 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [166e 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [166f 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1671 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68800 gate 1574140935445045600 evaluation starts +peer1.org2.example.com | [1672 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68800 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1673 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68800 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1670 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1674 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1675 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68800 principal evaluation fails +peer1.org2.example.com | [1676 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68800 gate 1574140935445045600 evaluation fails +peer1.org2.example.com | [1677 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1678 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1679 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [167a 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68d70 gate 1574140935447038400 evaluation starts +peer1.org2.example.com | [167b 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68d70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [167c 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68d70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [167d 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68d70 principal matched by identity 0 +peer1.org2.example.com | [167e 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer1.org2.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer1.org2.example.com | [167f 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer1.org2.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer1.org2.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer1.org2.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer1.org2.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer1.org2.example.com | [1680 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68d70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1681 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b68d70 gate 1574140935447038400 evaluation succeeds +peer1.org2.example.com | [1682 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1683 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1684 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1685 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1686 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1687 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1688 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1689 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [168a 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer1.org1.example.com | [114e 11-19 05:22:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [114f 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1150 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1151 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1152 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1153 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1154 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1155 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1156 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1157 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1158 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1159 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [115a 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [115b 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [115c 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [115d 11-19 05:22:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [115e 11-19 05:22:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [115f 11-19 05:22:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1160 11-19 05:22:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1161 11-19 05:22:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1162 11-19 05:22:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1163 11-19 05:22:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1164 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1165 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1166 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1167 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1168 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1169 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [116a 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [116b 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [116c 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [116d 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [116e 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [116f 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1170 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1171 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1172 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1173 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1174 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1175 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1176 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1177 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1178 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1179 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [117a 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [117b 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1ba0 gate 1574140927865543400 evaluation starts +peer1.org1.example.com | [117c 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [117d 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1ba0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [117e 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1ba0 principal matched by identity 0 +peer1.org1.example.com | [117f 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 6a 7d 56 6d 5f fc 25 72 1b 99 d9 a8 44 d4 44 |tj}Vm_.%r....D.D| +peer1.org1.example.com | 00000010 5d c4 92 fb 3a b5 13 80 a3 d2 61 9b 4f 79 aa 45 |]...:.....a.Oy.E| +peer1.org1.example.com | [1180 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 85 39 6f b5 de 76 75 fc 97 99 |0E.!...9o..vu...| +peer1.org1.example.com | 00000010 15 7b e0 90 65 38 a5 e4 60 ac db 2a 07 c6 19 25 |.{..e8..`..*...%| +peer1.org1.example.com | 00000020 8d a3 a7 74 f7 02 20 0b 88 0a 99 85 41 a5 5d 2b |...t.. .....A.]+| +peer1.org1.example.com | 00000030 b0 91 2d 11 d0 13 bb b5 5e 0c 94 5b 87 b2 bb cd |..-.....^..[....| +peer1.org1.example.com | 00000040 f4 59 5a 82 0b 92 e8 |.YZ....| +peer1.org1.example.com | [1181 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1ba0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1182 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1ba0 gate 1574140927865543400 evaluation succeeds +peer1.org1.example.com | [1183 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1184 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1185 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1186 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1187 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1188 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1189 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [118a 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [118b 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [118c 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [118d 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [118e 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [118f 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [1190 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1191 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1192 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1193 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1194 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1195 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1196 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1197 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1198 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15101C +peer1.org1.example.com | [1199 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5394A597D0FD5999E557CA0C06A2C6A7F92C3A87C572D150D9519615356F9BC3 +peer1.org1.example.com | [119a 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [119b 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [119c 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [119d 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [119e 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [119f 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11a0 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11a1 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11a2 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [11a3 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11a4 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [11a6 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11a5 11-19 05:22:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [11a7 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11a8 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [11a9 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [11aa 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11ab 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ac 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ad 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [11ae 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 94 a5 97 d0 fd 59 99 e5 57 ca 0c 06 a2 c6 a7 |S.....Y..W......| +peer1.org1.example.com | 00000010 f9 2c 3a 87 c5 72 d1 50 d9 51 96 15 35 6f 9b c3 |.,:..r.P.Q..5o..| +peer1.org1.example.com | [11af 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc ad 80 5b 80 12 1b 17 4e f6 85 |0E.!....[....N..| +peer1.org1.example.com | 00000010 1e 06 1f f1 67 f9 54 1f ab 07 6b 18 0e 65 4a e5 |....g.T...k..eJ.| +peer1.org1.example.com | 00000020 0f 78 5e 27 70 02 20 4d 5d e7 56 e4 16 10 a8 96 |.x^'p. M].V.....| +peer1.org1.example.com | 00000030 29 ec b5 f7 29 87 31 5b d9 65 b2 0a 77 54 1a fb |)...).1[.e..wT..| +peer1.org1.example.com | 00000040 40 58 2d fc 41 d7 2d |@X-.A.-| +peer1.org1.example.com | [11b0 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [11b1 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [11b2 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11b3 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [11b4 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer1.org1.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer1.org1.example.com | [11b5 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [11b6 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer1.org1.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer1.org1.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer1.org1.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +peer1.org1.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer1.org1.example.com | [11b7 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [11b8 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11b9 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [11ba 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11bb 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11bc 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11bd 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11be 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11bf 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11c0 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11c1 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002505d60 gate 1574140927937578900 evaluation starts +peer1.org1.example.com | [11c2 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002505d60 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1528 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1529 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 152a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152b Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152d Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152e Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152f Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1530 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1531 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1532 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1533 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1534 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1535 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1536 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1537 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1538 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1539 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153b Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1540 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1541 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1542 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1543 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1544 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1545 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1546 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1547 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1548 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1549 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 154a Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 154b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 154c Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 154d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 154e Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 154f Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 1550 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 1551 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 1552 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 1553 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1554 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1555 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1556 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1557 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1558 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1559 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 155a Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 155b Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 155c Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 155d As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 155e As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 155f As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1560 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1561 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1562 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1563 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1564 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1565 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1566 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1567 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1568 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.capabilities] Supported -> DEBU 1569 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [common.capabilities] Supported -> DEBU 156a Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [msp] GetDefaultSigningIdentity -> DEBU 156b Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:53.986 UTC [msp] GetDefaultSigningIdentity -> DEBU 156c Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [msp.identity] Sign -> DEBU 156d Sign: plaintext: 0AD2060A1B08011A0608ADF8CDEE0522...BC168103401164493E9301D349F24BB3 " +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [msp.identity] Sign -> DEBU 156e Sign: digest: 90179FC3741B52698B1B6104BD5F6EFC233F14B1DA98C7EB83D0995B692CD6FB " +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 156f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 1570 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 1571 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 1572 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 1573 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [msp] DeserializeIdentity -> DEBU 1574 Obtaining identity" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [msp.identity] newIdentity -> DEBU 1575 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [cauthdsl] func1 -> DEBU 1576 0xc0010b8eb0 gate 1574140973987567900 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [cauthdsl] func2 -> DEBU 1577 0xc0010b8eb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [cauthdsl] func2 -> DEBU 1578 0xc0010b8eb0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [cauthdsl] func2 -> DEBU 1579 0xc0010b8eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [cauthdsl] func2 -> DEBU 157a 0xc0010b8eb0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:53.987 UTC [cauthdsl] func1 -> DEBU 157b 0xc0010b8eb0 gate 1574140973987567900 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:53.988 UTC [policies] Evaluate -> DEBU 157c Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.988 UTC [policies] Evaluate -> DEBU 157d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.989 UTC [policies] Evaluate -> DEBU 157e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.989 UTC [cauthdsl] func1 -> DEBU 157f 0xc0010b9ff0 gate 1574140973989514100 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:53.989 UTC [cauthdsl] func2 -> DEBU 1580 0xc0010b9ff0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:53.989 UTC [cauthdsl] func2 -> DEBU 1581 0xc0010b9ff0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:53.990 UTC [cauthdsl] func2 -> DEBU 1582 0xc0010b9ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:53.990 UTC [cauthdsl] func2 -> DEBU 1583 0xc0010b9ff0 principal evaluation fails" +orderer0.example.com | "2019-11-19 05:22:53.990 UTC [cauthdsl] func1 -> DEBU 1584 0xc0010b9ff0 gate 1574140973989514100 evaluation fails" +orderer0.example.com | "2019-11-19 05:22:53.990 UTC [policies] Evaluate -> DEBU 1585 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.990 UTC [policies] Evaluate -> DEBU 1586 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:53.991 UTC [policies] func1 -> DEBU 1587 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]" +orderer0.example.com | "2019-11-19 05:22:53.991 UTC [policies] Evaluate -> DEBU 1588 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:53.991 UTC [policies] Evaluate -> DEBU 1589 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:53.991 UTC [policies] Evaluate -> DEBU 158a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.991 UTC [policies] Evaluate -> DEBU 158b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:53.993 UTC [policies] Evaluate -> DEBU 158d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-11-19 05:22:53.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 158c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:53.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 158e Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-11-19 05:22:53.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 158f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.2µs " +orderer0.example.com | "2019-11-19 05:22:53.994 UTC [cauthdsl] func1 -> DEBU 1590 0xc0012dcde0 gate 1574140973994662500 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:53.994 UTC [cauthdsl] func2 -> DEBU 1591 0xc0012dcde0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-11-19 05:22:53.995 UTC [cauthdsl] func2 -> DEBU 1592 0xc0012dcde0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:53.995 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1593 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-11-19 05:22:53.995 UTC [msp] Validate -> DEBU 1594 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:22:53.995 UTC [cauthdsl] func2 -> DEBU 1595 0xc0012dcde0 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:53.996 UTC [msp.identity] Verify -> DEBU 1596 Verify: digest = 00000000 90 17 9f c3 74 1b 52 69 8b 1b 61 04 bd 5f 6e fc |....t.Ri..a.._n.| +orderer0.example.com | 00000010 23 3f 14 b1 da 98 c7 eb 83 d0 99 5b 69 2c d6 fb |#?.........[i,..|" +orderer0.example.com | "2019-11-19 05:22:53.996 UTC [msp.identity] Verify -> DEBU 1597 Verify: sig = 00000000 30 44 02 20 52 c1 b9 60 ac e7 e3 8e 4c 35 f5 e3 |0D. R..`....L5..| +orderer0.example.com | 00000010 d0 57 4c 17 2b 63 e9 4e 0f 90 1b 11 66 33 ac 45 |.WL.+c.N....f3.E| +orderer0.example.com | 00000020 36 ba 41 a0 02 20 68 1d 3d 55 3a d4 2c 2e 3b ec |6.A.. h.=U:.,.;.| +orderer0.example.com | 00000030 b5 d4 40 5a 67 23 76 05 76 b9 63 e3 ff 94 86 d4 |..@Zg#v.v.c.....| +orderer0.example.com | 00000040 35 94 c1 49 86 f1 |5..I..|" +orderer0.example.com | "2019-11-19 05:22:53.996 UTC [cauthdsl] func2 -> DEBU 1598 0xc0012dcde0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:53.996 UTC [cauthdsl] func1 -> DEBU 1599 0xc0012dcde0 gate 1574140973994662500 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159c Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159e Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:53.998 UTC [policies] Evaluate -> DEBU 159f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:53.998 UTC [orderer.common.msgprocessor] Apply -> DEBU 15a0 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-11-19 05:22:53.998 UTC [common.channelconfig] NewStandardValues -> DEBU 15a1 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:22:53.999 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a2 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:22:53.999 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a3 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:22:53.999 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a4 Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:22:53.999 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a5 Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:22:54.000 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a6 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.000 UTC [common.channelconfig] NewStandardValues -> DEBU 15a7 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:22:54.000 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a8 Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:22:54.000 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a9 Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:22:54.000 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15aa Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:22:54.001 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ab Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:22:54.001 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ac Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:22:54.001 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ad Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.002 UTC [common.channelconfig] NewStandardValues -> DEBU 15ae Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | [12e5 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [12e6 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12e7 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12e8 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [12e9 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [12ea 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [12eb 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 gate 1574140925402131900 evaluation starts +peer0.org1.example.com | [12ec 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [12ed 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [12ee 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 principal matched by identity 0 +peer0.org1.example.com | [12ef 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c 60 4f 19 69 1e 59 13 b7 9c 6f 4c cb e4 6b ee |.`O.i.Y...oL..k.| +peer0.org1.example.com | 00000010 68 bd ad 42 e2 15 f1 15 b0 46 24 56 f1 b6 1b 92 |h..B.....F$V....| +peer0.org1.example.com | [12f0 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 c3 58 2d c8 1d de 2b bc fd 62 |0E.!...X-...+..b| +peer0.org1.example.com | 00000010 66 d2 e1 58 3b 8d a9 fb 0d b6 c8 93 51 f3 78 49 |f..X;.......Q.xI| +peer0.org1.example.com | 00000020 06 b8 e2 99 f1 02 20 28 6c c5 ee 26 57 11 2d 03 |...... (l..&W.-.| +peer0.org1.example.com | 00000030 9f 6b 56 9e 4d a3 78 f3 8e 4f 42 c4 80 64 04 c6 |.kV.M.x..OB..d..| +peer0.org1.example.com | 00000040 85 b1 42 8c 3b 28 b7 |..B.;(.| +peer0.org1.example.com | [12f1 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [12f2 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 gate 1574140925402131900 evaluation succeeds +peer0.org1.example.com | [12f3 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12f4 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12f5 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12f6 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12f7 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [12f8 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [12f9 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12fa 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [12fb 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [12fc 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [12fd 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [12fe 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12ff 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1300 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1301 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1302 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1303 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1304 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1305 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1306 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1307 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1308 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1309 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [130a 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [130b 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [130c 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [130d 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [130e 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [130f 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1310 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1311 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1312 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1313 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1314 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1315 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1316 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1317 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1318 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1319 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [131a 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [131b 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [131c 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 ee 66 4f d5 e3 fa a9 25 93 b2 89 75 fa 35 6d |..fO....%...u.5m| +peer0.org1.example.com | 00000010 78 38 b0 71 b7 14 c3 6e aa f8 0d dc 62 0a 76 45 |x8.q...n....b.vE| +peer0.org1.example.com | [131d 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 49 c7 ff 73 b1 2e 2c cf cd 58 74 |0D. 6I..s..,..Xt| +peer0.org1.example.com | 00000010 09 e1 b0 7e a2 f2 e9 1d dc b3 33 82 7b c3 0a 25 |...~......3.{..%| +peer0.org1.example.com | 00000020 2c 7a df a7 02 20 53 b7 9a 15 de 7a 8e 69 a1 ac |,z... S....z.i..| +peer0.org1.example.com | 00000030 31 cb 62 55 50 cd b5 1d d3 c4 ad 6e db 59 e5 e8 |1.bUP......n.Y..| +peer0.org1.example.com | 00000040 3a 4b 1a 97 be 08 |:K....| +peer0.org1.example.com | [131e 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [131f 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1320 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1321 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1322 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1323 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1324 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1325 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1326 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1327 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1328 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1329 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [132a 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [132b 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [132c 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [132d 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [132e 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [132f 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1330 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1331 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1332 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1333 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1334 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1335 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1336 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1338 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1337 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1339 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [133a 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [133b 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [133c 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [133d 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [133e 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [133f 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1340 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1341 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1342 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1343 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 gate 1574140925851789800 evaluation starts +peer0.org1.example.com | [1344 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1345 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1346 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 principal matched by identity 0 +peer0.org1.example.com | [1347 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 98 11 19 da 40 a9 16 e9 f9 72 f9 b0 11 0d 2d |7....@....r....-| +peer0.org1.example.com | 00000010 ec f7 3e 4f 9c 86 01 65 d4 25 07 6c 9a 14 80 de |..>O...e.%.l....| +peer0.org1.example.com | [1348 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 d9 e9 99 b7 22 41 0d 07 ef 4c |0E.!......"A...L| +peer0.org1.example.com | 00000010 37 ba 4f 64 ba d8 cd 10 f5 14 cf 72 75 d6 3a bc |7.Od.......ru.:.| +peer0.org1.example.com | 00000020 cc 74 14 3c 67 02 20 6e c0 d9 ce d6 4d 61 39 5f |.t. DEBU 0xc002f854c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [134a 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 gate 1574140925851789800 evaluation succeeds +peer0.org1.example.com | [134b 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [134c 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [134d 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [134e 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [134f 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1350 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1351 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1352 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1353 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1354 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1355 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1356 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1357 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1358 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1359 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [135a 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [135b 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [135c 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [135d 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1345 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1346 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1347 11-19 05:22:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1348 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1349 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [134a 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [134b 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [134c 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [134d 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [134e 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [134f 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [1350 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1351 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1352 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1353 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1354 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1355 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +peer0.org2.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +peer0.org2.example.com | [1356 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +peer0.org2.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +peer0.org2.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer0.org2.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer0.org2.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer0.org2.example.com | [1357 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1358 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 03 aa 2a 11 d0 85 d9 91 2b 0f |0E.!....*.....+.| +peer0.org2.example.com | 00000010 69 4e fb ed 38 63 d3 4c 89 61 82 b3 04 b2 d1 43 |iN..8c.L.a.....C| +peer0.org2.example.com | 00000020 03 51 89 f2 5a 02 20 14 a3 06 0e 93 87 a3 c4 70 |.Q..Z. ........p| +peer0.org2.example.com | 00000030 0d 64 d7 f2 38 da b1 dc 19 56 89 e1 e5 cb 05 1d |.d..8....V......| +peer0.org2.example.com | 00000040 b9 6f 62 32 5f 70 31 |.ob2_p1| +peer0.org2.example.com | [1359 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [135a 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [135b 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [135c 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [135d 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [135e 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [135f 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1360 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1361 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [1362 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1363 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1364 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1365 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [1366 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1367 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1368 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1369 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [136a 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [136b 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [136c 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [136d 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [136e 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [136f 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1370 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1371 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1372 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1373 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1374 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1375 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [1376 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1377 11-19 05:22:07.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1378 11-19 05:22:07.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1379 11-19 05:22:07.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [137a 11-19 05:22:07.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [137b 11-19 05:22:07.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [137c 11-19 05:22:07.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [137d 11-19 05:22:07.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [137e 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [137f 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [11c3 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002505d60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [11c4 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002505d60 principal matched by identity 0 +peer1.org1.example.com | [11c5 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +peer1.org1.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +peer1.org1.example.com | [11c6 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +peer1.org1.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +peer1.org1.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer1.org1.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer1.org1.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer1.org1.example.com | [11c7 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002505d60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [11c8 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002505d60 gate 1574140927937578900 evaluation succeeds +peer1.org1.example.com | [11c9 11-19 05:22:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11ca 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11cb 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [11cc 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [11cd 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [11ce 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11cf 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11d0 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11d1 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d2 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d3 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [11d4 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 94 a5 97 d0 fd 59 99 e5 57 ca 0c 06 a2 c6 a7 |S.....Y..W......| +peer1.org1.example.com | 00000010 f9 2c 3a 87 c5 72 d1 50 d9 51 96 15 35 6f 9b c3 |.,:..r.P.Q..5o..| +peer1.org1.example.com | [11d5 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc ad 80 5b 80 12 1b 17 4e f6 85 |0E.!....[....N..| +peer1.org1.example.com | 00000010 1e 06 1f f1 67 f9 54 1f ab 07 6b 18 0e 65 4a e5 |....g.T...k..eJ.| +peer1.org1.example.com | 00000020 0f 78 5e 27 70 02 20 4d 5d e7 56 e4 16 10 a8 96 |.x^'p. M].V.....| +orderer0.example.com | "2019-11-19 05:22:54.002 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15af Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:22:54.002 UTC [common.channelconfig] NewStandardValues -> DEBU 15b0 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:54.002 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b1 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:54.002 UTC [common.channelconfig] validateMSP -> DEBU 15b2 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.003 UTC [msp] newBccspMsp -> DEBU 15b3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.003 UTC [msp] New -> DEBU 15b4 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.003 UTC [msp] Setup -> DEBU 15b5 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:22:54.004 UTC [msp.identity] newIdentity -> DEBU 15b6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.004 UTC [msp.identity] newIdentity -> DEBU 15b7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.005 UTC [msp] Validate -> DEBU 15b8 MSP OrdererMSP validating identity" +peer0.org2.example.com | [1380 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1382 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1381 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1383 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1384 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1385 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1386 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1387 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1388 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1389 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [138a 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [138b 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [138c 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [138d 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151019 +peer0.org2.example.com | [138e 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 746A7D566D5FFC25721B99D9A844D4445DC492FB3AB51380A3D2619B4F79AA45 +peer0.org2.example.com | [138f 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1390 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1391 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1392 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1393 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1394 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1395 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1396 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1397 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1398 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1399 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [139a 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [139b 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [139c 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [139d 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [139e 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [139f 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [13a0 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [13a1 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 6a 7d 56 6d 5f fc 25 72 1b 99 d9 a8 44 d4 44 |tj}Vm_.%r....D.D| +peer0.org2.example.com | 00000010 5d c4 92 fb 3a b5 13 80 a3 d2 61 9b 4f 79 aa 45 |]...:.....a.Oy.E| +peer0.org2.example.com | [13a2 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 85 39 6f b5 de 76 75 fc 97 99 |0E.!...9o..vu...| +peer0.org2.example.com | 00000010 15 7b e0 90 65 38 a5 e4 60 ac db 2a 07 c6 19 25 |.{..e8..`..*...%| +peer0.org2.example.com | 00000020 8d a3 a7 74 f7 02 20 0b 88 0a 99 85 41 a5 5d 2b |...t.. .....A.]+| +peer0.org2.example.com | 00000030 b0 91 2d 11 d0 13 bb b5 5e 0c 94 5b 87 b2 bb cd |..-.....^..[....| +peer0.org2.example.com | 00000040 f4 59 5a 82 0b 92 e8 |.YZ....| +peer0.org2.example.com | [13a3 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [13a4 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 3d 7e 08 a7 d3 b7 2c 5b 75 19 |0E.!..=~....,[u.| +peer0.org2.example.com | 00000010 d8 fd 54 2f 3d 78 09 40 9c 01 21 6b 31 d9 54 30 |..T/=x.@..!k1.T0| +peer0.org2.example.com | 00000020 07 a5 c1 65 50 02 20 40 2b 8e f1 4b 69 39 4f da |...eP. @+..Ki9O.| +peer0.org2.example.com | 00000030 81 45 6c e8 af 2a e5 d3 56 dc 87 4e d9 09 ae e2 |.El..*..V..N....| +peer0.org2.example.com | 00000040 2c 70 c9 09 fa 7d 78 |,p...}x| +peer0.org2.example.com | [13a5 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [13a6 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [13a7 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13a8 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13a9 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [13aa 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13ab 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [13ac 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [13ad 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 6a 7d 56 6d 5f fc 25 72 1b 99 d9 a8 44 d4 44 |tj}Vm_.%r....D.D| +peer0.org2.example.com | 00000010 5d c4 92 fb 3a b5 13 80 a3 d2 61 9b 4f 79 aa 45 |]...:.....a.Oy.E| +peer0.org2.example.com | [13ae 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 85 39 6f b5 de 76 75 fc 97 99 |0E.!...9o..vu...| +peer0.org2.example.com | 00000010 15 7b e0 90 65 38 a5 e4 60 ac db 2a 07 c6 19 25 |.{..e8..`..*...%| +peer0.org2.example.com | 00000020 8d a3 a7 74 f7 02 20 0b 88 0a 99 85 41 a5 5d 2b |...t.. .....A.]+| +peer0.org2.example.com | 00000030 b0 91 2d 11 d0 13 bb b5 5e 0c 94 5b 87 b2 bb cd |..-.....^..[....| +peer0.org2.example.com | 00000040 f4 59 5a 82 0b 92 e8 |.YZ....| +peer0.org2.example.com | [13af 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [13b0 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13b1 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer1.org2.example.com | [168b 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer1.org2.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer1.org2.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer1.org2.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer1.org2.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer1.org2.example.com | [168c 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [168d 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [168e 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [168f 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +peer1.org2.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +peer1.org2.example.com | [1690 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer1.org2.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer1.org2.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer1.org2.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer1.org2.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer1.org2.example.com | [1691 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1692 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1693 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1694 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1696 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1695 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1697 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1698 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer1.org2.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer1.org2.example.com | [1699 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer1.org2.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer1.org2.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer1.org2.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer1.org2.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer1.org2.example.com | [169a 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [169b 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [169c 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [169d 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [169e 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [169f 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16a0 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16a1 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000030 29 ec b5 f7 29 87 31 5b d9 65 b2 0a 77 54 1a fb |)...).1[.e..wT..| +peer1.org1.example.com | 00000040 40 58 2d fc 41 d7 2d |@X-.A.-| +peer1.org1.example.com | [11d6 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [11d7 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a8 4d ab eb f4 91 c0 72 e3 63 |0E.!...M.....r.c| +peer1.org1.example.com | 00000010 11 34 55 69 36 55 09 06 32 16 29 44 c0 bc 3d 0e |.4Ui6U..2.)D..=.| +peer1.org1.example.com | 00000020 2e e0 0b 9f 1b 02 20 3a 4c 39 dc d6 45 ad 51 92 |...... :L9..E.Q.| +peer1.org1.example.com | 00000030 6f 42 d4 6a f0 5c c0 ee 07 f6 6c c6 ef 64 41 72 |oB.j.\....l..dAr| +peer1.org1.example.com | 00000040 c0 27 6f ca a7 13 db |.'o....| +peer1.org1.example.com | [11d8 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [11d9 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [11da 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11db 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11dc 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [11dd 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11de 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [11df 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer1.org1.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer1.org1.example.com | [11e0 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer1.org1.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer1.org1.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer1.org1.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +peer1.org1.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer1.org1.example.com | [11e1 11-19 05:22:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [11e2 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11e3 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [11e4 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11e5 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11e6 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11e7 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11e8 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11e9 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11ea 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11eb 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024dac30 gate 1574140927951289700 evaluation starts +peer1.org1.example.com | [11ec 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024dac30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11ed 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024dac30 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [11ee 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024dac30 principal matched by identity 0 +peer1.org1.example.com | [11ef 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 6a 7d 56 6d 5f fc 25 72 1b 99 d9 a8 44 d4 44 |tj}Vm_.%r....D.D| +peer1.org1.example.com | 00000010 5d c4 92 fb 3a b5 13 80 a3 d2 61 9b 4f 79 aa 45 |]...:.....a.Oy.E| +peer0.org1.example.com | [135e 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [135f 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1360 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1361 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1362 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1363 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1364 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1365 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1367 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1368 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1369 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1366 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:54.005 UTC [common.channelconfig] NewStandardValues -> DEBU 15b9 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-11-19 05:22:54.005 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ba Processing field: ACLs" +orderer0.example.com | "2019-11-19 05:22:54.005 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15bb Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [common.channelconfig] NewStandardValues -> DEBU 15bc Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15bd Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [common.channelconfig] NewStandardValues -> DEBU 15be Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15bf Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [common.channelconfig] Validate -> DEBU 15c0 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [common.channelconfig] validateMSP -> DEBU 15c1 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [msp] newBccspMsp -> DEBU 15c2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [msp] New -> DEBU 15c3 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [msp] Setup -> DEBU 15c4 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.006 UTC [msp.identity] newIdentity -> DEBU 15c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] NewStandardValues -> DEBU 15c6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c7 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] NewStandardValues -> DEBU 15c8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c9 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] Validate -> DEBU 15ca Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] validateMSP -> DEBU 15cb Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [msp] newBccspMsp -> DEBU 15cc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [msp] New -> DEBU 15cd Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [msp] Setup -> DEBU 15ce Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [msp.identity] newIdentity -> DEBU 15cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +orderer0.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +orderer0.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +orderer0.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] NewStandardValues -> DEBU 15d0 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d1 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] NewStandardValues -> DEBU 15d2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d3 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:54.007 UTC [common.channelconfig] Validate -> DEBU 15d4 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [common.channelconfig] validateMSP -> DEBU 15d5 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [msp] newBccspMsp -> DEBU 15d6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [msp] New -> DEBU 15d7 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [msp] Setup -> DEBU 15d8 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [msp.identity] newIdentity -> DEBU 15d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [msp] Setup -> DEBU 15da Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [msp] Setup -> DEBU 15db MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15dc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15dd Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15de Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15df Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e0 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | [136a 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [136b 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [136c 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [136d 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [136e 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [136f 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1370 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1371 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1372 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1373 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1374 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1375 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1376 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1377 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1378 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1379 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [137a 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [137b 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [137c 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [137d 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [137e 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [137f 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1380 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1381 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1382 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1383 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1384 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1385 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16a2 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [16a3 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [16a4 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e3c0 gate 1574140935460383700 evaluation starts +peer1.org2.example.com | [16a5 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e3c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [16a6 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e3c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [16a7 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [16a8 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e3c0 principal evaluation fails +peer1.org2.example.com | [16a9 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e3c0 gate 1574140935460383700 evaluation fails +peer1.org2.example.com | [16aa 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16ab 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16ac 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [16ad 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e930 gate 1574140935461851100 evaluation starts +peer1.org2.example.com | [16ae 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [16af 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e930 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [16b0 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e930 principal matched by identity 0 +peer1.org2.example.com | [16b1 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +peer1.org2.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +peer1.org2.example.com | [16b2 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +peer1.org2.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +peer1.org2.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +peer1.org2.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU 0xc003b8e930 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [16b4 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8e930 gate 1574140935461851100 evaluation succeeds +peer1.org2.example.com | [16b5 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [16b6 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [16b7 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [16b8 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [16b9 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16ba 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16bb 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [16bc 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +peer1.org2.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +peer1.org2.example.com | [16bd 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer1.org2.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer1.org2.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer1.org2.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer1.org2.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer1.org2.example.com | [16be 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16bf 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16c0 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16c1 11-19 05:22:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16c2 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [16c3 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16c4 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16c5 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16c6 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16c7 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [16c8 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [16c9 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16ca 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16cb 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16cc 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16cd 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16ce 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1386 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1387 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1388 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1389 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [138a 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [138b 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151017 +peer0.org1.example.com | [138c 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E2AE507A345A67573613BB0C075227F7BF55CE300635A2A4219D33CA7008BCD +peer0.org1.example.com | [138d 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [138e 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [138f 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1390 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1391 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1392 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1393 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1394 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1396 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1397 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1398 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1399 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1395 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [139a 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [139b 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [139c 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13b2 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13b3 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [13b4 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13b5 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [13b6 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13b7 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13b8 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [13b9 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [13ba 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [13bb 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0fe60 gate 1574140927884554400 evaluation starts +peer0.org2.example.com | [13bc 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0fe60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13bd 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0fe60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [13be 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0fe60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [13bf 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0fe60 principal evaluation fails +peer0.org2.example.com | [13c0 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0fe60 gate 1574140927884554400 evaluation fails +peer0.org2.example.com | [13c1 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13c2 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13c3 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [13c4 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c343d0 gate 1574140927886668500 evaluation starts +peer0.org2.example.com | [13c5 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c343d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13c6 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c343d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [13c7 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c343d0 principal matched by identity 0 +peer0.org2.example.com | [13c8 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer0.org2.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer0.org2.example.com | [13c9 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer0.org2.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer0.org2.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer0.org2.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +peer0.org2.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer0.org2.example.com | [13ca 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c343d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [13cb 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c343d0 gate 1574140927886668500 evaluation succeeds +peer0.org2.example.com | [13cc 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13cd 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13ce 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [13cf 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [13d0 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13d1 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13d2 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [13d3 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +peer1.org1.example.com | [11f0 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 85 39 6f b5 de 76 75 fc 97 99 |0E.!...9o..vu...| +peer1.org1.example.com | 00000010 15 7b e0 90 65 38 a5 e4 60 ac db 2a 07 c6 19 25 |.{..e8..`..*...%| +peer1.org1.example.com | 00000020 8d a3 a7 74 f7 02 20 0b 88 0a 99 85 41 a5 5d 2b |...t.. .....A.]+| +peer1.org1.example.com | 00000030 b0 91 2d 11 d0 13 bb b5 5e 0c 94 5b 87 b2 bb cd |..-.....^..[....| +peer1.org1.example.com | 00000040 f4 59 5a 82 0b 92 e8 |.YZ....| +peer1.org1.example.com | [11f1 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024dac30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [11f2 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024dac30 gate 1574140927951289700 evaluation succeeds +peer1.org1.example.com | [11f3 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11f4 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11f5 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [11f6 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [11f7 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [11f8 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11f9 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [11fa 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 94 a5 97 d0 fd 59 99 e5 57 ca 0c 06 a2 c6 a7 |S.....Y..W......| +peer1.org1.example.com | 00000010 f9 2c 3a 87 c5 72 d1 50 d9 51 96 15 35 6f 9b c3 |.,:..r.P.Q..5o..| +peer1.org1.example.com | [11fb 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc ad 80 5b 80 12 1b 17 4e f6 85 |0E.!....[....N..| +peer1.org1.example.com | 00000010 1e 06 1f f1 67 f9 54 1f ab 07 6b 18 0e 65 4a e5 |....g.T...k..eJ.| +peer1.org1.example.com | 00000020 0f 78 5e 27 70 02 20 4d 5d e7 56 e4 16 10 a8 96 |.x^'p. M].V.....| +peer1.org1.example.com | 00000030 29 ec b5 f7 29 87 31 5b d9 65 b2 0a 77 54 1a fb |)...).1[.e..wT..| +peer1.org1.example.com | 00000040 40 58 2d fc 41 d7 2d |@X-.A.-| +peer1.org1.example.com | [11fc 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [11fd 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [11fe 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11ff 11-19 05:22:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1200 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1201 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1202 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1203 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1204 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1205 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1206 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1207 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1208 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1209 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [120a 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [120b 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [120c 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [120d 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 86 1a c8 d4 99 3a 4b 4c 5b bc bf fe fd ce ef |......:KL[......| +peer1.org1.example.com | 00000010 36 e2 25 66 92 fd f5 e7 dd ab 37 e7 3e 3f 22 4c |6.%f......7.>?"L| +peer1.org1.example.com | [120e 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e 76 09 f4 55 09 b7 fa 29 15 24 6b |0D. nv..U...).$k| +peer1.org1.example.com | 00000010 9c 6e f1 d2 12 c3 e2 1b b4 b8 f1 e6 9a 74 bb 17 |.n...........t..| +peer1.org1.example.com | 00000020 c5 17 c1 22 02 20 20 3d c8 5c 7f 4a 33 52 62 7b |...". =.\.J3Rb{| +peer1.org1.example.com | 00000030 9c 0f 04 b8 6b 8a 81 0f 26 d5 d2 7e 62 17 6a 71 |....k...&..~b.jq| +peer1.org1.example.com | 00000040 6f b6 22 47 54 b7 |o."GT.| +peer1.org1.example.com | [120f 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1210 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [1211 11-19 05:22:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer1.org1.example.com | [1212 11-19 05:22:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer1.org1.example.com | [1213 11-19 05:22:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer0.org1.example.com | [139d 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [139e 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [139f 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer0.org1.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer0.org1.example.com | [13a0 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer0.org1.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer0.org1.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer0.org1.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +peer0.org1.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer0.org1.example.com | [13a1 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [13a2 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [13a3 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13a4 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13a5 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [13a6 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [13a7 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13a8 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [13a9 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [13aa 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer0.org1.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer0.org1.example.com | [13ab 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer0.org1.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer0.org1.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer0.org1.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +peer0.org1.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer0.org1.example.com | [13ac 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [13ad 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [13ae 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13af 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13b0 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [13b1 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [13b2 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13b3 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [13b4 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [13b5 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +peer0.org1.example.com | 00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +peer0.org1.example.com | [13b6 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +peer0.org1.example.com | 00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +peer0.org1.example.com | 00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +peer0.org1.example.com | 00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +peer0.org1.example.com | 00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +peer0.org1.example.com | [13b7 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [13b8 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd d3 b1 20 7c af f4 51 61 4b c7 |0E.!.... |..QaK.| +peer0.org1.example.com | 00000010 24 39 3b ca e3 29 d3 b7 30 9e f1 a7 e9 70 7e 9b |$9;..)..0....p~.| +peer0.org1.example.com | 00000020 c8 45 3b 88 18 02 20 51 75 8f 47 dc 4d 1a d8 3c |.E;... Qu.G.M..<| +peer0.org1.example.com | 00000030 ab 44 9c 2a 73 0e 1a a1 43 e3 27 8e a7 15 1c ac |.D.*s...C.'.....| +peer0.org1.example.com | 00000040 da ce 81 76 13 67 b9 |...v.g.| +peer0.org1.example.com | [13b9 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e1 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e2 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e3 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e4 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e5 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e6 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e7 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e8 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e9 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15ea Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15eb Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.009 UTC [policies] NewManagerImpl -> DEBU 15ec Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.009 UTC [policies] NewManagerImpl -> DEBU 15ed Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.009 UTC [policies] GetPolicy -> DEBU 15ee Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.009 UTC [policies] GetPolicy -> DEBU 15ef Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.009 UTC [policies] NewManagerImpl -> DEBU 15f0 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.009 UTC [policies] GetPolicy -> DEBU 15f1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.010 UTC [policies] GetPolicy -> DEBU 15f2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.010 UTC [policies] NewManagerImpl -> DEBU 15f3 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.010 UTC [policies] NewManagerImpl -> DEBU 15f4 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.010 UTC [policies] NewManagerImpl -> DEBU 15f5 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.010 UTC [policies] NewManagerImpl -> DEBU 15f6 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:22:54.011 UTC [policies] NewManagerImpl -> DEBU 15f7 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:22:54.011 UTC [policies] NewManagerImpl -> DEBU 15f8 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:22:54.011 UTC [common.configtx] addToMap -> DEBU 15f9 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:22:54.011 UTC [common.configtx] addToMap -> DEBU 15fa Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15fb Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15fc Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15fd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15fe Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15ff Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 1600 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:22:54.013 UTC [common.configtx] addToMap -> DEBU 1601 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:22:54.013 UTC [common.configtx] addToMap -> DEBU 1602 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.013 UTC [common.configtx] addToMap -> DEBU 1603 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:22:54.013 UTC [common.configtx] addToMap -> DEBU 1604 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1605 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1606 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1607 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1608 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1609 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160a Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1610 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1611 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1612 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1613 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1614 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1615 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1616 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1617 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org2.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +peer0.org2.example.com | [13d4 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +peer0.org2.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +peer0.org2.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer0.org2.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer0.org2.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer0.org2.example.com | [13d5 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13d6 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13d7 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13d8 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [13d9 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13da 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [13db 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 6a 7d 56 6d 5f fc 25 72 1b 99 d9 a8 44 d4 44 |tj}Vm_.%r....D.D| +peer0.org2.example.com | 00000010 5d c4 92 fb 3a b5 13 80 a3 d2 61 9b 4f 79 aa 45 |]...:.....a.Oy.E| +peer0.org2.example.com | [13dc 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 85 39 6f b5 de 76 75 fc 97 99 |0E.!...9o..vu...| +peer0.org2.example.com | 00000010 15 7b e0 90 65 38 a5 e4 60 ac db 2a 07 c6 19 25 |.{..e8..`..*...%| +peer0.org2.example.com | 00000020 8d a3 a7 74 f7 02 20 0b 88 0a 99 85 41 a5 5d 2b |...t.. .....A.]+| +peer0.org2.example.com | 00000030 b0 91 2d 11 d0 13 bb b5 5e 0c 94 5b 87 b2 bb cd |..-.....^..[....| +peer0.org2.example.com | 00000040 f4 59 5a 82 0b 92 e8 |.YZ....| +peer0.org2.example.com | [13dd 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13de 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13df 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13e0 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [13e1 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +peer0.org2.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +peer0.org2.example.com | [13e2 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +peer0.org2.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +peer0.org2.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer0.org2.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer0.org2.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer0.org2.example.com | [13e3 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13e4 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13e5 11-19 05:22:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13e6 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [13e7 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13e8 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [13e9 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [13ea 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1214 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1215 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1216 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1217 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1218 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 72 da 73 f9 eb a4 ae df de c2 56 08 db 91 4b | DEBU Verify: sig = 00000000 30 44 02 20 18 63 bf 52 f7 e4 99 d5 a6 3c e9 5f |0D. .c.R.....<._| +peer1.org1.example.com | 00000010 c9 a9 d1 dd 70 bb 2d 03 ce 2e 15 74 8e 90 ec d5 |....p.-....t....| +peer1.org1.example.com | 00000020 ce 08 7d 80 02 20 7d 0d cf 18 f9 15 59 88 d4 55 |..}.. }.....Y..U| +peer1.org1.example.com | 00000030 0f e8 2c f9 b1 d1 89 44 0d d3 a1 fa c5 6e 61 cf |..,....D.....na.| +peer1.org1.example.com | 00000040 6a e0 c1 e1 2b 69 |j...+i| +peer1.org1.example.com | [121a 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [121b 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [121c 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [121d 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [121e 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [121f 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1220 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1221 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1222 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1223 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1224 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1225 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1226 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1227 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1228 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1229 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [122a 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [122b 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [122c 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [122d 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [122e 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [122f 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1230 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1231 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1232 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1233 11-19 05:22:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1618 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1619 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161c Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161d Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161e Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1620 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1621 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1622 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1623 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1624 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1625 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1626 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1627 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1628 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1629 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 162a Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:54.016 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 162b [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:51628" +orderer0.example.com | "2019-11-19 05:22:54.016 UTC [orderer.consensus.etcdraft] propose -> INFO 162c Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:54.017 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 162d Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:54.017 UTC [orderer.consensus.etcdraft] 2 -> DEBU 162e Proposed block [6] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:54.019 UTC [orderer.common.broadcast] Handle -> WARN 162f Error reading from 172.18.0.5:51628: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:54.019 UTC [orderer.common.server] func1 -> DEBU 1630 Closing Broadcast stream" +orderer0.example.com | "2019-11-19 05:22:54.019 UTC [comm.grpc.server] 1 -> INFO 1631 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51628 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=78.4558ms +orderer0.example.com | "2019-11-19 05:22:54.019 UTC [grpc] infof -> DEBU 1632 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:54.020 UTC [common.deliver] Handle -> WARN 1633 Error reading from 172.18.0.5:51626: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-11-19 05:22:54.020 UTC [orderer.common.server] func1 -> DEBU 1634 Closing Deliver stream" +orderer0.example.com | "2019-11-19 05:22:54.020 UTC [comm.grpc.server] 1 -> INFO 1635 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51626 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=94.4394ms +orderer0.example.com | "2019-11-19 05:22:54.020 UTC [grpc] infof -> DEBU 1636 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-11-19 05:22:54.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1637 Sending msg of 37609 bytes to 2 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-11-19 05:22:54.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1638 Sending msg of 37609 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2019-11-19 05:22:54.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1639 Send of ConsensusRequest for channel businesschannel with payload of size 37609 to orderer2.example.com(orderer2.example.com:7050) took 304.7µs " +orderer0.example.com | "2019-11-19 05:22:54.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163a Send of ConsensusRequest for channel businesschannel with payload of size 37609 to orderer1.example.com(orderer1.example.com:7050) took 165.6µs " +orderer0.example.com | "2019-11-19 05:22:54.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163c Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-11-19 05:22:54.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163d Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2019-11-19 05:22:54.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.2µs " +orderer0.example.com | "2019-11-19 05:22:54.088 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 163f Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-11-19 05:22:54.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1640 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1641 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.8µs " +orderer0.example.com | "2019-11-19 05:22:54.089 UTC [common.configtx] addToMap -> DEBU 1642 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:22:54.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1643 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.095 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1644 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1645 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [16cf 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [16d0 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16d1 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16d2 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16d3 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16d4 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [16d5 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16d6 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [16d7 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16d8 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16d9 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [16da 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [16db 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [16dc 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad2f0 gate 1574140935785525700 evaluation starts +peer1.org2.example.com | [16dd 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad2f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [16de 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad2f0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [16df 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [16e0 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad2f0 principal evaluation fails +peer1.org2.example.com | [16e1 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad2f0 gate 1574140935785525700 evaluation fails +peer1.org2.example.com | [16e2 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16e3 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16e4 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [16e5 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad860 gate 1574140935785865800 evaluation starts +peer1.org2.example.com | [16e6 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [16e7 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad860 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [16e8 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad860 principal matched by identity 0 +peer1.org2.example.com | [16e9 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 bc da 02 d2 92 5c c2 d8 0e 4e 85 00 4b c3 9a |......\...N..K..| +peer1.org2.example.com | 00000010 b5 31 27 89 fe 62 b5 de 15 e4 69 07 7b 81 42 d7 |.1'..b....i.{.B.| +peer1.org2.example.com | [16ea 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 73 33 59 a4 bd a2 78 2a df 54 |0E.!..s3Y...x*.T| +peer1.org2.example.com | 00000010 00 d3 7b 4e 19 43 e2 57 7e df 8f 28 a6 6e da 03 |..{N.C.W~..(.n..| +peer1.org2.example.com | 00000020 32 a9 cf ce a8 02 20 55 a7 9f 8e 13 5b 30 b7 91 |2..... U....[0..| +peer1.org2.example.com | 00000030 96 cd d7 e2 85 79 b2 01 c9 35 c2 f1 a9 38 c5 40 |.....y...5...8.@| +peer1.org2.example.com | 00000040 71 b7 09 f3 b1 7c 44 |q....|D| +peer1.org2.example.com | [16eb 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad860 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [16ec 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad860 gate 1574140935785865800 evaluation succeeds +peer1.org2.example.com | [16ed 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1234 11-19 05:22:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1235 11-19 05:22:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1236 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1237 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1238 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1239 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [123a 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [123b 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [123c 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [123d 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [123e 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [123f 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1240 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1241 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1242 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000450520 gate 1574140930410377400 evaluation starts +peer1.org1.example.com | [1243 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000450520 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1244 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000450520 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1245 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000450520 principal matched by identity 0 +peer1.org1.example.com | [1246 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 c9 8e 0f 98 f6 14 a2 16 ae c0 98 fe 60 51 18 |.............`Q.| +peer1.org1.example.com | 00000010 49 cc 88 bc d0 d0 03 7d 39 45 b2 3a 34 7b 77 a5 |I......}9E.:4{w.| +peer1.org1.example.com | [1247 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 0a ce 03 9b 30 45 f1 9f 40 76 2c |0D. }....0E..@v,| +peer1.org1.example.com | 00000010 b2 bd 9d 0b a6 9a 58 d8 b3 a5 aa 28 2c cb 48 d3 |......X....(,.H.| +peer1.org1.example.com | 00000020 03 d9 90 f3 02 20 03 7b c4 65 83 9c c1 b6 20 e8 |..... .{.e.... .| +peer1.org1.example.com | 00000030 64 6a e3 3e 33 db 5b 6f b8 66 b9 4c 81 35 b0 1c |dj.>3.[o.f.L.5..| +peer1.org1.example.com | 00000040 23 d0 22 c9 d1 d2 |#."...| +peer1.org1.example.com | [1248 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000450520 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1249 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000450520 gate 1574140930410377400 evaluation succeeds +peer1.org1.example.com | [124a 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [124b 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [124c 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [124d 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [124e 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13ba 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [13bb 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13bc 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13bd 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13be 11-19 05:22:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13bf 11-19 05:22:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13c0 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [13c1 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13c3 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13c2 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13c4 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13c5 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13c6 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13c7 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [13c8 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [13c9 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [13ca 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [13cb 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [13cc 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [13cd 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [13ce 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [13cf 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13d0 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13d1 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [13d2 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13d3 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13d4 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [13d5 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [13eb 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [13ec 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13ed 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13ee 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [13ef 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [13f0 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [13f1 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c554f0 gate 1574140927915325600 evaluation starts +peer0.org2.example.com | [13f2 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c554f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13f3 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c554f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [13f4 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c554f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [13f5 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c554f0 principal evaluation fails +peer0.org2.example.com | [13f6 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c554f0 gate 1574140927915325600 evaluation fails +peer0.org2.example.com | [13f7 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13f8 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13f9 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [13fa 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a60 gate 1574140927915886300 evaluation starts +peer0.org2.example.com | [13fb 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13fc 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [13fd 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a60 principal matched by identity 0 +peer0.org2.example.com | [13fe 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 94 a5 97 d0 fd 59 99 e5 57 ca 0c 06 a2 c6 a7 |S.....Y..W......| +peer0.org2.example.com | 00000010 f9 2c 3a 87 c5 72 d1 50 d9 51 96 15 35 6f 9b c3 |.,:..r.P.Q..5o..| +peer0.org2.example.com | [13ff 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc ad 80 5b 80 12 1b 17 4e f6 85 |0E.!....[....N..| +peer0.org2.example.com | 00000010 1e 06 1f f1 67 f9 54 1f ab 07 6b 18 0e 65 4a e5 |....g.T...k..eJ.| +peer0.org2.example.com | 00000020 0f 78 5e 27 70 02 20 4d 5d e7 56 e4 16 10 a8 96 |.x^'p. M].V.....| +peer0.org2.example.com | 00000030 29 ec b5 f7 29 87 31 5b d9 65 b2 0a 77 54 1a fb |)...).1[.e..wT..| +peer0.org2.example.com | 00000040 40 58 2d fc 41 d7 2d |@X-.A.-| +peer0.org2.example.com | [1400 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1401 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a60 gate 1574140927915886300 evaluation succeeds +peer0.org2.example.com | [1402 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1403 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1404 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1405 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1406 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1407 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1408 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1409 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [140a 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [140b 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [140c 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [140d 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [140e 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [140f 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1410 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1411 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1412 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [124f 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1250 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1251 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1252 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1253 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1254 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1255 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1256 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1257 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1258 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1259 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [125a 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [125b 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125c 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125d 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125e 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125f 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1260 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1261 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1262 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1263 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1264 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1265 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1266 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1267 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1268 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1269 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [126a 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [126b 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [126c 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [126d 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [126e 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [126f 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [1270 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1271 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1272 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15101D +peer1.org1.example.com | [1273 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0B6B812570D6899408A1B766DF9EE2EE0617E5C1B22C2F01B1E757C74022C446 +peer1.org1.example.com | [1274 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [13d6 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [13d7 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 gate 1574140927348551800 evaluation starts +peer0.org1.example.com | [13d8 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13d9 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [13da 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 principal matched by identity 0 +peer0.org1.example.com | [13db 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [13dc 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [13dd 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [13de 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 gate 1574140927348551800 evaluation succeeds +peer0.org1.example.com | [13df 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13e0 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13e1 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13e2 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [13e3 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13e4 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13e5 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [13e6 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13e7 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13e8 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [13e9 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [13ea 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [13eb 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 gate 1574140927350590600 evaluation starts +peer0.org1.example.com | [13ec 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13ed 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [13ee 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 principal matched by identity 0 +peer0.org1.example.com | [13ef 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [13f0 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [13f1 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [13f2 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 gate 1574140927350590600 evaluation succeeds +peer0.org1.example.com | [13f3 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13f4 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13f5 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13f6 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1413 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1414 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1415 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1416 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1417 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1418 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1419 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [141a 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [141b 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [141d 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [141c 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [141e 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [141f 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1420 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [1421 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [1422 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1423 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1424 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1425 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1426 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1427 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1646 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1647 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1648 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1649 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.111 UTC [common.configtx] addToMap -> DEBU 164a Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:54.111 UTC [common.configtx] addToMap -> DEBU 164b Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.111 UTC [common.configtx] addToMap -> DEBU 164c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 164d Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 164e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 164f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 1650 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 1651 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.113 UTC [common.configtx] addToMap -> DEBU 1652 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.113 UTC [common.configtx] addToMap -> DEBU 1653 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.113 UTC [common.configtx] addToMap -> DEBU 1654 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:54.114 UTC [common.configtx] addToMap -> DEBU 1655 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.114 UTC [common.configtx] addToMap -> DEBU 1656 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.114 UTC [common.configtx] addToMap -> DEBU 1657 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:54.116 UTC [common.configtx] addToMap -> DEBU 1658 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:54.116 UTC [common.configtx] addToMap -> DEBU 1659 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.117 UTC [common.configtx] addToMap -> DEBU 165a Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:22:54.117 UTC [common.configtx] addToMap -> DEBU 165b Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.117 UTC [common.configtx] addToMap -> DEBU 165c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:22:54.118 UTC [common.configtx] addToMap -> DEBU 165d Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:54.120 UTC [common.configtx] addToMap -> DEBU 165e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:54.120 UTC [common.configtx] addToMap -> DEBU 165f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:54.120 UTC [common.configtx] verifyDeltaSet -> DEBU 1660 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:54.121 UTC [common.configtx] verifyDeltaSet -> DEBU 1661 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.121 UTC [common.configtx] verifyDeltaSet -> DEBU 1662 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:54.121 UTC [common.configtx] verifyDeltaSet -> DEBU 1663 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.121 UTC [common.configtx] policyForItem -> DEBU 1664 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-11-19 05:22:54.122 UTC [policies] Manager -> DEBU 1665 Manager Channel looking up path []" +orderer0.example.com | "2019-11-19 05:22:54.124 UTC [policies] Manager -> DEBU 1666 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:22:54.124 UTC [policies] Manager -> DEBU 1667 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:22:54.124 UTC [policies] Manager -> DEBU 1668 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:22:54.125 UTC [policies] Manager -> DEBU 1669 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:22:54.125 UTC [policies] Manager -> DEBU 166a Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:22:54.125 UTC [policies] Manager -> DEBU 166b Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:22:54.125 UTC [policies] Manager -> DEBU 166c Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.126 UTC [policies] Manager -> DEBU 166d Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.126 UTC [policies] Evaluate -> DEBU 166e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-11-19 05:22:54.126 UTC [policies] Evaluate -> DEBU 166f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:54.127 UTC [policies] Evaluate -> DEBU 1670 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-11-19 05:22:54.127 UTC [cauthdsl] deduplicate -> WARN 1671 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-11-19 05:22:54.127 UTC [cauthdsl] func1 -> DEBU 1672 0xc000afab70 gate 1574140974127434600 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:54.128 UTC [cauthdsl] func2 -> DEBU 1673 0xc000afab70 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-11-19 05:22:54.128 UTC [cauthdsl] func2 -> DEBU 1674 0xc000afab70 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:54.128 UTC [cauthdsl] func2 -> DEBU 1675 0xc000afab70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-11-19 05:22:54.128 UTC [cauthdsl] func2 -> DEBU 1676 0xc000afab70 processing identity 1 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:54.129 UTC [cauthdsl] func2 -> DEBU 1677 0xc000afab70 principal matched by identity 1" +orderer0.example.com | "2019-11-19 05:22:54.129 UTC [msp.identity] Verify -> DEBU 1678 Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +orderer0.example.com | 00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...|" +orderer0.example.com | "2019-11-19 05:22:54.129 UTC [msp.identity] Verify -> DEBU 1679 Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +orderer0.example.com | 00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +orderer0.example.com | 00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +orderer0.example.com | 00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +orderer0.example.com | 00000040 46 bf 84 1c 8c 35 |F....5|" +orderer0.example.com | "2019-11-19 05:22:54.130 UTC [cauthdsl] func2 -> DEBU 167a 0xc000afab70 principal evaluation succeeds for identity 1" +peer0.org2.example.com | [1428 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1429 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [142a 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e360 gate 1574140927993350000 evaluation starts +peer0.org2.example.com | [142b 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e360 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [142c 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e360 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [142d 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [142e 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e360 principal evaluation fails +peer0.org2.example.com | [142f 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e360 gate 1574140927993350000 evaluation fails +peer0.org2.example.com | [1430 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1431 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1432 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1433 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e8d0 gate 1574140927994561100 evaluation starts +peer0.org2.example.com | [1434 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e8d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1435 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e8d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1436 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e8d0 principal matched by identity 0 +peer0.org2.example.com | [1437 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1438 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1439 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e8d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [143a 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e8d0 gate 1574140927994561100 evaluation succeeds +peer0.org2.example.com | [143b 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [143c 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [143d 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [143e 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [143f 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1440 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1441 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1442 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1443 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1444 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1445 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1446 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1447 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1448 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1275 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1276 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1277 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1278 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1279 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127a 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127b 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [127c 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127d 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [127e 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [127f 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1280 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1281 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1282 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1283 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1284 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1285 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1286 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1287 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1288 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1289 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [128a 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [128b 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [128c 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [128d 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [128e 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [16ee 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [16ef 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [16f0 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [16f1 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16f2 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [16f3 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [16f4 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [16f5 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [16f6 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f7 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f8 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f9 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16fa 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16fb 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16fc 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16fd 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16fe 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16ff 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1700 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1701 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1702 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1703 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1704 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1705 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1706 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1707 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1708 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1709 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [170a 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [170b 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [170c 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [170e 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [170f 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [170d 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1710 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1711 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1712 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1713 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1714 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1715 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1716 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1717 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1718 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1719 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b b1 8f 0a 39 ad 76 56 b8 3f 78 c4 d4 5b 44 c9 |....9.vV.?x..[D.| +peer1.org2.example.com | 00000010 46 ad f7 77 3f 31 fc 9d c8 05 73 5d 2f cf 75 0b |F..w?1....s]/.u.| +peer1.org2.example.com | [171a 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 ee 7e 54 58 69 da e3 f1 09 7d |0E.!...~TXi....}| +peer1.org2.example.com | 00000010 d0 c6 cf f1 8c 3a 3e 09 72 51 49 bf f1 42 fe 50 |.....:>.rQI..B.P| +peer1.org2.example.com | 00000020 43 41 c4 13 f8 02 20 33 50 8a 7f 1b 73 db 30 6d |CA.... 3P...s.0m| +peer1.org2.example.com | 00000030 9b 66 64 db 65 ab 6b c9 3f 50 bb f9 75 34 4d b8 |.fd.e.k.?P..u4M.| +peer1.org2.example.com | 00000040 4f 6b fb 3a 94 9b d6 |Ok.:...| +peer1.org2.example.com | [171b 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [171c 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [171d 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [171e 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [171f 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1720 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1721 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1722 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1723 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1724 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1725 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1726 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1727 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1728 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1729 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer1.org1.example.com | [128f 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1290 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1291 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f45d0 gate 1574140930841819400 evaluation starts +peer1.org1.example.com | [1292 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f45d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1293 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f45d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1294 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f45d0 principal matched by identity 0 +peer1.org1.example.com | [1295 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 6f 8d 4a 96 49 d1 06 03 a4 de d5 ec af 66 0f |\o.J.I........f.| +peer1.org1.example.com | 00000010 6f ff 5c dc 9b 2d 5a 10 f4 14 4f 9b 44 dd b2 77 |o.\..-Z...O.D..w| +peer1.org1.example.com | [1296 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 0c f8 10 43 b3 a9 50 81 42 21 |0E.!.....C..P.B!| +peer1.org1.example.com | 00000010 30 0b 1a 69 52 7e e0 0d ea 10 73 82 25 5f 42 2b |0..iR~....s.%_B+| +peer1.org1.example.com | 00000020 1f 81 89 1d 1e 02 20 0d 07 4b c6 b4 5c 2f 65 17 |...... ..K..\/e.| +peer1.org1.example.com | 00000030 5c 61 0a ac d4 3f e3 fa 63 e2 40 58 af 81 97 db |\a...?..c.@X....| +peer1.org1.example.com | 00000040 84 c0 4f ad f4 f0 ab |..O....| +peer1.org1.example.com | [1297 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f45d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1298 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f45d0 gate 1574140930841819400 evaluation succeeds +peer1.org1.example.com | [1299 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [129a 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [129b 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [129c 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [129d 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [129e 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [129f 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [12a0 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [12a1 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [12a2 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a3 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a4 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a5 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12a6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12a7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12a8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12a9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12aa 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12ab 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12ac 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [12ad 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12ae 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [12af 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12b0 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12b1 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12b2 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12b3 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [12b4 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13f7 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13f8 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [13f9 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13fa 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13fb 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13fc 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [13fd 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13fe 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13ff 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1400 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1401 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1402 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 gate 1574140927353114600 evaluation starts +peer0.org1.example.com | [1403 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1404 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1405 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 principal matched by identity 0 +peer0.org1.example.com | [1406 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [1407 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [1408 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1409 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 gate 1574140927353114600 evaluation succeeds +peer0.org1.example.com | [140a 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [140b 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [140c 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [140d 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [140e 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [140f 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [1410 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1411 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1449 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe0e0 gate 1574140927999510500 evaluation starts +peer0.org2.example.com | [144a 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe0e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [144b 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe0e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [144c 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [144d 11-19 05:22:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe0e0 principal evaluation fails +peer0.org2.example.com | [144e 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe0e0 gate 1574140927999510500 evaluation fails +peer0.org2.example.com | [144f 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1450 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1451 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1452 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe650 gate 1574140928000681000 evaluation starts +peer0.org2.example.com | [1453 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1454 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe650 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1455 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe650 principal matched by identity 0 +peer0.org2.example.com | [1456 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1457 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1458 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe650 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1459 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe650 gate 1574140928000681000 evaluation succeeds +peer0.org2.example.com | [145a 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [145b 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [145c 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [145d 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [145e 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [145f 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1460 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1461 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1462 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1463 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1464 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1465 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1466 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1467 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1468 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1469 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [146a 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [146b 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [146c 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12b5 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [12b6 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [12b7 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer1.org1.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer1.org1.example.com | [12b8 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer1.org1.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer1.org1.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer1.org1.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer1.org1.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer1.org1.example.com | [12b9 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [12ba 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 75 14 2d 24 76 92 cd ee 51 0e |0E.!..u.-$v...Q.| +peer1.org1.example.com | 00000010 1b 83 5b b1 f3 d1 9e 54 89 6f c7 b8 8e fc a7 98 |..[....T.o......| +peer1.org1.example.com | 00000020 64 1d f7 7e 98 02 20 2f 92 8d 59 8e f3 44 4b 9d |d..~.. /..Y..DK.| +peer1.org1.example.com | 00000030 04 45 2d 70 94 62 35 f5 83 c7 15 20 66 0d f4 81 |.E-p.b5.... f...| +peer1.org1.example.com | 00000040 0f e5 eb 43 3f e5 01 |...C?..| +peer1.org1.example.com | [12bb 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [12bc 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12bd 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12be 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [12bf 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [12c0 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [12c1 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [12c2 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12c3 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12c4 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12c5 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [12c6 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12c7 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12c8 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [12c9 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > +peer1.org1.example.com | [12ca 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [12cb 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12cc 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12cd 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1412 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1413 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1414 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1415 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1416 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1417 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1418 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 gate 1574140927356895200 evaluation starts +peer0.org1.example.com | [1419 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [141a 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [141b 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 principal matched by identity 0 +peer0.org1.example.com | [141c 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [141d 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [141e 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [141f 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 gate 1574140927356895200 evaluation succeeds +peer0.org1.example.com | [1420 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1421 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1422 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1423 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1424 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1425 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [1426 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1427 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1428 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1429 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [142a 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer1.org2.example.com | [172a 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer1.org2.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer1.org2.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer1.org2.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer1.org2.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer1.org2.example.com | [172b 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [172c 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab e2 db 03 06 3a 07 a5 9f 28 36 |0E.!......:...(6| +peer1.org2.example.com | 00000010 ba c7 ba 25 81 d6 1e 4c 40 fb 40 fc d5 c9 39 6f |...%...L@.@...9o| +peer1.org2.example.com | 00000020 08 ef 19 37 6d 02 20 32 69 45 53 04 28 5d 6c 13 |...7m. 2iES.(]l.| +peer1.org2.example.com | 00000030 ea 8c 71 88 74 bc ac ad 75 bc 22 d3 4c 40 5b 65 |..q.t...u.".L@[e| +peer1.org2.example.com | 00000040 1d 9b 73 3c 00 b7 d3 |..s<...| +peer1.org2.example.com | [172d 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [172e 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [172f 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1730 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1731 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1732 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1733 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1734 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1735 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [1736 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1737 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1738 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1739 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" secret_envelope: > alive: +peer1.org2.example.com | [173a 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [173b 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [173c 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [173d 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [173e 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [173f 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1740 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1741 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1742 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1743 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1744 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1745 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [146d 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [146e 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [146f 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1470 11-19 05:22:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1471 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfa30 gate 1574140928010070400 evaluation starts +peer0.org2.example.com | [1472 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfa30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1473 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfa30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1474 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfa30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1475 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfa30 principal evaluation fails +peer0.org2.example.com | [1476 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfa30 gate 1574140928010070400 evaluation fails +peer0.org2.example.com | [1477 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1478 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1479 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [147a 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbffa0 gate 1574140928011645000 evaluation starts +peer0.org2.example.com | [147b 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbffa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [147c 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbffa0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [147d 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbffa0 principal matched by identity 0 +peer0.org2.example.com | [147e 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [147f 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1480 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbffa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1481 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbffa0 gate 1574140928011645000 evaluation succeeds +peer0.org2.example.com | [1482 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1483 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1484 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1485 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1486 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1487 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1488 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1489 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [148a 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [148b 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [148c 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [148d 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [148e 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1130 gate 1574140928015513800 evaluation starts +peer0.org2.example.com | [148f 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1130 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1490 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1130 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:54.133 UTC [cauthdsl] func1 -> DEBU 167b 0xc000afab70 gate 1574140974127434600 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:54.134 UTC [policies] Evaluate -> DEBU 167c Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.134 UTC [policies] Evaluate -> DEBU 167d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.134 UTC [policies] Evaluate -> DEBU 167e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-11-19 05:22:54.135 UTC [cauthdsl] deduplicate -> WARN 167f De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-11-19 05:22:54.135 UTC [cauthdsl] func1 -> DEBU 1680 0xc000afb1a0 gate 1574140974135166300 evaluation starts" +orderer0.example.com | "2019-11-19 05:22:54.135 UTC [cauthdsl] func2 -> DEBU 1681 0xc000afb1a0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-11-19 05:22:54.136 UTC [cauthdsl] func2 -> DEBU 1682 0xc000afb1a0 processing identity 0 with bytes of fd6070" +orderer0.example.com | "2019-11-19 05:22:54.137 UTC [cauthdsl] func2 -> DEBU 1683 0xc000afb1a0 principal matched by identity 0" +orderer0.example.com | "2019-11-19 05:22:54.137 UTC [msp.identity] Verify -> DEBU 1684 Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +orderer0.example.com | 00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR|" +orderer0.example.com | "2019-11-19 05:22:54.137 UTC [msp.identity] Verify -> DEBU 1685 Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +orderer0.example.com | 00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +orderer0.example.com | 00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +orderer0.example.com | 00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +orderer0.example.com | 00000040 28 40 4c 89 f5 38 |(@L..8|" +orderer0.example.com | "2019-11-19 05:22:54.138 UTC [cauthdsl] func2 -> DEBU 1686 0xc000afb1a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-11-19 05:22:54.138 UTC [cauthdsl] func1 -> DEBU 1687 0xc000afb1a0 gate 1574140974135166300 evaluation succeeds" +orderer0.example.com | "2019-11-19 05:22:54.138 UTC [policies] Evaluate -> DEBU 1688 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.139 UTC [policies] Evaluate -> DEBU 1689 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.139 UTC [policies] Evaluate -> DEBU 168a Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:54.140 UTC [policies] Evaluate -> DEBU 168b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:54.140 UTC [common.configtx] verifyDeltaSet -> DEBU 168c Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.140 UTC [common.configtx] verifyDeltaSet -> DEBU 168d Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.141 UTC [common.configtx] verifyDeltaSet -> DEBU 168e Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:54.142 UTC [common.configtx] recurseConfigMap -> DEBU 168f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.142 UTC [common.configtx] recurseConfigMap -> DEBU 1690 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.142 UTC [common.configtx] recurseConfigMap -> DEBU 1691 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.143 UTC [common.configtx] recurseConfigMap -> DEBU 1692 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.144 UTC [common.configtx] recurseConfigMap -> DEBU 1693 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.144 UTC [common.configtx] recurseConfigMap -> DEBU 1694 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.145 UTC [common.configtx] recurseConfigMap -> DEBU 1695 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.152 UTC [common.configtx] recurseConfigMap -> DEBU 1696 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.168 UTC [common.configtx] recurseConfigMap -> DEBU 1697 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.168 UTC [common.configtx] recurseConfigMap -> DEBU 1698 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.169 UTC [common.configtx] recurseConfigMap -> DEBU 1699 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.169 UTC [common.configtx] recurseConfigMap -> DEBU 169a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.169 UTC [common.configtx] recurseConfigMap -> DEBU 169b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.188 UTC [common.configtx] recurseConfigMap -> DEBU 169c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.189 UTC [common.configtx] recurseConfigMap -> DEBU 169d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.189 UTC [common.configtx] recurseConfigMap -> DEBU 169e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.192 UTC [common.configtx] recurseConfigMap -> DEBU 169f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.192 UTC [common.configtx] recurseConfigMap -> DEBU 16a0 Setting policy for key Admins to " +orderer0.example.com | "2019-11-19 05:22:54.192 UTC [common.configtx] recurseConfigMap -> DEBU 16a1 Setting policy for key Endorsement to " +orderer0.example.com | "2019-11-19 05:22:54.192 UTC [common.configtx] recurseConfigMap -> DEBU 16a2 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-11-19 05:22:54.193 UTC [common.configtx] recurseConfigMap -> DEBU 16a3 Setting policy for key Readers to " +orderer0.example.com | "2019-11-19 05:22:54.194 UTC [common.configtx] recurseConfigMap -> DEBU 16a4 Setting policy for key Writers to " +orderer0.example.com | "2019-11-19 05:22:54.194 UTC [common.configtx] recurseConfigMap -> DEBU 16a5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.195 UTC [common.configtx] recurseConfigMap -> DEBU 16a6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.195 UTC [common.configtx] recurseConfigMap -> DEBU 16a7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-11-19 05:22:54.198 UTC [common.channelconfig] NewStandardValues -> DEBU 16a8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a9 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16aa Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ab Processing field: OrdererAddresses" +orderer0.example.com | "2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ac Processing field: Consortium" +orderer0.example.com | "2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ad Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.199 UTC [common.channelconfig] NewStandardValues -> DEBU 16ae Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-11-19 05:22:54.199 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16af Processing field: ConsensusType" +orderer0.example.com | "2019-11-19 05:22:54.199 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b0 Processing field: BatchSize" +orderer0.example.com | "2019-11-19 05:22:54.199 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b1 Processing field: BatchTimeout" +orderer0.example.com | "2019-11-19 05:22:54.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b2 Processing field: KafkaBrokers" +orderer0.example.com | "2019-11-19 05:22:54.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b3 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:22:54.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b4 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.202 UTC [common.channelconfig] NewStandardValues -> DEBU 16b5 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-11-19 05:22:54.202 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b6 Processing field: Endpoints" +orderer0.example.com | "2019-11-19 05:22:54.202 UTC [common.channelconfig] NewStandardValues -> DEBU 16b7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:54.202 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b8 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:54.203 UTC [common.channelconfig] validateMSP -> DEBU 16b9 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.204 UTC [msp] newBccspMsp -> DEBU 16ba Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.204 UTC [msp] New -> DEBU 16bb Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.206 UTC [msp] Setup -> DEBU 16bc Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-11-19 05:22:54.206 UTC [msp.identity] newIdentity -> DEBU 16bd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.212 UTC [msp.identity] newIdentity -> DEBU 16be Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.213 UTC [msp] Validate -> DEBU 16bf MSP OrdererMSP validating identity" +orderer0.example.com | "2019-11-19 05:22:54.213 UTC [common.channelconfig] NewStandardValues -> DEBU 16c0 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-11-19 05:22:54.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c1 Processing field: ACLs" +orderer0.example.com | "2019-11-19 05:22:54.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c2 Processing field: Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.215 UTC [common.channelconfig] NewStandardValues -> DEBU 16c3 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:54.215 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c4 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.215 UTC [common.channelconfig] NewStandardValues -> DEBU 16c5 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:54.215 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c6 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:54.215 UTC [common.channelconfig] Validate -> DEBU 16c7 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:22:54.215 UTC [common.channelconfig] validateMSP -> DEBU 16c8 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.216 UTC [msp] newBccspMsp -> DEBU 16c9 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.216 UTC [msp] New -> DEBU 16ca Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.216 UTC [msp] Setup -> DEBU 16cb Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.218 UTC [msp.identity] newIdentity -> DEBU 16cc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.224 UTC [common.channelconfig] NewStandardValues -> DEBU 16cd Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ce Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] NewStandardValues -> DEBU 16cf Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d0 Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] Validate -> DEBU 16d1 Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] validateMSP -> DEBU 16d2 Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [msp] newBccspMsp -> DEBU 16d3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [msp] New -> DEBU 16d4 Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [msp] Setup -> DEBU 16d5 Setting up MSP instance Org3MSP" +peer0.org1.example.com | [142b 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [142c 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [142d 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [142e 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [142f 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1430 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1431 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 gate 1574140927364715600 evaluation starts +peer0.org1.example.com | [1432 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1433 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1434 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 principal matched by identity 0 +peer0.org1.example.com | [1435 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1436 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1437 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1438 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 gate 1574140927364715600 evaluation succeeds +peer0.org1.example.com | [1439 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [143a 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [143b 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [143c 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [143d 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [143e 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [143f 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1440 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [1441 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1442 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1443 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1444 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1445 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1446 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1746 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1747 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1748 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1749 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [174a 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [174b 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [174c 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [174d 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [174e 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [174f 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1750 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1751 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1752 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1753 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1754 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1755 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1756 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1757 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1758 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1759 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7f90 gate 1574140935892858600 evaluation starts +peer1.org2.example.com | [175a 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7f90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [175b 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7f90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [175c 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [175d 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7f90 principal evaluation fails +peer1.org2.example.com | [175e 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7f90 gate 1574140935892858600 evaluation fails +peer1.org2.example.com | [175f 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1760 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1761 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [12ce 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12cf 11-19 05:22:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12d0 11-19 05:22:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12d1 11-19 05:22:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12d2 11-19 05:22:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12d3 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [12d4 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d5 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d6 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12d7 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [12d8 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [12d9 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [12da 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12db 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [12dc 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [12dd 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [12de 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12df 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e0 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e1 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e2 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e3 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e4 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [12e5 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e6 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e7 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e8 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e9 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [12ea 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [12eb 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [msp.identity] newIdentity -> DEBU 16d6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +orderer0.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +orderer0.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +orderer0.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] NewStandardValues -> DEBU 16d7 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d8 Processing field: AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] NewStandardValues -> DEBU 16d9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16da Processing field: MSP" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] Validate -> DEBU 16db Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [common.channelconfig] validateMSP -> DEBU 16dc Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [msp] newBccspMsp -> DEBU 16dd Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.226 UTC [msp] New -> DEBU 16de Creating Cache-MSP instance" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [msp] Setup -> DEBU 16df Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [msp.identity] newIdentity -> DEBU 16e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [msp] Setup -> DEBU 16e1 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [msp] Setup -> DEBU 16e2 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e3 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e4 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e5 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e6 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e7 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e8 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e9 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16ea Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16eb Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16ec Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16ed Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16ee Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] GetPolicy -> DEBU 16ef Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] GetPolicy -> DEBU 16f0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16f1 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] GetPolicy -> DEBU 16f2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.227 UTC [policies] GetPolicy -> DEBU 16f3 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f4 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f5 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [12ec 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [12ed 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12ee 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12ef 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [12f0 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [12f1 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [12f2 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001dc710 gate 1574140931454598700 evaluation starts +peer1.org1.example.com | [12f3 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001dc710 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [12f4 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001dc710 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [12f5 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001dc710 principal matched by identity 0 +peer1.org1.example.com | [12f6 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer1.org1.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org1.example.com | [12f7 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer1.org1.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer1.org1.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer1.org1.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer1.org1.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org1.example.com | [12f8 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001dc710 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [12f9 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001dc710 gate 1574140931454598700 evaluation succeeds +peer1.org1.example.com | [12fa 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12fb 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12fc 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [12fd 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [12fe 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [12ff 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1300 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1301 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1302 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1303 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1304 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1305 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1306 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [1307 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1308 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1309 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [130a 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [130b 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [130c 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1491 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1492 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1130 principal evaluation fails +peer0.org2.example.com | [1493 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1130 gate 1574140928015513800 evaluation fails +peer0.org2.example.com | [1494 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1495 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1496 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1497 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce16a0 gate 1574140928017164700 evaluation starts +peer0.org2.example.com | [1498 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce16a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1499 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce16a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [149a 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce16a0 principal matched by identity 0 +peer0.org2.example.com | [149b 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [149c 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [149d 11-19 05:22:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce16a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [149e 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce16a0 gate 1574140928017164700 evaluation succeeds +peer0.org2.example.com | [149f 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14a0 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14a1 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [14a2 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [14a3 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [14a4 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [14a5 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [14a6 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [14a7 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14a8 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [14a9 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14aa 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ab 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ac 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [14ad 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14ae 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [130d 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > +peer1.org1.example.com | [130e 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [130f 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1310 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1311 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1312 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1313 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1314 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1315 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1316 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1317 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1318 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1319 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [131a 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [131b 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [131c 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [131d 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1320 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1321 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1322 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1323 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1324 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efb90 gate 1574140931665267100 evaluation starts +peer1.org1.example.com | [1325 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efb90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1326 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efb90 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1327 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efb90 principal matched by identity 0 +peer1.org1.example.com | [1328 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1762 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3c500 gate 1574140935893642600 evaluation starts +peer1.org2.example.com | [1763 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3c500 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1764 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3c500 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1765 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3c500 principal matched by identity 0 +peer1.org2.example.com | [1766 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +peer1.org2.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer1.org2.example.com | [1767 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer1.org2.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer1.org2.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +peer1.org2.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer1.org2.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer1.org2.example.com | [1768 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3c500 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1769 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3c500 gate 1574140935893642600 evaluation succeeds +peer1.org2.example.com | [176a 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [176b 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [176c 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [176d 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [176e 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [176f 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1770 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1771 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1772 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1773 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1774 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1775 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1776 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [1777 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1778 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1779 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [177a 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [177b 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > alive: alive: +peer1.org2.example.com | [177c 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [177d 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [177e 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [177f 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1780 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1781 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1782 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14af 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [14b0 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [14b1 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [14b2 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfb780 gate 1574140928026300600 evaluation starts +peer0.org2.example.com | [14b3 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfb780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14b4 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfb780 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [14b5 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfb780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [14b6 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfb780 principal evaluation fails +peer0.org2.example.com | [14b7 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfb780 gate 1574140928026300600 evaluation fails +peer0.org2.example.com | [14b8 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [14b9 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [14ba 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [14bb 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfbcf0 gate 1574140928027031600 evaluation starts +peer0.org2.example.com | [14bc 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfbcf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14bd 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfbcf0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [14be 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfbcf0 principal matched by identity 0 +peer0.org2.example.com | [14bf 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [14c0 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [14c1 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfbcf0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [14c2 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfbcf0 gate 1574140928027031600 evaluation succeeds +peer0.org2.example.com | [14c3 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14c4 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14c5 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [14c6 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [14c7 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [14c8 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [14c9 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [14ca 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [14cb 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14cc 11-19 05:22:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1447 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1448 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1449 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 gate 1574140927370296200 evaluation starts +peer0.org1.example.com | [144a 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [144b 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [144c 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 principal matched by identity 0 +peer0.org1.example.com | [144d 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [144e 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [144f 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1450 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 gate 1574140927370296200 evaluation succeeds +peer0.org1.example.com | [1451 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1452 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1453 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1454 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1455 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1456 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1457 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1458 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1459 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [145a 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [145b 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [145c 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [145d 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [145e 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [145f 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1460 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1461 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1462 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1463 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1464 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1465 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1466 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1467 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1468 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1469 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146a 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146b 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [146c 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [146d 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [146e 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [146f 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1783 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1784 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1785 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1786 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [1787 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1788 11-19 05:22:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1789 11-19 05:22:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [178a 11-19 05:22:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [178b 11-19 05:22:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [178c 11-19 05:22:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [178d 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [178e 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1790 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [1791 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [178f 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1793 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1792 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1794 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1795 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1796 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1797 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1798 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1799 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [179a 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [179b 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [179c 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [179d 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1bee0 gate 1574140936198484800 evaluation starts +peer1.org2.example.com | [179e 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1bee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [179f 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1bee0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [17a0 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1bee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [17a1 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1bee0 principal evaluation fails +peer1.org2.example.com | [17a2 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1bee0 gate 1574140936198484800 evaluation fails +peer1.org2.example.com | [17a3 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17a4 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17a5 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [17a6 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c450 gate 1574140936199941600 evaluation starts +peer1.org2.example.com | [17a7 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17a8 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c450 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [17a9 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c450 principal matched by identity 0 +peer1.org2.example.com | [17aa 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [17ab 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [17ac 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c450 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [17ad 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c450 gate 1574140936199941600 evaluation succeeds +peer1.org2.example.com | [17ae 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17af 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17b0 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [17b1 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [17b2 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17b3 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17b4 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [17b5 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17b6 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17b7 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [17b8 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [17b9 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [17ba 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7d5e0 gate 1574140936203196400 evaluation starts +peer1.org2.example.com | [17bb 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7d5e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17bc 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7d5e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [17bd 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7d5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [17be 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7d5e0 principal evaluation fails +peer1.org2.example.com | [17bf 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7d5e0 gate 1574140936203196400 evaluation fails +peer1.org2.example.com | [17c0 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17c1 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17c2 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [17c3 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7db50 gate 1574140936204834900 evaluation starts +peer1.org2.example.com | [17c4 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7db50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17c5 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7db50 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [17c6 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7db50 principal matched by identity 0 +peer1.org2.example.com | [17c7 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [17c8 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [17c9 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7db50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [17ca 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7db50 gate 1574140936204834900 evaluation succeeds +peer1.org2.example.com | [17cb 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17cc 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17cd 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [17ce 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [17cf 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [17d0 11-19 05:22:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [17d1 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17d2 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [17d3 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17d4 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17d5 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17d6 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17d7 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17d8 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [17d9 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [17da 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17dc 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17dd 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [17db 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17de 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17e0 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [17df 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [17e1 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [17e2 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [17e3 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17e4 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c915b0 gate 1574140936213824300 evaluation starts +peer1.org2.example.com | [17e5 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c915b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17e6 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c915b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [17e7 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c915b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [17e8 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c915b0 principal evaluation fails +peer1.org2.example.com | [17ea 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [17e9 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c915b0 gate 1574140936213824300 evaluation fails +peer1.org2.example.com | [17eb 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17ec 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17ed 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [17ee 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91b20 gate 1574140936217443700 evaluation starts +peer1.org2.example.com | [17ef 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91b20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17f0 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91b20 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [17f1 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91b20 principal matched by identity 0 +peer1.org2.example.com | [17f2 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [17f3 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [17f4 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91b20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [17f5 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91b20 gate 1574140936217443700 evaluation succeeds +peer1.org2.example.com | [17f6 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17f7 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17f8 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [17f9 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [17fa 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fb 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fc 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [17fd 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17fe 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17ff 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1800 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1801 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1802 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb2cb0 gate 1574140936220622900 evaluation starts +peer1.org2.example.com | [1803 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb2cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1804 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb2cb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1805 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb2cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1806 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb2cb0 principal evaluation fails +peer1.org2.example.com | [1807 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb2cb0 gate 1574140936220622900 evaluation fails +peer1.org2.example.com | [1808 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1809 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f9 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fa Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fb Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fc Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fd Proposed new policy Writers for Channel" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fe Proposed new policy Admins for Channel" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16ff Proposed new policy Readers for Channel" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1700 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1701 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1702 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1703 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1704 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1705 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1706 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1707 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1708 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1709 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170b Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170d Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170e Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170f Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1710 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1711 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1712 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1713 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1714 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1715 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1716 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1717 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1718 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:54.256 UTC [common.configtx] addToMap -> DEBU 1719 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.257 UTC [common.configtx] addToMap -> DEBU 171a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:54.260 UTC [common.configtx] addToMap -> DEBU 171b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.260 UTC [common.configtx] addToMap -> DEBU 171c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:54.261 UTC [common.configtx] addToMap -> DEBU 171d Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.261 UTC [common.configtx] addToMap -> DEBU 171e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-11-19 05:22:54.262 UTC [common.configtx] addToMap -> DEBU 171f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-11-19 05:22:54.262 UTC [common.configtx] addToMap -> DEBU 1720 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-11-19 05:22:54.263 UTC [common.configtx] addToMap -> DEBU 1721 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-11-19 05:22:54.263 UTC [common.configtx] addToMap -> DEBU 1722 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-11-19 05:22:54.264 UTC [common.configtx] addToMap -> DEBU 1723 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-11-19 05:22:54.264 UTC [common.configtx] addToMap -> DEBU 1724 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.265 UTC [common.configtx] addToMap -> DEBU 1725 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-11-19 05:22:54.265 UTC [common.configtx] addToMap -> DEBU 1726 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-11-19 05:22:54.266 UTC [common.configtx] addToMap -> DEBU 1727 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-11-19 05:22:54.266 UTC [common.configtx] addToMap -> DEBU 1728 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-11-19 05:22:54.268 UTC [common.configtx] addToMap -> DEBU 1729 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-11-19 05:22:54.268 UTC [common.configtx] addToMap -> DEBU 172a Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-11-19 05:22:54.268 UTC [common.configtx] addToMap -> DEBU 172b Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-11-19 05:22:54.268 UTC [common.configtx] addToMap -> DEBU 172c Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-11-19 05:22:54.269 UTC [common.configtx] addToMap -> DEBU 172d Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-11-19 05:22:54.269 UTC [common.configtx] addToMap -> DEBU 172e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-11-19 05:22:54.269 UTC [common.configtx] addToMap -> DEBU 172f Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-11-19 05:22:54.272 UTC [common.configtx] addToMap -> DEBU 1730 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-11-19 05:22:54.272 UTC [common.configtx] addToMap -> DEBU 1731 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-11-19 05:22:54.272 UTC [common.channelconfig] LogSanityChecks -> DEBU 1732 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1733 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1734 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1735 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1736 Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1737 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1738 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1739 Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 173a Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 173b As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 173c As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 173d As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 173e Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 173f Manager Channel has managers Orderer" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1740 Manager Channel has managers Application" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1741 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1742 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1743 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1744 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1745 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1746 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.capabilities] Supported -> DEBU 1747 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [common.capabilities] Supported -> DEBU 1748 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [orderer.common.server] func1 -> DEBU 1749 Executing callback to update root CAs" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174a updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174b adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174c adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174d adding app root CAs for MSP [Org3MSP]" +orderer0.example.com | "2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174e adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-11-19 05:22:54.275 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 174f [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +orderer0.example.com | "2019-11-19 05:22:54.295 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1750 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +orderer0.example.com | "2019-11-19 05:22:54.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 1751 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:54.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 1752 Obtaining default signing identity" +orderer0.example.com | "2019-11-19 05:22:54.298 UTC [msp.identity] Sign -> DEBU 1753 Sign: plaintext: 0A020806120B0A090A03010203100418...CBE7A2AB994C49C654FF8FB03F07758D " +orderer0.example.com | "2019-11-19 05:22:54.299 UTC [msp.identity] Sign -> DEBU 1754 Sign: digest: 4F3110DCF596C6E56C2F89A0887F4185C4451BE9F10E18A11D6CF0A45FB44591 " +orderer0.example.com | "2019-11-19 05:22:54.303 UTC [fsblkstorage] indexBlock -> DEBU 1755 Indexing block [blockNum=6, blockHash=[]byte{0xa2, 0x69, 0x20, 0xe7, 0x6, 0xba, 0xc2, 0x3, 0x29, 0x26, 0xfe, 0xbd, 0x9b, 0x32, 0xd3, 0x6e, 0x64, 0xfd, 0x5e, 0xe2, 0x9c, 0x95, 0x4, 0xb3, 0xa2, 0x44, 0xc8, 0xfa, 0x28, 0x5a, 0x80, 0x58} txOffsets= +orderer0.example.com | txId=546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf locPointer=offset=71, bytesLength=37478 +orderer0.example.com | ]" +orderer0.example.com | "2019-11-19 05:22:54.305 UTC [fsblkstorage] updateCheckpoint -> DEBU 1756 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127745], isChainEmpty=[false], lastBlockNumber=[6]" +orderer0.example.com | "2019-11-19 05:22:54.306 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1757 [channel: businesschannel] Wrote block [6]" +orderer0.example.com | "2019-11-19 05:22:54.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1758 Sending msg of 28 bytes to 2 on channel businesschannel took 81µs" +orderer0.example.com | "2019-11-19 05:22:54.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1759 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-11-19 05:22:54.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 175a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.9µs " +orderer0.example.com | "2019-11-19 05:22:54.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 175b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 325.9µs " +orderer0.example.com | "2019-11-19 05:22:54.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 175f Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2019-11-19 05:22:54.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1760 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.8µs " +orderer0.example.com | "2019-11-19 05:22:54.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1761 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +orderer0.example.com | "2019-11-19 05:22:54.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1762 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +orderer0.example.com | "2019-11-19 05:22:54.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1763 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.5µs " +orderer0.example.com | "2019-11-19 05:22:54.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1764 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1382ms " +orderer0.example.com | "2019-11-19 05:22:54.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1765 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1766 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1767 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:54.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1768 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-11-19 05:22:54.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1769 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 649.4µs " +orderer0.example.com | "2019-11-19 05:22:55.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 176a Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2019-11-19 05:22:55.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 176b Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2019-11-19 05:22:55.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 176c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.9µs " +orderer0.example.com | "2019-11-19 05:22:55.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 176d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.4µs " +orderer0.example.com | "2019-11-19 05:22:55.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 176e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:55.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 176f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:55.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1770 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:55.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1771 Sending msg of 28 bytes to 3 on channel testchainid took 69.8µs" +orderer0.example.com | "2019-11-19 05:22:55.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1772 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +orderer0.example.com | "2019-11-19 05:22:55.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1773 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +orderer0.example.com | "2019-11-19 05:22:55.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1774 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-11-19 05:22:55.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1775 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.6µs " +orderer0.example.com | "2019-11-19 05:22:55.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1776 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 263.1µs " +orderer0.example.com | "2019-11-19 05:22:55.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1777 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:55.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1778 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:55.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1779 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:55.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 177a Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2019-11-19 05:22:55.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 177b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.2µs " +orderer0.example.com | "2019-11-19 05:22:56.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 177c Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-11-19 05:22:56.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 177d Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +orderer0.example.com | "2019-11-19 05:22:56.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 177e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.6µs " +orderer0.example.com | "2019-11-19 05:22:56.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 177f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 898µs " +orderer0.example.com | "2019-11-19 05:22:56.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1780 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:56.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1781 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:56.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1782 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-11-19 05:22:56.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1783 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +orderer0.example.com | "2019-11-19 05:22:56.495 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1784 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.4µs " +orderer0.example.com | "2019-11-19 05:22:56.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1785 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120.2µs " +orderer0.example.com | "2019-11-19 05:22:56.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1786 Sending msg of 28 bytes to 2 on channel businesschannel took 176.7µs" +orderer0.example.com | "2019-11-19 05:22:56.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1787 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.1µs " +peer0.org1.example.com | [1470 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1471 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1472 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1473 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1474 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1475 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1476 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1477 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1478 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1479 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 gate 1574140927456824200 evaluation starts +peer0.org1.example.com | [147a 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [147b 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [147c 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 principal matched by identity 0 +peer0.org1.example.com | [147d 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +peer0.org1.example.com | 00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +peer0.org1.example.com | [147e 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +peer0.org1.example.com | 00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +peer0.org1.example.com | 00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +peer0.org1.example.com | 00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +peer0.org1.example.com | 00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +peer0.org1.example.com | [147f 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1480 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 gate 1574140927456824200 evaluation succeeds +peer0.org1.example.com | [1481 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1482 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1483 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1484 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1485 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1486 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1487 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1488 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1489 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [131e 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [131f 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1329 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [132a 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efb90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [132b 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efb90 gate 1574140931665267100 evaluation succeeds +peer1.org1.example.com | [132c 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [132d 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [132e 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [132f 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1330 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1331 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1332 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1333 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1334 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1335 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1336 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1337 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1338 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018ec70 gate 1574140931668902200 evaluation starts +peer1.org1.example.com | [1339 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018ec70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [133a 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018ec70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [133b 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018ec70 principal matched by identity 0 +peer1.org1.example.com | [133c 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [133d 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [133e 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018ec70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [133f 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018ec70 gate 1574140931668902200 evaluation succeeds +peer1.org1.example.com | [1340 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1341 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1342 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1343 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1344 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1345 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [14cd 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [14ce 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14cf 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14d0 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [14d1 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [14d2 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [14d3 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19b80 gate 1574140928030764500 evaluation starts +peer0.org2.example.com | [14d4 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19b80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14d5 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19b80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [14d6 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [14d7 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19b80 principal evaluation fails +peer0.org2.example.com | [14d8 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19b80 gate 1574140928030764500 evaluation fails +peer0.org2.example.com | [14d9 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [14da 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [14db 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [14dc 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d320f0 gate 1574140928031705600 evaluation starts +peer0.org2.example.com | [14dd 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d320f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14de 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d320f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [14df 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d320f0 principal matched by identity 0 +peer0.org2.example.com | [14e0 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [14e1 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [14e2 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d320f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [14e3 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d320f0 gate 1574140928031705600 evaluation succeeds +peer0.org2.example.com | [14e4 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14e5 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14e6 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [14e7 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [14e8 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14e9 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14ea 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14eb 11-19 05:22:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14ec 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14ed 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ee 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ef 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14f0 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f1 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f2 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [14f3 11-19 05:22:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14f4 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [14f5 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14f6 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [14f7 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [14f8 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [180a 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [180b 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3220 gate 1574140936227054900 evaluation starts +peer1.org2.example.com | [180c 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [180d 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3220 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [180e 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3220 principal matched by identity 0 +peer1.org2.example.com | [180f 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1810 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1811 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3220 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1812 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3220 gate 1574140936227054900 evaluation succeeds +peer1.org2.example.com | [1813 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1814 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1815 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1816 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1817 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1818 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1819 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [181a 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [181b 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [181c 11-19 05:22:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [181d 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [181e 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [181f 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1820 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1821 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1822 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1823 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1824 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1825 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1346 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1347 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1348 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1349 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [134a 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [134b 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [134c 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [134d 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [134e 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [134f 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1350 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1351 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d74e0 gate 1574140931676011100 evaluation starts +peer1.org1.example.com | [1352 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d74e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1353 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d74e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1354 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d74e0 principal matched by identity 0 +peer1.org1.example.com | [1355 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [1356 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1357 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d74e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1358 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d74e0 gate 1574140931676011100 evaluation succeeds +peer1.org1.example.com | [1359 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [135a 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [135b 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [135c 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [135d 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [135e 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [135f 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1360 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [148a 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148b 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148c 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148d 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [148e 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [148f 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1490 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1491 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1492 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1493 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1494 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1495 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1496 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1497 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1498 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1499 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [149a 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [149b 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [149c 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [149d 11-19 05:22:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [149e 11-19 05:22:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [149f 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a0 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a1 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a2 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [14a3 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14a4 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a5 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a6 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a7 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14a8 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14a9 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14aa 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ab 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ac 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ad 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [1826 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3300 gate 1574140936231720300 evaluation starts +peer1.org2.example.com | [1827 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1828 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3300 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1829 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [182a 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3300 principal evaluation fails +peer1.org2.example.com | [182b 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3300 gate 1574140936231720300 evaluation fails +peer1.org2.example.com | [182c 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [182d 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [182e 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [182f 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3870 gate 1574140936232874600 evaluation starts +peer1.org2.example.com | [1830 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1831 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3870 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1832 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3870 principal matched by identity 0 +peer1.org2.example.com | [1833 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1834 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1835 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3870 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1836 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3870 gate 1574140936232874600 evaluation succeeds +peer1.org2.example.com | [1837 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1838 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1839 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [183a 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [183b 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [183c 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [183d 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [183e 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [183f 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1840 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1841 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1842 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1843 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1361 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1362 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1363 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1364 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1365 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1366 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1367 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000239230 gate 1574140931679569000 evaluation starts +peer1.org1.example.com | [1368 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000239230 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1369 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000239230 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [136a 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000239230 principal matched by identity 0 +peer1.org1.example.com | [136b 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [136c 11-19 05:22:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [136d 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000239230 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [136e 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000239230 gate 1574140931679569000 evaluation succeeds +peer1.org1.example.com | [136f 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1370 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1371 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1372 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1373 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1374 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1375 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1376 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1377 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1378 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1379 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [137a 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [137b 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [137c 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [137d 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [137e 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [137f 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1380 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a77d0 gate 1574140931686284500 evaluation starts +peer1.org1.example.com | [1381 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a77d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1382 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a77d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1383 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a77d0 principal matched by identity 0 +peer1.org1.example.com | [1384 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1385 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1386 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a77d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1387 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a77d0 gate 1574140931686284500 evaluation succeeds +peer1.org1.example.com | [1388 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1389 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [138a 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [138b 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [138c 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [138d 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [138e 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [138f 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1390 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1391 11-19 05:22:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1392 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1393 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1394 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1395 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1396 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1397 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1398 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282d740 gate 1574140931690883500 evaluation starts +peer1.org1.example.com | [1399 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282d740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [139a 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282d740 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [139b 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282d740 principal matched by identity 0 +peer1.org1.example.com | [139c 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [139d 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [139e 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282d740 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [139f 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282d740 gate 1574140931690883500 evaluation succeeds +peer1.org1.example.com | [13a0 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13a1 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13a2 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [13a3 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13a4 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13a5 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13a6 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13a7 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [13a8 11-19 05:22:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13a9 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13aa 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13ab 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ac 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13ad 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ae 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13af 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13b0 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [13b1 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13b2 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [13b3 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13b4 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [13b7 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13b8 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [13b9 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13b5 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ba 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13b6 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [13bb 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13bc 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [13bd 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [13be 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [13bf 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13c0 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c1 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c2 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c3 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13c4 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c5 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c6 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13c7 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c8 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c9 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ca 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13cb 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ae 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14f9 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:56.868 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1788 Sending msg of 28 bytes to 3 on channel businesschannel took 1.6688ms" +peer1.org2.example.com | [1844 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [13cc 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14af 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [14fa 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:56.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1789 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1845 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [13cd 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14b0 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [14fb 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:56.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 178a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1846 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [13ce 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14b1 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [14fc 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:56.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 178b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1847 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb700 gate 1574140936237657800 evaluation starts +peer1.org1.example.com | [13cf 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14b2 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [14fd 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:56.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 178c Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +peer1.org2.example.com | [1848 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb700 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [13d0 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [14b3 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14fe 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:56.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 178d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.2µs " +peer1.org2.example.com | [1849 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb700 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [13d1 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14b4 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [14ff 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33770 gate 1574140929779915000 evaluation starts +orderer0.example.com | "2019-11-19 05:22:57.157 UTC [orderer.common.server] Deliver -> DEBU 178e Starting new Deliver handler" +peer1.org2.example.com | [184a 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [13d2 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [14b5 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1500 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33770 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:57.157 UTC [common.deliver] Handle -> DEBU 178f Starting new deliver loop for 172.18.0.5:51662" +peer1.org2.example.com | [184b 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb700 principal evaluation fails +peer1.org1.example.com | [13d3 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [14b6 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1501 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33770 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:57.157 UTC [common.deliver] Handle -> DEBU 1790 Attempting to read seek info message from 172.18.0.5:51662" +peer1.org2.example.com | [184c 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb700 gate 1574140936237657800 evaluation fails +peer1.org1.example.com | [13d5 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [14b7 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1502 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:57.158 UTC [policies] Evaluate -> DEBU 1791 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [184d 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13d6 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [14b8 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1503 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33770 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:57.158 UTC [policies] Evaluate -> DEBU 1792 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [184e 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14b9 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [13d7 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1504 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33770 gate 1574140929779915000 evaluation fails +orderer0.example.com | "2019-11-19 05:22:57.159 UTC [policies] Evaluate -> DEBU 1793 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | [184f 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [14ba 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 gate 1574140927864389900 evaluation starts +peer1.org1.example.com | [13d8 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1505 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.159 UTC [policies] Evaluate -> DEBU 1794 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1850 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cebc70 gate 1574140936238910200 evaluation starts +peer0.org1.example.com | [14bb 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [13d9 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1506 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.159 UTC [policies] Evaluate -> DEBU 1795 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | [1851 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cebc70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [14bc 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [13da 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1507 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:57.160 UTC [msp] DeserializeIdentity -> DEBU 1796 Obtaining identity" +peer1.org2.example.com | [1852 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cebc70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [14bd 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 principal matched by identity 0 +peer1.org1.example.com | [13db 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1508 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33ce0 gate 1574140929782241500 evaluation starts +orderer0.example.com | "2019-11-19 05:22:57.160 UTC [msp.identity] newIdentity -> DEBU 1797 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [1853 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cebc70 principal matched by identity 0 +peer0.org1.example.com | [14be 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 6a 7d 56 6d 5f fc 25 72 1b 99 d9 a8 44 d4 44 |tj}Vm_.%r....D.D| +peer1.org1.example.com | [13dc 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1509 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33ce0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [1854 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000010 5d c4 92 fb 3a b5 13 80 a3 d2 61 9b 4f 79 aa 45 |]...:.....a.Oy.E| +peer1.org1.example.com | [13dd 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [150a 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33ce0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [14bf 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 85 39 6f b5 de 76 75 fc 97 99 |0E.!...9o..vu...| +peer1.org1.example.com | [13de 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ba7e0 gate 1574140931865705000 evaluation starts +peer0.org2.example.com | [150b 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33ce0 principal matched by identity 0 +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [1855 11-19 05:22:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000010 15 7b e0 90 65 38 a5 e4 60 ac db 2a 07 c6 19 25 |.{..e8..`..*...%| +peer1.org1.example.com | [13df 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ba7e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [150c 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 72 da 73 f9 eb a4 ae df de c2 56 08 db 91 4b | DEBU 0xc0029ba7e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 56 67 3c e2 a5 8b 0a 4b 40 e9 17 fd a2 cc 6f f2 |Vg<....K@.....o.| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000030 b0 91 2d 11 d0 13 bb b5 5e 0c 94 5b 87 b2 bb cd |..-.....^..[....| +peer1.org1.example.com | [13e1 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ba7e0 principal matched by identity 0 +peer0.org2.example.com | [150d 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 63 bf 52 f7 e4 99 d5 a6 3c e9 5f |0D. .c.R.....<._| +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000040 f4 59 5a 82 0b 92 e8 |.YZ....| +peer1.org1.example.com | [13e2 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer0.org2.example.com | 00000010 c9 a9 d1 dd 70 bb 2d 03 ce 2e 15 74 8e 90 ec d5 |....p.-....t....| +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [14c0 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer0.org2.example.com | 00000020 ce 08 7d 80 02 20 7d 0d cf 18 f9 15 59 88 d4 55 |..}.. }.....Y..U| +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | [1856 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cebc70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [14c1 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 gate 1574140927864389900 evaluation succeeds +peer1.org1.example.com | [13e3 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer0.org2.example.com | 00000030 0f e8 2c f9 b1 d1 89 44 0d d3 a1 fa c5 6e 61 cf |..,....D.....na.| +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org2.example.com | [1857 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cebc70 gate 1574140936238910200 evaluation succeeds +peer0.org1.example.com | [14c2 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer0.org2.example.com | 00000040 6a e0 c1 e1 2b 69 |j...+i| +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org2.example.com | [1858 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [14c3 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer0.org2.example.com | [150e 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33ce0 principal evaluation succeeds for identity 0 +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org2.example.com | [1859 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [14c4 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer0.org2.example.com | [150f 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33ce0 gate 1574140929782241500 evaluation succeeds +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [185a 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [14c5 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer0.org2.example.com | [1510 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.160 UTC [cauthdsl] func1 -> DEBU 1798 0xc0003266c0 gate 1574140977160877300 evaluation starts" +peer1.org2.example.com | [185b 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13e4 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ba7e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [14c6 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1511 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.161 UTC [cauthdsl] func2 -> DEBU 1799 0xc0003266c0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [185c 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13e5 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ba7e0 gate 1574140931865705000 evaluation succeeds +peer0.org1.example.com | [14c7 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1512 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:57.161 UTC [cauthdsl] func2 -> DEBU 179a 0xc0003266c0 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [185d 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13e6 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14c8 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1513 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:57.161 UTC [cauthdsl] func2 -> DEBU 179b 0xc0003266c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org2.example.com | [185e 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13e7 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14c9 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1514 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.161 UTC [cauthdsl] func2 -> DEBU 179c 0xc0003266c0 principal evaluation fails" +peer1.org2.example.com | [185f 11-19 05:22:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13e8 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [14ca 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1515 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.162 UTC [cauthdsl] func1 -> DEBU 179d 0xc0003266c0 gate 1574140977160877300 evaluation fails" +peer1.org2.example.com | [1860 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [13e9 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [14cb 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1516 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2019-11-19 05:22:57.162 UTC [policies] Evaluate -> DEBU 179e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [1861 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ea 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14cc 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1517 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.162 UTC [policies] Evaluate -> DEBU 179f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [1862 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13eb 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [14cd 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1518 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.162 UTC [policies] Evaluate -> DEBU 17a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org2.example.com | [1863 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13ec 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [14ce 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | [1519 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:57.162 UTC [cauthdsl] func1 -> DEBU 17a1 0xc000327a40 gate 1574140977162977300 evaluation starts" +peer1.org2.example.com | [1864 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13ed 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [14cf 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [151a 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.163 UTC [cauthdsl] func2 -> DEBU 17a2 0xc000327a40 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1865 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13ee 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [14d0 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [151b 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.163 UTC [cauthdsl] func2 -> DEBU 17a3 0xc000327a40 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1866 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13ef 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14d1 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [151c 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.163 UTC [cauthdsl] func2 -> DEBU 17a4 0xc000327a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | [1867 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13f0 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14d2 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [151e 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.163 UTC [cauthdsl] func2 -> DEBU 17a5 0xc000327a40 principal evaluation fails" +peer1.org2.example.com | [1868 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [13f1 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14d3 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [151d 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.163 UTC [cauthdsl] func1 -> DEBU 17a6 0xc000327a40 gate 1574140977162977300 evaluation fails" +peer1.org2.example.com | [1869 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f2 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [14d4 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [151f 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.164 UTC [policies] Evaluate -> DEBU 17a7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [186a 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f3 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14d5 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1520 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.165 UTC [policies] Evaluate -> DEBU 17a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [186b 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f4 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14d6 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1521 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.165 UTC [policies] Evaluate -> DEBU 17a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | [186c 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f5 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14d7 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1522 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.165 UTC [cauthdsl] func1 -> DEBU 17aa 0xc00024c000 gate 1574140977165676700 evaluation starts" +peer1.org2.example.com | [186d 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [14d8 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f6 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1523 11-19 05:22:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.166 UTC [cauthdsl] func2 -> DEBU 17ab 0xc00024c000 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [186e 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14d9 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f7 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > alive: alive: alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > +peer0.org2.example.com | [1524 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.166 UTC [cauthdsl] func2 -> DEBU 17ac 0xc00024c000 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [186f 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [14da 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f8 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1525 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.166 UTC [cauthdsl] func2 -> DEBU 17ad 0xc00024c000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [1870 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [14db 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [13f9 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1526 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.166 UTC [cauthdsl] func2 -> DEBU 17ae 0xc00024c000 principal evaluation fails" +peer1.org2.example.com | [1871 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [14dc 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 94 a5 97 d0 fd 59 99 e5 57 ca 0c 06 a2 c6 a7 |S.....Y..W......| +peer1.org1.example.com | [13d4 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1527 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.167 UTC [cauthdsl] func1 -> DEBU 17af 0xc00024c000 gate 1574140977165676700 evaluation fails" +peer1.org2.example.com | [1872 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 f9 2c 3a 87 c5 72 d1 50 d9 51 96 15 35 6f 9b c3 |.,:..r.P.Q..5o..| +peer1.org1.example.com | [13fa 11-19 05:22:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1528 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.167 UTC [policies] Evaluate -> DEBU 17b0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1873 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [13fb 11-19 05:22:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15101E +peer0.org1.example.com | [14dd 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc ad 80 5b 80 12 1b 17 4e f6 85 |0E.!....[....N..| +peer0.org2.example.com | [1529 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.167 UTC [policies] Evaluate -> DEBU 17b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1874 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [13fc 11-19 05:22:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D79F0050963B6DB9544DB9E31E23CBB71F8640CFD5B87DD8D2DF168936E6337A +peer0.org1.example.com | 00000010 1e 06 1f f1 67 f9 54 1f ab 07 6b 18 0e 65 4a e5 |....g.T...k..eJ.| +peer0.org2.example.com | [152a 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.167 UTC [policies] func1 -> DEBU 17b2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer1.org2.example.com | [1875 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67510 gate 1574140938827956100 evaluation starts +peer1.org1.example.com | [13fd 11-19 05:22:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000020 0f 78 5e 27 70 02 20 4d 5d e7 56 e4 16 10 a8 96 |.x^'p. M].V.....| +peer0.org2.example.com | [152b 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b3 Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org2.example.com | [1876 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [13fe 11-19 05:22:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000030 29 ec b5 f7 29 87 31 5b d9 65 b2 0a 77 54 1a fb |)...).1[.e..wT..| +peer0.org2.example.com | [152c 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org2.example.com | [1877 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67510 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [13ff 11-19 05:22:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000040 40 58 2d fc 41 d7 2d |@X-.A.-| +peer0.org2.example.com | [152d 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1878 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1400 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14de 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [152e 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1879 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67510 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1401 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [152f 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [187a 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67510 gate 1574140938827956100 evaluation fails +orderer0.example.com | "2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [1402 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [14df 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a8 4d ab eb f4 91 c0 72 e3 63 |0E.!...M.....r.c| +peer0.org2.example.com | [1530 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [187b 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.169 UTC [cauthdsl] func1 -> DEBU 17b8 0xc00024ce90 gate 1574140977169238900 evaluation starts" +peer1.org1.example.com | [1403 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 11 34 55 69 36 55 09 06 32 16 29 44 c0 bc 3d 0e |.4Ui6U..2.)D..=.| +peer0.org2.example.com | [1531 11-19 05:22:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [187c 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.169 UTC [cauthdsl] func2 -> DEBU 17b9 0xc00024ce90 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1404 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000020 2e e0 0b 9f 1b 02 20 3a 4c 39 dc d6 45 ad 51 92 |...... :L9..E.Q.| +peer0.org2.example.com | [1532 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer1.org2.example.com | [187d 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:57.169 UTC [cauthdsl] func2 -> DEBU 17ba 0xc00024ce90 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | [1405 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 6f 42 d4 6a f0 5c c0 ee 07 f6 6c c6 ef 64 41 72 |oB.j.\....l..dAr| +peer0.org2.example.com | [1533 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer1.org2.example.com | [187e 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67a80 gate 1574140938830459700 evaluation starts +orderer0.example.com | "2019-11-19 05:22:57.169 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17bb Checking if identity satisfies MEMBER role for OrdererMSP" +peer1.org1.example.com | [1406 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 c0 27 6f ca a7 13 db |.'o....| +peer0.org2.example.com | [1534 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [187f 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67a80 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:57.170 UTC [msp] Validate -> DEBU 17bc MSP OrdererMSP validating identity" +peer1.org1.example.com | [1407 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [14e0 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1535 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510061801 +peer1.org2.example.com | [1880 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67a80 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:57.170 UTC [cauthdsl] func2 -> DEBU 17bd 0xc00024ce90 principal matched by identity 0" +peer1.org1.example.com | [1408 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e1 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1536 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A4BB905EA8B309CF8E114E15042A3A83ED82B935E0F436B1EA4E48767376811A +peer1.org2.example.com | [1881 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67a80 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:57.170 UTC [msp.identity] Verify -> DEBU 17be Verify: digest = 00000000 24 76 5c e9 59 95 9d dc d5 13 44 9a f3 00 ac 7f |$v\.Y.....D.....| +peer1.org1.example.com | [1409 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [14e2 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1537 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer1.org2.example.com | [1882 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +orderer0.example.com | 00000010 e7 88 eb 71 4a e5 78 db bd 70 f6 2d 02 29 d0 dc |...qJ.x..p.-.)..|" +peer1.org1.example.com | [140a 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e3 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1538 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +orderer0.example.com | "2019-11-19 05:22:57.170 UTC [msp.identity] Verify -> DEBU 17bf Verify: sig = 00000000 30 45 02 21 00 85 70 dd 5a 70 b2 ea 42 b7 9c 62 |0E.!..p.Zp..B..b| +peer0.org1.example.com | [14e4 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [140b 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1539 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1883 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +orderer0.example.com | 00000010 83 53 aa 49 be 10 c4 01 f4 56 e8 15 57 58 01 6f |.S.I.....V..WX.o| +peer0.org1.example.com | [14e5 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [140c 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [153a 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +orderer0.example.com | 00000020 61 55 94 1e cd 02 20 23 c2 03 c7 79 9b 3e 47 ae |aU.... #...y.>G.| +peer0.org1.example.com | [14e6 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [140d 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [153b 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +orderer0.example.com | 00000030 66 30 e2 ac 1f d2 a6 3e 1f 19 de e6 43 5f fd 45 |f0.....>....C_.E| +peer0.org1.example.com | [14e7 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [140e 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [153c 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +orderer0.example.com | 00000040 bf da ba a6 a1 92 ee |.......|" +peer0.org1.example.com | [14e8 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [140f 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [153d 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 cf c7 3e 31 88 70 |..>1.p| +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [cauthdsl] func2 -> DEBU 17c0 0xc00024ce90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [14e9 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1410 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [153e 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [1884 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67a80 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [cauthdsl] func1 -> DEBU 17c1 0xc00024ce90 gate 1574140977169238900 evaluation succeeds" +peer0.org1.example.com | [14ea 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1411 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [153f 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1885 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67a80 gate 1574140938830459700 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [14eb 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1412 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1540 11-19 05:22:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1886 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [14ec 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [1413 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1541 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1887 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c4 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | [14ed 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1414 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1542 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1888 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | [14ee 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1415 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1889 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1543 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c6 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [14ef 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1416 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [188a 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1544 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | [14f0 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1417 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e75e0 gate 1574140931940557800 evaluation starts +peer1.org2.example.com | [188b 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1545 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 c9 8e 0f 98 f6 14 a2 16 ae c0 98 fe 60 51 18 |.............`Q.| +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [common.deliver] deliverBlocks -> DEBU 17c8 [channel: businesschannel] Received seekInfo (0xc000089e40) start: > stop: > from 172.18.0.5:51662" +peer0.org1.example.com | [14f1 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1418 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e75e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [188c 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 49 cc 88 bc d0 d0 03 7d 39 45 b2 3a 34 7b 77 a5 |I......}9E.:4{w.| +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [fsblkstorage] Next -> DEBU 17c9 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org1.example.com | [14f2 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1419 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e75e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [188d 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1546 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 0a ce 03 9b 30 45 f1 9f 40 76 2c |0D. }....0E..@v,| +orderer0.example.com | "2019-11-19 05:22:57.171 UTC [fsblkstorage] newBlockfileStream -> DEBU 17ca newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +peer0.org1.example.com | [14f3 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [141a 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e75e0 principal matched by identity 0 +peer0.org2.example.com | 00000010 b2 bd 9d 0b a6 9a 58 d8 b3 a5 aa 28 2c cb 48 d3 |......X....(,.H.| +peer1.org2.example.com | [188e 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:57.172 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17cb Remaining bytes=[38486], Going to peek [8] bytes" +peer0.org1.example.com | [14f4 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [141b 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer0.org2.example.com | 00000020 03 d9 90 f3 02 20 03 7b c4 65 83 9c c1 b6 20 e8 |..... .{.e.... .| +peer1.org2.example.com | [188f 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.172 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17cc Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +peer0.org1.example.com | [14f5 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer0.org2.example.com | 00000030 64 6a e3 3e 33 db 5b 6f b8 66 b9 4c 81 35 b0 1c |dj.>3.[o.f.L.5..| +peer1.org2.example.com | [1890 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.172 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17cd blockbytes [38483] read from file [0]" +peer0.org1.example.com | [14f6 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [141c 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer0.org2.example.com | 00000040 23 d0 22 c9 d1 d2 |#."...| +peer1.org2.example.com | [1891 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.172 UTC [common.deliver] deliverBlocks -> DEBU 17ce [channel: businesschannel] Delivering block for (0xc000089e40) for 172.18.0.5:51662" +peer0.org1.example.com | [14f7 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer0.org2.example.com | [1547 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1892 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +orderer0.example.com | "2019-11-19 05:22:57.172 UTC [common.deliver] deliverBlocks -> DEBU 17cf [channel: businesschannel] Done delivering to 172.18.0.5:51662 for (0xc000089e40)" +peer0.org1.example.com | [14f8 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer0.org2.example.com | [1548 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1893 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.173 UTC [common.deliver] Handle -> DEBU 17d0 Waiting for new SeekInfo from 172.18.0.5:51662" +peer0.org1.example.com | [14f9 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer0.org2.example.com | [1549 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1894 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.174 UTC [common.deliver] Handle -> DEBU 17d1 Attempting to read seek info message from 172.18.0.5:51662" +peer0.org1.example.com | [14fa 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer0.org2.example.com | [154a 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1895 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.178 UTC [common.deliver] Handle -> WARN 17d3 Error reading from 172.18.0.5:51662: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [14fb 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer1.org1.example.com | [141d 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e75e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [154b 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1896 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.178 UTC [orderer.common.server] func1 -> DEBU 17d4 Closing Deliver stream" +peer0.org1.example.com | [14fc 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer1.org1.example.com | [141e 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e75e0 gate 1574140931940557800 evaluation succeeds +peer0.org2.example.com | [154c 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1897 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.178 UTC [comm.grpc.server] 1 -> INFO 17d5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51662 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.9798ms +peer0.org1.example.com | [14fd 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [141f 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [154d 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1898 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.177 UTC [grpc] infof -> DEBU 17d2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [14fe 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510061801 +peer1.org1.example.com | [1420 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [154e 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1899 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:1\210p" > alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > alive: alive: +orderer0.example.com | "2019-11-19 05:22:57.310 UTC [orderer.common.server] Deliver -> DEBU 17d6 Starting new Deliver handler" +peer1.org1.example.com | [1421 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [14ff 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B5861AC8D4993A4B4C5BBCBFFEFDCEEF36E2256692FDF5E7DDAB37E73E3F224C +peer0.org2.example.com | [154f 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [189a 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.310 UTC [common.deliver] Handle -> DEBU 17d7 Starting new deliver loop for 172.18.0.5:51664" +peer1.org1.example.com | [1422 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1500 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org2.example.com | [1550 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [189b 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.310 UTC [common.deliver] Handle -> DEBU 17d8 Attempting to read seek info message from 172.18.0.5:51664" +peer1.org1.example.com | [1423 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1501 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1551 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [189c 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.311 UTC [policies] Evaluate -> DEBU 17d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [1424 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1502 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1552 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [189d 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.311 UTC [policies] Evaluate -> DEBU 17da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1425 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1503 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1553 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [189e 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org1.example.com | [1426 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer0.org1.example.com | [1504 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1554 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [189f 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer0.org1.example.com | [1505 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1555 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a0 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org1.example.com | [1427 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer0.org1.example.com | [1506 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1556 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [18a1 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func1 -> DEBU 17de 0xc00043d940 gate 1574140977312225800 evaluation starts" +peer1.org1.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer0.org1.example.com | [1507 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [1557 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [18a2 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17df 0xc00043d940 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer0.org1.example.com | [1508 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1558 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a3 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e0 0xc00043d940 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer0.org1.example.com | [1509 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1559 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [18a4 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e1 0xc00043d940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer0.org1.example.com | [150a 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [155a 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a5 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e2 0xc00043d940 principal evaluation fails" +peer0.org1.example.com | [150b 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151018 +peer1.org1.example.com | [1428 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [155b 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [18a6 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func1 -> DEBU 17e3 0xc00043d940 gate 1574140977312225800 evaluation fails" +peer0.org1.example.com | [150c 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C72DA73F9EBA4AEDFDEC25608DB914B56673CE2A58B0A4B40E917FDA2CC6FF2 +peer1.org1.example.com | [1429 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [155c 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a7 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [150d 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [142a 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [155d 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [18a8 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [150e 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [142b 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [155e 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a9 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | [150f 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [142c 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer0.org2.example.com | [155f 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [18aa 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func1 -> DEBU 17e7 0xc0001f6450 gate 1574140977312798100 evaluation starts" +peer0.org1.example.com | [1510 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer0.org2.example.com | [1560 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18ab 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e8 0xc0001f6450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [1511 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [142d 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer0.org2.example.com | [1561 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [18ac 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e9 0xc0001f6450 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [1512 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer0.org2.example.com | [1562 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [18ad 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17ea 0xc0001f6450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org1.example.com | [1513 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer0.org2.example.com | [1563 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18ae 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17eb 0xc0001f6450 principal evaluation fails" +peer0.org1.example.com | [1514 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer0.org2.example.com | [1564 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [cauthdsl] func1 -> DEBU 17ec 0xc0001f6450 gate 1574140977312798100 evaluation fails" +peer0.org1.example.com | [1515 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer0.org2.example.com | [1565 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18af 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [policies] Evaluate -> DEBU 17ed Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [1516 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [142e 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1566 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b0 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [policies] Evaluate -> DEBU 17ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [1517 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [142f 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1567 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b1 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [policies] Evaluate -> DEBU 17ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | [1518 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1430 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1568 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b2 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [cauthdsl] func1 -> DEBU 17f0 0xc0001f6ce0 gate 1574140977313393900 evaluation starts" +peer0.org1.example.com | [1519 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1431 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1569 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [18b3 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17f1 0xc0001f6ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [151a 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1432 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [156a 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18b4 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17f2 0xc0001f6ce0 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | [1433 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [156b 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [18b5 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17f3 0xc0001f6ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org1.example.com | [151b 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1434 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [156c 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18b6 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151020 +orderer0.example.com | "2019-11-19 05:22:57.314 UTC [cauthdsl] func2 -> DEBU 17f4 0xc0001f6ce0 principal evaluation fails" +peer0.org1.example.com | [151c 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1435 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [18b7 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F9D3029E3D13EC1A63E6EC06E3C3109A6C569B55D23946E4FE1F890DAFC781A8 +orderer0.example.com | "2019-11-19 05:22:57.314 UTC [cauthdsl] func1 -> DEBU 17f5 0xc0001f6ce0 gate 1574140977313393900 evaluation fails" +peer0.org1.example.com | [151d 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1436 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [156d 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [18b8 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:22:57.315 UTC [policies] Evaluate -> DEBU 17f6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [151e 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1437 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [156e 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [18b9 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2019-11-19 05:22:57.315 UTC [policies] Evaluate -> DEBU 17f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [151f 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1438 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [156f 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18ba 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer0.example.com | "2019-11-19 05:22:57.315 UTC [policies] func1 -> DEBU 17f8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org1.example.com | [1520 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1439 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1570 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [18bb 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.315 UTC [policies] Evaluate -> DEBU 17f9 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [1521 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [143a 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1571 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18bc 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [policies] Evaluate -> DEBU 17fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [1522 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [143b 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1572 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18bd 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [policies] Evaluate -> DEBU 17fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [1523 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [143c 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1573 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [18be 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [policies] Evaluate -> DEBU 17fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [143d 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f3e70 gate 1574140931947851600 evaluation starts +peer0.org1.example.com | [1524 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1574 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [18bf 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [policies] Evaluate -> DEBU 17fd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [143e 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f3e70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1525 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1575 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [18c1 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [cauthdsl] func1 -> DEBU 17fe 0xc0001f79d0 gate 1574140977316554400 evaluation starts" +peer1.org1.example.com | [143f 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f3e70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1526 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1576 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daeb30 gate 1574140930810194700 evaluation starts +peer1.org2.example.com | [18c2 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [cauthdsl] func2 -> DEBU 17ff 0xc0001f79d0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1440 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f3e70 principal matched by identity 0 +peer0.org1.example.com | [1527 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1577 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daeb30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [18c0 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [cauthdsl] func2 -> DEBU 1800 0xc0001f79d0 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | [1441 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer0.org1.example.com | [1528 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1578 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daeb30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [18c3 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [cauthdsl] func2 -> DEBU 1801 0xc0001f79d0 principal matched by identity 0" +peer1.org1.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer0.org1.example.com | [1529 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1579 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daeb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [msp.identity] Verify -> DEBU 1802 Verify: digest = 00000000 df 1b 6e a3 53 96 5a 4a 1e 41 b9 30 ac af 62 35 |..n.S.ZJ.A.0..b5| +peer1.org2.example.com | [18c4 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1442 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer0.org1.example.com | [152a 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 gate 1574140930411891900 evaluation starts +peer0.org2.example.com | [157a 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daeb30 principal evaluation fails +orderer0.example.com | 00000010 90 cd 63 95 f5 29 e6 46 e0 c9 80 f4 dc 2f 08 c3 |..c..).F...../..|" +peer1.org2.example.com | [18c5 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer0.org1.example.com | [152b 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [157b 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daeb30 gate 1574140930810194700 evaluation fails +orderer0.example.com | "2019-11-19 05:22:57.316 UTC [msp.identity] Verify -> DEBU 1803 Verify: sig = 00000000 30 44 02 20 46 6e 18 72 6e c6 18 b2 4f fc 47 0c |0D. Fn.rn...O.G.| +peer1.org2.example.com | [18c6 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer0.org1.example.com | [152c 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [157c 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000010 c5 03 4c b1 9e 58 9c 90 9f 19 6b a3 a3 d5 07 28 |..L..X....k....(| +peer1.org2.example.com | [18c7 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer0.org1.example.com | [152d 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 principal matched by identity 0 +peer0.org2.example.com | [157d 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000020 d2 96 a0 87 02 20 4e 87 3a 15 68 8a c4 0a d4 80 |..... N.:.h.....| +peer1.org2.example.com | [18c8 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer0.org1.example.com | [152e 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 c9 8e 0f 98 f6 14 a2 16 ae c0 98 fe 60 51 18 |.............`Q.| +peer0.org2.example.com | [157e 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | 00000030 b4 73 9c 6d 5f 1d b0 11 5d 88 db 20 dd f9 bc 53 |.s.m_...].. ...S| +peer1.org2.example.com | [18c9 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1443 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f3e70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 49 cc 88 bc d0 d0 03 7d 39 45 b2 3a 34 7b 77 a5 |I......}9E.:4{w.| +peer0.org2.example.com | [157f 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf0a0 gate 1574140930811355900 evaluation starts +orderer0.example.com | 00000040 74 b1 ae 26 cd ad |t..&..|" +peer1.org2.example.com | [18ca 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [1444 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f3e70 gate 1574140931947851600 evaluation succeeds +peer0.org1.example.com | [152f 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 0a ce 03 9b 30 45 f1 9f 40 76 2c |0D. }....0E..@v,| +peer0.org2.example.com | [1580 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf0a0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [cauthdsl] func2 -> DEBU 1804 0xc0001f79d0 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [18cb 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer1.org1.example.com | [1445 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 b2 bd 9d 0b a6 9a 58 d8 b3 a5 aa 28 2c cb 48 d3 |......X....(,.H.| +peer0.org2.example.com | [1581 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf0a0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [cauthdsl] func1 -> DEBU 1805 0xc0001f79d0 gate 1574140977316554400 evaluation succeeds" +peer1.org2.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer1.org1.example.com | [1446 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 03 d9 90 f3 02 20 03 7b c4 65 83 9c c1 b6 20 e8 |..... .{.e.... .| +peer0.org2.example.com | [1582 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf0a0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 1806 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [18cc 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer1.org1.example.com | [1447 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 64 6a e3 3e 33 db 5b 6f b8 66 b9 4c 81 35 b0 1c |dj.>3.[o.f.L.5..| +peer0.org2.example.com | [1583 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 6b 81 25 70 d6 89 94 08 a1 b7 66 df 9e e2 ee |.k.%p......f....| +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 1807 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer1.org1.example.com | [1448 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 23 d0 22 c9 d1 d2 |#."...| +peer0.org2.example.com | 00000010 06 17 e5 c1 b2 2c 2f 01 b1 e7 57 c7 40 22 c4 46 |.....,/...W.@".F| +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 1808 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer1.org1.example.com | [1449 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1530 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1584 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a ce 86 02 c4 ab 30 56 82 a4 50 a4 |0D. :.....0V..P.| +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 1809 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer1.org1.example.com | [144a 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1531 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 gate 1574140930411891900 evaluation succeeds +peer0.org2.example.com | 00000010 65 13 c1 61 99 46 e1 61 ca c2 99 47 6b 9f a3 3e |e..a.F.a...Gk..>| +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer1.org1.example.com | [144b 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1532 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 180b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | 00000020 34 12 af 0d 02 20 59 be fd 77 59 28 0c f2 31 3c |4.... Y..wY(..1<| +peer1.org2.example.com | [18cd 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [144c 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1533 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [common.deliver] deliverBlocks -> DEBU 180c [channel: businesschannel] Received seekInfo (0xc000c6a9c0) start: > stop: > from 172.18.0.5:51664" +peer0.org2.example.com | 00000030 12 7f e7 ad a3 e5 87 b4 73 e1 52 10 f5 98 68 4a |........s.R...hJ| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [144d 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer0.org1.example.com | [1534 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [fsblkstorage] Next -> DEBU 180d Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | 00000040 54 d0 ad 6e 5c 61 |T..n\a| +peer1.org2.example.com | [18ce 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 96 5c c2 28 60 2a 61 fe 8b c0 |0E.!...\.(`*a...| +peer1.org1.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer0.org1.example.com | [1535 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [fsblkstorage] newBlockfileStream -> DEBU 180e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +peer0.org2.example.com | [1585 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf0a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 f4 71 dc 9e e9 7c c1 cc b8 7c 72 d7 37 4e 24 1f |.q...|...|r.7N$.| +peer1.org1.example.com | [144e 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer0.org1.example.com | [1536 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 180f Remaining bytes=[38486], Going to peek [8] bytes" +peer0.org2.example.com | [1586 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf0a0 gate 1574140930811355900 evaluation succeeds +peer1.org2.example.com | 00000020 9c 7e cf 5d 26 02 20 05 1b 2e f9 a4 3c d8 53 f6 |.~.]&. .....<.S.| +peer1.org1.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer0.org1.example.com | [1537 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1810 Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +peer0.org2.example.com | [1587 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000030 1c e2 6a 61 ad d9 95 01 f2 f0 6b 19 d3 b5 35 c7 |..ja......k...5.| +peer1.org1.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer0.org1.example.com | [1538 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.317 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1811 blockbytes [38483] read from file [0]" +peer0.org2.example.com | [1588 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 3b 9a 07 97 62 f3 e3 |;...b..| +peer1.org1.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer0.org1.example.com | [1539 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2019-11-19 05:22:57.318 UTC [common.deliver] deliverBlocks -> DEBU 1812 [channel: businesschannel] Delivering block for (0xc000c6a9c0) for 172.18.0.5:51664" +peer0.org2.example.com | [1589 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [18cf 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer0.org1.example.com | [153a 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.318 UTC [common.deliver] deliverBlocks -> DEBU 1813 [channel: businesschannel] Done delivering to 172.18.0.5:51664 for (0xc000c6a9c0)" +peer0.org2.example.com | [158a 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [18d0 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [144f 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [153b 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.319 UTC [common.deliver] Handle -> DEBU 1814 Waiting for new SeekInfo from 172.18.0.5:51664" +peer0.org2.example.com | [158b 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [18d1 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [153c 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:57.319 UTC [common.deliver] Handle -> DEBU 1815 Attempting to read seek info message from 172.18.0.5:51664" +peer0.org2.example.com | [158c 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [18d2 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1450 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [153d 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [158d 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.321 UTC [grpc] infof -> DEBU 1816 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [18d3 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1451 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [153e 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [158e 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.321 UTC [common.deliver] Handle -> WARN 1817 Error reading from 172.18.0.5:51664: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [18d4 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1452 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [153f 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [158f 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:57.322 UTC [orderer.common.server] func1 -> DEBU 1818 Closing Deliver stream" +peer1.org2.example.com | [18d5 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1453 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer0.org1.example.com | [1540 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1590 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.322 UTC [comm.grpc.server] 1 -> INFO 1819 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51664 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.0602ms +peer1.org2.example.com | [18d6 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer0.org2.example.com | [1591 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1541 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 181a Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +peer1.org2.example.com | [18d7 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer1.org1.example.com | [1454 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer0.org2.example.com | [1592 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1542 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 181b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.3µs " +peer1.org2.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer1.org1.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer0.org2.example.com | [1593 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1543 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 181c Sending msg of 28 bytes to 3 on channel businesschannel took 46.2µs" +peer1.org2.example.com | [18d8 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer1.org1.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer0.org2.example.com | [1594 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1544 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 181d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +peer1.org2.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer1.org1.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer0.org2.example.com | [1595 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1545 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 181e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer1.org1.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer0.org2.example.com | [1596 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1546 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 181f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer1.org1.example.com | [1455 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1597 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1547 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1820 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer1.org1.example.com | [1456 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1598 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1548 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1821 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +peer1.org2.example.com | [18d9 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1457 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1599 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1549 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1822 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +peer1.org2.example.com | [18da 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1458 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [159a 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [154a 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.808 UTC [orderer.common.server] Deliver -> DEBU 1823 Starting new Deliver handler" +peer1.org2.example.com | [18db 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1459 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [159b 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [154b 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.809 UTC [common.deliver] Handle -> DEBU 1824 Starting new deliver loop for 172.18.0.5:51666" +peer1.org2.example.com | [18dc 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [145a 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [159c 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [154d 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.809 UTC [common.deliver] Handle -> DEBU 1825 Attempting to read seek info message from 172.18.0.5:51666" +peer1.org2.example.com | [18dd 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer1.org1.example.com | [145b 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer0.org2.example.com | [159d 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [154e 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 1826 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer1.org1.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer0.org2.example.com | [159e 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [154c 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 1827 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [18de 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer1.org1.example.com | [145c 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer0.org2.example.com | [159f 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [154f 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 1828 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer1.org1.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer0.org2.example.com | [15a0 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1550 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 1829 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer1.org1.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer0.org2.example.com | [15a1 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1551 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 182a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer1.org1.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer0.org2.example.com | [15a2 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1552 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.811 UTC [cauthdsl] func1 -> DEBU 182b 0xc00097e610 gate 1574140977811015900 evaluation starts" +peer1.org1.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer1.org2.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer0.org2.example.com | [15a3 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1553 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.811 UTC [cauthdsl] func2 -> DEBU 182c 0xc00097e610 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [145d 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [18df 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [15a4 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1554 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.811 UTC [cauthdsl] func2 -> DEBU 182d 0xc00097e610 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [18e0 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15a5 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1555 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.811 UTC [cauthdsl] func2 -> DEBU 182e 0xc00097e610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | [145e 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c bf d0 52 58 e0 49 f9 0d 24 de 11 |0D. ...RX.I..$..| +peer1.org2.example.com | [18e1 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [15a6 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15101A +peer0.org1.example.com | [1556 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2019-11-19 05:22:57.811 UTC [cauthdsl] func2 -> DEBU 182f 0xc00097e610 principal evaluation fails" +peer1.org1.example.com | 00000010 61 a6 2a db d9 10 5a 8e 41 6c ac d5 1b 5a 06 db |a.*...Z.Al...Z..| +peer1.org2.example.com | [18e2 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15a7 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5C6F8D4A9649D10603A4DED5ECAF660F6FFF5CDC9B2D5A10F4144F9B44DDB277 +peer0.org1.example.com | [1557 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.811 UTC [cauthdsl] func1 -> DEBU 1830 0xc00097e610 gate 1574140977811015900 evaluation fails" +peer1.org1.example.com | 00000020 d0 bc f0 7f 02 20 19 3a 61 90 b8 36 16 08 07 a8 |..... .:a..6....| +peer1.org2.example.com | [18e3 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [15a8 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1558 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2019-11-19 05:22:57.812 UTC [policies] Evaluate -> DEBU 1831 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | 00000030 95 00 b0 88 56 d1 31 df d1 45 71 7b 50 1b c2 b0 |....V.1..Eq{P...| +peer1.org2.example.com | [18e4 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15a9 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1559 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.812 UTC [policies] Evaluate -> DEBU 1832 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | 00000040 82 5e 5c bb 02 ab |.^\...| +peer1.org2.example.com | [18e5 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15aa 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [155a 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2019-11-19 05:22:57.813 UTC [policies] Evaluate -> DEBU 1833 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | [145f 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [18e6 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ab 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [155b 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.813 UTC [cauthdsl] func1 -> DEBU 1834 0xc00097ee60 gate 1574140977813440000 evaluation starts" +peer1.org1.example.com | [1460 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [18e7 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [15ac 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [155c 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.813 UTC [cauthdsl] func2 -> DEBU 1835 0xc00097ee60 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1461 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18e8 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [15ad 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [155e 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.813 UTC [cauthdsl] func2 -> DEBU 1836 0xc00097ee60 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [18e9 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1462 11-19 05:22:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [155d 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ae 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.814 UTC [cauthdsl] func2 -> DEBU 1837 0xc00097ee60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | [18ea 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5bf60 gate 1574140939453768100 evaluation starts +peer1.org1.example.com | [1463 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [155f 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [15af 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.814 UTC [cauthdsl] func2 -> DEBU 1838 0xc00097ee60 principal evaluation fails" +peer1.org2.example.com | [18eb 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5bf60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1464 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1560 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15b1 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.814 UTC [cauthdsl] func1 -> DEBU 1839 0xc00097ee60 gate 1574140977813440000 evaluation fails" +peer1.org2.example.com | [18ec 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5bf60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1465 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1561 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15b2 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.815 UTC [policies] Evaluate -> DEBU 183a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [18ed 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5bf60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1466 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1562 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [15b4 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.815 UTC [policies] Evaluate -> DEBU 183b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [18ee 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5bf60 principal evaluation fails +peer1.org1.example.com | [1467 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1563 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [15b5 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:57.815 UTC [policies] Evaluate -> DEBU 183c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | [18ef 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5bf60 gate 1574140939453768100 evaluation fails +peer1.org1.example.com | [1468 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15b0 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1565 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.815 UTC [cauthdsl] func1 -> DEBU 183d 0xc00097f790 gate 1574140977815722100 evaluation starts" +peer1.org2.example.com | [18f0 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1469 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [15b3 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1566 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.816 UTC [cauthdsl] func2 -> DEBU 183e 0xc00097f790 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [18f1 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [146a 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [15b6 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1567 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.816 UTC [cauthdsl] func2 -> DEBU 183f 0xc00097f790 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [18f2 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [146b 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15b7 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1564 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.816 UTC [cauthdsl] func2 -> DEBU 1840 0xc00097f790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [18f3 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da24d0 gate 1574140939456674000 evaluation starts +peer1.org1.example.com | [146c 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15b8 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1568 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.816 UTC [cauthdsl] func2 -> DEBU 1841 0xc00097f790 principal evaluation fails" +peer1.org2.example.com | [18f4 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da24d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [146d 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15b9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1569 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.817 UTC [cauthdsl] func1 -> DEBU 1842 0xc00097f790 gate 1574140977815722100 evaluation fails" +peer1.org2.example.com | [18f5 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da24d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [146e 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15ba 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [156a 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.817 UTC [policies] Evaluate -> DEBU 1843 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [18f6 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da24d0 principal matched by identity 0 +peer1.org1.example.com | [146f 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [15bb 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [156b 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.817 UTC [policies] Evaluate -> DEBU 1844 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [18f7 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +peer1.org1.example.com | [1470 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d b0 c6 97 85 d7 c3 d8 69 8f 4a 23 78 5a c0 d7 |........i.J#xZ..| +peer0.org2.example.com | [15bc 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [156c 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.817 UTC [policies] func1 -> DEBU 1845 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer1.org2.example.com | 00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +peer1.org1.example.com | 00000010 7f 98 db dd 29 8f 09 5e 6a 6a 6e dc 7d 3f 56 e0 |....)..^jjn.}?V.| +peer0.org2.example.com | [15bd 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [156d 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.818 UTC [policies] Evaluate -> DEBU 1846 Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org2.example.com | [18f8 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +peer1.org1.example.com | [1471 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 49 28 05 09 cd a9 8e 6f f2 de 8b |0D. .I(.....o...| +peer0.org2.example.com | [15be 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [156e 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:57.818 UTC [policies] Evaluate -> DEBU 1847 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org2.example.com | 00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +peer1.org1.example.com | 00000010 b9 c7 5b dd 67 f8 69 e6 86 cf 04 60 48 65 1e d1 |..[.g.i....`He..| +peer0.org2.example.com | [15bf 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [156f 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +orderer0.example.com | "2019-11-19 05:22:57.818 UTC [policies] Evaluate -> DEBU 1848 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | 00000020 60 68 ad 7b 02 20 17 d8 2d ad c0 a2 11 e2 15 28 |`h.{. ..-......(| +peer0.org2.example.com | [15c0 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1570 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +orderer0.example.com | "2019-11-19 05:22:57.819 UTC [policies] Evaluate -> DEBU 1849 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | 00000030 b7 28 de c1 a3 e9 a9 d6 57 d4 ac d4 c0 2a 46 3f |.(......W....*F?| +peer0.org2.example.com | [15c1 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1571 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | 00000040 cf c7 3e 31 88 70 |..>1.p| +orderer0.example.com | "2019-11-19 05:22:57.819 UTC [policies] Evaluate -> DEBU 184a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | 00000040 f8 47 f8 d8 32 c7 |.G..2.| +peer0.org2.example.com | [15c2 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1572 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 6b 81 25 70 d6 89 94 08 a1 b7 66 df 9e e2 ee |.k.%p......f....| +peer1.org2.example.com | [18f9 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da24d0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:57.820 UTC [cauthdsl] func1 -> DEBU 184b 0xc000bce490 gate 1574140977820032300 evaluation starts" +peer1.org1.example.com | [1472 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15c3 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 06 17 e5 c1 b2 2c 2f 01 b1 e7 57 c7 40 22 c4 46 |.....,/...W.@".F| +peer1.org2.example.com | [18fa 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da24d0 gate 1574140939456674000 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:57.820 UTC [cauthdsl] func2 -> DEBU 184c 0xc000bce490 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1473 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer0.org2.example.com | [15c4 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1573 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a ce 86 02 c4 ab 30 56 82 a4 50 a4 |0D. :.....0V..P.| +peer1.org2.example.com | [18fb 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.820 UTC [cauthdsl] func2 -> DEBU 184d 0xc000bce490 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | [1474 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15c5 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 65 13 c1 61 99 46 e1 61 ca c2 99 47 6b 9f a3 3e |e..a.F.a...Gk..>| +peer1.org2.example.com | [18fc 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.821 UTC [cauthdsl] func2 -> DEBU 184e 0xc000bce490 principal matched by identity 0" +peer1.org1.example.com | [1475 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15c6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 34 12 af 0d 02 20 59 be fd 77 59 28 0c f2 31 3c |4.... Y..wY(..1<| +peer1.org2.example.com | [18fd 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:57.821 UTC [msp.identity] Verify -> DEBU 184f Verify: digest = 00000000 13 1c 79 6b 3b ac b8 e8 e3 fa fb 07 c8 4c b9 3c |..yk;........L.<| +peer1.org1.example.com | [1476 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15c7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000030 12 7f e7 ad a3 e5 87 b4 73 e1 52 10 f5 98 68 4a |........s.R...hJ| +peer1.org2.example.com | [18fe 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | 00000010 bd e9 a5 59 d2 a7 70 c4 e0 25 f4 f5 79 2a 84 63 |...Y..p..%..y*.c|" +peer1.org1.example.com | [1477 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [15c8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83930 gate 1574140930858459000 evaluation starts +peer0.org1.example.com | 00000040 54 d0 ad 6e 5c 61 |T..n\a| +orderer0.example.com | "2019-11-19 05:22:57.821 UTC [msp.identity] Verify -> DEBU 1850 Verify: sig = 00000000 30 45 02 21 00 a3 c9 0b 69 58 c5 ea 5e 4e 63 af |0E.!....iX..^Nc.| +peer1.org2.example.com | [18ff 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1478 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 b5 bd 86 fb ee c1 43 cf 99 73 ed fa 58 1f 27 |.......C..s..X.'| +peer0.org2.example.com | [15c9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1574 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000010 ee 8f 29 8c ca d2 8f c8 57 62 1b 2b b2 0d 58 c2 |..).....Wb.+..X.| +peer1.org2.example.com | [1900 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 4a da cd 1a 1d 02 b5 f6 04 f7 22 e2 50 ce 7a 76 |J.........".P.zv| +peer0.org2.example.com | [15ca 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83930 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1575 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | 00000020 b7 e9 e6 5f a3 02 20 2d 1a 27 89 5f ff 23 97 64 |..._.. -.'._.#.d| +peer1.org2.example.com | [1901 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1479 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 9e 0a eb b1 dc be ba 54 86 5b |0E.!.........T.[| +peer0.org2.example.com | [15cb 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1576 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | 00000030 36 ff 36 ab 22 89 93 ff 14 24 66 06 e8 53 76 a0 |6.6."....$f..Sv.| +peer1.org2.example.com | [1902 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 dc db 11 72 c0 2b 49 10 36 36 3f 4c 3b 27 f4 13 |...r.+I.66?L;'..| +peer0.org2.example.com | [15cc 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83930 principal evaluation fails +peer0.org1.example.com | [1577 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | 00000040 14 8f c8 91 5e b1 eb |....^..|" +peer1.org2.example.com | [1903 11-19 05:22:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 21 3b ad 13 c5 02 20 2e 79 c0 9f bf ef ae d0 bc |!;.... .y.......| +peer0.org2.example.com | [15cd 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83930 gate 1574140930858459000 evaluation fails +orderer0.example.com | "2019-11-19 05:22:57.821 UTC [cauthdsl] func2 -> DEBU 1851 0xc000bce490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [1578 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1904 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | 00000030 5c 4f c8 5e c6 09 9a 75 d1 38 51 ed 4c 4b 78 a2 |\O.^...u.8Q.LKx.| +peer0.org2.example.com | [15ce 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.822 UTC [cauthdsl] func1 -> DEBU 1852 0xc000bce490 gate 1574140977820032300 evaluation succeeds" +peer0.org1.example.com | [1579 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1905 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 a6 5b 11 fb 0b f7 4e |.[....N| +peer0.org2.example.com | [15cf 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.822 UTC [policies] Evaluate -> DEBU 1853 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [157a 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1906 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [147a 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15d0 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:57.822 UTC [policies] Evaluate -> DEBU 1854 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [157b 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1907 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [147b 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [15d1 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83ea0 gate 1574140930858759700 evaluation starts +peer0.org2.example.com | [15d2 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83ea0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:57.823 UTC [policies] Evaluate -> DEBU 1855 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1908 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [147c 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [15d3 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83ea0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:57.823 UTC [policies] Evaluate -> DEBU 1856 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | [157c 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1909 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [147d 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.823 UTC [policies] Evaluate -> DEBU 1857 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [157d 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [190a 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [147e 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [15d4 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83ea0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:57.823 UTC [policies] Evaluate -> DEBU 1858 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | [157e 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [190b 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [147f 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d5 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +orderer0.example.com | "2019-11-19 05:22:57.823 UTC [common.deliver] deliverBlocks -> DEBU 1859 [channel: businesschannel] Received seekInfo (0xc000c6b340) start: > stop: > from 172.18.0.5:51666" +peer0.org1.example.com | [157f 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [190c 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3920 gate 1574140939461346300 evaluation starts +peer1.org1.example.com | [1480 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +orderer0.example.com | "2019-11-19 05:22:57.824 UTC [fsblkstorage] Next -> DEBU 185a Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org1.example.com | [1580 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [190d 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3920 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1481 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [15d6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +orderer0.example.com | "2019-11-19 05:22:57.824 UTC [fsblkstorage] newBlockfileStream -> DEBU 185b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +peer0.org1.example.com | [1581 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [190e 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3920 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1483 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +orderer0.example.com | "2019-11-19 05:22:57.824 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 185c Remaining bytes=[38486], Going to peek [8] bytes" +peer0.org1.example.com | [1582 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [190f 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1484 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +orderer0.example.com | "2019-11-19 05:22:57.825 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 185d Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +peer0.org1.example.com | [1583 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1910 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3920 principal evaluation fails +peer1.org1.example.com | [1482 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +orderer0.example.com | "2019-11-19 05:22:57.825 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 185e blockbytes [38483] read from file [0]" +peer0.org1.example.com | [1584 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1911 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3920 gate 1574140939461346300 evaluation fails +peer1.org1.example.com | [1485 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +orderer0.example.com | "2019-11-19 05:22:57.825 UTC [common.deliver] deliverBlocks -> DEBU 185f [channel: businesschannel] Delivering block for (0xc000c6b340) for 172.18.0.5:51666" +peer0.org1.example.com | [1585 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1912 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1486 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83ea0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:57.826 UTC [common.deliver] deliverBlocks -> DEBU 1860 [channel: businesschannel] Done delivering to 172.18.0.5:51666 for (0xc000c6b340)" +peer0.org1.example.com | [1586 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1913 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1487 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15d8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d83ea0 gate 1574140930858759700 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:57.827 UTC [common.deliver] Handle -> DEBU 1861 Waiting for new SeekInfo from 172.18.0.5:51666" +peer0.org1.example.com | [1587 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1914 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1488 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.827 UTC [common.deliver] Handle -> DEBU 1862 Attempting to read seek info message from 172.18.0.5:51666" +peer0.org1.example.com | [1588 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1915 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3e90 gate 1574140939462731000 evaluation starts +peer1.org1.example.com | [1489 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15da 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:57.830 UTC [grpc] infof -> DEBU 1863 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [1589 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1916 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3e90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [148a 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15db 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:57.830 UTC [common.deliver] Handle -> WARN 1864 Error reading from 172.18.0.5:51666: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [158a 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1917 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3e90 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [148b 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [148c 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:57.830 UTC [orderer.common.server] func1 -> DEBU 1865 Closing Deliver stream" +peer0.org1.example.com | [158b 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1918 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3e90 principal matched by identity 0 +peer1.org1.example.com | [148d 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.831 UTC [comm.grpc.server] 1 -> INFO 1866 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51666 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.9555ms +orderer0.example.com | "2019-11-19 05:22:57.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1867 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +peer0.org2.example.com | [15dc 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [158c 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1919 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +peer1.org1.example.com | [148e 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [148f 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15dd 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [158d 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer1.org1.example.com | [1490 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15de 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2019-11-19 05:22:57.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1868 Sending msg of 28 bytes to 3 on channel businesschannel took 92.2µs" +peer0.org1.example.com | [158e 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [191a 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer1.org1.example.com | [1491 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15df 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1869 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.3µs " +orderer0.example.com | "2019-11-19 05:22:57.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 186a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.4µs " +peer1.org2.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer1.org1.example.com | [1492 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15e0 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +peer0.org1.example.com | [158f 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1493 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [15e1 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:57.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer0.org1.example.com | [1590 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1494 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15e2 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.988 UTC [orderer.common.server] Deliver -> DEBU 186d Starting new Deliver handler" +peer1.org2.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer0.org1.example.com | [1591 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1495 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [15e3 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.988 UTC [common.deliver] Handle -> DEBU 186e Starting new deliver loop for 172.18.0.5:51668" +peer1.org2.example.com | [191b 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3e90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1496 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1592 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [15e4 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.988 UTC [common.deliver] Handle -> DEBU 186f Attempting to read seek info message from 172.18.0.5:51668" +peer1.org2.example.com | [191c 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3e90 gate 1574140939462731000 evaluation succeeds +peer1.org1.example.com | [1497 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1593 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15e5 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +orderer0.example.com | "2019-11-19 05:22:57.991 UTC [policies] Evaluate -> DEBU 1870 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [191d 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1498 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1594 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15e6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.991 UTC [policies] Evaluate -> DEBU 1871 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [191e 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1499 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1595 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [15e7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.992 UTC [policies] Evaluate -> DEBU 1872 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | [191f 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [149a 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1596 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [15e8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.992 UTC [policies] Evaluate -> DEBU 1873 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [149b 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1920 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1597 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [15e9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.992 UTC [policies] Evaluate -> DEBU 1874 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org1.example.com | [149c 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1921 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1598 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 gate 1574140930838002500 evaluation starts +peer0.org2.example.com | [15ea 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:3\333[o\270f\271L\2015\260\034#\320\"\311\321\322" > alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > alive: alive: +orderer0.example.com | "2019-11-19 05:22:57.993 UTC [cauthdsl] func1 -> DEBU 1875 0xc000c42b60 gate 1574140977993027900 evaluation starts" +peer1.org1.example.com | [149d 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1922 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1599 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [15eb 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [149e 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +orderer0.example.com | "2019-11-19 05:22:57.993 UTC [cauthdsl] func2 -> DEBU 1876 0xc000c42b60 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1923 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [159a 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [15ec 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +orderer0.example.com | "2019-11-19 05:22:57.994 UTC [cauthdsl] func2 -> DEBU 1877 0xc000c42b60 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1924 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer0.org1.example.com | [159b 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 principal matched by identity 0 +peer0.org2.example.com | [15ed 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [149f 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +orderer0.example.com | "2019-11-19 05:22:57.994 UTC [cauthdsl] func2 -> DEBU 1878 0xc000c42b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org2.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer0.org1.example.com | [159c 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 6f 8d 4a 96 49 d1 06 03 a4 de d5 ec af 66 0f |\o.J.I........f.| +peer0.org2.example.com | [15ee 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +orderer0.example.com | "2019-11-19 05:22:57.994 UTC [cauthdsl] func2 -> DEBU 1879 0xc000c42b60 principal evaluation fails" +peer1.org2.example.com | [1925 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer0.org1.example.com | 00000010 6f ff 5c dc 9b 2d 5a 10 f4 14 4f 9b 44 dd b2 77 |o.\..-Z...O.D..w| +peer0.org2.example.com | [15ef 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +orderer0.example.com | "2019-11-19 05:22:57.994 UTC [cauthdsl] func1 -> DEBU 187a 0xc000c42b60 gate 1574140977993027900 evaluation fails" +peer1.org2.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer0.org1.example.com | [159d 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 0c f8 10 43 b3 a9 50 81 42 21 |0E.!.....C..P.B!| +peer0.org2.example.com | [15f0 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU 187b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer0.org1.example.com | 00000010 30 0b 1a 69 52 7e e0 0d ea 10 73 82 25 5f 42 2b |0..iR~....s.%_B+| +peer0.org2.example.com | [15f1 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 6b 34 eb 1f d5 31 |k4...1| +orderer0.example.com | "2019-11-19 05:22:57.994 UTC [policies] Evaluate -> DEBU 187c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer0.org1.example.com | 00000020 1f 81 89 1d 1e 02 20 0d 07 4b c6 b4 5c 2f 65 17 |...... ..K..\/e.| +peer0.org2.example.com | [15f2 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [14a0 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +orderer0.example.com | "2019-11-19 05:22:57.995 UTC [policies] Evaluate -> DEBU 187d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org2.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer0.org1.example.com | 00000030 5c 61 0a ac d4 3f e3 fa 63 e2 40 58 af 81 97 db |\a...?..c.@X....| +peer0.org2.example.com | [15f3 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +orderer0.example.com | "2019-11-19 05:22:57.995 UTC [cauthdsl] func1 -> DEBU 187e 0xc000c433a0 gate 1574140977995405700 evaluation starts" +peer1.org2.example.com | [1926 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 84 c0 4f ad f4 f0 ab |..O....| +peer0.org2.example.com | [15f4 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [14a1 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 46 f3 09 00 b8 17 14 8f 71 ea |0E.!..F.......q.| +orderer0.example.com | "2019-11-19 05:22:57.995 UTC [cauthdsl] func2 -> DEBU 187f 0xc000c433a0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1927 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [159e 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [15f5 11-19 05:22:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 38 84 8c 81 a8 58 9d d6 7d 24 f0 55 51 c7 4c bf |8....X..}$.UQ.L.| +orderer0.example.com | "2019-11-19 05:22:57.996 UTC [cauthdsl] func2 -> DEBU 1880 0xc000c433a0 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1928 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [15a0 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [15f6 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 7d 3a 2a ba 95 02 20 34 c5 11 6e 57 97 9e 74 3a |}:*... 4..nW..t:| +orderer0.example.com | "2019-11-19 05:22:57.996 UTC [cauthdsl] func2 -> DEBU 1881 0xc000c433a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | [1929 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer0.org1.example.com | [15a1 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 gate 1574140930838002500 evaluation succeeds +peer0.org2.example.com | [15f7 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 74 42 7c 38 12 d0 a6 c9 54 62 0d 77 ba 72 78 3a |tB|8....Tb.w.rx:| +orderer0.example.com | "2019-11-19 05:22:57.996 UTC [cauthdsl] func2 -> DEBU 1882 0xc000c433a0 principal evaluation fails" +peer1.org2.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer0.org1.example.com | [159f 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151019 +peer0.org2.example.com | [15f8 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 52 c4 62 b5 71 25 f2 |R.b.q%.| +orderer0.example.com | "2019-11-19 05:22:57.996 UTC [cauthdsl] func1 -> DEBU 1883 0xc000c433a0 gate 1574140977995405700 evaluation fails" +peer1.org2.example.com | [192a 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer0.org1.example.com | [15a2 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 95ABEEBA30AACE539A01F77BE1E151477D4B18F92E642D724912C9F14C377F2F +peer0.org2.example.com | [15f9 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [14a2 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:57.997 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer0.org1.example.com | [15a3 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [15fa 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer1.org1.example.com | [14a3 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:22:57.997 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer0.org1.example.com | [15a4 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org1.example.com | [14a4 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.997 UTC [policies] Evaluate -> DEBU 1887 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer0.org1.example.com | [15a5 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [15fb 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer1.org1.example.com | [14a5 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:57.997 UTC [cauthdsl] func1 -> DEBU 1888 0xc000c43be0 gate 1574140977997728500 evaluation starts" +peer1.org2.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer0.org1.example.com | [15a6 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer1.org1.example.com | [14a6 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:57.997 UTC [cauthdsl] func2 -> DEBU 1889 0xc000c43be0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [192b 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15a8 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer1.org1.example.com | [14a7 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.997 UTC [cauthdsl] func2 -> DEBU 188a 0xc000c43be0 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [192c 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15a7 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer1.org1.example.com | [14a8 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.997 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1886 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [192d 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15a9 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org1.example.com | [14a9 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.998 UTC [cauthdsl] func2 -> DEBU 188b 0xc000c43be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [192e 11-19 05:22:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ab 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [15fc 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [14aa 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +orderer0.example.com | "2019-11-19 05:22:57.998 UTC [cauthdsl] func2 -> DEBU 188c 0xc000c43be0 principal evaluation fails" +peer1.org2.example.com | [192f 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [15aa 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [14ab 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.998 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188d Sending msg of 28 bytes to 3 on channel testchainid took 171.2µs" +peer1.org2.example.com | [1930 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15ac 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [15fd 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a cc ff 46 15 e2 3f ab 02 46 54 55 |0D. :..F..?..FTU| +peer1.org1.example.com | [14ac 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.998 UTC [cauthdsl] func1 -> DEBU 188e 0xc000c43be0 gate 1574140977997728500 evaluation fails" +peer1.org2.example.com | [1931 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15ad 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000010 72 f5 f0 bc 62 39 72 39 9c 2d f2 fc c5 60 b9 5d |r...b9r9.-...`.]| +peer1.org1.example.com | [14ad 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:57.998 UTC [policies] Evaluate -> DEBU 188f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1932 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15ae 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | 00000020 98 b1 5c 21 02 20 04 f8 7a 7f aa 98 5a 20 88 19 |..\!. ..z...Z ..| +peer1.org1.example.com | [14ae 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1890 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1933 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15af 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 13 ae 6e 36 72 62 f8 52 62 2f dd 7c 9a ef 09 ac |..n6rb.Rb/.|....| +peer1.org1.example.com | [14af 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:57.999 UTC [policies] func1 -> DEBU 1891 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer1.org2.example.com | [1934 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15b0 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 ba 3d 8d 2d 34 13 |.=.-4.| +peer1.org1.example.com | [14b0 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > +orderer0.example.com | "2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1892 Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org2.example.com | [1935 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15b2 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [15fe 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [14b1 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1893 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org2.example.com | [1936 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15b1 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15ff 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [14b2 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [1937 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [15b3 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1600 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [14b3 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1896 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1938 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b4 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1601 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [14b4 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.000 UTC [policies] Evaluate -> DEBU 1897 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [15b5 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1939 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1602 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [14b5 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.000 UTC [cauthdsl] func1 -> DEBU 1898 0xc000d70d50 gate 1574140978000580900 evaluation starts" +peer1.org2.example.com | [193a 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15b6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1603 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14b6 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.000 UTC [cauthdsl] func2 -> DEBU 1899 0xc000d70d50 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [193b 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15b7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14b7 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1604 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.001 UTC [cauthdsl] func2 -> DEBU 189a 0xc000d70d50 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [193c 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [15b8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14b8 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1605 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.001 UTC [cauthdsl] func2 -> DEBU 189b 0xc000d70d50 principal matched by identity 0" +peer1.org2.example.com | [193d 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [15ba 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [14b9 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1606 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +orderer0.example.com | "2019-11-19 05:22:58.001 UTC [msp.identity] Verify -> DEBU 189c Verify: digest = 00000000 63 36 e4 f7 77 93 88 22 a3 7d b7 c4 c7 9d ac 39 |c6..w..".}.....9| +peer1.org2.example.com | [193e 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [15bb 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ba 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1607 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 16 de ac 32 2c ab 11 35 5a 60 0b 7f 65 a4 33 d1 |...2,..5Z`..e.3.|" +peer1.org2.example.com | [193f 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd60a0 gate 1574140939754930000 evaluation starts +peer0.org1.example.com | [15b9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1608 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14bb 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.002 UTC [msp.identity] Verify -> DEBU 189d Verify: sig = 00000000 30 45 02 21 00 8e 96 0a 55 61 1c f2 73 70 da 16 |0E.!....Ua..sp..| +peer1.org2.example.com | [1940 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd60a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [15bc 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1609 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14bc 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 00000010 de e1 b8 87 48 cd 4e ef 51 31 58 1b 6b a5 56 3c |....H.N.Q1X.k.V<| +peer1.org2.example.com | [1941 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd60a0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [15bd 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [160a 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [14bd 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000020 02 6b a9 bb 40 02 20 32 b2 f2 d2 40 e3 b6 ba 66 |.k..@. 2...@...f| +peer1.org2.example.com | [1942 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd60a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [15be 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [160b 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [14be 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000030 91 04 5c ff 1c 14 25 ad 6c 4d d1 26 f4 52 ec 18 |..\...%.lM.&.R..| +peer1.org2.example.com | [1943 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd60a0 principal evaluation fails +peer0.org1.example.com | [15bf 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [160c 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14bf 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | 00000040 20 c7 2c 48 81 41 18 | .,H.A.|" +peer1.org2.example.com | [1944 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd60a0 gate 1574140939754930000 evaluation fails +peer0.org1.example.com | [15c0 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [160d 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [14c0 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.002 UTC [cauthdsl] func2 -> DEBU 189e 0xc000d70d50 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [1945 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15c1 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [160e 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c1 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebdde0 gate 1574140935373699700 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.002 UTC [cauthdsl] func1 -> DEBU 189f 0xc000d70d50 gate 1574140978000580900 evaluation succeeds" +peer1.org2.example.com | [1946 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15c2 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer0.org2.example.com | [160f 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c2 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebdde0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.002 UTC [policies] Evaluate -> DEBU 18a0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1947 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer0.org2.example.com | [1610 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c3 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebdde0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.002 UTC [policies] Evaluate -> DEBU 18a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1948 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6610 gate 1574140939757850400 evaluation starts +peer0.org1.example.com | [15c3 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer0.org2.example.com | [1611 11-19 05:22:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14c4 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebdde0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:58.003 UTC [policies] Evaluate -> DEBU 18a2 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1949 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer0.org2.example.com | [1612 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [14c5 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b f5 f2 30 49 0c f6 fe 80 00 b9 aa 7c 14 f0 a4 |k..0I.......|...| +orderer0.example.com | "2019-11-19 05:22:58.003 UTC [policies] Evaluate -> DEBU 18a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [194a 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6610 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer0.org2.example.com | [1613 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 a5 dd df 75 b5 03 96 21 af 1e c8 44 bd fe 56 df |...u...!...D..V.| +orderer0.example.com | "2019-11-19 05:22:58.003 UTC [policies] Evaluate -> DEBU 18a4 Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [194b 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6610 principal matched by identity 0 +peer0.org1.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer0.org2.example.com | [1614 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c6 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc e4 d5 b9 64 8c 50 80 9a 6b 39 |0E.!.....d.P..k9| +orderer0.example.com | "2019-11-19 05:22:58.003 UTC [policies] Evaluate -> DEBU 18a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [194c 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 16 1c 59 2d 2a c6 fd 60 d7 71 78 2f 73 a7 a0 |B..Y-*..`.qx/s..| +peer0.org1.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer0.org2.example.com | [1615 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 c5 69 4a c7 1c 2f 39 96 5b 01 6e 9f c8 78 49 6e |.iJ../9.[.n..xIn| +orderer0.example.com | "2019-11-19 05:22:58.004 UTC [common.deliver] deliverBlocks -> DEBU 18a6 [channel: businesschannel] Received seekInfo (0xc0000c0500) start: > stop: > from 172.18.0.5:51668" +peer1.org2.example.com | 00000010 1d 72 dd 1b d4 0f 9d 42 0c 8a cc 28 3a 3e e4 90 |.r.....B...(:>..| +peer0.org1.example.com | [15c4 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1616 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 c5 56 0a 1c 8d 02 20 2a 92 06 ea cb 76 39 fc db |.V.... *....v9..| +orderer0.example.com | "2019-11-19 05:22:58.004 UTC [fsblkstorage] Next -> DEBU 18a7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org2.example.com | [194d 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 15 c6 d0 a6 6c 8f 35 87 3d ca |0E.!......l.5.=.| +peer0.org1.example.com | [15c5 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1617 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 66 58 8f b4 0c 80 8c ee 0f a1 4c b9 d0 37 d6 eb |fX........L..7..| +orderer0.example.com | "2019-11-19 05:22:58.004 UTC [fsblkstorage] newBlockfileStream -> DEBU 18a8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +peer1.org2.example.com | 00000010 c8 f2 ec 21 31 ed 69 6d b1 66 0f 52 3c 7e 75 ea |...!1.im.f.R<~u.| +peer0.org1.example.com | [15c7 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1618 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 f8 39 8f 78 81 8e e2 |.9.x...| +peer1.org2.example.com | 00000020 6c 20 07 fa 84 02 20 70 ad d7 87 61 21 2c 47 9a |l .... p...a!,G.| +orderer0.example.com | "2019-11-19 05:22:58.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18a9 Remaining bytes=[38486], Going to peek [8] bytes" +peer0.org1.example.com | [15c9 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1619 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c7 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebdde0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 8a 86 35 77 09 3c 37 8a b0 d9 4c 5b 09 34 42 c9 |..5w.<7...L[.4B.| +orderer0.example.com | "2019-11-19 05:22:58.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18aa Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +peer0.org1.example.com | [15c6 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [161a 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [14c8 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ebdde0 gate 1574140935373699700 evaluation succeeds +peer1.org2.example.com | 00000040 e7 1f 92 2b f2 cc 26 |...+..&| +orderer0.example.com | "2019-11-19 05:22:58.005 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ab blockbytes [38483] read from file [0]" +peer0.org1.example.com | [15c8 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [161b 11-19 05:22:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14c9 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [194e 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6610 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:58.005 UTC [common.deliver] deliverBlocks -> DEBU 18ac [channel: businesschannel] Delivering block for (0xc0000c0500) for 172.18.0.5:51668" +peer0.org1.example.com | [15cb 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [161c 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [14ca 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [194f 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6610 gate 1574140939757850400 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:57.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1895 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 720.5µs " +peer0.org1.example.com | [15cc 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [161d 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14cb 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1950 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.005 UTC [common.deliver] deliverBlocks -> DEBU 18ad [channel: businesschannel] Done delivering to 172.18.0.5:51668 for (0xc0000c0500)" +peer0.org1.example.com | [15ca 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [161e 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [14cc 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1951 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.006 UTC [common.deliver] Handle -> DEBU 18ae Waiting for new SeekInfo from 172.18.0.5:51668" +peer0.org1.example.com | [15cd 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [161f 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [14cd 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1952 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.006 UTC [common.deliver] Handle -> DEBU 18af Attempting to read seek info message from 172.18.0.5:51668" +peer0.org1.example.com | [15cf 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1620 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ce 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1953 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [15d0 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1621 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14cf 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1954 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [15ce 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1622 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [14d0 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1955 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | [15d1 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1623 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14d1 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1956 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [15d2 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1624 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d2 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1957 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | [15d4 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1625 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d3 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1958 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:58.011 UTC [cauthdsl] func1 -> DEBU 18b5 0xc000fe6c80 gate 1574140978011090400 evaluation starts" +peer0.org1.example.com | [15d5 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1626 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d5 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1959 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.011 UTC [cauthdsl] func2 -> DEBU 18b6 0xc000fe6c80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [15d6 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1627 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15d7 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [195a 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.011 UTC [cauthdsl] func2 -> DEBU 18b7 0xc000fe6c80 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [1628 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [15d8 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer1.org1.example.com | [14d6 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [195b 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.011 UTC [cauthdsl] func2 -> DEBU 18b8 0xc000fe6c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer0.org2.example.com | [1629 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d4 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [195c 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.011 UTC [cauthdsl] func2 -> DEBU 18b9 0xc000fe6c80 principal evaluation fails" +peer0.org1.example.com | [15d9 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer0.org2.example.com | [162a 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d7 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [195d 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.011 UTC [cauthdsl] func1 -> DEBU 18ba 0xc000fe6c80 gate 1574140978011090400 evaluation fails" +peer0.org1.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer0.org2.example.com | [162b 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [195e 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14d8 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.012 UTC [policies] Evaluate -> DEBU 18bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer0.org2.example.com | [162c 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [195f 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14da 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.012 UTC [policies] Evaluate -> DEBU 18bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer0.org2.example.com | [162d 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1960 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14d9 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.012 UTC [policies] Evaluate -> DEBU 18bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer0.org2.example.com | [162e 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [14db 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1961 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.012 UTC [cauthdsl] func1 -> DEBU 18be 0xc000fe74c0 gate 1574140978012677300 evaluation starts" +peer0.org1.example.com | [15d3 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [162f 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [14dc 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1962 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.013 UTC [cauthdsl] func2 -> DEBU 18bf 0xc000fe74c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [15da 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1630 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14dd 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1963 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.013 UTC [cauthdsl] func2 -> DEBU 18c0 0xc000fe74c0 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [15de 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1631 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [14de 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1964 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.013 UTC [cauthdsl] func2 -> DEBU 18c1 0xc000fe74c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org1.example.com | [15db 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1632 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15101B +peer1.org1.example.com | [14df 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1965 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.013 UTC [cauthdsl] func2 -> DEBU 18c2 0xc000fe74c0 principal evaluation fails" +peer0.org1.example.com | [15dc 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1633 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BD3672E5D387333A9812CB3C5C8089A85F5B3DBA1BF052E13AA3779230354181 +peer1.org1.example.com | [14e0 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1966 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.013 UTC [cauthdsl] func1 -> DEBU 18c3 0xc000fe74c0 gate 1574140978012677300 evaluation fails" +peer0.org1.example.com | [15dd 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1634 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [14e1 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1967 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.013 UTC [policies] Evaluate -> DEBU 18c4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [15df 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1635 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [14e2 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1968 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.013 UTC [policies] Evaluate -> DEBU 18c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [15e0 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1636 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [14e3 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [1969 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.014 UTC [policies] Evaluate -> DEBU 18c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | [15e1 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1637 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14e4 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [196a 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.014 UTC [cauthdsl] func1 -> DEBU 18c7 0xc000fe7d00 gate 1574140978014325500 evaluation starts" +peer0.org1.example.com | [15e2 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1638 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14e5 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [196b 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:58.014 UTC [cauthdsl] func2 -> DEBU 18c8 0xc000fe7d00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [15e3 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1639 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14e6 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [196c 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.014 UTC [cauthdsl] func2 -> DEBU 18c9 0xc000fe7d00 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [15e4 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [163a 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14e7 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [196d 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.014 UTC [cauthdsl] func2 -> DEBU 18ca 0xc000fe7d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org1.example.com | [15e5 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [163b 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14e8 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [196e 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:58.015 UTC [cauthdsl] func2 -> DEBU 18cb 0xc000fe7d00 principal evaluation fails" +peer0.org1.example.com | [15e6 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [163e 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [14e9 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [196f 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.015 UTC [cauthdsl] func1 -> DEBU 18cc 0xc000fe7d00 gate 1574140978014325500 evaluation fails" +peer0.org1.example.com | [15e7 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [163f 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ea 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1970 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18cd Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [15e8 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [163c 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [14eb 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1971 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [15e9 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1640 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ec 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1972 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.015 UTC [policies] func1 -> DEBU 18cf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org1.example.com | [15ea 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [14ed 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [163d 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1973 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18d0 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [15ec 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [14ee 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1641 11-19 05:22:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1974 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18d1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [15ed 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer1.org1.example.com | [14ef 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1642 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1975 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer1.org1.example.com | [14f0 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1643 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1976 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.016 UTC [policies] Evaluate -> DEBU 18d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [15ee 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer1.org1.example.com | [14f1 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1644 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1977 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.016 UTC [policies] Evaluate -> DEBU 18d4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer1.org1.example.com | [14f3 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1645 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1978 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.016 UTC [cauthdsl] func1 -> DEBU 18d5 0xc0011d09f0 gate 1574140978016610300 evaluation starts" +peer0.org1.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer1.org1.example.com | [14f4 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1646 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer1.org2.example.com | [1979 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.016 UTC [cauthdsl] func2 -> DEBU 18d6 0xc0011d09f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer1.org1.example.com | [14f5 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer1.org2.example.com | [197a 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.016 UTC [cauthdsl] func2 -> DEBU 18d7 0xc0011d09f0 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer1.org1.example.com | [14f2 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1647 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer1.org2.example.com | [197b 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +orderer0.example.com | "2019-11-19 05:22:58.017 UTC [cauthdsl] func2 -> DEBU 18d8 0xc0011d09f0 principal matched by identity 0" +peer0.org1.example.com | [15ef 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14f6 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer1.org2.example.com | [197c 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.017 UTC [msp.identity] Verify -> DEBU 18d9 Verify: digest = 00000000 d4 39 b1 17 22 b4 a1 6c d2 01 a1 d6 03 aa 8e dd |.9.."..l........| +peer0.org1.example.com | [15f0 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | [14f7 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer1.org2.example.com | [197d 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 6b 11 db ce 29 fe fb c4 cf 80 35 23 b6 50 25 37 |k...).....5#.P%7|" +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [14f8 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer1.org2.example.com | [197e 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.017 UTC [msp.identity] Verify -> DEBU 18da Verify: sig = 00000000 30 45 02 21 00 a9 6e 95 69 c1 30 78 d7 f0 4f 28 |0E.!..n.i.0x..O(| +peer0.org1.example.com | [15f2 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 75 14 2d 24 76 92 cd ee 51 0e |0E.!..u.-$v...Q.| +peer1.org1.example.com | [14f9 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer1.org2.example.com | [197f 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 df fe 41 a1 b1 44 ff fc 17 ef 3e 7a 4e b3 98 50 |..A..D....>zN..P| +peer0.org1.example.com | 00000010 1b 83 5b b1 f3 d1 9e 54 89 6f c7 b8 8e fc a7 98 |..[....T.o......| +peer1.org1.example.com | [14fa 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1648 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1980 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +orderer0.example.com | 00000020 e1 2f f3 3e e1 02 20 1e fc c8 ca f7 1d f2 a0 21 |./.>.. ........!| +peer0.org1.example.com | 00000020 64 1d f7 7e 98 02 20 2f 92 8d 59 8e f3 44 4b 9d |d..~.. /..Y..DK.| +peer1.org1.example.com | [14fb 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1649 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1981 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 04 45 2d 70 94 62 35 f5 83 c7 15 20 66 0d f4 81 |.E-p.b5.... f...| +orderer0.example.com | 00000030 b4 3c ed c2 37 2d ae 2c cd bc 36 24 07 61 3e d8 |.<..7-.,..6$.a>.| +peer1.org1.example.com | [14fc 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [164a 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1982 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 0f e5 eb 43 3f e5 01 |...C?..| +orderer0.example.com | 00000040 e7 96 bd cf f5 49 a1 |.....I.|" +peer1.org1.example.com | [14fd 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [164b 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1983 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [15f3 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.018 UTC [cauthdsl] func2 -> DEBU 18db 0xc0011d09f0 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [164c 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [14fe 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1984 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15f4 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.018 UTC [cauthdsl] func1 -> DEBU 18dc 0xc0011d09f0 gate 1574140978016610300 evaluation succeeds" +peer0.org2.example.com | [164d 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer1.org1.example.com | [14ff 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1985 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [15f5 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.018 UTC [policies] Evaluate -> DEBU 18dd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org1.example.com | [1500 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1986 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +orderer0.example.com | "2019-11-19 05:22:58.018 UTC [policies] Evaluate -> DEBU 18de == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [15f1 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [164e 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer1.org1.example.com | [1501 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1987 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +orderer0.example.com | "2019-11-19 05:22:58.019 UTC [policies] Evaluate -> DEBU 18df Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | [15f6 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer1.org1.example.com | [1502 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +orderer0.example.com | "2019-11-19 05:22:58.019 UTC [policies] Evaluate -> DEBU 18e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | [15f7 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer1.org1.example.com | [1503 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1988 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +orderer0.example.com | "2019-11-19 05:22:58.019 UTC [policies] Evaluate -> DEBU 18e1 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [15f8 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer1.org1.example.com | [1504 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +orderer0.example.com | "2019-11-19 05:22:58.019 UTC [policies] Evaluate -> DEBU 18e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | [15f9 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org1.example.com | [1505 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +orderer0.example.com | "2019-11-19 05:22:58.019 UTC [common.deliver] deliverBlocks -> DEBU 18e3 [channel: businesschannel] Received seekInfo (0xc000c6bbc0) start: > stop: > from 172.18.0.5:51668" +peer0.org1.example.com | [15eb 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [164f 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1506 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +orderer0.example.com | "2019-11-19 05:22:58.020 UTC [fsblkstorage] Next -> DEBU 18e4 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org1.example.com | [15fa 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1650 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1507 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d4c0 gate 1574140935426471100 evaluation starts +peer1.org2.example.com | 00000040 cd f9 67 25 28 fc 53 |..g%(.S| +orderer0.example.com | "2019-11-19 05:22:58.020 UTC [fsblkstorage] newBlockfileStream -> DEBU 18e5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +peer0.org1.example.com | [15fb 11-19 05:22:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1651 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1508 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d4c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1989 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +orderer0.example.com | "2019-11-19 05:22:58.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e6 Remaining bytes=[38486], Going to peek [8] bytes" +peer0.org1.example.com | [15fc 11-19 05:22:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1652 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1509 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d4c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +orderer0.example.com | "2019-11-19 05:22:58.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e7 Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +peer0.org1.example.com | [15fd 11-19 05:22:11.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1653 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [150a 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d4c0 principal matched by identity 0 +peer1.org2.example.com | [198a 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 79 25 47 91 2c 42 bf 8f 47 16 |0E.!..y%G.,B..G.| +orderer0.example.com | "2019-11-19 05:22:58.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e8 blockbytes [38483] read from file [0]" +peer0.org1.example.com | [15fe 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1654 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [150b 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +peer1.org2.example.com | 00000010 47 51 bc f4 b5 74 d5 9a 23 eb e8 c4 1f 21 0c 60 |GQ...t..#....!.`| +orderer0.example.com | "2019-11-19 05:22:58.021 UTC [common.deliver] deliverBlocks -> DEBU 18e9 [channel: businesschannel] Delivering block for (0xc000c6bbc0) for 172.18.0.5:51668" +peer0.org1.example.com | [15ff 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1655 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer1.org1.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +peer1.org2.example.com | 00000020 71 78 32 78 d6 02 20 66 ba d8 df d8 8a 2c ba 09 |qx2x.. f.....,..| +orderer0.example.com | "2019-11-19 05:22:58.022 UTC [common.deliver] deliverBlocks -> DEBU 18ea [channel: businesschannel] Done delivering to 172.18.0.5:51668 for (0xc000c6bbc0)" +peer0.org1.example.com | [1600 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer1.org1.example.com | [150c 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer1.org2.example.com | 00000030 b9 37 db f6 47 b4 4d f2 2a d1 5a 25 24 2e 57 66 |.7..G.M.*.Z%$.Wf| +orderer0.example.com | "2019-11-19 05:22:58.022 UTC [common.deliver] Handle -> DEBU 18eb Waiting for new SeekInfo from 172.18.0.5:51668" +peer0.org1.example.com | [1601 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1656 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer1.org1.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer1.org2.example.com | 00000040 18 2f 65 67 32 eb a6 |./eg2..| +orderer0.example.com | "2019-11-19 05:22:58.022 UTC [common.deliver] Handle -> DEBU 18ec Attempting to read seek info message from 172.18.0.5:51668" +peer0.org1.example.com | [1602 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer1.org1.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer1.org2.example.com | [198b 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.028 UTC [common.deliver] Handle -> WARN 18ee Error reading from 172.18.0.5:51668: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [1603 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer1.org1.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer1.org2.example.com | [198c 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:22:58.028 UTC [grpc] infof -> DEBU 18ed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [1605 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer1.org1.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer1.org2.example.com | [198d 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:58.028 UTC [orderer.common.server] func1 -> DEBU 18ef Closing Deliver stream" +peer0.org1.example.com | [1606 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer1.org1.example.com | [150d 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d4c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [198e 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:58.029 UTC [comm.grpc.server] 1 -> INFO 18f0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51668 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.8153ms +peer0.org1.example.com | [1607 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1657 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [150e 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d4c0 gate 1574140935426471100 evaluation succeeds +peer1.org2.example.com | [198f 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:58.170 UTC [orderer.common.server] Deliver -> DEBU 18f1 Starting new Deliver handler" +peer0.org1.example.com | [1608 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [150f 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1990 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.171 UTC [common.deliver] Handle -> DEBU 18f2 Starting new deliver loop for 172.18.0.5:51670" +peer0.org1.example.com | [1604 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1658 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 30 23 a6 3a ea f0 b7 9a c4 fe 78 |0D. =0#.:......x| +peer1.org1.example.com | [1510 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1991 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.171 UTC [common.deliver] Handle -> DEBU 18f3 Attempting to read seek info message from 172.18.0.5:51670" +peer0.org1.example.com | [1609 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 c4 7b ae 3b 95 c6 ca fa e2 66 2e db ae 03 1b f7 |.{.;.....f......| +peer1.org1.example.com | [1511 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1992 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.171 UTC [policies] Evaluate -> DEBU 18f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [160a 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 c4 a1 3a f7 02 20 1e 61 8d 7c 42 7e 10 da 32 b4 |..:.. .a.|B~..2.| +peer1.org1.example.com | [1512 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1993 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +orderer0.example.com | "2019-11-19 05:22:58.172 UTC [policies] Evaluate -> DEBU 18f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [160b 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000030 75 89 86 a2 75 3d f4 74 de 1f 0b f8 bb 92 b3 b7 |u...u=.t........| +peer1.org1.example.com | [1513 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1994 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.172 UTC [policies] Evaluate -> DEBU 18f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | [160c 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 ad 5d 71 b9 a4 57 |.]q..W| +peer1.org1.example.com | [1514 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1995 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.172 UTC [policies] Evaluate -> DEBU 18f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [160d 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1659 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1515 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1996 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:58.172 UTC [policies] Evaluate -> DEBU 18f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | [160e 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [165a 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1516 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1997 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.172 UTC [cauthdsl] func1 -> DEBU 18f9 0xc000c75840 gate 1574140978172607100 evaluation starts" +peer0.org1.example.com | [160f 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [165b 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1517 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1998 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.172 UTC [cauthdsl] func2 -> DEBU 18fa 0xc000c75840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [1610 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [165c 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1518 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1999 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | "2019-11-19 05:22:58.173 UTC [cauthdsl] func2 -> DEBU 18fb 0xc000c75840 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [1611 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 gate 1574140931345645500 evaluation starts +peer0.org2.example.com | [165d 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [199a 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1519 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.173 UTC [cauthdsl] func2 -> DEBU 18fc 0xc000c75840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | [1612 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [165e 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [199b 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [151a 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +orderer0.example.com | "2019-11-19 05:22:58.173 UTC [cauthdsl] func2 -> DEBU 18fd 0xc000c75840 principal evaluation fails" +peer0.org1.example.com | [1613 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [165f 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [151b 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [199c 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.173 UTC [cauthdsl] func1 -> DEBU 18fe 0xc000c75840 gate 1574140978172607100 evaluation fails" +peer0.org1.example.com | [1614 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 principal matched by identity 0 +peer0.org2.example.com | [1660 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [151c 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [199d 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +orderer0.example.com | "2019-11-19 05:22:58.173 UTC [policies] Evaluate -> DEBU 18ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [1615 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [1661 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer1.org1.example.com | [151d 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [199e 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.173 UTC [policies] Evaluate -> DEBU 1900 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer1.org1.example.com | [151e 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [199f 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.173 UTC [policies] Evaluate -> DEBU 1901 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | [1616 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [1662 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer1.org1.example.com | [151f 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > alive: alive: alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > +peer1.org2.example.com | [19a0 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.174 UTC [cauthdsl] func1 -> DEBU 1902 0xc0011fe080 gate 1574140978174116300 evaluation starts" +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer1.org1.example.com | [1520 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [19a1 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.174 UTC [cauthdsl] func2 -> DEBU 1903 0xc0011fe080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer1.org1.example.com | [1521 11-19 05:22:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19a2 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.174 UTC [cauthdsl] func2 -> DEBU 1904 0xc0011fe080 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer1.org1.example.com | [1522 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19a3 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.174 UTC [cauthdsl] func2 -> DEBU 1905 0xc0011fe080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer1.org1.example.com | [1523 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19a4 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.174 UTC [cauthdsl] func2 -> DEBU 1906 0xc0011fe080 principal evaluation fails" +peer0.org1.example.com | [1617 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1663 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1524 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19a5 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09520 gate 1574140939897542200 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.174 UTC [cauthdsl] func1 -> DEBU 1907 0xc0011fe080 gate 1574140978174116300 evaluation fails" +peer0.org1.example.com | [1618 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 gate 1574140931345645500 evaluation succeeds +peer0.org2.example.com | [1664 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1525 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [19a6 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09520 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.175 UTC [policies] Evaluate -> DEBU 1908 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [1619 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1665 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1526 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [19a7 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09520 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.175 UTC [policies] Evaluate -> DEBU 1909 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [161a 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1666 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1527 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19a8 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:58.175 UTC [policies] Evaluate -> DEBU 190a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | [161b 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1667 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1528 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [19a9 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09520 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.175 UTC [cauthdsl] func1 -> DEBU 190b 0xc0011fe8c0 gate 1574140978175378100 evaluation starts" +peer0.org1.example.com | [161c 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1668 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1529 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19aa 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09520 gate 1574140939897542200 evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.175 UTC [cauthdsl] func2 -> DEBU 190c 0xc0011fe8c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [161d 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [1669 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [152a 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [19ab 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.175 UTC [cauthdsl] func2 -> DEBU 190d 0xc0011fe8c0 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [166a 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [152b 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19ac 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [161e 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:22:58.175 UTC [cauthdsl] func2 -> DEBU 190e 0xc0011fe8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org2.example.com | [166b 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [152c 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [19ad 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:22:58.176 UTC [cauthdsl] func2 -> DEBU 190f 0xc0011fe8c0 principal evaluation fails" +peer0.org2.example.com | [166c 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [152d 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [19ae 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09a90 gate 1574140939897893200 evaluation starts +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:22:58.176 UTC [cauthdsl] func1 -> DEBU 1910 0xc0011fe8c0 gate 1574140978175378100 evaluation fails" +peer0.org2.example.com | [166d 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [152e 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [19af 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09a90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1911 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [166e 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eac5e0 gate 1574140931884431500 evaluation starts +peer1.org1.example.com | [152f 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19b0 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09a90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1912 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [166f 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eac5e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1530 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19b1 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09a90 principal matched by identity 0 +peer0.org1.example.com | [161f 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +orderer0.example.com | "2019-11-19 05:22:58.176 UTC [policies] func1 -> DEBU 1913 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org2.example.com | [1670 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eac5e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1531 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19b2 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 e1 a5 84 b8 e7 7c b7 b1 eb 3a fb cd f1 34 59 |......|...:...4Y| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +orderer0.example.com | "2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1914 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org2.example.com | [1671 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eac5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000010 23 4a 03 ab 14 d6 75 22 99 07 2f 04 cb ac 2b fb |#J....u"../...+.| +peer1.org1.example.com | [1532 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1620 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +orderer0.example.com | "2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1915 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org2.example.com | [1672 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eac5e0 principal evaluation fails +peer1.org2.example.com | [19b3 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 90 f9 8e f6 d6 c2 69 17 9c 02 03 |0D. U......i....| +peer1.org1.example.com | [1533 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +orderer0.example.com | "2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1916 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | [1673 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eac5e0 gate 1574140931884431500 evaluation fails +peer1.org2.example.com | 00000010 aa 5b cc bf 7f 28 59 33 01 e4 54 0a c7 23 5e 97 |.[...(Y3..T..#^.| +peer1.org1.example.com | [1534 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +orderer0.example.com | "2019-11-19 05:22:58.177 UTC [policies] Evaluate -> DEBU 1917 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1674 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 4a 04 c8 03 02 20 55 84 0f 30 af 13 80 2e 14 ba |J.... U..0......| +peer1.org1.example.com | [1535 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +orderer0.example.com | "2019-11-19 05:22:58.177 UTC [policies] Evaluate -> DEBU 1918 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [1675 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 14 2a 06 0b 07 2c b4 fd 1b 5f 00 39 09 26 34 d9 |.*...,..._.9.&4.| +peer1.org1.example.com | [1536 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +orderer0.example.com | "2019-11-19 05:22:58.177 UTC [cauthdsl] func1 -> DEBU 1919 0xc0011ff5f0 gate 1574140978177217800 evaluation starts" +peer0.org2.example.com | [1676 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000040 65 fb 17 39 76 b8 |e..9v.| +peer1.org1.example.com | [1537 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1621 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.177 UTC [cauthdsl] func2 -> DEBU 191a 0xc0011ff5f0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1677 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eacb50 gate 1574140931885595000 evaluation starts +peer1.org2.example.com | [19b4 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09a90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1538 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84e90 gate 1574140935637441300 evaluation starts +peer0.org1.example.com | [1622 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.177 UTC [cauthdsl] func2 -> DEBU 191b 0xc0011ff5f0 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [1678 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eacb50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [19b5 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e09a90 gate 1574140939897893200 evaluation succeeds +peer1.org1.example.com | [1539 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84e90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1623 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.177 UTC [cauthdsl] func2 -> DEBU 191c 0xc0011ff5f0 principal matched by identity 0" +peer0.org2.example.com | [1679 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eacb50 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [19b6 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [153a 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84e90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1624 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.177 UTC [msp.identity] Verify -> DEBU 191d Verify: digest = 00000000 4f f0 f8 e4 60 ad cb 2f 53 cc f8 fa aa 4d a0 2a |O...`../S....M.*| +peer0.org2.example.com | [167a 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eacb50 principal matched by identity 0 +peer1.org2.example.com | [19b7 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [153b 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84e90 principal matched by identity 0 +peer0.org1.example.com | [1625 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000010 af d7 61 14 5f c6 32 df 15 1c 92 4e 17 b3 17 0f |..a._.2....N....|" +peer0.org2.example.com | [167b 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +peer1.org2.example.com | [19b8 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [153c 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [1626 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.177 UTC [msp.identity] Verify -> DEBU 191e Verify: sig = 00000000 30 45 02 21 00 f6 ed bc ea 9c bf 33 48 9f a5 8f |0E.!.......3H...| +peer0.org2.example.com | 00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +peer1.org2.example.com | [19b9 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1627 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | 00000010 80 47 e9 db 51 ea dd d1 a8 9a a6 0e 35 7e 67 fd |.G..Q.......5~g.| +peer0.org2.example.com | [167c 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +peer1.org2.example.com | [19ba 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [153d 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [1628 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | 00000020 d7 94 c7 9f 42 02 20 53 98 41 15 4f 9d e5 fd e5 |....B. S.A.O....| +peer0.org2.example.com | 00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [19bb 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1629 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 gate 1574140931348869600 evaluation starts +orderer0.example.com | 00000030 51 62 19 ed 98 75 90 81 9c a5 bc 35 fc 74 f0 30 |Qb...u.....5.t.0| +peer0.org2.example.com | 00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [19bc 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [162a 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000040 b8 04 b5 52 23 14 15 |...R#..|" +peer0.org2.example.com | 00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [19bd 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [162b 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.178 UTC [cauthdsl] func2 -> DEBU 191f 0xc0011ff5f0 principal evaluation succeeds for identity 0" +peer0.org2.example.com | 00000040 48 7c 41 ee bb a6 |H|A...| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [19be 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [162c 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:58.178 UTC [cauthdsl] func1 -> DEBU 1920 0xc0011ff5f0 gate 1574140978177217800 evaluation succeeds" +peer0.org2.example.com | [167d 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eacb50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [153e 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84e90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [19bf 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [162d 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +orderer0.example.com | "2019-11-19 05:22:58.178 UTC [policies] Evaluate -> DEBU 1921 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [167e 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eacb50 gate 1574140931885595000 evaluation succeeds +peer1.org1.example.com | [153f 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f84e90 gate 1574140935637441300 evaluation succeeds +peer1.org2.example.com | [19c0 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +orderer0.example.com | "2019-11-19 05:22:58.178 UTC [policies] Evaluate -> DEBU 1922 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [167f 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1540 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19c1 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [162e 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +orderer0.example.com | "2019-11-19 05:22:58.178 UTC [policies] Evaluate -> DEBU 1923 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1680 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1541 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19c3 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.178 UTC [policies] Evaluate -> DEBU 1924 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1681 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [1542 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [19c4 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.179 UTC [policies] Evaluate -> DEBU 1925 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [1682 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1543 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [19c2 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.179 UTC [policies] Evaluate -> DEBU 1926 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [1683 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [19c5 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.179 UTC [common.deliver] deliverBlocks -> DEBU 1927 [channel: businesschannel] Received seekInfo (0xc0000c1280) start: > stop: > from 172.18.0.5:51670" +peer0.org2.example.com | [1684 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1544 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [19c6 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:58.179 UTC [fsblkstorage] Next -> DEBU 1928 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | [1685 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [162f 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [19c7 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +orderer0.example.com | "2019-11-19 05:22:58.179 UTC [fsblkstorage] newBlockfileStream -> DEBU 1929 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [1686 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer1.org1.example.com | [1545 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [1630 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1631 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 gate 1574140931348869600 evaluation succeeds +peer1.org2.example.com | [19c8 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.179 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 192a Remaining bytes=[127745], Going to peek [8] bytes" +peer0.org2.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [1632 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19c9 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.180 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 192b Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [1687 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [1633 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19ca 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.180 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 192c blockbytes [25803] read from file [0]" +peer0.org2.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [1634 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [19cb 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.180 UTC [common.deliver] deliverBlocks -> DEBU 192d [channel: businesschannel] Delivering block for (0xc0000c1280) for 172.18.0.5:51670" +peer0.org2.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [1635 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [19cc 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.180 UTC [common.deliver] deliverBlocks -> DEBU 192e [channel: businesschannel] Done delivering to 172.18.0.5:51670 for (0xc0000c1280)" +peer0.org2.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer1.org1.example.com | [1546 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1636 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19cd 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.181 UTC [common.deliver] Handle -> DEBU 192f Waiting for new SeekInfo from 172.18.0.5:51670" +peer0.org2.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1637 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [19ce 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.181 UTC [common.deliver] Handle -> DEBU 1930 Attempting to read seek info message from 172.18.0.5:51670" +peer0.org2.example.com | [1688 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1547 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1639 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [19cf 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.195 UTC [grpc] infof -> DEBU 1931 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [1689 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [19d0 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.195 UTC [common.deliver] Handle -> WARN 1932 Error reading from 172.18.0.5:51670: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [168a 11-19 05:22:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [1638 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [19d1 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.195 UTC [orderer.common.server] func1 -> DEBU 1933 Closing Deliver stream" +peer0.org2.example.com | [168b 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [163a 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [19d2 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +orderer0.example.com | "2019-11-19 05:22:58.195 UTC [comm.grpc.server] 1 -> INFO 1934 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51670 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.9238ms +peer0.org2.example.com | [168c 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +orderer0.example.com | "2019-11-19 05:22:58.341 UTC [orderer.common.server] Deliver -> DEBU 1935 Starting new Deliver handler" +peer0.org2.example.com | [168d 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1548 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19d3 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +orderer0.example.com | "2019-11-19 05:22:58.341 UTC [common.deliver] Handle -> DEBU 1936 Starting new deliver loop for 172.18.0.5:51672" +peer0.org2.example.com | [168e 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [1549 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19d4 11-19 05:22:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +orderer0.example.com | "2019-11-19 05:22:58.341 UTC [common.deliver] Handle -> DEBU 1937 Attempting to read seek info message from 172.18.0.5:51672" +peer0.org2.example.com | [168f 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [154a 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [19d5 11-19 05:22:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +orderer0.example.com | "2019-11-19 05:22:58.342 UTC [policies] Evaluate -> DEBU 1938 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [1690 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [154b 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [19d6 11-19 05:22:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 05 f4 62 e2 d6 8d 2f 1c db bd 49 d4 57 4d be |)..b.../...I.WM.| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +orderer0.example.com | "2019-11-19 05:22:58.342 UTC [policies] Evaluate -> DEBU 1939 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1691 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [154c 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 a7 76 a7 c9 e4 20 25 2d 76 e8 db 80 8d cb 4b 2f |.v... %-v.....K/| +peer0.org1.example.com | [163b 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:22:58.343 UTC [policies] Evaluate -> DEBU 193a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org2.example.com | [1692 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [154d 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [19d7 11-19 05:22:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 3b 47 01 fb e4 eb 4d 04 2d ae e5 |0D. Q;G....M.-..| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:22:58.343 UTC [policies] Evaluate -> DEBU 193b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1693 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 7a 04 69 76 1f ea e8 f1 bd 45 a2 38 29 d4 dd 60 |z.iv.....E.8)..`| +peer1.org1.example.com | [154e 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [163c 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:22:58.343 UTC [policies] Evaluate -> DEBU 193c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | 00000020 9a d2 27 b3 02 20 53 6a 61 04 a4 4d d5 33 50 d0 |..'.. Sja..M.3P.| +peer0.org2.example.com | [1694 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [154f 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:22:58.344 UTC [cauthdsl] func1 -> DEBU 193d 0xc00122dba0 gate 1574140978344106500 evaluation starts" +peer1.org2.example.com | 00000030 92 9e 71 a8 c4 d2 fe 3e f1 6e 52 7e 9c 19 29 03 |..q....>.nR~..).| +peer0.org2.example.com | [1695 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1696 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec88c0 gate 1574140931919892700 evaluation starts +peer0.org2.example.com | [1697 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec88c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1698 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec88c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1699 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec88c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [169a 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec88c0 principal evaluation fails +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [169b 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec88c0 gate 1574140931919892700 evaluation fails +peer1.org2.example.com | 00000040 4a 53 d4 c3 b1 fe |JS....| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:22:58.344 UTC [cauthdsl] func2 -> DEBU 193e 0xc00122dba0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1550 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2da0 gate 1574140935643923300 evaluation starts +peer0.org2.example.com | [169c 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19d8 11-19 05:22:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:22:58.345 UTC [cauthdsl] func2 -> DEBU 193f 0xc00122dba0 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | [1551 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2da0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [169d 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19d9 11-19 05:22:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer0.org1.example.com | [163d 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.345 UTC [cauthdsl] func2 -> DEBU 1940 0xc00122dba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | [1552 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2da0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [169e 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [19da 11-19 05:22:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer0.org1.example.com | [163e 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.345 UTC [cauthdsl] func2 -> DEBU 1941 0xc00122dba0 principal evaluation fails" +peer1.org1.example.com | [1553 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2da0 principal matched by identity 0 +peer0.org2.example.com | [169f 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec8e30 gate 1574140931923630300 evaluation starts +peer1.org2.example.com | [19db 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [163f 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.345 UTC [cauthdsl] func1 -> DEBU 1942 0xc00122dba0 gate 1574140978344106500 evaluation fails" +peer1.org1.example.com | [1554 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [16a0 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec8e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [19dc 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1640 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.345 UTC [policies] Evaluate -> DEBU 1943 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [16a1 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec8e30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [19dd 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1641 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.346 UTC [policies] Evaluate -> DEBU 1944 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1555 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [16a2 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec8e30 principal matched by identity 0 +peer1.org2.example.com | [19de 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [19df 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.346 UTC [policies] Evaluate -> DEBU 1945 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [16a3 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer1.org2.example.com | [19e0 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1642 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.346 UTC [cauthdsl] func1 -> DEBU 1946 0xc0012464f0 gate 1574140978346708900 evaluation starts" +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer1.org2.example.com | [19e2 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1643 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.347 UTC [cauthdsl] func2 -> DEBU 1947 0xc0012464f0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [16a4 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer1.org2.example.com | [19e1 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1644 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.347 UTC [cauthdsl] func2 -> DEBU 1948 0xc0012464f0 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer1.org2.example.com | [19e3 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1645 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 gate 1574140931357785600 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.347 UTC [cauthdsl] func2 -> DEBU 1949 0xc0012464f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org1.example.com | [1556 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2da0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer1.org2.example.com | [19e4 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1646 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.347 UTC [cauthdsl] func2 -> DEBU 194a 0xc0012464f0 principal evaluation fails" +peer1.org1.example.com | [1557 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2da0 gate 1574140935643923300 evaluation succeeds +peer0.org2.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer1.org2.example.com | [19e5 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1647 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.348 UTC [cauthdsl] func1 -> DEBU 194b 0xc0012464f0 gate 1574140978346708900 evaluation fails" +peer1.org1.example.com | [1558 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer1.org2.example.com | [19e6 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1648 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:58.348 UTC [policies] Evaluate -> DEBU 194c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [1559 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16a5 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec8e30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [19e7 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1649 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:22:58.348 UTC [policies] Evaluate -> DEBU 194d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [155a 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [16a6 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec8e30 gate 1574140931923630300 evaluation succeeds +peer0.org2.example.com | [16a7 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [19e8 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.348 UTC [policies] Evaluate -> DEBU 194e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org1.example.com | [155b 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [16a8 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [19e9 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:22:58.349 UTC [cauthdsl] func1 -> DEBU 194f 0xc001246d80 gate 1574140978349463600 evaluation starts" +peer1.org1.example.com | [155c 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16a9 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [19ea 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [164a 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:22:58.349 UTC [cauthdsl] func2 -> DEBU 1950 0xc001246d80 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [155d 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [16aa 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [19eb 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.349 UTC [cauthdsl] func2 -> DEBU 1951 0xc001246d80 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [155e 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ab 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19ec 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.350 UTC [cauthdsl] func2 -> DEBU 1952 0xc001246d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-11-19 05:22:58.350 UTC [cauthdsl] func2 -> DEBU 1953 0xc001246d80 principal evaluation fails" +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [16ac 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [19ed 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.350 UTC [cauthdsl] func1 -> DEBU 1954 0xc001246d80 gate 1574140978349463600 evaluation fails" +peer1.org1.example.com | [155f 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [16ad 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [19ee 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a110 gate 1574140940199407200 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.350 UTC [policies] Evaluate -> DEBU 1955 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [1560 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [16ae 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [19ef 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a110 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.350 UTC [policies] Evaluate -> DEBU 1956 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [1561 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [164b 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [16af 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [19f0 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a110 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.350 UTC [policies] func1 -> DEBU 1957 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer1.org1.example.com | [1562 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [164c 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 gate 1574140931357785600 evaluation succeeds +peer0.org2.example.com | [16b0 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f1 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:58.351 UTC [policies] Evaluate -> DEBU 1958 Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org1.example.com | [1563 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [164d 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16b1 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f2 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a110 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.351 UTC [policies] Evaluate -> DEBU 1959 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org1.example.com | [1564 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [164e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16b2 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [19f3 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a110 gate 1574140940199407200 evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.351 UTC [policies] Evaluate -> DEBU 195a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1565 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [164f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [16b3 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f4 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.352 UTC [policies] Evaluate -> DEBU 195b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1566 11-19 05:22:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1650 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1567 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030721c0 gate 1574140935652114300 evaluation starts +peer1.org2.example.com | [19f5 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.352 UTC [policies] Evaluate -> DEBU 195c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [1651 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1568 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030721c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16b4 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f6 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.353 UTC [cauthdsl] func1 -> DEBU 195d 0xc001247bb0 gate 1574140978353006900 evaluation starts" +peer0.org1.example.com | [1652 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1653 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [16b5 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f7 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a680 gate 1574140940201592500 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.353 UTC [cauthdsl] func2 -> DEBU 195e 0xc001247bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [1654 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1569 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030721c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [16b6 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [19f8 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a680 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.353 UTC [cauthdsl] func2 -> DEBU 195f 0xc001247bb0 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [1655 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [156a 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030721c0 principal matched by identity 0 +peer1.org2.example.com | [19f9 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a680 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [16b7 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +orderer0.example.com | "2019-11-19 05:22:58.353 UTC [cauthdsl] func2 -> DEBU 1960 0xc001247bb0 principal matched by identity 0" +peer0.org1.example.com | [1656 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [156b 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [19fa 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a680 principal matched by identity 0 +peer0.org2.example.com | [16b8 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.353 UTC [msp.identity] Verify -> DEBU 1961 Verify: digest = 00000000 b4 2a 0b 2a 55 3f f2 73 fa ed 58 51 df d3 6c 55 |.*.*U?.s..XQ..lU| +peer0.org1.example.com | [1657 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [19fb 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [16b9 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 ac c4 19 0f 11 53 58 6e bb b2 cc d6 13 78 c2 8e |.....SXn.....x..|" +peer0.org1.example.com | [1658 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [156c 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [16ba 11-19 05:22:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.353 UTC [msp.identity] Verify -> DEBU 1962 Verify: sig = 00000000 30 44 02 20 62 09 af 78 71 3d e4 28 64 33 ec f9 |0D. b..xq=.(d3..| +peer0.org1.example.com | [1659 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 gate 1574140931362000200 evaluation starts +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [16bb 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19fc 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +orderer0.example.com | 00000010 35 41 1b 12 4f f2 66 3d 85 ff d7 40 4a 42 fb 1e |5A..O.f=...@JB..| +peer0.org1.example.com | [165a 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [16bc 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +orderer0.example.com | 00000020 31 0b f6 c0 02 20 68 c8 06 03 58 34 25 7c f9 93 |1.... h...X4%|..| +peer0.org1.example.com | [165b 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [16bd 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +orderer0.example.com | 00000030 23 79 35 f4 a3 63 78 51 18 c7 d4 b1 2e 75 eb 66 |#y5..cxQ.....u.f| +peer0.org1.example.com | [165c 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 principal matched by identity 0 +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [16be 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +orderer0.example.com | 00000040 05 ae 64 ff 57 66 |..d.Wf|" +peer0.org1.example.com | [165d 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [156d 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030721c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [16c1 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +orderer0.example.com | "2019-11-19 05:22:58.354 UTC [cauthdsl] func2 -> DEBU 1963 0xc001247bb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [156e 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030721c0 gate 1574140935652114300 evaluation succeeds +peer0.org2.example.com | [16bf 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [19fd 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a680 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:58.354 UTC [cauthdsl] func1 -> DEBU 1964 0xc001247bb0 gate 1574140978353006900 evaluation succeeds" +peer0.org1.example.com | [165e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [156f 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16c2 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19fe 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a680 gate 1574140940201592500 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:58.354 UTC [policies] Evaluate -> DEBU 1965 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [1570 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19ff 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.354 UTC [policies] Evaluate -> DEBU 1966 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1571 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1a00 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [16c0 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.354 UTC [policies] Evaluate -> DEBU 1967 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1572 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1a01 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [16c3 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.354 UTC [policies] Evaluate -> DEBU 1968 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1573 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [1a02 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [16c4 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.355 UTC [policies] Evaluate -> DEBU 1969 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [165f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1a03 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16c5 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +orderer0.example.com | "2019-11-19 05:22:58.355 UTC [policies] Evaluate -> DEBU 196a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | [1660 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 gate 1574140931362000200 evaluation succeeds +peer1.org1.example.com | [1574 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [1a04 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +orderer0.example.com | "2019-11-19 05:22:58.356 UTC [common.deliver] deliverBlocks -> DEBU 196b [channel: businesschannel] Received seekInfo (0xc0000c1c00) start: > stop: > from 172.18.0.5:51672" +peer0.org1.example.com | [1661 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [1a05 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16c6 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +orderer0.example.com | "2019-11-19 05:22:58.356 UTC [fsblkstorage] Next -> DEBU 196c Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org1.example.com | [1662 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [1a06 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +orderer0.example.com | "2019-11-19 05:22:58.357 UTC [fsblkstorage] newBlockfileStream -> DEBU 196d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25806]" +peer0.org1.example.com | [1663 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [1a07 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +orderer0.example.com | "2019-11-19 05:22:58.357 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196e Remaining bytes=[101939], Going to peek [8] bytes" +peer0.org1.example.com | [1664 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1a08 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +orderer0.example.com | "2019-11-19 05:22:58.357 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196f Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25806], bytesOffset=[25809]}" +peer0.org1.example.com | [1665 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1575 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a09 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +orderer0.example.com | "2019-11-19 05:22:58.357 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1970 blockbytes [25475] read from file [0]" +peer0.org1.example.com | [1666 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1576 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a0a 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [16c7 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1667 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.358 UTC [common.deliver] deliverBlocks -> DEBU 1971 [channel: businesschannel] Delivering block for (0xc0000c1c00) for 172.18.0.5:51672" +peer1.org1.example.com | [1577 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1a0b 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [16c8 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1668 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.358 UTC [common.deliver] deliverBlocks -> DEBU 1972 [channel: businesschannel] Done delivering to 172.18.0.5:51672 for (0xc0000c1c00)" +peer1.org1.example.com | [1578 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a0c 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7b810 gate 1574140940205893700 evaluation starts +peer0.org2.example.com | [16c9 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1669 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.359 UTC [common.deliver] Handle -> DEBU 1973 Waiting for new SeekInfo from 172.18.0.5:51672" +peer1.org1.example.com | [1579 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a0d 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7b810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16ca 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.359 UTC [common.deliver] Handle -> DEBU 1974 Attempting to read seek info message from 172.18.0.5:51672" +peer0.org1.example.com | [166a 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [157a 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1a0e 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7b810 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [16cb 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1975 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +peer0.org1.example.com | [166b 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [157b 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1a0f 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7b810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [16cc 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1976 Sending msg of 28 bytes to 3 on channel businesschannel took 74.9µs" +peer0.org1.example.com | [166c 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [157c 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1a10 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7b810 principal evaluation fails +peer0.org2.example.com | [16cd 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1977 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 426µs " +peer0.org1.example.com | [166d 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [157d 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030739e0 gate 1574140935656309000 evaluation starts +peer1.org2.example.com | [1a11 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7b810 gate 1574140940205893700 evaluation fails +peer0.org2.example.com | [16ce 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1978 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.2µs " +peer0.org1.example.com | [166e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [166f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [157e 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030739e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16cf 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 gate 1574140931990227000 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1979 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1670 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 gate 1574140931364439500 evaluation starts +peer1.org1.example.com | [157f 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030739e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1a12 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16d0 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 197a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1671 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1580 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030739e0 principal matched by identity 0 +peer1.org2.example.com | [1a13 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16d1 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.369 UTC [grpc] infof -> DEBU 197b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [1672 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1581 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [1a14 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [16d2 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:58.369 UTC [common.deliver] Handle -> WARN 197c Error reading from 172.18.0.5:51672: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [1673 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 principal matched by identity 0 +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1a15 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7bd80 gate 1574140940207072100 evaluation starts +peer0.org2.example.com | [16d3 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.369 UTC [orderer.common.server] func1 -> DEBU 197d Closing Deliver stream" +peer0.org1.example.com | [1674 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [1582 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [1a16 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7bd80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16d4 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 gate 1574140931990227000 evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.370 UTC [comm.grpc.server] 1 -> INFO 197e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51672 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.1214ms +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [1a17 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7bd80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [16d5 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.495 UTC [orderer.common.cluster.step] handleMessage -> DEBU 197f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1675 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [1a18 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7bd80 principal matched by identity 0 +peer0.org2.example.com | [16d6 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.496 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1980 Sending msg of 28 bytes to 3 on channel testchainid took 114.7µs" +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [1a19 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [16d7 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1981 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.7µs " +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [16d8 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efb380 gate 1574140931991117700 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.530 UTC [orderer.common.server] Deliver -> DEBU 1982 Starting new Deliver handler" +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1583 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030739e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1a1a 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [16d9 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efb380 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.530 UTC [common.deliver] Handle -> DEBU 1983 Starting new deliver loop for 172.18.0.5:51674" +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1584 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030739e0 gate 1574140935656309000 evaluation succeeds +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [16da 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efb380 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.531 UTC [common.deliver] Handle -> DEBU 1984 Attempting to read seek info message from 172.18.0.5:51674" +peer0.org1.example.com | [1676 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1585 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [16db 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efb380 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:58.532 UTC [policies] Evaluate -> DEBU 1985 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [1677 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 gate 1574140931364439500 evaluation succeeds +peer1.org1.example.com | [1586 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [16dc 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:22:58.532 UTC [policies] Evaluate -> DEBU 1986 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [1678 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1587 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:22:58.533 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | [1679 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1588 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1a1b 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7bd80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [16dd 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:22:58.533 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [167a 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1589 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [1a1c 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7bd80 gate 1574140940207072100 evaluation succeeds +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:22:58.537 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | [167b 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:22:58.539 UTC [cauthdsl] func1 -> DEBU 198a 0xc000f90490 gate 1574140978539004800 evaluation starts" +peer1.org2.example.com | [1a1d 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [167c 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [158a 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:22:58.540 UTC [cauthdsl] func2 -> DEBU 198b 0xc000f90490 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1a1e 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:22:58.542 UTC [cauthdsl] func2 -> DEBU 198c 0xc000f90490 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1a1f 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [167d 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [16de 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efb380 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:58.543 UTC [cauthdsl] func2 -> DEBU 198d 0xc000f90490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org2.example.com | [1a20 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [16df 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efb380 gate 1574140931991117700 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:58.543 UTC [cauthdsl] func2 -> DEBU 198e 0xc000f90490 principal evaluation fails" +peer1.org2.example.com | [1a21 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [16e0 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.544 UTC [cauthdsl] func1 -> DEBU 198f 0xc000f90490 gate 1574140978539004800 evaluation fails" +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [158b 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16e1 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.544 UTC [policies] Evaluate -> DEBU 1990 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [1a22 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [16e2 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [158c 11-19 05:22:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.545 UTC [policies] Evaluate -> DEBU 1991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [167e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16e3 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [158d 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:22:58.545 UTC [policies] Evaluate -> DEBU 1992 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [167f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16e4 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:22:58.545 UTC [cauthdsl] func1 -> DEBU 1993 0xc000f90cd0 gate 1574140978545929200 evaluation starts" +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1680 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [158e 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:22:58.546 UTC [cauthdsl] func2 -> DEBU 1994 0xc000f90cd0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [16e5 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [1681 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:22:58.546 UTC [cauthdsl] func2 -> DEBU 1995 0xc000f90cd0 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1a23 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1682 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:22:58.546 UTC [cauthdsl] func2 -> DEBU 1996 0xc000f90cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [1683 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:22:58.546 UTC [cauthdsl] func2 -> DEBU 1997 0xc000f90cd0 principal evaluation fails" +peer1.org2.example.com | [1a24 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [1684 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:22:58.546 UTC [cauthdsl] func1 -> DEBU 1998 0xc000f90cd0 gate 1574140978545929200 evaluation fails" +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1685 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [158f 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.547 UTC [policies] Evaluate -> DEBU 1999 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [16e6 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1686 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 gate 1574140931367480100 evaluation starts +peer1.org1.example.com | [1590 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.547 UTC [policies] Evaluate -> DEBU 199a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [16e7 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1687 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1591 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.547 UTC [policies] Evaluate -> DEBU 199b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [16e8 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1688 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1592 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.547 UTC [cauthdsl] func1 -> DEBU 199c 0xc000f91510 gate 1574140978547457800 evaluation starts" +peer1.org2.example.com | [1a25 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16e9 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1689 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 principal matched by identity 0 +peer1.org1.example.com | [1593 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.547 UTC [cauthdsl] func2 -> DEBU 199d 0xc000f91510 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1a26 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [16ea 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [168a 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1594 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.547 UTC [cauthdsl] func2 -> DEBU 199e 0xc000f91510 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1a27 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16eb 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1595 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.547 UTC [cauthdsl] func2 -> DEBU 199f 0xc000f91510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [1a28 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ec 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [168b 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1596 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.547 UTC [cauthdsl] func2 -> DEBU 19a0 0xc000f91510 principal evaluation fails" +peer1.org2.example.com | [1a29 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ed 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [1597 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003109a30 gate 1574140935661909600 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.548 UTC [cauthdsl] func1 -> DEBU 19a1 0xc000f91510 gate 1574140978547457800 evaluation fails" +peer1.org2.example.com | [1a2a 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [16ee 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f14b90 gate 1574140931995564100 evaluation starts +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [1598 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003109a30 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.548 UTC [policies] Evaluate -> DEBU 19a2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1a2b 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16ef 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f14b90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [1599 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003109a30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1a2c 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.548 UTC [policies] Evaluate -> DEBU 19a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [16f0 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f14b90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [159a 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003109a30 principal matched by identity 0 +peer1.org2.example.com | [1a2d 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.548 UTC [policies] func1 -> DEBU 19a4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org2.example.com | [16f1 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f14b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [168c 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [159b 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1a2e 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.548 UTC [policies] Evaluate -> DEBU 19a5 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org2.example.com | [16f2 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f14b90 principal evaluation fails +peer0.org1.example.com | [168d 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 gate 1574140931367480100 evaluation succeeds +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1a2f 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.548 UTC [policies] Evaluate -> DEBU 19a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org2.example.com | [16f3 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f14b90 gate 1574140931995564100 evaluation fails +peer0.org1.example.com | [168e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [159c 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1a30 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97e60 gate 1574140940211753900 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.549 UTC [policies] Evaluate -> DEBU 19a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | [16f4 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [168f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1a31 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97e60 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.549 UTC [policies] Evaluate -> DEBU 19a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [16f5 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1690 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [1a32 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97e60 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.549 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [16f6 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1691 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [1a33 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:58.549 UTC [cauthdsl] func1 -> DEBU 19aa 0xc0011bc200 gate 1574140978549522600 evaluation starts" +peer0.org2.example.com | [16f7 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f15100 gate 1574140931996941100 evaluation starts +peer0.org1.example.com | [1692 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1a34 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97e60 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.549 UTC [cauthdsl] func2 -> DEBU 19ab 0xc0011bc200 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [16f8 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f15100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [159d 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003109a30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1a35 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97e60 gate 1574140940211753900 evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.549 UTC [cauthdsl] func2 -> DEBU 19ac 0xc0011bc200 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [16f9 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f15100 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1693 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [159e 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003109a30 gate 1574140935661909600 evaluation succeeds +peer1.org2.example.com | [1a36 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.549 UTC [cauthdsl] func2 -> DEBU 19ad 0xc0011bc200 principal matched by identity 0" +peer0.org2.example.com | [16fa 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f15100 principal matched by identity 0 +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [159f 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a37 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.550 UTC [msp.identity] Verify -> DEBU 19ae Verify: digest = 00000000 7f 23 1a b3 37 ff d0 87 71 f2 0c 75 cb fb 2b 5c |.#..7...q..u..+\| +peer0.org2.example.com | [16fb 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [15a0 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a38 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | 00000010 c4 26 a7 25 05 fb 5a c0 b0 1b 55 6d 32 91 f2 f2 |.&.%..Z...Um2...|" +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [15a1 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1a39 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb43d0 gate 1574140940212801400 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.550 UTC [msp.identity] Verify -> DEBU 19af Verify: sig = 00000000 30 45 02 21 00 bf 5b 51 a6 88 b5 be 3c 70 6d e2 |0E.!..[Q.... DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [15a2 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1a3a 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb43d0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000010 3c cb 7c 9e 79 90 fd 7f e2 47 6c 6b 3c c2 2b 48 |<.|.y....Glk<.+H| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [1694 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15a3 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3b 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb43d0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | 00000020 75 44 56 5b 7f 02 20 17 70 04 81 ee 37 2c d1 b1 |uDV[.. .p...7,..| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [1695 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15a4 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3c 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb43d0 principal matched by identity 0 +orderer0.example.com | 00000030 89 80 78 e4 32 9a 40 de 79 58 50 16 62 17 f8 73 |..x.2.@.yXP.b..s| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [1696 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3d 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [15a5 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 00000040 63 b5 c4 29 5e 99 25 |c..)^.%|" +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [1697 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [15a6 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:22:58.550 UTC [cauthdsl] func2 -> DEBU 19b0 0xc0011bc200 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [16fd 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f15100 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1698 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15a7 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a3e 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:22:58.550 UTC [cauthdsl] func1 -> DEBU 19b1 0xc0011bc200 gate 1574140978549522600 evaluation succeeds" +peer0.org2.example.com | [16fe 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f15100 gate 1574140931996941100 evaluation succeeds +peer0.org1.example.com | [1699 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15a8 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:22:58.550 UTC [policies] Evaluate -> DEBU 19b2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [16ff 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [169a 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [15a9 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +orderer0.example.com | "2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1700 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [169b 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [15aa 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +orderer0.example.com | "2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b4 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1701 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [169c 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15ab 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003238c20 gate 1574140935665308000 evaluation starts +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +orderer0.example.com | "2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1702 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [169d 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [15ac 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003238c20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a3f 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb43d0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b6 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [1703 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [169e 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [15ad 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003238c20 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1a40 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb43d0 gate 1574140940212801400 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [1704 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [169f 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [15ae 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003238c20 principal matched by identity 0 +peer1.org2.example.com | [1a41 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.551 UTC [common.deliver] deliverBlocks -> DEBU 19b8 [channel: businesschannel] Received seekInfo (0xc000269800) start: > stop: > from 172.18.0.5:51674" +peer0.org2.example.com | [1705 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16a0 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15af 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a42 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.551 UTC [fsblkstorage] Next -> DEBU 19b9 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | [1706 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16a1 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [15b0 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a44 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.552 UTC [fsblkstorage] newBlockfileStream -> DEBU 19ba newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51284]" +peer0.org2.example.com | [1707 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16a2 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [15b1 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1a45 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.552 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bb Remaining bytes=[76461], Going to peek [8] bytes" +peer0.org2.example.com | [1708 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [16a3 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [15b2 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a43 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.552 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bc Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51284], bytesOffset=[51287]}" +peer0.org2.example.com | [1709 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [16a4 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15b3 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a46 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.552 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd blockbytes [25480] read from file [0]" +peer0.org2.example.com | [170a 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [16a5 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15b4 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a47 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2019-11-19 05:22:58.553 UTC [common.deliver] deliverBlocks -> DEBU 19be [channel: businesschannel] Delivering block for (0xc000269800) for 172.18.0.5:51674" +peer0.org2.example.com | [170b 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [16a6 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15b5 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a48 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.553 UTC [common.deliver] deliverBlocks -> DEBU 19bf [channel: businesschannel] Done delivering to 172.18.0.5:51674 for (0xc000269800)" +peer0.org2.example.com | [170c 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [16a7 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15b6 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a49 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +orderer0.example.com | "2019-11-19 05:22:58.555 UTC [common.deliver] Handle -> DEBU 19c0 Waiting for new SeekInfo from 172.18.0.5:51674" +peer0.org2.example.com | [170d 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [16a8 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15b7 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +orderer0.example.com | "2019-11-19 05:22:58.555 UTC [common.deliver] Handle -> DEBU 19c1 Attempting to read seek info message from 172.18.0.5:51674" +peer0.org2.example.com | [170e 11-19 05:22:11.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f364e0 gate 1574140931999879400 evaluation starts +peer0.org1.example.com | [16a9 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1a4a 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.561 UTC [common.deliver] Handle -> WARN 19c2 Error reading from 172.18.0.5:51674: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [170f 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f364e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [16aa 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [15b8 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [1a4c 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:58.561 UTC [orderer.common.server] func1 -> DEBU 19c3 Closing Deliver stream" +peer0.org2.example.com | [1710 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f364e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [16ab 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [1a4d 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.561 UTC [comm.grpc.server] 1 -> INFO 19c4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51674 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.2307ms +peer0.org2.example.com | [1711 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f364e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [16ac 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [1a4e 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.562 UTC [grpc] infof -> DEBU 19c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [1712 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f364e0 principal evaluation fails +peer0.org1.example.com | [16ad 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [1a4b 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +orderer0.example.com | "2019-11-19 05:22:58.720 UTC [orderer.common.server] Deliver -> DEBU 19c6 Starting new Deliver handler" +peer0.org2.example.com | [1713 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f364e0 gate 1574140931999879400 evaluation fails +peer0.org1.example.com | [16ae 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +orderer0.example.com | "2019-11-19 05:22:58.720 UTC [common.deliver] Handle -> DEBU 19c7 Starting new deliver loop for 172.18.0.5:51676" +peer0.org2.example.com | [1714 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [16af 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [15b9 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003238c20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +orderer0.example.com | "2019-11-19 05:22:58.720 UTC [common.deliver] Handle -> DEBU 19c8 Attempting to read seek info message from 172.18.0.5:51676" +peer0.org2.example.com | [1715 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [16b0 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [15ba 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003238c20 gate 1574140935665308000 evaluation succeeds +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +orderer0.example.com | "2019-11-19 05:22:58.721 UTC [policies] Evaluate -> DEBU 19c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [1716 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [16b1 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15bb 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +orderer0.example.com | "2019-11-19 05:22:58.721 UTC [policies] Evaluate -> DEBU 19ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1717 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36a50 gate 1574140932000937400 evaluation starts +peer0.org1.example.com | [16b2 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [15bc 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a4f 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:22:58.721 UTC [policies] Evaluate -> DEBU 19cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org2.example.com | [1718 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [16b3 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15bd 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:22:58.721 UTC [policies] Evaluate -> DEBU 19cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1719 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36a50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [16b4 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15be 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1a50 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:22:58.722 UTC [policies] Evaluate -> DEBU 19cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org2.example.com | [171a 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36a50 principal matched by identity 0 +peer0.org1.example.com | [16b5 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [15bf 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | "2019-11-19 05:22:58.722 UTC [cauthdsl] func1 -> DEBU 19ce 0xc0012c8320 gate 1574140978722162100 evaluation starts" +peer0.org2.example.com | [171b 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [16b6 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:22:58.722 UTC [cauthdsl] func2 -> DEBU 19cf 0xc0012c8320 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [16b7 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [15c0 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | "2019-11-19 05:22:58.722 UTC [cauthdsl] func2 -> DEBU 19d0 0xc0012c8320 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [171c 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [16b8 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 gate 1574140931457592700 evaluation starts +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:22:58.722 UTC [cauthdsl] func2 -> DEBU 19d1 0xc0012c8320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [16b9 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [1a51 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.723 UTC [cauthdsl] func2 -> DEBU 19d2 0xc0012c8320 principal evaluation fails" +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [16ba 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [1a53 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.723 UTC [cauthdsl] func1 -> DEBU 19d3 0xc0012c8320 gate 1574140978722162100 evaluation fails" +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [16bb 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 principal matched by identity 0 +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [1a52 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +orderer0.example.com | "2019-11-19 05:22:58.723 UTC [policies] Evaluate -> DEBU 19d4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [16bc 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer1.org1.example.com | [15c1 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a54 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [171d 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36a50 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:58.723 UTC [policies] Evaluate -> DEBU 19d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org1.example.com | [15c2 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a55 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [171e 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36a50 gate 1574140932000937400 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:58.724 UTC [policies] Evaluate -> DEBU 19d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | [16bd 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer1.org1.example.com | [15c3 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a56 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [171f 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.724 UTC [cauthdsl] func1 -> DEBU 19d7 0xc0012c8b60 gate 1574140978724236300 evaluation starts" +peer0.org1.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer1.org1.example.com | [15c4 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a57 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1720 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.724 UTC [cauthdsl] func2 -> DEBU 19d8 0xc0012c8b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer1.org1.example.com | [15c5 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1a58 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1721 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.724 UTC [cauthdsl] func2 -> DEBU 19d9 0xc0012c8b60 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer1.org1.example.com | [15c6 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15101F +peer1.org2.example.com | [1a59 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1722 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.724 UTC [cauthdsl] func2 -> DEBU 19da 0xc0012c8b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org1.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org1.example.com | [15c7 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5BCDA02D2925CC2D80E4E85004BC39AB5312789FE62B5DE15E469077B8142D7 +peer1.org2.example.com | [1a5a 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede380 gate 1574140940218934800 evaluation starts +peer0.org2.example.com | [1723 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.724 UTC [cauthdsl] func2 -> DEBU 19db 0xc0012c8b60 principal evaluation fails" +peer0.org1.example.com | [16be 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [15c8 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1724 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a5b 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede380 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.724 UTC [cauthdsl] func1 -> DEBU 19dc 0xc0012c8b60 gate 1574140978724236300 evaluation fails" +peer0.org1.example.com | [16bf 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 gate 1574140931457592700 evaluation succeeds +peer1.org1.example.com | [15c9 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1725 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1a5c 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede380 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.725 UTC [policies] Evaluate -> DEBU 19dd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [16c0 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15ca 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [1726 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a5d 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:58.725 UTC [policies] Evaluate -> DEBU 19de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [16c1 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15cb 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1727 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a5e 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede380 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.725 UTC [policies] Evaluate -> DEBU 19df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | [16c2 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [15cc 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1728 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1a5f 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede380 gate 1574140940218934800 evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.725 UTC [cauthdsl] func1 -> DEBU 19e0 0xc0012c93a0 gate 1574140978725494900 evaluation starts" +peer0.org1.example.com | [16c3 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [15cd 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1729 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1a60 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.725 UTC [cauthdsl] func2 -> DEBU 19e1 0xc0012c93a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [16c4 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [172a 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [15ce 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a61 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.725 UTC [cauthdsl] func2 -> DEBU 19e2 0xc0012c93a0 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [16c5 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [172b 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37be0 gate 1574140932005668700 evaluation starts +peer1.org1.example.com | [15cf 11-19 05:22:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a62 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.725 UTC [cauthdsl] func2 -> DEBU 19e3 0xc0012c93a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org1.example.com | [16c6 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [172c 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37be0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [15d0 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1a63 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede8f0 gate 1574140940220075600 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.725 UTC [cauthdsl] func2 -> DEBU 19e4 0xc0012c93a0 principal evaluation fails" +peer0.org1.example.com | [16c7 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [172d 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37be0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [15d1 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a64 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede8f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.726 UTC [cauthdsl] func1 -> DEBU 19e5 0xc0012c93a0 gate 1574140978725494900 evaluation fails" +peer0.org1.example.com | [16c8 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [172f 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15d2 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1a65 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede8f0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.726 UTC [policies] Evaluate -> DEBU 19e6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [16c9 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1730 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15d3 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a66 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede8f0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:58.726 UTC [policies] Evaluate -> DEBU 19e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [16ca 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1731 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [15d4 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a67 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +orderer0.example.com | "2019-11-19 05:22:58.726 UTC [policies] func1 -> DEBU 19e8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org1.example.com | [16cb 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1732 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15d5 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +orderer0.example.com | "2019-11-19 05:22:58.726 UTC [policies] Evaluate -> DEBU 19e9 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [16cc 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [1733 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15d6 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a68 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +orderer0.example.com | "2019-11-19 05:22:58.726 UTC [policies] Evaluate -> DEBU 19ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [16cd 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1734 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [15d7 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +orderer0.example.com | "2019-11-19 05:22:58.727 UTC [policies] Evaluate -> DEBU 19eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [16ce 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1735 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [15d8 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +orderer0.example.com | "2019-11-19 05:22:58.727 UTC [policies] Evaluate -> DEBU 19ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [16cf 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1736 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15d9 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +orderer0.example.com | "2019-11-19 05:22:58.727 UTC [policies] Evaluate -> DEBU 19ed == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [16d0 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [172e 11-19 05:22:12.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [15da 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +orderer0.example.com | "2019-11-19 05:22:58.727 UTC [cauthdsl] func1 -> DEBU 19ee 0xc00127a090 gate 1574140978727455300 evaluation starts" +peer0.org1.example.com | [16d1 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > alive: alive: +peer0.org2.example.com | [1737 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37be0 principal evaluation fails +peer1.org1.example.com | [15db 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a69 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede8f0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:58.727 UTC [cauthdsl] func2 -> DEBU 19ef 0xc00127a090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [16d2 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1738 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37be0 gate 1574140932005668700 evaluation fails +peer1.org1.example.com | [15dc 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a6a 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede8f0 gate 1574140940220075600 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:58.727 UTC [cauthdsl] func2 -> DEBU 19f0 0xc00127a090 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [16d3 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1739 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15dd 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a6b 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.727 UTC [cauthdsl] func2 -> DEBU 19f1 0xc00127a090 principal matched by identity 0" +peer0.org1.example.com | [16d4 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [173a 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15de 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a6c 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.727 UTC [msp.identity] Verify -> DEBU 19f2 Verify: digest = 00000000 03 0e 2d a5 1c 82 c7 04 d6 23 b6 ea 31 eb 9b 46 |..-......#..1..F| +peer0.org1.example.com | [16d5 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [173b 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [15df 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a6d 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | 00000010 ab 3e 55 19 61 bf 4a 66 bc c9 6f 3e aa 83 58 5d |.>U.a.Jf..o>..X]|" +peer0.org1.example.com | [16d6 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [173c 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65c70 gate 1574140932012986900 evaluation starts +peer1.org1.example.com | [15e0 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a6e 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.728 UTC [msp.identity] Verify -> DEBU 19f3 Verify: sig = 00000000 30 45 02 21 00 c2 30 85 05 a8 c5 b7 82 92 e8 87 |0E.!..0.........| +peer0.org1.example.com | [16d7 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [173d 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65c70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [15e1 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a6f 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 8b 09 4c 13 ef b4 3b 90 c5 8b b6 c7 21 2b 49 4a |..L...;.....!+IJ| +peer0.org1.example.com | [16d8 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e2 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [173e 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65c70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1a70 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +orderer0.example.com | 00000020 5c 9a d4 5b 19 02 20 6d 82 2f c1 65 22 27 d5 6a |\..[.. m./.e"'.j| +peer0.org1.example.com | [16d9 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e3 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [173f 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65c70 principal matched by identity 0 +peer1.org2.example.com | [1a71 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | 00000030 28 1e 81 79 9e 48 19 76 b5 a9 b4 6e 7d ba ca 48 |(..y.H.v...n}..H| +peer0.org1.example.com | [16da 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e4 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1740 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | 00000040 c4 bb da d8 d5 f5 e9 |.......|" +peer0.org1.example.com | [16db 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e5 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1a72 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:22:58.728 UTC [cauthdsl] func2 -> DEBU 19f4 0xc00127a090 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [16dc 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [15e6 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1741 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | "2019-11-19 05:22:58.728 UTC [cauthdsl] func1 -> DEBU 19f5 0xc00127a090 gate 1574140978727455300 evaluation succeeds" +peer0.org1.example.com | [16dd 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e7 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:22:58.728 UTC [policies] Evaluate -> DEBU 19f6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [16de 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e8 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | "2019-11-19 05:22:58.728 UTC [policies] Evaluate -> DEBU 19f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [16df 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e9 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:22:58.728 UTC [policies] Evaluate -> DEBU 19f8 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | [16e0 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [15ea 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a73 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.728 UTC [policies] Evaluate -> DEBU 19f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | [16e1 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [1742 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65c70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [15eb 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a74 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.729 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [16e2 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1743 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65c70 gate 1574140932012986900 evaluation succeeds +peer1.org1.example.com | [15ec 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a75 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.729 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [1744 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [16e3 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15ed 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a76 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.729 UTC [common.deliver] deliverBlocks -> DEBU 19fc [channel: businesschannel] Received seekInfo (0xc000bb40c0) start: > stop: > from 172.18.0.5:51676" +peer0.org2.example.com | [1745 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [16e4 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15ee 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a77 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.729 UTC [fsblkstorage] Next -> DEBU 19fd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | [1746 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [16e5 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15ef 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a78 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.729 UTC [fsblkstorage] newBlockfileStream -> DEBU 19fe newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76767]" +peer0.org2.example.com | [1747 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [16e6 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15f0 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a79 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.729 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19ff Remaining bytes=[50978], Going to peek [8] bytes" +peer0.org2.example.com | [1748 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [16e7 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15f1 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a7a 11-19 05:22:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.729 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a00 Returning blockbytes - length=[4521], placementInfo={fileNum=[0], startOffset=[76767], bytesOffset=[76769]}" +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [16e8 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15f2 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.730 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a01 blockbytes [4521] read from file [0]" +peer1.org2.example.com | [1a7b 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc2a0 gate 1574140940230086500 evaluation starts +peer0.org2.example.com | [1749 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [16e9 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15f3 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.730 UTC [common.deliver] deliverBlocks -> DEBU 1a02 [channel: businesschannel] Delivering block for (0xc000bb40c0) for 172.18.0.5:51676" +peer1.org2.example.com | [1a7c 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [16ea 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15f4 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.730 UTC [common.deliver] deliverBlocks -> DEBU 1a03 [channel: businesschannel] Done delivering to 172.18.0.5:51676 for (0xc000bb40c0)" +peer1.org2.example.com | [1a7d 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc2a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [16eb 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15f5 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.730 UTC [common.deliver] Handle -> DEBU 1a04 Waiting for new SeekInfo from 172.18.0.5:51676" +peer1.org2.example.com | [1a7e 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [16ec 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [15f6 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:58.730 UTC [common.deliver] Handle -> DEBU 1a05 Attempting to read seek info message from 172.18.0.5:51676" +peer1.org2.example.com | [1a7f 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc2a0 principal evaluation fails +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [16ed 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15f7 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a80 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc2a0 gate 1574140940230086500 evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.737 UTC [grpc] infof -> DEBU 1a07 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [174a 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [16ee 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f8 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a81 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.737 UTC [common.deliver] Handle -> WARN 1a06 Error reading from 172.18.0.5:51676: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [16ef 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f9 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [1a82 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.739 UTC [orderer.common.server] func1 -> DEBU 1a08 Closing Deliver stream" +peer0.org2.example.com | [174b 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [16f0 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15fa 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a83 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.739 UTC [comm.grpc.server] 1 -> INFO 1a09 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51676 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.9644ms +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [16f1 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [15fb 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a84 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc810 gate 1574140940231582000 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0a Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | [16f2 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [15fc 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a85 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc810 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 173.1µs " +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [16f3 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15fd 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a86 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc810 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0c Sending msg of 28 bytes to 3 on channel businesschannel took 382µs" +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [16f4 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [15fe 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a87 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc810 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:58.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.9µs " +peer0.org2.example.com | [174c 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16f5 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15ff 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1a88 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:22:58.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a0e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [174d 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [16f6 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1600 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:22:58.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a0f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [174e 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f7 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1a89 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1601 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.921 UTC [orderer.common.server] Deliver -> DEBU 1a10 Starting new Deliver handler" +peer0.org2.example.com | [174f 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f8 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1602 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.921 UTC [common.deliver] Handle -> DEBU 1a11 Starting new deliver loop for 172.18.0.5:51678" +peer0.org2.example.com | [1750 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f9 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1603 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.921 UTC [common.deliver] Handle -> DEBU 1a12 Attempting to read seek info message from 172.18.0.5:51678" +peer0.org2.example.com | [1751 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [16fa 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 gate 1574140931863602400 evaluation starts +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1604 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.923 UTC [policies] Evaluate -> DEBU 1a13 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [1752 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [16fb 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1605 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.923 UTC [policies] Evaluate -> DEBU 1a14 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1753 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [16fc 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1a8a 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc810 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1606 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.924 UTC [policies] Evaluate -> DEBU 1a15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org2.example.com | [1754 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [16fd 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 principal matched by identity 0 +peer1.org2.example.com | [1a8b 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc810 gate 1574140940231582000 evaluation succeeds +peer1.org1.example.com | [1607 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7bf00 gate 1574140935820796800 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.924 UTC [policies] Evaluate -> DEBU 1a16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1755 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [16fe 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +peer1.org2.example.com | [1a8c 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1608 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7bf00 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.924 UTC [policies] Evaluate -> DEBU 1a17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org2.example.com | [1756 11-19 05:22:12.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +peer1.org2.example.com | [1a8d 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1609 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7bf00 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.925 UTC [cauthdsl] func1 -> DEBU 1a18 0xc0010069f0 gate 1574140978925150000 evaluation starts" +peer0.org2.example.com | [1757 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f61d50 gate 1574140932020206500 evaluation starts +peer0.org1.example.com | [16ff 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +peer1.org2.example.com | [1a8e 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [160a 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7bf00 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:58.925 UTC [cauthdsl] func2 -> DEBU 1a19 0xc0010069f0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1758 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f61d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +peer1.org2.example.com | [1a8f 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [160b 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b b1 8f 0a 39 ad 76 56 b8 3f 78 c4 d4 5b 44 c9 |....9.vV.?x..[D.| +orderer0.example.com | "2019-11-19 05:22:58.925 UTC [cauthdsl] func2 -> DEBU 1a1a 0xc0010069f0 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [1759 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f61d50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +peer1.org2.example.com | [1a90 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 46 ad f7 77 3f 31 fc 9d c8 05 73 5d 2f cf 75 0b |F..w?1....s]/.u.| +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [cauthdsl] func2 -> DEBU 1a1b 0xc0010069f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org2.example.com | [175a 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f61d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +peer1.org2.example.com | [1a91 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [160c 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 ee 7e 54 58 69 da e3 f1 09 7d |0E.!...~TXi....}| +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc0010069f0 principal evaluation fails" +peer0.org1.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +peer0.org2.example.com | [175b 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f61d50 principal evaluation fails +peer1.org2.example.com | [1a92 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 d0 c6 cf f1 8c 3a 3e 09 72 51 49 bf f1 42 fe 50 |.....:>.rQI..B.P| +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [cauthdsl] func1 -> DEBU 1a1d 0xc0010069f0 gate 1574140978925150000 evaluation fails" +peer0.org1.example.com | [1700 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [175c 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f61d50 gate 1574140932020206500 evaluation fails +peer1.org2.example.com | [1a93 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 43 41 c4 13 f8 02 20 33 50 8a 7f 1b 73 db 30 6d |CA.... 3P...s.0m| +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [policies] Evaluate -> DEBU 1a1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [1701 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 gate 1574140931863602400 evaluation succeeds +peer0.org2.example.com | [175d 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a94 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 9b 66 64 db 65 ab 6b c9 3f 50 bb f9 75 34 4d b8 |.fd.e.k.?P..u4M.| +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [policies] Evaluate -> DEBU 1a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [1702 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [175e 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a95 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000040 4f 6b fb 3a 94 9b d6 |Ok.:...| +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [policies] Evaluate -> DEBU 1a20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | [1703 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [175f 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1a96 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [160d 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7bf00 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [cauthdsl] func1 -> DEBU 1a21 0xc001007230 gate 1574140978926740600 evaluation starts" +peer0.org1.example.com | [1704 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1760 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f802c0 gate 1574140932022332000 evaluation starts +peer1.org2.example.com | [1a97 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [160e 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7bf00 gate 1574140935820796800 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [cauthdsl] func2 -> DEBU 1a22 0xc001007230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [1705 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1761 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f802c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a98 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd9a0 gate 1574140940235325300 evaluation starts +peer1.org1.example.com | [160f 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.926 UTC [cauthdsl] func2 -> DEBU 1a23 0xc001007230 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [1706 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1762 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f802c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1a99 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1610 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.927 UTC [cauthdsl] func2 -> DEBU 1a24 0xc001007230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org1.example.com | [1707 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1763 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f802c0 principal matched by identity 0 +peer1.org2.example.com | [1a9a 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd9a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1611 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.927 UTC [cauthdsl] func2 -> DEBU 1a25 0xc001007230 principal evaluation fails" +peer0.org1.example.com | [1708 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1764 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [1a9b 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1612 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.927 UTC [cauthdsl] func1 -> DEBU 1a26 0xc001007230 gate 1574140978926740600 evaluation fails" +peer0.org1.example.com | [1709 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1a9c 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd9a0 principal evaluation fails +peer1.org1.example.com | [1613 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.927 UTC [policies] Evaluate -> DEBU 1a27 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [170a 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1765 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [1a9d 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd9a0 gate 1574140940235325300 evaluation fails +peer1.org1.example.com | [1614 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:58.927 UTC [policies] Evaluate -> DEBU 1a28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [170b 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [1a9e 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1615 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:58.927 UTC [policies] Evaluate -> DEBU 1a29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | [170c 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1616 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1a9f 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.928 UTC [cauthdsl] func1 -> DEBU 1a2a 0xc001007a70 gate 1574140978928000500 evaluation starts" +peer0.org1.example.com | [170d 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1617 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1aa0 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.928 UTC [cauthdsl] func2 -> DEBU 1a2b 0xc001007a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [170e 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1618 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1aa1 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efdf10 gate 1574140940236780700 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.928 UTC [cauthdsl] func2 -> DEBU 1a2c 0xc001007a70 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | [170f 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1766 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f802c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1619 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1aa2 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efdf10 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.928 UTC [cauthdsl] func2 -> DEBU 1a2d 0xc001007a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org1.example.com | [1710 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1767 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f802c0 gate 1574140932022332000 evaluation succeeds +peer1.org1.example.com | [161a 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aa3 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efdf10 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.928 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc001007a70 principal evaluation fails" +peer0.org1.example.com | [1711 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1768 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [161b 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aa4 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efdf10 principal matched by identity 0 +peer0.org1.example.com | [1712 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1769 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [161c 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aa5 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1713 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.928 UTC [cauthdsl] func1 -> DEBU 1a2f 0xc001007a70 gate 1574140978928000500 evaluation fails" +peer0.org2.example.com | [176a 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [161d 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1714 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a30 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [176b 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [161e 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1aa6 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1715 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > alive: alive: +orderer0.example.com | "2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [176c 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [1716 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:58.929 UTC [policies] func1 -> DEBU 1a32 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [161f 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +orderer0.example.com | "2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a33 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org2.example.com | [176d 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [1717 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1620 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +orderer0.example.com | "2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a34 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [1718 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1621 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | [1719 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1aa7 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efdf10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1622 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.930 UTC [policies] Evaluate -> DEBU 1a36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [171a 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1aa8 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efdf10 gate 1574140940236780700 evaluation succeeds +peer1.org1.example.com | [1623 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.930 UTC [policies] Evaluate -> DEBU 1a37 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [171b 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer1.org2.example.com | [1aa9 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1624 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [176e 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:22:58.930 UTC [cauthdsl] func1 -> DEBU 1a38 0xc00117a760 gate 1574140978930343800 evaluation starts" +peer0.org1.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer1.org2.example.com | [1aaa 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1625 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:22:58.930 UTC [cauthdsl] func2 -> DEBU 1a39 0xc00117a760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [171c 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer1.org2.example.com | [1aab 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1626 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [176f 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:22:58.930 UTC [cauthdsl] func2 -> DEBU 1a3a 0xc00117a760 processing identity 0 with bytes of fd6070" +peer0.org1.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer1.org2.example.com | [1aac 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1627 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b680 gate 1574140935843240100 evaluation starts +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | "2019-11-19 05:22:58.930 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc00117a760 principal matched by identity 0" +peer0.org1.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer1.org2.example.com | [1aad 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [1628 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b680 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:22:58.931 UTC [msp.identity] Verify -> DEBU 1a3c Verify: digest = 00000000 e5 cf 0c c8 2f 5e 55 53 25 05 f1 c0 7e 7a a0 cc |..../^US%...~z..| +peer0.org1.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [1629 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b680 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | 00000010 ee 2b a9 15 09 73 75 e0 c8 1e cf 78 fa d3 58 83 |.+...su....x..X.|" +peer0.org1.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer1.org2.example.com | [1aae 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [162a 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:22:58.931 UTC [msp.identity] Verify -> DEBU 1a3d Verify: sig = 00000000 30 44 02 20 53 0f 5f 88 d1 d3 4f 7e 50 d3 80 b8 |0D. S._...O~P...| +peer0.org1.example.com | [171d 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [162b 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1770 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 0f 2a ed 0d 69 14 3b da 95 fc 7f 05 72 24 1b db |.*..i.;.....r$..| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [162c 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1771 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 10 9b 74 fa 02 20 0d 70 ff d0 6c 8b ed d4 40 1a |..t.. .p..l...@.| +peer0.org1.example.com | [171e 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c bf d0 52 58 e0 49 f9 0d 24 de 11 |0D. ...RX.I..$..| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [162d 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1772 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 00000030 21 25 ac 3e bb 35 69 e6 b0 6d 8d 82 c6 b1 eb 89 |!%.>.5i..m......| +peer0.org1.example.com | 00000010 61 a6 2a db d9 10 5a 8e 41 6c ac d5 1b 5a 06 db |a.*...Z.Al...Z..| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [162e 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1773 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 00000040 22 1e ab f2 3a 64 |"...:d|" +peer0.org1.example.com | 00000020 d0 bc f0 7f 02 20 19 3a 61 90 b8 36 16 08 07 a8 |..... .:a..6....| +peer1.org2.example.com | [1aaf 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [162f 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1774 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:58.931 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc00117a760 principal evaluation succeeds for identity 0" +peer0.org1.example.com | 00000030 95 00 b0 88 56 d1 31 df d1 45 71 7b 50 1b c2 b0 |....V.1..Eq{P...| +peer1.org2.example.com | [1ab0 11-19 05:22:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1630 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1775 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:58.932 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc00117a760 gate 1574140978930343800 evaluation succeeds" +peer0.org1.example.com | 00000040 82 5e 5c bb 02 ab |.^\...| +peer1.org2.example.com | [1ab1 11-19 05:22:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1631 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1776 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:58.932 UTC [policies] Evaluate -> DEBU 1a40 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [171f 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1ab2 11-19 05:22:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1632 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1777 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.932 UTC [policies] Evaluate -> DEBU 1a41 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [1720 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [1ab3 11-19 05:22:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1633 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1778 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c150 gate 1574140932024417100 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.932 UTC [policies] Evaluate -> DEBU 1a42 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | [1721 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1ab4 11-19 05:22:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151021 +peer1.org1.example.com | [1634 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1779 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c150 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.932 UTC [policies] Evaluate -> DEBU 1a43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | [1722 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1ab5 11-19 05:22:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2005531B4A7CD7B7DA6BA089CF288B661C8213572B06E3ABA3ADA7D2B8B4CCE1 +peer1.org1.example.com | [1635 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [177a 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c150 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.933 UTC [policies] Evaluate -> DEBU 1a44 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [1723 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1ab6 11-19 05:22:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1636 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [177b 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:58.933 UTC [policies] Evaluate -> DEBU 1a45 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | [1724 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab7 11-19 05:22:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1637 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [177c 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c150 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.933 UTC [common.deliver] deliverBlocks -> DEBU 1a46 [channel: businesschannel] Received seekInfo (0xc000bb49c0) start: > stop: > from 172.18.0.5:51678" +peer0.org1.example.com | [1725 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab8 11-19 05:22:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [1638 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b680 principal matched by identity 0 +peer0.org2.example.com | [177d 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c150 gate 1574140932024417100 evaluation fails +orderer0.example.com | "2019-11-19 05:22:58.934 UTC [fsblkstorage] Next -> DEBU 1a47 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org1.example.com | [1726 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab9 11-19 05:22:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1639 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer0.org2.example.com | [177e 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.934 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a48 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[81290]" +peer0.org1.example.com | [1727 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [1aba 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer0.org2.example.com | [177f 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:58.934 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a49 Remaining bytes=[46455], Going to peek [8] bytes" +peer0.org1.example.com | [1728 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1abb 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [163a 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer0.org2.example.com | [1780 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:58.934 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4a Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81290], bytesOffset=[81292]}" +peer0.org1.example.com | [1729 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1abc 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer0.org2.example.com | [1781 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c6c0 gate 1574140932024676900 evaluation starts +orderer0.example.com | "2019-11-19 05:22:58.934 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4b blockbytes [3982] read from file [0]" +peer0.org1.example.com | [172a 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1abd 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer0.org2.example.com | [1782 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c6c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:58.935 UTC [common.deliver] deliverBlocks -> DEBU 1a4c [channel: businesschannel] Delivering block for (0xc000bb49c0) for 172.18.0.5:51678" +peer0.org1.example.com | [172b 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1abe 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer0.org2.example.com | [1783 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c6c0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:58.935 UTC [common.deliver] deliverBlocks -> DEBU 1a4d [channel: businesschannel] Done delivering to 172.18.0.5:51678 for (0xc000bb49c0)" +peer0.org1.example.com | [172c 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1abf 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer0.org2.example.com | [1784 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c6c0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:58.935 UTC [common.deliver] Handle -> DEBU 1a4e Waiting for new SeekInfo from 172.18.0.5:51678" +peer0.org1.example.com | [172d 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [1ac0 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [163b 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b680 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1785 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +orderer0.example.com | "2019-11-19 05:22:58.935 UTC [common.deliver] Handle -> DEBU 1a4f Attempting to read seek info message from 172.18.0.5:51678" +peer0.org1.example.com | [172e 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ac1 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [163c 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b680 gate 1574140935843240100 evaluation succeeds +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +orderer0.example.com | "2019-11-19 05:22:58.940 UTC [common.deliver] Handle -> WARN 1a50 Error reading from 172.18.0.5:51678: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [172f 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ac2 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [163d 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1786 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +orderer0.example.com | "2019-11-19 05:22:58.940 UTC [orderer.common.server] func1 -> DEBU 1a51 Closing Deliver stream" +peer0.org1.example.com | [1730 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac3 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [163e 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +orderer0.example.com | "2019-11-19 05:22:58.940 UTC [comm.grpc.server] 1 -> INFO 1a52 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51678 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.655ms +peer0.org1.example.com | [1731 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac4 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [163f 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +orderer0.example.com | "2019-11-19 05:22:58.940 UTC [grpc] infof -> DEBU 1a53 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [1732 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac5 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1641 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +orderer0.example.com | "2019-11-19 05:22:58.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a54 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1ac6 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1733 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1640 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +orderer0.example.com | "2019-11-19 05:22:58.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a55 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +peer1.org2.example.com | [1ac7 11-19 05:22:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1734 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1787 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c6c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1642 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:58.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.3µs " +peer1.org2.example.com | [1ac8 11-19 05:22:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1735 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1788 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f9c6c0 gate 1574140932024676900 evaluation succeeds +peer0.org2.example.com | [1789 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:22:59.094 UTC [orderer.common.server] Deliver -> DEBU 1a57 Starting new Deliver handler" +peer1.org2.example.com | [1ac9 11-19 05:22:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1736 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [178a 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1643 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2019-11-19 05:22:59.094 UTC [common.deliver] Handle -> DEBU 1a58 Starting new deliver loop for 172.18.0.5:51680" +peer1.org2.example.com | [1aca 11-19 05:22:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1737 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [178b 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1644 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:59.095 UTC [common.deliver] Handle -> DEBU 1a59 Attempting to read seek info message from 172.18.0.5:51680" +peer1.org2.example.com | [1acb 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 222188947551341445, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [1738 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [178c 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1645 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:59.095 UTC [policies] Evaluate -> DEBU 1a5a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1acc 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1739 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [178d 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1646 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:59.095 UTC [policies] Evaluate -> DEBU 1a5b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1acd 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 222188947551341445, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [173a 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org2.example.com | [178e 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1647 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.095 UTC [policies] Evaluate -> DEBU 1a5c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | [1ace 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [173b 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org2.example.com | [178f 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1648 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.095 UTC [policies] Evaluate -> DEBU 1a5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1acf 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [173c 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1790 11-19 05:22:12.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.096 UTC [policies] Evaluate -> DEBU 1a5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | [1ad0 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [173d 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510071801 +peer0.org2.example.com | [1791 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.096 UTC [cauthdsl] func1 -> DEBU 1a5f 0xc00118f0b0 gate 1574140979096387700 evaluation starts" +peer1.org1.example.com | [1649 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ad1 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [173e 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0DB0C69785D7C3D8698F4A23785AC0D77F98DBDD298F095E6A6A6EDC7D3F56E0 +peer0.org2.example.com | [1792 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.096 UTC [cauthdsl] func2 -> DEBU 1a60 0xc00118f0b0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [164a 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ad2 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [173f 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org2.example.com | [1793 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.096 UTC [cauthdsl] func2 -> DEBU 1a61 0xc00118f0b0 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | [164b 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1740 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1794 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.096 UTC [cauthdsl] func2 -> DEBU 1a62 0xc00118f0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | [164c 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [1ad3 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1741 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1795 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.096 UTC [cauthdsl] func2 -> DEBU 1a63 0xc00118f0b0 principal evaluation fails" +peer1.org1.example.com | [164e 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ad4 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1742 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1796 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.097 UTC [cauthdsl] func1 -> DEBU 1a64 0xc00118f0b0 gate 1574140979096387700 evaluation fails" +peer1.org1.example.com | [164d 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ad5 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1743 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1797 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +orderer0.example.com | "2019-11-19 05:22:59.097 UTC [policies] Evaluate -> DEBU 1a65 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [164f 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ad6 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f367e0 gate 1574140940551391600 evaluation starts +peer0.org1.example.com | [1744 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1798 11-19 05:22:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.098 UTC [policies] Evaluate -> DEBU 1a66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1650 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ad7 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f367e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1745 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1799 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.098 UTC [policies] Evaluate -> DEBU 1a67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | [1651 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ad8 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f367e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1746 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [179a 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1652 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > alive: alive: alive: +orderer0.example.com | "2019-11-19 05:22:59.098 UTC [cauthdsl] func1 -> DEBU 1a68 0xc0012c4f30 gate 1574140979098504200 evaluation starts" +peer1.org2.example.com | [1ad9 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f367e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1747 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [179b 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1653 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.098 UTC [cauthdsl] func2 -> DEBU 1a69 0xc0012c4f30 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1ada 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f367e0 principal evaluation fails +peer0.org1.example.com | [1748 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [179c 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1654 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.098 UTC [cauthdsl] func2 -> DEBU 1a6a 0xc0012c4f30 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [179d 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1655 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:22:59.098 UTC [cauthdsl] func2 -> DEBU 1a6b 0xc0012c4f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | [1adb 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f367e0 gate 1574140940551391600 evaluation fails +peer0.org1.example.com | [1749 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1656 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151020 +peer0.org2.example.com | [179e 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [179f 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:59.099 UTC [cauthdsl] func2 -> DEBU 1a6c 0xc0012c4f30 principal evaluation fails" +peer1.org2.example.com | [1adc 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1add 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [174a 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101A +peer0.org1.example.com | [174b 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C1B5BD86FBEEC143CF9973EDFA581F274ADACD1A1D02B5F604F722E250CE7A76 +peer0.org2.example.com | [17a0 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ade 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [174c 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1657 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ED3ED6DB05B9DB18A0D81C5E87C4069826D73502278F9A58817629FFC35679E6 +peer1.org1.example.com | [1658 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:22:59.099 UTC [cauthdsl] func1 -> DEBU 1a6d 0xc0012c4f30 gate 1574140979098504200 evaluation fails" +peer1.org2.example.com | [1adf 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36d50 gate 1574140940552415700 evaluation starts +peer0.org1.example.com | [174d 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1659 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [17a1 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:59.099 UTC [policies] Evaluate -> DEBU 1a6e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [1ae0 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [174e 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [165a 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [17a2 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:59.099 UTC [policies] Evaluate -> DEBU 1a6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [1ae1 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36d50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [174f 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [165b 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a3 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:59.099 UTC [policies] Evaluate -> DEBU 1a70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | [1ae2 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36d50 principal matched by identity 0 +peer0.org1.example.com | [1750 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [165c 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [17a4 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc0c0 gate 1574140934761081900 evaluation starts +orderer0.example.com | "2019-11-19 05:22:59.100 UTC [cauthdsl] func1 -> DEBU 1a71 0xc0012c5770 gate 1574140979100192800 evaluation starts" +peer1.org2.example.com | [1ae3 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 e1 a5 84 b8 e7 7c b7 b1 eb 3a fb cd f1 34 59 |......|...:...4Y| +peer0.org1.example.com | [1751 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [165d 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [17a5 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc0c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:59.100 UTC [cauthdsl] func2 -> DEBU 1a72 0xc0012c5770 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | 00000010 23 4a 03 ab 14 d6 75 22 99 07 2f 04 cb ac 2b fb |#J....u"../...+.| +peer0.org1.example.com | [1752 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [165e 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a6 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc0c0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:59.100 UTC [cauthdsl] func2 -> DEBU 1a73 0xc0012c5770 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1ae4 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 90 f9 8e f6 d6 c2 69 17 9c 02 03 |0D. U......i....| +peer0.org1.example.com | [1753 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [17a7 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [165f 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:59.100 UTC [cauthdsl] func2 -> DEBU 1a74 0xc0012c5770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | 00000010 aa 5b cc bf 7f 28 59 33 01 e4 54 0a c7 23 5e 97 |.[...(Y3..T..#^.| +peer0.org1.example.com | [1754 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [17a8 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc0c0 principal evaluation fails +peer1.org1.example.com | [1660 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.100 UTC [cauthdsl] func2 -> DEBU 1a75 0xc0012c5770 principal evaluation fails" +peer0.org1.example.com | [1755 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 4a 04 c8 03 02 20 55 84 0f 30 af 13 80 2e 14 ba |J.... U..0......| +peer0.org2.example.com | [17a9 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc0c0 gate 1574140934761081900 evaluation fails +peer1.org1.example.com | [1661 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.100 UTC [cauthdsl] func1 -> DEBU 1a76 0xc0012c5770 gate 1574140979100192800 evaluation fails" +peer0.org1.example.com | [1756 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000030 14 2a 06 0b 07 2c b4 fd 1b 5f 00 39 09 26 34 d9 |.*...,..._.9.&4.| +peer0.org2.example.com | [17aa 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1662 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a77 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [1758 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 65 fb 17 39 76 b8 |e..9v.| +peer0.org2.example.com | [17ab 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1663 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [1759 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ae5 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36d50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [17ac 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1664 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.101 UTC [policies] func1 -> DEBU 1a79 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org1.example.com | [175a 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ae6 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f36d50 gate 1574140940552415700 evaluation succeeds +peer0.org2.example.com | [17ad 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc630 gate 1574140934764461700 evaluation starts +peer1.org1.example.com | [1665 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a7a Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [175b 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ae7 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [17ae 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc630 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1666 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [1757 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ae8 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [17af 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc630 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1667 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [175c 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1ae9 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [17b0 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc630 principal matched by identity 0 +peer1.org1.example.com | [1668 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [175d 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1aea 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [17b1 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 b5 bd 86 fb ee c1 43 cf 99 73 ed fa 58 1f 27 |.......C..s..X.'| +peer1.org1.example.com | [1669 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.102 UTC [policies] Evaluate -> DEBU 1a7e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [175e 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1aeb 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 4a da cd 1a 1d 02 b5 f6 04 f7 22 e2 50 ce 7a 76 |J.........".P.zv| +peer1.org1.example.com | [166a 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.102 UTC [cauthdsl] func1 -> DEBU 1a7f 0xc00112a460 gate 1574140979102259600 evaluation starts" +peer0.org1.example.com | [175f 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1aec 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17b2 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 9e 0a eb b1 dc be ba 54 86 5b |0E.!.........T.[| +peer1.org1.example.com | [166b 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.102 UTC [cauthdsl] func2 -> DEBU 1a80 0xc00112a460 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1aed 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1760 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | 00000010 dc db 11 72 c0 2b 49 10 36 36 3f 4c 3b 27 f4 13 |...r.+I.66?L;'..| +peer1.org1.example.com | [166c 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.102 UTC [cauthdsl] func2 -> DEBU 1a81 0xc00112a460 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1aee 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +peer0.org1.example.com | [1761 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 21 3b ad 13 c5 02 20 2e 79 c0 9f bf ef ae d0 bc |!;.... .y.......| +peer1.org1.example.com | [166d 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.102 UTC [cauthdsl] func2 -> DEBU 1a82 0xc00112a460 principal matched by identity 0" +peer1.org2.example.com | 00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +peer0.org1.example.com | [1762 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 5c 4f c8 5e c6 09 9a 75 d1 38 51 ed 4c 4b 78 a2 |\O.^...u.8Q.LKx.| +peer1.org1.example.com | [166e 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +orderer0.example.com | "2019-11-19 05:22:59.102 UTC [msp.identity] Verify -> DEBU 1a83 Verify: digest = 00000000 8f be 6e 4e df 97 f0 ab 19 17 75 b3 8c 0f c8 5c |..nN......u....\| +peer1.org2.example.com | [1aef 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +peer0.org1.example.com | [1763 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 a6 5b 11 fb 0b f7 4e |.[....N| +peer1.org1.example.com | [166f 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +orderer0.example.com | 00000010 82 ee f5 5c 32 ca ed 46 b4 4e 9d cf 38 5d 2c 07 |...\2..F.N..8],.|" +peer1.org2.example.com | 00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +peer0.org1.example.com | [1764 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17b3 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc630 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +orderer0.example.com | "2019-11-19 05:22:59.103 UTC [msp.identity] Verify -> DEBU 1a84 Verify: sig = 00000000 30 45 02 21 00 84 6c 54 8e 9f 87 d6 41 e0 2b b4 |0E.!..lT....A.+.| +peer1.org2.example.com | 00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +peer0.org1.example.com | [1765 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [17b4 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc630 gate 1574140934764461700 evaluation succeeds +peer1.org1.example.com | [1670 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +orderer0.example.com | 00000010 e5 47 ac 6d f0 0f 6a f5 c7 9f 63 16 d4 3d 89 55 |.G.m..j...c..=.U| +peer1.org2.example.com | 00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +peer0.org1.example.com | [1767 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17b5 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +orderer0.example.com | 00000020 1e a9 4a 37 6a 02 20 73 31 44 84 01 36 5b dd a1 |..J7j. s1D..6[..| +peer1.org2.example.com | 00000040 cd f9 67 25 28 fc 53 |..g%(.S| +peer0.org1.example.com | [1766 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [17b6 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +orderer0.example.com | 00000030 8b 14 52 b8 d9 f3 4d be e7 f3 2a 41 57 64 41 f8 |..R...M...*AWdA.| +peer1.org2.example.com | [1af0 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1768 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17b7 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +orderer0.example.com | 00000040 71 ff 1f bf 63 e8 39 |q...c.9|" +peer1.org2.example.com | [1af1 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1769 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [17b8 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +orderer0.example.com | "2019-11-19 05:22:59.103 UTC [cauthdsl] func2 -> DEBU 1a85 0xc00112a460 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [1af2 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [176a 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [17b9 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1671 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | "2019-11-19 05:22:59.103 UTC [cauthdsl] func1 -> DEBU 1a86 0xc00112a460 gate 1574140979102259600 evaluation succeeds" +peer1.org2.example.com | [1af3 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 05 53 1b 4a 7c d7 b7 da 6b a0 89 cf 28 8b 66 | .S.J|...k...(.f| +peer1.org2.example.com | 00000010 1c 82 13 57 2b 06 e3 ab a3 ad a7 d2 b8 b4 cc e1 |...W+...........| +peer1.org2.example.com | [1af4 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 64 41 c8 3a 6d f5 c3 f7 b0 44 0f |0D. udA.:m....D.| +peer0.org2.example.com | [17ba 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2019-11-19 05:22:59.103 UTC [policies] Evaluate -> DEBU 1a87 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000010 21 d7 fd fe ab 97 aa 2f 3d 87 67 05 6a 5f 89 fb |!....../=.g.j_..| +peer0.org2.example.com | [17bb 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [176b 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1672 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 b1 2b 82 fa a6 96 ac 93 97 20 bb |0D. B.+....... .| +orderer0.example.com | "2019-11-19 05:22:59.103 UTC [policies] Evaluate -> DEBU 1a88 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000020 18 8c 13 82 02 20 32 03 24 3f fc 94 4b c9 a5 74 |..... 2.$?..K..t| +peer0.org2.example.com | [17bc 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [176c 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 22 40 ee 8a dc 91 9d 13 83 6b 5e 10 0a 38 41 c4 |"@.......k^..8A.| +orderer0.example.com | "2019-11-19 05:22:59.104 UTC [policies] Evaluate -> DEBU 1a89 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | 00000030 d3 48 06 c0 66 f0 05 8e 5a ed 36 9c f7 4f 05 2c |.H..f...Z.6..O.,| +peer0.org2.example.com | [17bd 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [176d 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 9a 1f 36 a2 02 20 0c bf a6 eb 88 70 37 e6 72 fa |..6.. .....p7.r.| +orderer0.example.com | "2019-11-19 05:22:59.104 UTC [policies] Evaluate -> DEBU 1a8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | 00000040 5d 6a 1c 82 5c 1a |]j..\.| +peer0.org2.example.com | [17be 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [176e 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 07 51 4b b2 f1 06 5f 16 ac 3b 21 b6 2e 7d 8a 8a |.QK..._..;!..}..| +orderer0.example.com | "2019-11-19 05:22:59.104 UTC [policies] Evaluate -> DEBU 1a8b Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [1af5 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [17bf 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [176f 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 a9 e6 d5 f1 a0 31 |.....1| +orderer0.example.com | "2019-11-19 05:22:59.104 UTC [policies] Evaluate -> DEBU 1a8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [1af6 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [17c0 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1770 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1673 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:59.104 UTC [common.deliver] deliverBlocks -> DEBU 1a8d [channel: businesschannel] Received seekInfo (0xc000bb5080) start: > stop: > from 172.18.0.5:51680" +peer1.org2.example.com | [1af7 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17c1 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1771 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1674 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:59.104 UTC [fsblkstorage] Next -> DEBU 1a8e Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org2.example.com | [1af8 11-19 05:22:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17c2 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1772 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1675 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.105 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a8f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85274]" +peer1.org2.example.com | [1af9 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [17c3 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1773 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1676 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a90 Remaining bytes=[42471], Going to peek [8] bytes" +peer1.org2.example.com | [1afa 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1774 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17c4 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1677 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a91 Returning blockbytes - length=[3983], placementInfo={fileNum=[0], startOffset=[85274], bytesOffset=[85276]}" +peer1.org2.example.com | [1afb 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1775 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [17c5 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a92 blockbytes [3983] read from file [0]" +peer1.org1.example.com | [1678 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1afc 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1776 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101B +peer0.org2.example.com | [17c6 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.105 UTC [common.deliver] deliverBlocks -> DEBU 1a93 [channel: businesschannel] Delivering block for (0xc000bb5080) for 172.18.0.5:51680" +peer1.org1.example.com | [1679 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1afd 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1777 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E1496B11434695B92FF829A6582CB6E9A904F809DFD6F97AD9B063DE9C8FC88E +peer0.org2.example.com | [17c7 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.106 UTC [common.deliver] deliverBlocks -> DEBU 1a94 [channel: businesschannel] Done delivering to 172.18.0.5:51680 for (0xc000bb5080)" +peer1.org1.example.com | [167a 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1778 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1afe 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [17c8 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.106 UTC [common.deliver] Handle -> DEBU 1a95 Waiting for new SeekInfo from 172.18.0.5:51680" +peer1.org1.example.com | [167b 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1779 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1aff 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17c9 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.106 UTC [common.deliver] Handle -> DEBU 1a96 Attempting to read seek info message from 172.18.0.5:51680" +peer1.org1.example.com | [167c 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +peer1.org2.example.com | [1b00 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [177a 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | [17ca 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.112 UTC [common.deliver] Handle -> WARN 1a98 Error reading from 172.18.0.5:51680: rpc error: code = Canceled desc = context canceled" +peer1.org1.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer1.org2.example.com | [1b01 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [177b 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17cb 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.112 UTC [grpc] infof -> DEBU 1a97 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | [167d 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer1.org2.example.com | [1b02 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [177c 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [17cc 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.112 UTC [orderer.common.server] func1 -> DEBU 1a99 Closing Deliver stream" +peer1.org1.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer1.org2.example.com | [1b03 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [177d 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17cd 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +orderer0.example.com | "2019-11-19 05:22:59.113 UTC [comm.grpc.server] 1 -> INFO 1a9a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51680 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.6497ms +peer1.org2.example.com | [1b04 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51450 gate 1574140940786955300 evaluation starts +peer0.org1.example.com | [177e 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [17ce 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +orderer0.example.com | "2019-11-19 05:22:59.258 UTC [orderer.common.server] Deliver -> DEBU 1a9b Starting new Deliver handler" +peer1.org2.example.com | [1b05 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [177f 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [17cf 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +orderer0.example.com | "2019-11-19 05:22:59.258 UTC [common.deliver] Handle -> DEBU 1a9c Starting new deliver loop for 172.18.0.5:51682" +peer1.org2.example.com | [1b06 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51450 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1780 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [17d0 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [167e 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.258 UTC [common.deliver] Handle -> DEBU 1a9d Attempting to read seek info message from 172.18.0.5:51682" +orderer0.example.com | "2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1a9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1a9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1b07 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org2.example.com | [17d1 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1782 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [167f 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b08 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51450 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:59.259 UTC [cauthdsl] func1 -> DEBU 1aa3 0xc00129c7c0 gate 1574140979259795000 evaluation starts" +peer0.org2.example.com | [17d2 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1784 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1680 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b09 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51450 gate 1574140940786955300 evaluation fails +orderer0.example.com | "2019-11-19 05:22:59.259 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc00129c7c0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [17d3 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1781 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1681 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1b0a 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:59.260 UTC [cauthdsl] func2 -> DEBU 1aa5 0xc00129c7c0 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [17d4 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1785 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1682 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +peer1.org2.example.com | [1b0b 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:59.260 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc00129c7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org2.example.com | [17d5 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1783 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +peer1.org2.example.com | [1b0c 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:59.260 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc00129c7c0 principal evaluation fails" +peer0.org2.example.com | [17d6 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1786 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1683 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +peer1.org2.example.com | [1b0d 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f519c0 gate 1574140940791167900 evaluation starts +orderer0.example.com | "2019-11-19 05:22:59.260 UTC [cauthdsl] func1 -> DEBU 1aa8 0xc00129c7c0 gate 1574140979259795000 evaluation fails" +peer0.org2.example.com | [17d7 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [1787 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +peer1.org2.example.com | [1b0e 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f519c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:59.260 UTC [policies] Evaluate -> DEBU 1aa9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [17d8 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1788 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +peer1.org2.example.com | [1b0f 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f519c0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:59.261 UTC [policies] Evaluate -> DEBU 1aaa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [17d9 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1789 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU 0xc003f519c0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:59.261 UTC [policies] Evaluate -> DEBU 1aab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org2.example.com | [17da 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [178a 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | 00000040 6b 34 eb 1f d5 31 |k4...1| +peer1.org2.example.com | [1b11 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 9f c8 8d c8 6e 76 f4 d7 7e 4e 83 3d 20 d0 d0 |.....nv..~N.= ..| +orderer0.example.com | "2019-11-19 05:22:59.261 UTC [cauthdsl] func1 -> DEBU 1aac 0xc00129d000 gate 1574140979261393500 evaluation starts" +peer0.org2.example.com | [17db 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [178b 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +peer1.org1.example.com | [1684 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 4c ba 7f 10 17 d6 88 fb 00 e3 4c b9 37 bc 6d 2f |L.........L.7.m/| +orderer0.example.com | "2019-11-19 05:22:59.261 UTC [cauthdsl] func2 -> DEBU 1aad 0xc00129d000 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [17dc 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +peer1.org1.example.com | [1685 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b12 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 8c 2a 05 1c a7 3b 35 02 98 ee c0 |0D. ..*...;5....| +orderer0.example.com | "2019-11-19 05:22:59.261 UTC [cauthdsl] func2 -> DEBU 1aae 0xc00129d000 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [17dd 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [178c 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +peer1.org1.example.com | [1686 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | 00000010 9c 13 d3 ea 8c da be 2b b7 7c 97 c2 98 be a3 68 |.......+.|.....h| +orderer0.example.com | "2019-11-19 05:22:59.261 UTC [cauthdsl] func2 -> DEBU 1aaf 0xc00129d000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org2.example.com | [17de 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +peer1.org1.example.com | [1687 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 de 29 38 c0 02 20 1d 22 46 25 fb e1 40 7d 4e c2 |.)8.. ."F%..@}N.| +orderer0.example.com | "2019-11-19 05:22:59.261 UTC [cauthdsl] func2 -> DEBU 1ab0 0xc00129d000 principal evaluation fails" +peer0.org2.example.com | [17df 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +peer1.org1.example.com | [1688 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 71 b3 c1 9c 5e 69 2c 94 c5 2b 39 00 e3 59 31 d5 |q...^i,..+9..Y1.| +orderer0.example.com | "2019-11-19 05:22:59.262 UTC [cauthdsl] func1 -> DEBU 1ab1 0xc00129d000 gate 1574140979261393500 evaluation fails" +peer0.org2.example.com | [17e0 11-19 05:22:14.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 51 09 98 7a 2d f2 |Q..z-.| +orderer0.example.com | "2019-11-19 05:22:59.262 UTC [policies] Evaluate -> DEBU 1ab2 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [17e1 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 6b 34 eb 1f d5 31 |k4...1| +peer1.org2.example.com | [1b13 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f519c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [168a 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:59.262 UTC [policies] Evaluate -> DEBU 1ab3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [17e2 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [178d 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b14 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f519c0 gate 1574140940791167900 evaluation succeeds +peer1.org1.example.com | [168b 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:59.262 UTC [policies] Evaluate -> DEBU 1ab4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org2.example.com | [17e3 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [178e 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b15 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [168c 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:59.262 UTC [cauthdsl] func1 -> DEBU 1ab5 0xc00129d840 gate 1574140979262593000 evaluation starts" +peer0.org2.example.com | [17e4 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [178f 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [1b16 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [168d 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:59.262 UTC [cauthdsl] func2 -> DEBU 1ab6 0xc00129d840 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [17e5 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [1b17 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [168e 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3670 gate 1574140935896817700 evaluation starts +orderer0.example.com | "2019-11-19 05:22:59.262 UTC [cauthdsl] func2 -> DEBU 1ab7 0xc00129d840 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [17e6 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1790 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 46 f3 09 00 b8 17 14 8f 71 ea |0E.!..F.......q.| +peer1.org2.example.com | [1b18 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [168f 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3670 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:59.263 UTC [cauthdsl] func2 -> DEBU 1ab8 0xc00129d840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org2.example.com | [17e7 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 38 84 8c 81 a8 58 9d d6 7d 24 f0 55 51 c7 4c bf |8....X..}$.UQ.L.| +peer1.org2.example.com | [1b19 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1690 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3670 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:59.263 UTC [cauthdsl] func2 -> DEBU 1ab9 0xc00129d840 principal evaluation fails" +peer0.org2.example.com | [17e8 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 7d 3a 2a ba 95 02 20 34 c5 11 6e 57 97 9e 74 3a |}:*... 4..nW..t:| +peer1.org2.example.com | [1b1a 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1691 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3670 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:59.263 UTC [cauthdsl] func1 -> DEBU 1aba 0xc00129d840 gate 1574140979262593000 evaluation fails" +peer0.org2.example.com | [17e9 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 74 42 7c 38 12 d0 a6 c9 54 62 0d 77 ba 72 78 3a |tB|8....Tb.w.rx:| +peer1.org2.example.com | [1b1b 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1692 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +orderer0.example.com | "2019-11-19 05:22:59.263 UTC [policies] Evaluate -> DEBU 1abb Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [17ea 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 52 c4 62 b5 71 25 f2 |R.b.q%.| +peer1.org2.example.com | [1b1c 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +orderer0.example.com | "2019-11-19 05:22:59.263 UTC [policies] Evaluate -> DEBU 1abc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [17eb 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b1d 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1693 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer0.org1.example.com | [1791 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.263 UTC [policies] func1 -> DEBU 1abd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org2.example.com | [17ec 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fab5e0 gate 1574140934830264300 evaluation starts +peer1.org2.example.com | [1b1e 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer0.org1.example.com | [1792 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.263 UTC [policies] Evaluate -> DEBU 1abe Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org2.example.com | [17ed 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fab5e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b1f 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer0.org1.example.com | [1793 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.264 UTC [policies] Evaluate -> DEBU 1abf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org2.example.com | [17ee 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fab5e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1b20 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer0.org1.example.com | [1794 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.264 UTC [policies] Evaluate -> DEBU 1ac0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | [17ef 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fab5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b21 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer0.org1.example.com | [1795 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.264 UTC [policies] Evaluate -> DEBU 1ac1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [17f0 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fab5e0 principal evaluation fails +peer1.org2.example.com | [1b22 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1694 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3670 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1796 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +orderer0.example.com | "2019-11-19 05:22:59.264 UTC [policies] Evaluate -> DEBU 1ac2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [17f1 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fab5e0 gate 1574140934830264300 evaluation fails +peer1.org2.example.com | [1b23 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1695 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3670 gate 1574140935896817700 evaluation succeeds +peer0.org1.example.com | [1797 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.264 UTC [cauthdsl] func1 -> DEBU 1ac3 0xc0012a6530 gate 1574140979264549300 evaluation starts" +peer0.org2.example.com | [17f2 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b24 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1696 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1798 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +orderer0.example.com | "2019-11-19 05:22:59.264 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc0012a6530 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [17f3 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b25 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1697 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +orderer0.example.com | "2019-11-19 05:22:59.264 UTC [cauthdsl] func2 -> DEBU 1ac5 0xc0012a6530 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | [17f4 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b26 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1698 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1799 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +orderer0.example.com | "2019-11-19 05:22:59.264 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0012a6530 principal matched by identity 0" +peer0.org2.example.com | [17f5 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb50 gate 1574140934831906500 evaluation starts +peer1.org1.example.com | [1699 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b27 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +orderer0.example.com | "2019-11-19 05:22:59.265 UTC [msp.identity] Verify -> DEBU 1ac7 Verify: digest = 00000000 40 1a 8d 08 ea 55 8c 86 07 61 56 1b ae af 2f 40 |@....U...aV.../@| +peer0.org2.example.com | [17f6 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [169a 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1b28 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +orderer0.example.com | 00000010 69 dd f1 71 27 f1 c4 34 27 40 0a cc 03 6a 5e 7f |i..q'..4'@...j^.|" +peer0.org2.example.com | [17f7 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [169b 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b29 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU 1ac8 Verify: sig = 00000000 30 44 02 20 6e b9 a7 1f a3 55 9a be 5c d6 ac da |0D. n....U..\...| +peer0.org2.example.com | [17f8 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb50 principal matched by identity 0 +peer1.org1.example.com | [169c 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b2a 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 6b 34 eb 1f d5 31 |k4...1| +orderer0.example.com | 00000010 23 5f c5 8e 85 23 1c 9d 9a 96 3b fb 77 68 52 97 |#_...#....;.whR.| +peer0.org2.example.com | [17f9 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +peer1.org1.example.com | [169d 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b2b 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [179a 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000020 d1 13 ab 49 02 20 68 1a a9 8e fa a3 46 d5 39 73 |...I. h.....F.9s| +peer0.org2.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +peer1.org1.example.com | [169e 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b2c 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [179b 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000030 bc e3 b3 3a 6b 3d b2 e5 6f 00 fb 5b 87 e9 69 b1 |...:k=..o..[..i.| +peer0.org2.example.com | [17fa 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +peer1.org1.example.com | [169f 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b2d 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [179c 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 60 47 f5 c1 d7 a8 |`G....|" +peer0.org2.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +peer1.org1.example.com | [16a0 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b2e 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 cc 25 aa 71 10 1a d1 25 a7 62 88 c2 1c b8 51 |..%.q...%.b....Q| +peer0.org1.example.com | [179d 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +orderer0.example.com | "2019-11-19 05:22:59.265 UTC [cauthdsl] func2 -> DEBU 1ac9 0xc0012a6530 principal evaluation succeeds for identity 0" +peer0.org2.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +peer1.org1.example.com | [16a1 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | 00000010 c4 0f 4f 3d 2f 1d c1 a5 c7 59 b8 6f 92 c8 94 6e |..O=/....Y.o...n| +peer0.org1.example.com | [179e 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.265 UTC [cauthdsl] func1 -> DEBU 1aca 0xc0012a6530 gate 1574140979264549300 evaluation succeeds" +peer0.org2.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +peer1.org2.example.com | [1b2f 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 57 25 7a 99 a9 4c 02 03 ba e1 3a |0D. .W%z..L....:| +peer0.org1.example.com | [179f 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:59.265 UTC [policies] Evaluate -> DEBU 1acb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | 00000040 6b 34 eb 1f d5 31 |k4...1| +peer1.org1.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +peer1.org2.example.com | 00000010 33 26 cf 22 76 8d e6 01 86 e5 ca 38 39 3e db 84 |3&."v......89>..| +peer0.org1.example.com | [17a0 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:59.265 UTC [policies] Evaluate -> DEBU 1acc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [17fb 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [16a3 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +peer1.org2.example.com | 00000020 e9 f5 46 1c 02 20 61 4f ff 44 ec 0d 44 a2 0e db |..F.. aO.D..D...| +peer0.org1.example.com | [17a1 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:59.266 UTC [policies] Evaluate -> DEBU 1acd Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [17fc 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb50 gate 1574140934831906500 evaluation succeeds +peer1.org1.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +peer1.org2.example.com | 00000030 db f8 98 7b 7b d1 48 6e a8 02 04 aa fd a3 c4 86 |...{{.Hn........| +peer0.org1.example.com | [17a2 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:59.266 UTC [policies] Evaluate -> DEBU 1ace == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [17fd 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +peer1.org2.example.com | 00000040 b1 8a 25 86 2b ef |..%.+.| +peer0.org1.example.com | [17a3 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:59.266 UTC [policies] Evaluate -> DEBU 1acf Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [17fe 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17a4 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:59.266 UTC [policies] Evaluate -> DEBU 1ad0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [17ff 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 6b 34 eb 1f d5 31 |k4...1| +peer1.org2.example.com | [1b31 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [17a5 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 gate 1574140934844708200 evaluation starts +orderer0.example.com | "2019-11-19 05:22:59.266 UTC [common.deliver] deliverBlocks -> DEBU 1ad1 [channel: businesschannel] Received seekInfo (0xc000bb5540) start: > stop: > from 172.18.0.5:51682" +peer0.org2.example.com | [1800 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [16a4 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1b32 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [17a6 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:59.266 UTC [fsblkstorage] Next -> DEBU 1ad2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | [1801 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16a5 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b33 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [17a7 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:59.266 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +peer0.org2.example.com | [1802 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [16a6 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1b34 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [17a8 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:59.267 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad4 Remaining bytes=[38486], Going to peek [8] bytes" +peer0.org2.example.com | [1803 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [16a7 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b35 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17a9 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +orderer0.example.com | "2019-11-19 05:22:59.267 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad5 Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +peer0.org2.example.com | [1804 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [16a8 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b36 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +orderer0.example.com | "2019-11-19 05:22:59.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad6 blockbytes [38483] read from file [0]" +peer0.org2.example.com | [1805 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [16a9 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b37 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17aa 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +orderer0.example.com | "2019-11-19 05:22:59.268 UTC [common.deliver] deliverBlocks -> DEBU 1ad7 [channel: businesschannel] Delivering block for (0xc000bb5540) for 172.18.0.5:51682" +peer0.org2.example.com | [1806 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16aa 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b38 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +orderer0.example.com | "2019-11-19 05:22:59.268 UTC [common.deliver] deliverBlocks -> DEBU 1ad8 [channel: businesschannel] Done delivering to 172.18.0.5:51682 for (0xc000bb5540)" +peer0.org2.example.com | [1807 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16ab 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b39 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +orderer0.example.com | "2019-11-19 05:22:59.269 UTC [common.deliver] Handle -> DEBU 1ad9 Waiting for new SeekInfo from 172.18.0.5:51682" +peer0.org2.example.com | [1808 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16ac 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b3a 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +orderer0.example.com | "2019-11-19 05:22:59.269 UTC [common.deliver] Handle -> DEBU 1ada Attempting to read seek info message from 172.18.0.5:51682" +peer0.org2.example.com | [1809 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [16ad 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b3b 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000040 e0 f0 e8 f4 47 16 43 |....G.C| +orderer0.example.com | "2019-11-19 05:22:59.291 UTC [common.deliver] Handle -> WARN 1adb Error reading from 172.18.0.5:51682: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [180a 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ae 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469e30 gate 1574140935909023000 evaluation starts +peer1.org2.example.com | [1b3c 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17ab 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:59.291 UTC [orderer.common.server] func1 -> DEBU 1add Closing Deliver stream" +peer0.org2.example.com | [180b 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16af 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b3d 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:59.292 UTC [comm.grpc.server] 1 -> INFO 1ade streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51682 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.0601ms +peer0.org1.example.com | [17ac 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 gate 1574140934844708200 evaluation succeeds +peer0.org2.example.com | [180c 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16b0 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469e30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1b3e 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.291 UTC [grpc] infof -> DEBU 1adc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [17ad 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [180d 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16b1 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469e30 principal matched by identity 0 +peer1.org2.example.com | [1b3f 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1adf Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +peer0.org1.example.com | [17ae 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [180e 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [16b2 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer1.org2.example.com | [1b40 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:59.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ae0 Sending msg of 28 bytes to 3 on channel businesschannel took 23.8µs" +peer0.org1.example.com | [17af 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [180f 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer1.org2.example.com | [1b41 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ae1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.4µs " +peer0.org1.example.com | [17b0 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1810 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b3 11-19 05:22:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer1.org2.example.com | [1b42 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:59.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ae2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125µs " +peer0.org1.example.com | [17b1 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1811 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer1.org1.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer1.org2.example.com | [1b43 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [17b2 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1812 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer1.org1.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer1.org2.example.com | [1b44 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:59.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae4 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [17b3 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [1813 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer1.org2.example.com | [1b45 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.471 UTC [orderer.common.server] Deliver -> DEBU 1ae5 Starting new Deliver handler" +peer0.org1.example.com | [17b4 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer0.org2.example.com | [1814 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510071801 +peer1.org1.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer1.org2.example.com | [1b46 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.472 UTC [common.deliver] Handle -> DEBU 1ae6 Starting new deliver loop for 172.18.0.5:51684" +peer0.org1.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer0.org2.example.com | [1815 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 40264ACAEC42400D4721411DCA874F969523F19130B6558C8788337B2B7C35C5 +peer1.org1.example.com | [16b4 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469e30 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:59.472 UTC [common.deliver] Handle -> DEBU 1ae7 Attempting to read seek info message from 172.18.0.5:51684" +peer1.org2.example.com | [1b47 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17b5 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer0.org2.example.com | [1816 11-19 05:22:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer1.org1.example.com | [16b5 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469e30 gate 1574140935909023000 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:59.473 UTC [policies] Evaluate -> DEBU 1ae8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1b48 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer0.org2.example.com | [1817 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16b6 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:59.483 UTC [policies] Evaluate -> DEBU 1ae9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1b49 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer0.org2.example.com | [1818 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16b7 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:59.483 UTC [policies] Evaluate -> DEBU 1aea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [1b4a 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer0.org2.example.com | [1819 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16b8 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:59.483 UTC [policies] Evaluate -> DEBU 1aeb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1b4b 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer0.org2.example.com | [181a 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16b9 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:22:59.483 UTC [policies] Evaluate -> DEBU 1aec == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [1b4c 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b6 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [181b 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [16ba 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:22:59.484 UTC [cauthdsl] func1 -> DEBU 1aed 0xc001125470 gate 1574140979484034600 evaluation starts" +peer1.org2.example.com | [1b4d 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b7 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [181c 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16bb 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.484 UTC [cauthdsl] func2 -> DEBU 1aee 0xc001125470 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1b4e 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [17b8 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [181d 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16bc 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +orderer0.example.com | "2019-11-19 05:22:59.484 UTC [cauthdsl] func2 -> DEBU 1aef 0xc001125470 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1b4f 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b9 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [181e 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [16bd 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +orderer0.example.com | "2019-11-19 05:22:59.484 UTC [cauthdsl] func2 -> DEBU 1af0 0xc001125470 principal matched by identity 0" +peer1.org2.example.com | [1b50 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [17ba 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [181f 11-19 05:22:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1820 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.484 UTC [msp.identity] Verify -> DEBU 1af1 Verify: digest = 00000000 0f 09 98 c6 fc 52 2c 57 ee 35 dd 6f ed bc 6c e8 |.....R,W.5.o..l.| +peer1.org2.example.com | [1b51 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17bb 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1821 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 6b ff bc 67 33 38 b6 f0 f4 d8 07 3e 22 a5 aa 5e |k..g38.....>"..^|" +peer1.org1.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer1.org2.example.com | [1b52 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17bc 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1822 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.484 UTC [msp.identity] Verify -> DEBU 1af2 Verify: sig = 00000000 30 44 02 20 48 56 02 a3 77 5c 65 41 73 a4 74 60 |0D. HV..w\eAs.t`| +peer1.org1.example.com | [16be 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer1.org2.example.com | [1b53 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17bd 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1823 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 81 06 60 91 2b 49 6a 3b 63 b9 35 b5 3a 8b 56 31 |..`.+Ij;c.5.:.V1| +peer1.org1.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer1.org2.example.com | [1b55 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17be 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1824 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 ce 28 d6 75 02 20 59 56 85 17 1a df b2 d3 0d 07 |.(.u. YV........| +peer1.org1.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +peer1.org2.example.com | [1b54 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17bf 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1825 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | 00000030 81 92 8a 26 83 15 b7 07 cd bb 32 0c 5d b0 3c 25 |...&......2.].<%| +peer1.org1.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer1.org2.example.com | [1b56 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17c0 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1826 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 5f 49 51 30 ff ba |_IQ0..|" +peer1.org1.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer1.org2.example.com | [1b57 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17c1 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1827 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.485 UTC [cauthdsl] func2 -> DEBU 1af3 0xc001125470 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [16bf 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b58 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17c2 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1828 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | "2019-11-19 05:22:59.485 UTC [cauthdsl] func1 -> DEBU 1af4 0xc001125470 gate 1574140979484034600 evaluation succeeds" +peer1.org1.example.com | [16c0 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b59 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [17c3 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1829 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b f5 f2 30 49 0c f6 fe 80 00 b9 aa 7c 14 f0 a4 |k..0I.......|...| +orderer0.example.com | "2019-11-19 05:22:59.485 UTC [policies] Evaluate -> DEBU 1af5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [16c1 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b5a 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [17c4 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 a5 dd df 75 b5 03 96 21 af 1e c8 44 bd fe 56 df |...u...!...D..V.| +orderer0.example.com | "2019-11-19 05:22:59.485 UTC [policies] Evaluate -> DEBU 1af6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [16c2 11-19 05:22:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b5b 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17c5 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 gate 1574140934853827500 evaluation starts +peer0.org2.example.com | [182a 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc e4 d5 b9 64 8c 50 80 9a 6b 39 |0E.!.....d.P..k9| +orderer0.example.com | "2019-11-19 05:22:59.485 UTC [policies] Evaluate -> DEBU 1af7 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [16c3 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b5c 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17c6 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 c5 69 4a c7 1c 2f 39 96 5b 01 6e 9f c8 78 49 6e |.iJ../9.[.n..xIn| +orderer0.example.com | "2019-11-19 05:22:59.486 UTC [policies] Evaluate -> DEBU 1af8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [16c4 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b5d 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17c7 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000020 c5 56 0a 1c 8d 02 20 2a 92 06 ea cb 76 39 fc db |.V.... *....v9..| +orderer0.example.com | "2019-11-19 05:22:59.486 UTC [policies] Evaluate -> DEBU 1af9 Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [16c5 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b5e 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17c8 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 principal matched by identity 0 +peer0.org2.example.com | 00000030 66 58 8f b4 0c 80 8c ee 0f a1 4c b9 d0 37 d6 eb |fX........L..7..| +orderer0.example.com | "2019-11-19 05:22:59.487 UTC [policies] Evaluate -> DEBU 1afa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [16c6 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b5f 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17c9 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +peer0.org2.example.com | 00000040 f8 39 8f 78 81 8e e2 |.9.x...| +peer1.org1.example.com | [16c7 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b60 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.487 UTC [common.deliver] deliverBlocks -> DEBU 1afb [channel: testchainid] Received seekInfo (0xc00095f380) start: > stop: > from 172.18.0.5:51684" +peer0.org1.example.com | 00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +peer1.org1.example.com | [16c8 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [182b 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b61 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +orderer0.example.com | "2019-11-19 05:22:59.487 UTC [fsblkstorage] Next -> DEBU 1afc Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org1.example.com | [16c9 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [17ca 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +peer0.org2.example.com | [182c 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1b62 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.488 UTC [fsblkstorage] newBlockfileStream -> DEBU 1afd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +peer1.org1.example.com | [16ca 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +peer0.org2.example.com | [182d 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1b63 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.488 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afe Remaining bytes=[27692], Going to peek [8] bytes" +peer1.org1.example.com | [16cb 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +peer0.org2.example.com | [182e 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1b64 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.488 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aff Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +peer1.org1.example.com | [16cc 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +peer0.org2.example.com | [182f 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1b65 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b00 blockbytes [27689] read from file [0]" +peer1.org1.example.com | [16cd 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 e2 8a 16 3a 1d 12 |...:..| +peer1.org2.example.com | [1b66 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +orderer0.example.com | "2019-11-19 05:22:59.489 UTC [common.deliver] deliverBlocks -> DEBU 1b01 [channel: testchainid] Delivering block for (0xc00095f380) for 172.18.0.5:51684" +peer1.org1.example.com | [16ce 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17cb 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1830 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b67 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.490 UTC [common.deliver] deliverBlocks -> DEBU 1b02 [channel: testchainid] Done delivering to 172.18.0.5:51684 for (0xc00095f380)" +peer1.org1.example.com | [16cf 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [17cc 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 gate 1574140934853827500 evaluation succeeds +peer0.org2.example.com | [1831 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.490 UTC [common.deliver] Handle -> DEBU 1b03 Waiting for new SeekInfo from 172.18.0.5:51684" +peer1.org2.example.com | [1b68 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [17cd 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [16d0 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1832 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.490 UTC [common.deliver] Handle -> DEBU 1b04 Attempting to read seek info message from 172.18.0.5:51684" +peer1.org2.example.com | [1b69 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17ce 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1833 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b05 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1b6a 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [16d1 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [17cf 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1834 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b06 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +peer1.org2.example.com | [1b6b 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [16d2 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d0 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1835 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " +peer1.org2.example.com | [1b6c 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [16d3 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:1\210p" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d1 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1836 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:59.508 UTC [grpc] infof -> DEBU 1b08 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [1b6d 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [16d4 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d2 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1837 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.508 UTC [common.deliver] Handle -> WARN 1b09 Error reading from 172.18.0.5:51684: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [1b6e 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fae9a0 gate 1574140942866881600 evaluation starts +peer1.org1.example.com | [16d5 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\210p" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d3 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [1838 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.515 UTC [orderer.common.server] func1 -> DEBU 1b0a Closing Deliver stream" +peer1.org2.example.com | [1b6f 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fae9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [16d6 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [17d4 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +peer0.org2.example.com | [1839 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:59.515 UTC [comm.grpc.server] 1 -> INFO 1b0b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51684 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.4186ms +peer1.org2.example.com | [1b70 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fae9a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [16d7 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +peer0.org1.example.com | 00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +peer0.org2.example.com | [183b 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.724 UTC [orderer.common.server] Deliver -> DEBU 1b0c Starting new Deliver handler" +peer1.org2.example.com | [1b71 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fae9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +peer0.org1.example.com | [17d5 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +peer0.org2.example.com | [183c 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.724 UTC [common.deliver] Handle -> DEBU 1b0d Starting new deliver loop for 172.18.0.5:51686" +peer1.org2.example.com | [1b72 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fae9a0 principal evaluation fails +peer1.org1.example.com | [16d8 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +peer0.org1.example.com | 00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +peer0.org2.example.com | [183a 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.725 UTC [common.deliver] Handle -> DEBU 1b0e Attempting to read seek info message from 172.18.0.5:51686" +peer1.org2.example.com | [1b73 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fae9a0 gate 1574140942866881600 evaluation fails +peer1.org1.example.com | 00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +peer0.org1.example.com | 00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +peer0.org2.example.com | [183d 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.725 UTC [policies] Evaluate -> DEBU 1b0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1b74 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +peer0.org1.example.com | 00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +peer0.org2.example.com | [183e 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.725 UTC [policies] Evaluate -> DEBU 1b10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1b75 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +peer0.org1.example.com | 00000040 eb 91 0c 98 35 67 ce |....5g.| +peer0.org2.example.com | [183f 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +orderer0.example.com | "2019-11-19 05:22:59.725 UTC [policies] Evaluate -> DEBU 1b11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [1b76 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000040 cf c7 3e 31 88 70 |..>1.p| +peer0.org1.example.com | [17d6 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1840 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.725 UTC [policies] Evaluate -> DEBU 1b12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1b77 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faef10 gate 1574140942868757900 evaluation starts +peer1.org1.example.com | [16d9 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | [17d7 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1841 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.726 UTC [policies] Evaluate -> DEBU 1b13 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [1b78 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faef10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [17d8 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1842 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.727 UTC [cauthdsl] func1 -> DEBU 1b14 0xc000d4cbe0 gate 1574140979727205200 evaluation starts" +peer1.org2.example.com | [1b79 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faef10 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [16da 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 7d 35 b2 20 5a 67 0d 9c ea ef |0E.!..}5. Zg....| +peer0.org1.example.com | [17d9 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +peer0.org2.example.com | [1843 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.727 UTC [cauthdsl] func2 -> DEBU 1b15 0xc000d4cbe0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1b7a 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faef10 principal matched by identity 0 +peer1.org1.example.com | 00000010 3a 08 c2 99 13 03 81 35 62 82 4d 67 03 e4 a8 4b |:......5b.Mg...K| +peer0.org1.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +peer0.org2.example.com | [1844 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.727 UTC [cauthdsl] func2 -> DEBU 1b16 0xc000d4cbe0 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | [1b7b 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer1.org1.example.com | 00000020 a6 2e 37 65 bf 02 20 7d c7 b2 27 df b6 59 82 d2 |..7e.. }..'..Y..| +peer0.org1.example.com | [17da 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +peer0.org2.example.com | [1845 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:22:59.728 UTC [cauthdsl] func2 -> DEBU 1b17 0xc000d4cbe0 principal matched by identity 0" +peer1.org2.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer1.org1.example.com | 00000030 bb e4 82 79 17 a9 cb 02 38 59 41 65 2f c1 e4 9a |...y....8YAe/...| +peer0.org1.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +peer0.org2.example.com | [1846 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.728 UTC [msp.identity] Verify -> DEBU 1b18 Verify: digest = 00000000 c5 ec 96 de a7 ef e1 a3 44 d8 39 da 31 70 4e a9 |........D.9.1pN.| +peer1.org2.example.com | [1b7c 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer1.org1.example.com | 00000040 d3 1b 70 24 38 cd 9f |..p$8..| +peer0.org1.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +peer0.org2.example.com | [1847 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | 00000010 bd 03 1f 81 e1 ae 5e 14 5b e7 46 61 30 f6 fb 54 |......^.[.Fa0..T|" +peer1.org2.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer1.org1.example.com | [16db 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.728 UTC [msp.identity] Verify -> DEBU 1b19 Verify: sig = 00000000 30 44 02 20 67 fd 09 cd 8b 5c f2 e5 44 51 3e f4 |0D. g....\..DQ>.| +peer1.org2.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer1.org1.example.com | [16dc 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | 00000040 6b 34 eb 1f d5 31 |k4...1| +peer0.org2.example.com | [1849 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 7c 63 e0 83 06 b4 17 b7 04 80 57 98 65 5d 60 38 ||c........W.e]`8| +peer1.org2.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer1.org1.example.com | [16dd 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [17db 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [184a 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 0e fc 76 9b 02 20 5a c5 52 b8 93 82 07 65 62 80 |..v.. Z.R....eb.| +peer1.org2.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer1.org1.example.com | [16de 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [17dc 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000030 92 33 71 b5 75 1d c8 9a 4d fe 07 8a 6c be 21 f6 |.3q.u...M...l.!.| +peer0.org2.example.com | [184b 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b7d 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faef10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [16df 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [17dd 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 a8 d3 0f c1 da 4d |.....M|" +peer0.org2.example.com | [184c 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1b7e 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faef10 gate 1574140942868757900 evaluation succeeds +peer1.org1.example.com | [16e0 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17de 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.729 UTC [cauthdsl] func2 -> DEBU 1b1a 0xc000d4cbe0 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [184d 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +peer1.org2.example.com | [1b7f 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [16e1 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17df 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.729 UTC [cauthdsl] func1 -> DEBU 1b1b 0xc000d4cbe0 gate 1574140979727205200 evaluation succeeds" +peer0.org2.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +peer1.org2.example.com | [1b80 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [16e2 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17e0 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.729 UTC [policies] Evaluate -> DEBU 1b1c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [184e 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer1.org2.example.com | [1b81 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [16e3 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | [17e1 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +orderer0.example.com | "2019-11-19 05:22:59.729 UTC [policies] Evaluate -> DEBU 1b1d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer1.org2.example.com | [1b82 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [16e4 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17e2 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.729 UTC [policies] Evaluate -> DEBU 1b1e Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer1.org2.example.com | [1b83 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16e5 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17e3 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.730 UTC [policies] Evaluate -> DEBU 1b1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer1.org2.example.com | [1b84 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [16e6 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17e4 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.730 UTC [policies] Evaluate -> DEBU 1b20 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer1.org2.example.com | [1b85 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [16e7 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [17e5 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.730 UTC [policies] Evaluate -> DEBU 1b21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [184f 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | [1b86 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [16e8 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17e6 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.730 UTC [common.deliver] deliverBlocks -> DEBU 1b22 [channel: testchainid] Received seekInfo (0xc000bb4180) start: > stop: > from 172.18.0.5:51686" +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [16e9 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:1\210p" secret_envelope: > alive: +peer0.org1.example.com | [17e7 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b87 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:59.730 UTC [fsblkstorage] Next -> DEBU 1b23 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org2.example.com | [1850 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 4f a2 24 1a 1c 4e 61 6d e2 18 e8 |0D. .O.$..Nam...| +peer1.org1.example.com | [16ea 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [17e8 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b88 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.736 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b24 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +peer0.org2.example.com | 00000010 08 b0 ec a2 ba db 59 81 16 01 77 76 51 e8 99 08 |......Y...wvQ...| +peer1.org1.example.com | [16eb 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17e9 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b89 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b25 Remaining bytes=[27692], Going to peek [8] bytes" +peer0.org2.example.com | 00000020 a2 b0 d1 06 02 20 41 16 ef 6a 19 95 07 b0 54 9e |..... A..j....T.| +peer1.org1.example.com | [16ec 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17ea 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [1b8a 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.739 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b26 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +peer0.org2.example.com | 00000030 ab 55 ec 21 08 97 e1 bb 98 06 83 4d b6 9f bf 68 |.U.!.......M...h| +peer1.org1.example.com | [16ed 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [1b8b 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +orderer0.example.com | "2019-11-19 05:22:59.740 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b27 blockbytes [27689] read from file [0]" +peer0.org2.example.com | 00000040 36 40 42 27 8e 68 |6@B'.h| +peer1.org1.example.com | [16ee 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [17eb 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [1b8c 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.740 UTC [common.deliver] deliverBlocks -> DEBU 1b28 [channel: testchainid] Delivering block for (0xc000bb4180) for 172.18.0.5:51686" +peer0.org2.example.com | [1851 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [16ef 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [1b8d 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.741 UTC [common.deliver] deliverBlocks -> DEBU 1b29 [channel: testchainid] Done delivering to 172.18.0.5:51686 for (0xc000bb4180)" +peer0.org2.example.com | [1852 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [16f0 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [1b8e 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1853 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:59.741 UTC [common.deliver] Handle -> DEBU 1b2a Waiting for new SeekInfo from 172.18.0.5:51686" +peer1.org1.example.com | [16f1 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [1b8f 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1854 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:22:59.742 UTC [common.deliver] Handle -> DEBU 1b2b Attempting to read seek info message from 172.18.0.5:51686" +peer1.org1.example.com | [16f2 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [1b90 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1855 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:22:59.760 UTC [policies] Evaluate -> DEBU 1b2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [16f3 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17ec 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [1b91 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1856 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.760 UTC [policies] Evaluate -> DEBU 1b2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [16f4 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1b92 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\333\204\351\365F\034\002 aO\377D\354\rD\242\016\333\333\370\230{{\321Hn\250\002\004\252\375\243\304\206\261\212%\206+\357" > alive: alive: alive: +peer0.org2.example.com | [1857 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.761 UTC [policies] Evaluate -> DEBU 1b2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [16f5 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17ed 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [1b93 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1858 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.761 UTC [policies] Evaluate -> DEBU 1b2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [16f6 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [1b94 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1859 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +orderer0.example.com | "2019-11-19 05:22:59.761 UTC [policies] Evaluate -> DEBU 1b30 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [16f7 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [1b95 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [185a 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.762 UTC [cauthdsl] func1 -> DEBU 1b31 0xc00122cc70 gate 1574140979762111300 evaluation starts" +peer1.org1.example.com | [16f8 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [1b96 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [185b 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:22:59.762 UTC [cauthdsl] func2 -> DEBU 1b32 0xc00122cc70 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [16f9 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1b97 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [185c 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:59.762 UTC [cauthdsl] func2 -> DEBU 1b33 0xc00122cc70 processing identity 0 with bytes of fd6070" +peer1.org1.example.com | [16fa 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 57 d1 02 4d b6 0a 9f a6 a8 48 bc 0a 58 39 99 |.W..M.....H..X9.| +peer0.org1.example.com | [17ee 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b98 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [185d 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | "2019-11-19 05:22:59.762 UTC [cauthdsl] func2 -> DEBU 1b34 0xc00122cc70 principal matched by identity 0" +peer1.org1.example.com | 00000010 0c 7f 19 4d 4f 33 22 69 01 dd c2 54 1e 6d d0 f9 |...MO3"i...T.m..| +peer0.org1.example.com | [17ef 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b99 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [185e 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.762 UTC [msp.identity] Verify -> DEBU 1b35 Verify: digest = 00000000 aa b9 cc 4a 24 6c 34 ae ab 8b 0a cc be 2e 96 63 |...J$l4........c| +peer1.org1.example.com | [16fb 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 22 5f 17 9f a1 14 5d f8 0a 6c d8 |0D. B"_....]..l.| +peer0.org1.example.com | [17f0 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b9a 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [185f 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 14 42 68 44 f4 cf 43 ca 28 9d 6c 0a 60 77 af 1f |.BhD..C.(.l.`w..|" +peer1.org1.example.com | 00000010 31 62 2d 3e e1 d5 fd 10 3d fc 83 0f e5 48 fd ec |1b->....=....H..| +peer0.org1.example.com | [17f1 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b9c 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1860 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.763 UTC [msp.identity] Verify -> DEBU 1b36 Verify: sig = 00000000 30 45 02 21 00 b8 eb c1 8b 48 d8 f0 8d 84 da f3 |0E.!.....H......| +peer1.org1.example.com | 00000020 4a 58 67 90 02 20 45 db d8 2c bc fe b1 f7 36 59 |JXg.. E..,....6Y| +peer0.org1.example.com | [17f2 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b9d 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1861 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 4d cd f4 b9 f7 45 8c 3d 39 ab 55 1c d8 15 65 7f |M....E.=9.U...e.| +peer1.org1.example.com | 00000030 77 9a e6 40 05 72 23 e7 1d 05 de b0 14 ef 15 9c |w..@.r#.........| +peer0.org1.example.com | [17f3 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b9e 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1862 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 a3 8f fb 11 c2 02 20 5f 58 5f 21 97 fd b3 0f e6 |...... _X_!.....| +peer1.org1.example.com | 00000040 b1 d9 7c ea af 84 |..|...| +peer0.org1.example.com | [17f4 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b9b 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1863 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 1b c8 10 18 74 39 c5 84 5b 03 0f 9e de e6 c0 2a |....t9..[......*| +peer1.org1.example.com | [16fc 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17f5 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b9f 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1864 11-19 05:22:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 32 ba ff ad 60 39 57 |2...`9W|" +peer1.org1.example.com | [16fd 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer0.org1.example.com | [17f6 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ba0 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.763 UTC [cauthdsl] func2 -> DEBU 1b37 0xc00122cc70 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [1865 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16fe 11-19 05:22:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer0.org1.example.com | [17f7 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ba1 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.763 UTC [cauthdsl] func1 -> DEBU 1b38 0xc00122cc70 gate 1574140979762111300 evaluation succeeds" +peer0.org2.example.com | [1866 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16ff 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer0.org1.example.com | [17f8 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 gate 1574140935312881700 evaluation starts +peer1.org2.example.com | [1ba2 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b39 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1867 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1700 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer0.org1.example.com | [17f9 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ba3 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1868 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1701 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [17fa 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1ba4 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3b Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [186a 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1702 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [17fb 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 principal matched by identity 0 +peer1.org2.example.com | [1ba5 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [186b 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1703 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [17fc 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [1ba6 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3d Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [186c 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1704 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1ba7 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [186d 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1705 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [17fd 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [1ba8 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.765 UTC [common.deliver] deliverBlocks -> DEBU 1b3f [channel: testchainid] Received seekInfo (0xc000bb4640) start: > stop: > from 172.18.0.5:51686" +peer0.org2.example.com | [186e 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1706 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [1ba9 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.765 UTC [fsblkstorage] Next -> DEBU 1b40 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org2.example.com | [186f 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1707 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [1baa 11-19 05:22:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.765 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b41 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [1870 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [1708 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [1bab 11-19 05:22:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.766 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b42 Remaining bytes=[47979], Going to peek [8] bytes" +peer0.org2.example.com | [1871 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1709 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1bac 11-19 05:22:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.766 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b43 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [1869 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [170a 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17fe 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1bad 11-19 05:22:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:22:59.766 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b44 blockbytes [20284] read from file [0]" +peer0.org2.example.com | [1872 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [170b 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [17ff 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 gate 1574140935312881700 evaluation succeeds +peer1.org2.example.com | [1bae 11-19 05:22:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:22:59.766 UTC [common.deliver] deliverBlocks -> DEBU 1b45 [channel: testchainid] Delivering block for (0xc000bb4640) for 172.18.0.5:51686" +peer0.org2.example.com | [1873 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [170c 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1800 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1baf 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151022 +orderer0.example.com | "2019-11-19 05:22:59.767 UTC [common.deliver] deliverBlocks -> DEBU 1b46 [channel: testchainid] Done delivering to 172.18.0.5:51686 for (0xc000bb4640)" +peer0.org2.example.com | [1874 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [170d 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1801 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bb0 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A84A698B402115B5DBC142706B4DE322536856812854EDED87C248DDD4304EA8 +orderer0.example.com | "2019-11-19 05:22:59.767 UTC [common.deliver] Handle -> DEBU 1b47 Waiting for new SeekInfo from 172.18.0.5:51686" +peer0.org2.example.com | [1875 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [170e 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1802 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1bb1 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:22:59.768 UTC [common.deliver] Handle -> DEBU 1b48 Attempting to read seek info message from 172.18.0.5:51686" +peer0.org2.example.com | [1876 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [170f 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1803 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1bb2 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2019-11-19 05:22:59.778 UTC [grpc] infof -> DEBU 1b49 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [1877 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1710 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1804 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bb3 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer0.example.com | "2019-11-19 05:22:59.778 UTC [common.deliver] Handle -> WARN 1b4a Error reading from 172.18.0.5:51686: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [1878 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1711 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ebc90 gate 1574140939435187100 evaluation starts +peer0.org1.example.com | [1805 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bb4 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:mB_l\270\226=(\353\221\305\030\373\217\032\206\277\004G9" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:22:59.778 UTC [orderer.common.server] func1 -> DEBU 1b4b Closing Deliver stream" +peer0.org2.example.com | [1879 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1712 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ebc90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bb5 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1806 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:22:59.778 UTC [comm.grpc.server] 1 -> INFO 1b4c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51686 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.5223ms +peer0.org2.example.com | [187a 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040941a0 gate 1574140935783059800 evaluation starts +peer1.org1.example.com | [1713 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ebc90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1bb6 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1807 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:59.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4d Sending msg of 28 bytes to 3 on channel businesschannel took 23.8µs" +peer0.org2.example.com | [187b 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040941a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1714 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ebc90 principal matched by identity 0 +peer1.org2.example.com | [1bb7 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1808 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:59.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4e Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +peer0.org2.example.com | [187c 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040941a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1715 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer1.org2.example.com | [1bb8 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1809 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:59.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171µs " +peer0.org2.example.com | [187d 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040941a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer1.org2.example.com | [1bb9 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [180a 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [187e 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040941a0 principal evaluation fails +orderer0.example.com | "2019-11-19 05:22:59.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.3µs " +peer1.org1.example.com | [1716 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer1.org2.example.com | [1bba 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [180b 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [187f 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040941a0 gate 1574140935783059800 evaluation fails +orderer0.example.com | "2019-11-19 05:22:59.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b51 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer1.org2.example.com | [1bbb 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:mB_l\270\226=(\353\221\305\030\373\217\032\206\277\004G9" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [180c 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 gate 1574140935315124400 evaluation starts +peer0.org2.example.com | [1880 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:59.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b52 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer0.org1.example.com | [180d 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bbc 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1881 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:22:59.987 UTC [orderer.common.server] Deliver -> DEBU 1b53 Starting new Deliver handler" +peer1.org1.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer0.org1.example.com | [180e 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1bbd 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1882 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:59.987 UTC [common.deliver] Handle -> DEBU 1b54 Starting new deliver loop for 172.18.0.5:51688" +peer1.org1.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer0.org1.example.com | [180f 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 principal matched by identity 0 +peer1.org2.example.com | [1bbe 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1883 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094710 gate 1574140935783989400 evaluation starts +orderer0.example.com | "2019-11-19 05:22:59.987 UTC [common.deliver] Handle -> DEBU 1b55 Attempting to read seek info message from 172.18.0.5:51688" +peer1.org1.example.com | [1717 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ebc90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1810 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1bbf 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1884 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094710 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [1718 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ebc90 gate 1574140939435187100 evaluation succeeds +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1bc0 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1885 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094710 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1719 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1811 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1bc1 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1886 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094710 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b58 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [171a 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1bc2 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1887 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 bc da 02 d2 92 5c c2 d8 0e 4e 85 00 4b c3 9a |......\...N..K..| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [171b 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [1bc3 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | 00000010 b5 31 27 89 fe 62 b5 de 15 e4 69 07 7b 81 42 d7 |.1'..b....i.{.B.| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b5a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [171c 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [1bc4 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [cauthdsl] func1 -> DEBU 1b5b 0xc000c75710 gate 1574140979988238800 evaluation starts" +peer0.org2.example.com | [1888 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 73 33 59 a4 bd a2 78 2a df 54 |0E.!..s3Y...x*.T| +peer1.org1.example.com | [171d 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1bc5 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [cauthdsl] func2 -> DEBU 1b5c 0xc000c75710 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | 00000010 00 d3 7b 4e 19 43 e2 57 7e df 8f 28 a6 6e da 03 |..{N.C.W~..(.n..| +peer1.org1.example.com | [171e 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1812 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [cauthdsl] func2 -> DEBU 1b5d 0xc000c75710 processing identity 0 with bytes of fd6070" +peer0.org2.example.com | 00000020 32 a9 cf ce a8 02 20 55 a7 9f 8e 13 5b 30 b7 91 |2..... U....[0..| +peer1.org1.example.com | [171f 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1813 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 gate 1574140935315124400 evaluation succeeds +peer1.org2.example.com | [1bc6 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [cauthdsl] func2 -> DEBU 1b5e 0xc000c75710 principal matched by identity 0" +peer0.org2.example.com | 00000030 96 cd d7 e2 85 79 b2 01 c9 35 c2 f1 a9 38 c5 40 |.....y...5...8.@| +peer1.org1.example.com | [1720 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1814 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [msp.identity] Verify -> DEBU 1b5f Verify: digest = 00000000 fb 47 b3 c6 de 2a 67 16 12 d5 ab 25 1d 20 4d 8e |.G...*g....%. M.| +peer0.org2.example.com | 00000040 71 b7 09 f3 b1 7c 44 |q....|D| +peer1.org1.example.com | [1721 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1815 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +orderer0.example.com | 00000010 5f 7b bb 30 af 88 0e 5c 6c e1 b9 98 03 bc 00 68 |_{.0...\l......h|" +peer0.org2.example.com | [1889 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094710 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1722 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1816 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [msp.identity] Verify -> DEBU 1b60 Verify: sig = 00000000 30 45 02 21 00 b9 fd 46 9d 1a 26 2e 67 0f bb 17 |0E.!...F..&.g...| +peer0.org2.example.com | [188a 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094710 gate 1574140935783989400 evaluation succeeds +peer1.org1.example.com | [1723 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1817 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 d4 ee 0e e0 32 5d |....2]| +orderer0.example.com | 00000010 a3 74 b6 56 f5 54 7d cd ff 68 68 f9 e5 c0 2c c0 |.t.V.T}..hh...,.| +peer0.org2.example.com | [188b 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1724 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [1818 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bc7 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +orderer0.example.com | 00000020 6c ed 32 75 de 02 20 31 e0 a5 7b 7f 14 c3 a5 31 |l.2u.. 1..{....1| +peer0.org2.example.com | [188c 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1725 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1819 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +orderer0.example.com | 00000030 50 e0 e9 a3 17 10 2d 43 e6 a8 eb b2 1b dd a6 74 |P.....-C.......t| +peer0.org2.example.com | [188d 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1726 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [181a 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bc8 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ce c5 63 a5 4e 13 39 23 31 73 |0E.!....c.N.9#1s| +orderer0.example.com | 00000040 01 5a c2 0c 41 27 6d |.Z..A'm|" +peer0.org2.example.com | [188e 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1727 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [181b 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 c6 74 aa cd 15 1c 8f f5 5a 9f 14 c0 18 70 ff b4 |.t......Z....p..| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [cauthdsl] func2 -> DEBU 1b61 0xc000c75710 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [188f 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1728 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [181c 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 47 70 83 77 4a 02 20 27 5a 55 4d 90 31 c8 da 97 |Gp.wJ. 'ZUM.1...| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [cauthdsl] func1 -> DEBU 1b62 0xc000c75710 gate 1574140979988238800 evaluation succeeds" +peer0.org2.example.com | [1890 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1729 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > alive:1\210p" > alive: +peer0.org1.example.com | [181d 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 29 29 3e 6d 42 5f 6c b8 96 3d 28 eb 91 c5 18 fb |))>mB_l..=(.....| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b63 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1891 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [172a 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [181e 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 8f 1a 86 bf 04 47 39 |.....G9| +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b64 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1892 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [172b 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bc9 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [181f 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b65 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1893 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [172c 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bca 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1820 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b66 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1894 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [172d 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1bcb 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1821 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b67 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [1895 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [172e 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bcc 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1822 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [1896 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [172f 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bcd 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1823 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 gate 1574140935317526000 evaluation starts +orderer0.example.com | "2019-11-19 05:22:59.988 UTC [common.deliver] deliverBlocks -> DEBU 1b69 [channel: testchainid] Received seekInfo (0xc000bb4e40) start: > stop: > from 172.18.0.5:51688" +peer0.org2.example.com | [1897 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1730 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 551137968960121392, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bce 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1824 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:22:59.990 UTC [fsblkstorage] Next -> DEBU 1b6a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org2.example.com | [1898 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1731 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bcf 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1825 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:22:59.990 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b6b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [1899 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1732 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 551137968960121392, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bd0 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1826 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:22:59.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6c Remaining bytes=[47979], Going to peek [8] bytes" +peer0.org2.example.com | [189a 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1733 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1bd1 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1827 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +orderer0.example.com | "2019-11-19 05:22:59.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6d Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [189b 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1734 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +peer1.org2.example.com | [1bd2 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +orderer0.example.com | "2019-11-19 05:22:59.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6e blockbytes [20284] read from file [0]" +peer0.org2.example.com | [189c 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15101C +peer1.org1.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer1.org2.example.com | [1bd3 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1828 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +orderer0.example.com | "2019-11-19 05:22:59.990 UTC [common.deliver] deliverBlocks -> DEBU 1b6f [channel: testchainid] Delivering block for (0xc000bb4e40) for 172.18.0.5:51688" +peer0.org2.example.com | [189d 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0BB18F0A39AD7656B83F78C4D45B44C946ADF7773F31FC9DC805735D2FCF750B +peer1.org1.example.com | [1735 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer1.org2.example.com | [1bd4 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +orderer0.example.com | "2019-11-19 05:22:59.991 UTC [common.deliver] deliverBlocks -> DEBU 1b70 [channel: testchainid] Done delivering to 172.18.0.5:51688 for (0xc000bb4e40)" +peer0.org2.example.com | [189e 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer1.org2.example.com | [1bd5 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +orderer0.example.com | "2019-11-19 05:22:59.991 UTC [common.deliver] Handle -> DEBU 1b71 Waiting for new SeekInfo from 172.18.0.5:51688" +peer0.org2.example.com | [189f 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +peer1.org2.example.com | [1bd6 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +orderer0.example.com | "2019-11-19 05:22:59.991 UTC [common.deliver] Handle -> DEBU 1b72 Attempting to read seek info message from 172.18.0.5:51688" +peer0.org2.example.com | [18a0 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer1.org2.example.com | [1bd7 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +orderer0.example.com | "2019-11-19 05:22:59.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b73 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [18a1 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer1.org2.example.com | [1bd8 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026690 gate 1574140943470626400 evaluation starts +peer0.org1.example.com | [1829 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:22:59.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b74 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +peer0.org2.example.com | [18a2 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1736 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [1bd9 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [182a 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 gate 1574140935317526000 evaluation succeeds +orderer0.example.com | "2019-11-19 05:22:59.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.5µs " +peer0.org2.example.com | [18a3 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [1bda 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026690 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [182b 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:23:00.005 UTC [common.deliver] Handle -> WARN 1b76 Error reading from 172.18.0.5:51688: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [18a4 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1737 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 b1 2b 82 fa a6 96 ac 93 97 20 bb |0D. B.+....... .| +peer1.org2.example.com | [1bdb 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [182c 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:23:00.006 UTC [orderer.common.server] func1 -> DEBU 1b77 Closing Deliver stream" +peer0.org2.example.com | [18a5 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 22 40 ee 8a dc 91 9d 13 83 6b 5e 10 0a 38 41 c4 |"@.......k^..8A.| +peer1.org2.example.com | [1bdc 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026690 principal evaluation fails +peer0.org1.example.com | [182d 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:00.005 UTC [grpc] infof -> DEBU 1b78 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [18a6 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | 00000020 9a 1f 36 a2 02 20 0c bf a6 eb 88 70 37 e6 72 fa |..6.. .....p7.r.| +peer1.org2.example.com | [1bdd 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026690 gate 1574140943470626400 evaluation fails +peer0.org1.example.com | [182e 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:00.006 UTC [comm.grpc.server] 1 -> INFO 1b79 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51688 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8568ms +peer0.org2.example.com | [18a7 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000030 07 51 4b b2 f1 06 5f 16 ac 3b 21 b6 2e 7d 8a 8a |.QK..._..;!..}..| +peer1.org2.example.com | [1bde 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [182f 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +orderer0.example.com | "2019-11-19 05:23:00.191 UTC [orderer.common.server] Deliver -> DEBU 1b7a Starting new Deliver handler" +peer0.org2.example.com | [18a8 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | 00000040 a9 e6 d5 f1 a0 31 |.....1| +peer1.org2.example.com | [1bdf 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +orderer0.example.com | "2019-11-19 05:23:00.191 UTC [common.deliver] Handle -> DEBU 1b7b Starting new deliver loop for 172.18.0.5:51690" +peer0.org2.example.com | [18a9 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1738 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1be0 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1830 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +orderer0.example.com | "2019-11-19 05:23:00.191 UTC [common.deliver] Handle -> DEBU 1b7c Attempting to read seek info message from 172.18.0.5:51690" +peer0.org2.example.com | [18aa 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1739 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1be1 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026c00 gate 1574140943472270700 evaluation starts +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +orderer0.example.com | "2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [18ab 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [173a 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1be2 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026c00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [18ac 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [173b 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1be3 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026c00 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [18ad 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [173c 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1be4 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026c00 principal matched by identity 0 +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [18ae 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b80 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [173d 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1be5 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer0.org1.example.com | [1831 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [18af 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b81 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer1.org1.example.com | [173e 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [18b0 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.194 UTC [cauthdsl] func1 -> DEBU 1b82 0xc000d71d00 gate 1574140980194093700 evaluation starts" +peer1.org2.example.com | [1be6 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer1.org1.example.com | [173f 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1832 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [18b1 11-19 05:22:15.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.194 UTC [cauthdsl] func2 -> DEBU 1b83 0xc000d71d00 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer1.org1.example.com | [1740 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [18b2 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:00.194 UTC [cauthdsl] func2 -> DEBU 1b84 0xc000d71d00 processing identity 0 with bytes of fd6070" +peer1.org2.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer1.org1.example.com | [1741 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [18b3 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:00.194 UTC [cauthdsl] func2 -> DEBU 1b85 0xc000d71d00 principal matched by identity 0" +peer1.org2.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer1.org1.example.com | [1742 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [18b4 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.194 UTC [msp.identity] Verify -> DEBU 1b86 Verify: digest = 00000000 4d 12 64 46 d1 b9 f6 75 d7 14 4f 75 cb 3d ed d4 |M.dF...u..Ou.=..| +peer1.org2.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer1.org1.example.com | [1743 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [18b5 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 38 55 a1 1a 09 61 71 4d e4 3e 0a 7a 17 3a 34 e5 |8U...aqM.>.z.:4.|" +peer1.org2.example.com | [1be7 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026c00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1744 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1833 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18b6 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:00.194 UTC [msp.identity] Verify -> DEBU 1b87 Verify: sig = 00000000 30 45 02 21 00 e6 ba f6 6d 34 3b 04 c6 57 cf 19 |0E.!....m4;..W..| +peer1.org2.example.com | [1be8 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004026c00 gate 1574140943472270700 evaluation succeeds +peer1.org1.example.com | [1745 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1834 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18b7 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 be 23 5f 5a a2 01 23 dd bf 6e 43 a7 8d d5 c8 5e |.#_Z..#..nC....^| +peer1.org2.example.com | [1be9 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1746 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [1835 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [18b8 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000020 0f 3c 4e 0c e2 02 20 26 00 ab 86 99 0b 9b 68 c0 |. DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [1836 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18b9 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000030 d6 d7 2b b1 91 64 5c a4 c1 a2 21 77 25 dd 05 a3 |..+..d\...!w%...| +peer1.org2.example.com | [1beb 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1747 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [1837 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18ba 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 06 d4 35 e7 9c 5a cf |..5..Z.|" +peer1.org2.example.com | [1bec 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [1838 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [18bb 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.194 UTC [cauthdsl] func2 -> DEBU 1b88 0xc000d71d00 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [1bed 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [1839 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [18bc 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.195 UTC [cauthdsl] func1 -> DEBU 1b89 0xc000d71d00 gate 1574140980194093700 evaluation succeeds" +peer1.org2.example.com | [1bee 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [183a 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [18bd 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.195 UTC [policies] Evaluate -> DEBU 1b8a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1bef 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [183b 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 gate 1574140935324263300 evaluation starts +peer0.org2.example.com | [18be 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.195 UTC [policies] Evaluate -> DEBU 1b8b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1bf0 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +peer1.org1.example.com | [174a 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [183c 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18bf 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.196 UTC [policies] Evaluate -> DEBU 1b8c Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +peer1.org1.example.com | [174b 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [183d 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [18c0 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.196 UTC [policies] Evaluate -> DEBU 1b8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1bf1 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +peer1.org1.example.com | [174c 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [183e 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 principal matched by identity 0 +peer0.org2.example.com | [18c1 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.196 UTC [policies] Evaluate -> DEBU 1b8e Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +peer1.org1.example.com | [174d 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [183f 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [18c2 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:00.196 UTC [policies] Evaluate -> DEBU 1b8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +peer1.org1.example.com | [174e 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [18c3 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.196 UTC [common.deliver] deliverBlocks -> DEBU 1b90 [channel: testchainid] Received seekInfo (0xc000bb5440) start: > stop: > from 172.18.0.5:51690" +peer1.org2.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +peer1.org1.example.com | [174f 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1840 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [18c4 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:00.197 UTC [fsblkstorage] Next -> DEBU 1b91 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org2.example.com | 00000040 d4 ee 0e e0 32 5d |....2]| +peer1.org1.example.com | [1750 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [18c6 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.197 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b92 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +peer1.org2.example.com | [1bf2 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1751 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [18c5 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:00.197 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b93 Remaining bytes=[27692], Going to peek [8] bytes" +peer1.org2.example.com | [1bf3 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1748 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [18c7 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.197 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b94 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +peer1.org2.example.com | [1bf4 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1749 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [18c9 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:00.197 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b95 blockbytes [27689] read from file [0]" +peer1.org2.example.com | [1bf5 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1752 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003671370 gate 1574140939632106500 evaluation starts +peer0.org1.example.com | [1841 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [18c8 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:00.197 UTC [common.deliver] deliverBlocks -> DEBU 1b96 [channel: testchainid] Delivering block for (0xc000bb5440) for 172.18.0.5:51690" +peer1.org2.example.com | [1bf6 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1753 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003671370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1842 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 gate 1574140935324263300 evaluation succeeds +peer0.org2.example.com | [18ca 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.198 UTC [common.deliver] deliverBlocks -> DEBU 1b97 [channel: testchainid] Done delivering to 172.18.0.5:51690 for (0xc000bb5440)" +peer1.org2.example.com | [1bf7 11-19 05:22:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1754 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003671370 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1843 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18cb 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:00.198 UTC [common.deliver] Handle -> DEBU 1b98 Waiting for new SeekInfo from 172.18.0.5:51690" +peer1.org2.example.com | [1bf8 11-19 05:22:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [1755 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003671370 principal matched by identity 0 +peer0.org1.example.com | [1844 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18cc 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:00.199 UTC [common.deliver] Handle -> DEBU 1b99 Attempting to read seek info message from 172.18.0.5:51690" +peer1.org2.example.com | [1bf9 11-19 05:22:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +peer1.org1.example.com | [1756 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [1845 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [18cd 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.209 UTC [grpc] infof -> DEBU 1b9a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [1846 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [18ce 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.209 UTC [common.deliver] Handle -> WARN 1b9b Error reading from 172.18.0.5:51690: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [1bfa 11-19 05:22:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +peer1.org1.example.com | [1757 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [1847 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18d0 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:00.209 UTC [orderer.common.server] func1 -> DEBU 1b9c Closing Deliver stream" +peer1.org2.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [1848 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [18d1 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:00.210 UTC [comm.grpc.server] 1 -> INFO 1b9d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51690 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.9311ms +peer1.org2.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | [1849 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18d2 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.370 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9e Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +peer1.org2.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [184a 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18cf 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:00.370 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9f Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | 00000040 d4 ee 0e e0 32 5d |....2]| +peer0.org1.example.com | [184b 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18d3 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:00.370 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.2µs " +peer1.org1.example.com | [1758 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003671370 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1bfb 11-19 05:22:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [184c 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [18d4 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:23:00.370 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.4µs " +peer1.org1.example.com | [1759 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003671370 gate 1574140939632106500 evaluation succeeds +peer1.org2.example.com | [1bfc 11-19 05:22:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [184d 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18d5 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15101D +orderer0.example.com | "2019-11-19 05:23:00.372 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1bfd 11-19 05:22:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [175a 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [184e 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18d6 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4B2F2E1E98F5513618D842C4A5EE20A58B4EA79DCB18AA0261DF211CAA6267D9 +orderer0.example.com | "2019-11-19 05:23:00.372 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1bfe 11-19 05:22:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [175b 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [184f 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [18d7 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2019-11-19 05:23:00.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1bff 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [175c 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1850 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [18d8 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2019-11-19 05:23:00.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba5 Sending msg of 28 bytes to 3 on channel testchainid took 9.5µs" +peer1.org2.example.com | [1c00 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [175d 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1851 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [18d9 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +orderer0.example.com | "2019-11-19 05:23:00.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 225.8µs " +peer1.org2.example.com | [1c01 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [175e 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1852 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 gate 1574140935329024100 evaluation starts +peer0.org2.example.com | [18da 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba7 Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +peer1.org2.example.com | [1c02 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [175f 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1853 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18db 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:00.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba8 Sending msg of 28 bytes to 2 on channel businesschannel took 9.1µs" +peer1.org2.example.com | [1c03 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1760 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1854 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [18dc 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.3µs " +peer1.org2.example.com | [1c04 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1761 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1855 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 principal matched by identity 0 +peer0.org2.example.com | [18dd 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1c05 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:00.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.1µs " +peer1.org1.example.com | [1762 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1856 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [18de 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1c06 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bab Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1763 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [18df 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c07 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bac Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1764 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1857 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [18e0 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c08 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bad Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1765 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [18e1 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c09 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bae Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +peer1.org1.example.com | [1766 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0500 gate 1574140939636142200 evaluation starts +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [18e2 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c0a 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:00.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.7µs " +peer1.org1.example.com | [1767 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0500 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [18e3 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c0b 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:01.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb0 Sending msg of 28 bytes to 2 on channel businesschannel took 36.5µs" +peer1.org1.example.com | [1768 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0500 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [18e4 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c0c 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +orderer0.example.com | "2019-11-19 05:23:01.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.3µs " +peer1.org1.example.com | [1769 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1858 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [18e5 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c0d 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:01.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [176a 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1859 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 gate 1574140935329024100 evaluation succeeds +peer0.org2.example.com | [18e6 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c0e 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:01.367 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb3 Sending msg of 28 bytes to 3 on channel businesschannel took 124.6µs" +peer1.org1.example.com | [176b 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [185a 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18e7 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c0f 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:01.368 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +peer1.org1.example.com | [176c 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0500 principal matched by identity 0 +peer0.org1.example.com | [185b 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18e8 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1c10 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:01.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [176d 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [185c 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [18e9 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer1.org2.example.com | [1c11 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +orderer0.example.com | "2019-11-19 05:23:01.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [185d 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer1.org2.example.com | [1c12 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:01.495 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb7 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +peer1.org1.example.com | [176e 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [18ea 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer0.org1.example.com | [185e 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +orderer0.example.com | "2019-11-19 05:23:01.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.5µs " +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer1.org2.example.com | [1c13 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:01.863 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb9 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [185f 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer1.org2.example.com | [1c14 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:01.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bba Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +peer1.org2.example.com | [1c15 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +orderer0.example.com | "2019-11-19 05:23:01.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.9µs " +peer1.org2.example.com | [1c16 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [18eb 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:23:01.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.6µs " +peer1.org2.example.com | [1c17 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [18ec 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:23:01.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c18 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 56 09 a6 c3 d9 9b 49 97 c4 98 5f 43 79 49 71 |.V.....I..._CyIq| +peer1.org1.example.com | [176f 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0500 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [18ed 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 0c 1b 9a f3 ea fb d3 43 79 24 55 9e 3d 12 30 53 |.......Cy$U.=.0S| +orderer0.example.com | "2019-11-19 05:23:01.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbe Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1770 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0500 gate 1574140939636142200 evaluation succeeds +peer0.org1.example.com | [1860 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18ee 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1c19 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 5d 6d be 18 15 50 10 0b 95 b1 |0E.!..]m...P....| +orderer0.example.com | "2019-11-19 05:23:01.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1771 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1861 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18ef 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +orderer0.example.com | "2019-11-19 05:23:01.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc0 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +peer1.org1.example.com | [1772 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 47 3c b3 21 72 95 6b 75 34 59 9c dd c1 a1 14 11 |G<.!r.ku4Y......| +peer0.org1.example.com | [1862 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +orderer0.example.com | "2019-11-19 05:23:01.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.9µs " +peer1.org2.example.com | 00000020 89 8d f7 b8 d2 02 20 33 84 59 ef b6 bd ae c1 ee |...... 3.Y......| +peer1.org1.example.com | [1773 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1863 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18f0 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +orderer0.example.com | "2019-11-19 05:23:02.366 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc2 Sending msg of 28 bytes to 2 on channel businesschannel took 53.1µs" +peer1.org2.example.com | 00000030 f7 cc 0b 57 1f bc 2b 4c 5c 3a 3b 6e 38 b4 9b a6 |...W..+L\:;n8...| +peer1.org1.example.com | [1774 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1864 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +orderer0.example.com | "2019-11-19 05:23:02.367 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc4 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +peer1.org2.example.com | 00000040 bc 54 0a c5 ac b9 7d |.T....}| +peer1.org1.example.com | [1775 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1865 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +orderer0.example.com | "2019-11-19 05:23:02.368 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 489.6µs " +peer1.org2.example.com | [1c1a 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1866 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +orderer0.example.com | "2019-11-19 05:23:02.367 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 319.9µs " +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [1776 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1867 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 29 8b ad a5 19 09 |).....| +orderer0.example.com | "2019-11-19 05:23:02.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc6 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c1b 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c bf e6 01 b3 79 87 e4 bc 5f b1 29 |0D. <....y..._.)| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [1868 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 gate 1574140935335829400 evaluation starts +peer0.org2.example.com | [18f1 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2019-11-19 05:23:02.371 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 bf 7b 20 b1 9a f5 b7 f8 5e 6d e4 e7 76 19 52 92 |.{ .....^m..v.R.| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [1869 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18f2 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:02.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000020 45 7e 5f 0c 02 20 6a 66 c1 c8 dc 09 0a 66 3d 3b |E~_.. jf.....f=;| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [186a 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [18f3 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:02.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc9 Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +peer1.org2.example.com | 00000030 93 37 b2 dc df 06 7a fd a2 83 b9 10 17 82 f5 f1 |.7....z.........| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [186b 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 principal matched by identity 0 +peer0.org2.example.com | [18f4 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:02.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +peer1.org2.example.com | 00000040 70 2a cf db 6c 50 |p*..lP| +peer1.org1.example.com | [1777 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [186c 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [18f5 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:02.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bcb Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +peer1.org2.example.com | [1c1c 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1778 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [18f6 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:02.871 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bce Sending msg of 28 bytes to 3 on channel businesschannel took 52.6µs" +peer1.org2.example.com | [1c1d 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1779 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186d 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [18f7 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +orderer0.example.com | "2019-11-19 05:23:02.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 518.8µs " +peer1.org2.example.com | [1c1e 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [177a 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [18f8 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +orderer0.example.com | "2019-11-19 05:23:02.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c1f 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [177b 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +orderer0.example.com | "2019-11-19 05:23:02.871 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115µs " +peer1.org2.example.com | [1c20 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [177c 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [18f9 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer1.org2.example.com | [1c21 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:02.872 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [177d 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer1.org2.example.com | [1c22 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:02.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [177e 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [186e 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer1.org2.example.com | [1c23 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:02.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd2 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +peer1.org1.example.com | [177f 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [186f 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 gate 1574140935335829400 evaluation succeeds +peer0.org2.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer1.org2.example.com | [1c24 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +orderer0.example.com | "2019-11-19 05:23:02.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " +peer1.org1.example.com | [1780 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1870 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer1.org2.example.com | [1c25 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:03.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd4 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +peer1.org1.example.com | [1781 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1871 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18fa 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c26 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:03.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd5 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +peer1.org1.example.com | [1782 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1f80 gate 1574140939649535700 evaluation starts +peer0.org1.example.com | [1872 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [18fb 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c27 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:03.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +peer1.org1.example.com | [1783 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1f80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1873 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [18fc 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c28 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | "2019-11-19 05:23:03.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.3µs " +peer1.org1.example.com | [1784 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1f80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1874 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [18fd 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1c29 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:03.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1785 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1f80 principal matched by identity 0 +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [18fe 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c2a 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:03.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1786 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [1875 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [18ff 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c2b 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" > > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:03.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bda Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1900 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c2c 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:03.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bdb Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +peer1.org1.example.com | [1787 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1901 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c2d 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" > > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:03.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69µs " +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1902 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c2e 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +orderer0.example.com | "2019-11-19 05:23:03.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bdd Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1903 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c2f 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:03.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bde Sending msg of 28 bytes to 3 on channel businesschannel took 31.8µs" +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [1876 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1904 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:23:03.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.2µs " +peer1.org2.example.com | [1c30 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c31 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1877 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1905 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004106ca0 gate 1574140935871559400 evaluation starts +orderer0.example.com | "2019-11-19 05:23:03.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57µs " +peer1.org2.example.com | [1c32 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [1906 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004106ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1878 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:03.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c33 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1788 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1f80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1907 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004106ca0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1879 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:03.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c34 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1789 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1f80 gate 1574140939649535700 evaluation succeeds +peer0.org2.example.com | [1908 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004106ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [187a 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:04.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be3 Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" +peer1.org2.example.com | [1c35 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [178a 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1909 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004106ca0 principal evaluation fails +peer0.org1.example.com | [187b 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +orderer0.example.com | "2019-11-19 05:23:04.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be4 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +peer1.org2.example.com | [1c36 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004076bc0 gate 1574140943888468500 evaluation starts +peer1.org1.example.com | [178b 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [190a 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004106ca0 gate 1574140935871559400 evaluation fails +peer0.org1.example.com | [187c 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:04.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115.5µs " +peer1.org2.example.com | [1c37 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004076bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [178c 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [190b 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [187d 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:23:04.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +peer1.org2.example.com | [1c38 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004076bc0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [178d 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [190c 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [187e 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:23:04.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be7 Sending msg of 28 bytes to 2 on channel businesschannel took 39.8µs" +peer1.org2.example.com | [1c39 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004076bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [178e 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [190d 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [187f 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:23:04.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be8 Sending msg of 28 bytes to 3 on channel businesschannel took 37µs" +peer1.org2.example.com | [1c3a 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004076bc0 principal evaluation fails +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [190e 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107210 gate 1574140935871834400 evaluation starts +peer0.org1.example.com | [1880 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:23:04.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121µs " +peer1.org2.example.com | [1c3b 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004076bc0 gate 1574140943888468500 evaluation fails +peer1.org1.example.com | [178f 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [190f 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107210 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1881 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:23:04.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.3µs " +peer1.org2.example.com | [1c3c 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1910 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107210 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1882 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:23:04.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1beb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1c3d 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1911 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107210 principal matched by identity 0 +peer0.org1.example.com | [1883 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 gate 1574140935372734400 evaluation starts +orderer0.example.com | "2019-11-19 05:23:04.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bec Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +peer1.org2.example.com | [1c3e 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1912 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +peer0.org1.example.com | [1884 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:23:04.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +peer1.org2.example.com | [1c3f 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077130 gate 1574140943893524400 evaluation starts +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | 00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +peer0.org1.example.com | [1885 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:23:04.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bee Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c40 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1790 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1913 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +peer0.org1.example.com | [1886 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:23:04.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bef Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c41 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077130 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1791 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +peer0.org1.example.com | [1887 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b f5 f2 30 49 0c f6 fe 80 00 b9 aa 7c 14 f0 a4 |k..0I.......|...| +orderer0.example.com | "2019-11-19 05:23:04.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf0 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c42 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077130 principal matched by identity 0 +peer0.org2.example.com | 00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +peer1.org1.example.com | [1792 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 a5 dd df 75 b5 03 96 21 af 1e c8 44 bd fe 56 df |...u...!...D..V.| +orderer0.example.com | "2019-11-19 05:23:04.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c43 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac fd d3 0a 61 64 0a 7b dd 3e 5f fc 13 26 9f a1 |....ad.{.>_..&..| +peer0.org2.example.com | 00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1888 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc e4 d5 b9 64 8c 50 80 9a 6b 39 |0E.!.....d.P..k9| +orderer0.example.com | "2019-11-19 05:23:04.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000010 7a 6c 15 0d 69 0e 4a ed b9 2e c0 7a 79 c3 d3 f0 |zl..i.J....zy...| +peer0.org2.example.com | 00000040 6b 34 eb 1f d5 31 |k4...1| +peer1.org1.example.com | [1794 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 c5 69 4a c7 1c 2f 39 96 5b 01 6e 9f c8 78 49 6e |.iJ../9.[.n..xIn| +orderer0.example.com | "2019-11-19 05:23:04.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf3 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +peer1.org2.example.com | [1c44 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 96 29 b3 a4 b9 10 6c 1b e2 20 |0E.!...)....l.. | +peer0.org2.example.com | [1914 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107210 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1795 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000020 c5 56 0a 1c 8d 02 20 2a 92 06 ea cb 76 39 fc db |.V.... *....v9..| +orderer0.example.com | "2019-11-19 05:23:04.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.2µs " +peer1.org2.example.com | 00000010 fb b0 e1 87 f9 f7 32 0d 52 1e b2 4f 2e bf fb 68 |......2.R..O...h| +peer0.org2.example.com | [1915 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107210 gate 1574140935871834400 evaluation succeeds +peer1.org1.example.com | [1796 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000030 66 58 8f b4 0c 80 8c ee 0f a1 4c b9 d0 37 d6 eb |fX........L..7..| +orderer0.example.com | "2019-11-19 05:23:05.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf5 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +peer1.org2.example.com | 00000020 06 d2 e9 76 a8 02 20 5b 95 ce 18 de b2 37 a3 e5 |...v.. [.....7..| +peer0.org2.example.com | [1916 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1797 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000040 f8 39 8f 78 81 8e e2 |.9.x...| +peer1.org2.example.com | 00000030 fa 9f 2d da 92 1b d3 8a 72 17 61 cf 6a 05 3e 25 |..-.....r.a.j.>%| +orderer0.example.com | "2019-11-19 05:23:05.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf6 Sending msg of 28 bytes to 3 on channel businesschannel took 256.8µs" +peer0.org2.example.com | [1917 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1798 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372b8e0 gate 1574140939656240900 evaluation starts +peer0.org1.example.com | [1889 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000040 80 0c 10 b1 b3 bf 55 |......U| +orderer0.example.com | "2019-11-19 05:23:05.366 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 330.6µs " +peer0.org2.example.com | [1918 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1799 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372b8e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [188a 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 gate 1574140935372734400 evaluation succeeds +peer1.org2.example.com | [1c45 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077130 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:23:05.366 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.5µs " +peer0.org2.example.com | [1919 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [179a 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372b8e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [188b 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c46 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077130 gate 1574140943893524400 evaluation succeeds +orderer0.example.com | "2019-11-19 05:23:05.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [191a 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [179b 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372b8e0 principal matched by identity 0 +peer0.org1.example.com | [188c 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c47 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:23:05.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bfa Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [191b 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [179c 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [188d 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c48 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:23:05.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bfb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [191c 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [188e 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c49 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:05.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bfc Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +peer0.org2.example.com | [191d 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +peer1.org1.example.com | [179d 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [188f 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c4a 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:05.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bfd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +peer0.org2.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1890 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1c4b 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:05.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bfe Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +peer0.org2.example.com | [191e 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [1891 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1c4c 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:23:05.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bff Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +peer0.org2.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [1892 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1c4d 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:23:05.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.8µs " +peer0.org2.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1893 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1c4e 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:23:05.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45µs " +peer0.org2.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer1.org1.example.com | [179e 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372b8e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1894 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c4f 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:23:05.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c02 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer1.org1.example.com | [179f 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372b8e0 gate 1574140939656240900 evaluation succeeds +peer0.org1.example.com | [1895 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c50 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:05.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c03 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [191f 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [17a0 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1896 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c51 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:05.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c04 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1920 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17a1 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1897 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c52 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:05.992 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c05 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +peer0.org2.example.com | [1921 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17a2 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1898 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c53 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +orderer0.example.com | "2019-11-19 05:23:05.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.4µs " +peer0.org2.example.com | [1922 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [17a3 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:06.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c07 Sending msg of 28 bytes to 2 on channel businesschannel took 22.9µs" +peer1.org2.example.com | [1c54 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1923 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17a4 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1899 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:06.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c08 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +peer1.org2.example.com | [1c55 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1924 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [189a 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:06.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.6µs " +peer1.org2.example.com | [1c56 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1925 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [17a5 11-19 05:22:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [189b 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.4µs " +peer1.org2.example.com | [1c57 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1926 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [189c 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:06.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c0b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c58 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:%\200\014\020\261\263\277U" > alive: +peer0.org2.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [189d 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c0c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c59 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1927 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [189e 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c0d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1c5a 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer0.org1.example.com | [189f 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c0e Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +peer1.org2.example.com | [1c5b 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [17a6 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer0.org1.example.com | [18a3 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61µs " +peer1.org2.example.com | [1c5c 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [17a7 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer0.org1.example.com | [18a0 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:06.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c10 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +peer1.org2.example.com | [1c5d 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17a8 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer0.org1.example.com | [18a1 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c11 Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +peer1.org2.example.com | [1c5e 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17a9 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1928 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [18a2 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.8µs " +peer1.org2.example.com | [1c5f 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17aa 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [18a5 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.9µs " +peer1.org2.example.com | [1c60 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1929 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab e2 db 03 06 3a 07 a5 9f 28 36 |0E.!......:...(6| +peer1.org1.example.com | [17ab 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [18a7 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c14 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c61 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 ba c7 ba 25 81 d6 1e 4c 40 fb 40 fc d5 c9 39 6f |...%...L@.@...9o| +peer1.org1.example.com | [17ac 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18a8 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c15 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c62 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 08 ef 19 37 6d 02 20 32 69 45 53 04 28 5d 6c 13 |...7m. 2iES.(]l.| +peer1.org1.example.com | [17ad 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18a6 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:06.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c16 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [18a4 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ea 8c 71 88 74 bc ac ad 75 bc 22 d3 4c 40 5b 65 |..q.t...u.".L@[e| +peer1.org1.example.com | [17ae 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:23:06.992 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c17 Sending msg of 28 bytes to 3 on channel testchainid took 8.1µs" +peer0.org1.example.com | [18a9 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c63 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | 00000040 1d 9b 73 3c 00 b7 d3 |..s<...| +peer1.org1.example.com | [17af 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:23:06.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.1µs " +peer0.org1.example.com | [18aa 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [1c64 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [192a 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [17b0 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:23:07.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c19 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +peer0.org1.example.com | [18ac 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c65 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192b 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [17b1 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037536a0 gate 1574140939662445500 evaluation starts +orderer0.example.com | "2019-11-19 05:23:07.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c1a Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +peer0.org1.example.com | [18ad 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c66 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192c 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b2 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037536a0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:23:07.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +peer0.org1.example.com | [18af 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c67 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [192d 11-19 05:22:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b3 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037536a0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [18ae 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2019-11-19 05:23:07.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.1µs " +peer1.org2.example.com | [1c68 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [192e 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [17b4 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037536a0 principal matched by identity 0 +peer0.org1.example.com | [18ab 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:07.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c1d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c69 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [192f 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b5 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [18b1 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:07.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c1e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c6a 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1930 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [18b2 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:07.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c1f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1c6b 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1931 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [17b6 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [18b3 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:07.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c20 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +peer1.org2.example.com | [1c6c 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1932 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [18b4 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:07.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs " +peer1.org2.example.com | [1c6d 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [1933 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [18b0 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:07.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c22 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +peer1.org2.example.com | [1c6e 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [1934 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18b5 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:07.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c23 Sending msg of 28 bytes to 3 on channel businesschannel took 6.5µs" +peer1.org2.example.com | [1c6f 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1935 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18b6 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:07.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.9µs " +peer1.org2.example.com | [1c70 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [17b7 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037536a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1936 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [18b7 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:07.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [17b8 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037536a0 gate 1574140939662445500 evaluation succeeds +peer0.org2.example.com | [1937 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [18b8 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:07.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c26 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c71 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [17b9 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1938 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [18b9 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:07.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c27 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [17ba 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1939 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134560 gate 1574140935882931800 evaluation starts +peer0.org1.example.com | [18ba 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:07.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c28 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [17bb 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [193a 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134560 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [18bb 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:07.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c29 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [17bc 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [193b 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134560 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [18bd 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:07.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.4µs " +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [17bd 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [193c 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [18bc 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:08.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c2b Sending msg of 28 bytes to 2 on channel businesschannel took 17.2µs" +peer1.org2.example.com | [1c72 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [193d 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134560 principal evaluation fails +peer0.org1.example.com | [18be 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:08.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c2c Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +peer1.org2.example.com | [1c73 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17be 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [193e 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134560 gate 1574140935882931800 evaluation fails +orderer0.example.com | "2019-11-19 05:23:08.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.1µs " +peer0.org1.example.com | [18bf 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [1c74 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [193f 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:23:08.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.7µs " +peer0.org1.example.com | [18c0 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [1c75 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1940 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:23:08.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c2f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [18c1 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [1c76 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1941 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2019-11-19 05:23:08.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c30 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [18c2 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1c77 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1942 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134ad0 gate 1574140935883170500 evaluation starts +orderer0.example.com | "2019-11-19 05:23:08.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c31 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [18c3 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [17bf 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [1c78 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1943 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134ad0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:23:08.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c32 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +peer0.org1.example.com | [18c4 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [1c79 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1944 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134ad0 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:23:08.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c33 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.8µs " +peer0.org1.example.com | [18c5 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17c0 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [1c7a 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406dab0 gate 1574140944202255700 evaluation starts +peer0.org2.example.com | [1945 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134ad0 principal matched by identity 0 +orderer0.example.com | "2019-11-19 05:23:08.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c34 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +peer0.org1.example.com | [18c6 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [1c7b 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406dab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1946 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +orderer0.example.com | "2019-11-19 05:23:08.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c35 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +peer0.org1.example.com | [18c7 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [1c7c 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406dab0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +orderer0.example.com | "2019-11-19 05:23:08.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.8µs " +peer0.org1.example.com | [18c8 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [1c7d 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406dab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1947 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +orderer0.example.com | "2019-11-19 05:23:08.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.7µs " +peer0.org1.example.com | [18c9 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +orderer0.example.com | "2019-11-19 05:23:08.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c38 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [18ca 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [17c1 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c7e 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406dab0 principal evaluation fails +peer0.org2.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +orderer0.example.com | "2019-11-19 05:23:08.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c39 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [18cb 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c2 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c7f 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406dab0 gate 1574140944202255700 evaluation fails +peer0.org2.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +orderer0.example.com | "2019-11-19 05:23:08.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [18cc 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c80 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17c3 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +orderer0.example.com | "2019-11-19 05:23:08.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3b Sending msg of 28 bytes to 3 on channel testchainid took 49.9µs" +peer0.org1.example.com | [18cd 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c81 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17c4 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1948 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134ad0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2019-11-19 05:23:08.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +peer0.org1.example.com | [18ce 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c82 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [17c5 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1949 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004134ad0 gate 1574140935883170500 evaluation succeeds +orderer0.example.com | "2019-11-19 05:23:09.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3d Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +peer0.org1.example.com | [18cf 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c83 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc020 gate 1574140944202600700 evaluation starts +peer1.org1.example.com | [17c6 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [194a 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:23:09.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3e Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" +peer0.org1.example.com | [18d0 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c84 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17c7 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [194b 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2019-11-19 05:23:09.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207µs " +peer0.org1.example.com | [18d1 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c85 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc020 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [17c8 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [194c 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:09.366 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.6µs " +peer0.org1.example.com | [18d2 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 gate 1574140935430232300 evaluation starts +peer1.org2.example.com | [1c86 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc020 principal matched by identity 0 +peer1.org1.example.com | [17ca 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [194d 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:09.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c41 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [18d3 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c87 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [17c9 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3530 gate 1574140939669163400 evaluation starts +peer0.org2.example.com | [194e 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:09.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c42 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [18d4 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [17cb 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [194f 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:23:09.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c43 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [18d5 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 principal matched by identity 0 +peer1.org2.example.com | [1c88 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [17cc 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3530 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1950 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:23:09.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c44 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +peer0.org1.example.com | [18d6 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [17cd 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3530 principal matched by identity 0 +peer0.org2.example.com | [1951 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:23:09.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.6µs " +peer0.org1.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [17ce 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [1952 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:23:09.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c46 Sending msg of 28 bytes to 2 on channel businesschannel took 38.3µs" +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [18d7 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [1953 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:09.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c47 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer1.org1.example.com | [17cf 11-19 05:22:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [1954 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:09.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " +peer1.org2.example.com | [1c89 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc020 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [1955 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:09.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.6µs " +peer1.org2.example.com | [1c8a 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc020 gate 1574140944202600700 evaluation succeeds +peer0.org1.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [1956 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +orderer0.example.com | "2019-11-19 05:23:09.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c4a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c8b 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [1957 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:09.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c4b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1c8c 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [18d8 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [1958 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:09.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c4c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1c8d 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [18d9 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 gate 1574140935430232300 evaluation succeeds +peer1.org1.example.com | [17d0 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1959 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:09.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4d Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +peer1.org2.example.com | [1c8e 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [18da 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17d1 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3530 gate 1574140939669163400 evaluation succeeds +peer0.org2.example.com | [195a 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:09.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +peer1.org2.example.com | [1c8f 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18db 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17d2 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:23:10.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4f Sending msg of 28 bytes to 2 on channel businesschannel took 115.6µs" +peer0.org2.example.com | [195b 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\trQI\277\361B\376PCA\304\023\370\002 3P\212\177\033s\3330m\233fd\333e\253k\311?P\273\371u4M\270Ok\373:\224\233\326" > +peer1.org2.example.com | [1c90 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18dc 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [17d3 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2019-11-19 05:23:10.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c50 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +peer0.org2.example.com | [195c 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18dd 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c91 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [17d4 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:10.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327.8µs " +peer0.org2.example.com | [195d 11-19 05:22:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18de 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c92 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17d5 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2019-11-19 05:23:10.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 449.8µs " +peer0.org2.example.com | [195e 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18df 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1c93 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17d6 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:10.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c53 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [195f 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18e0 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1c94 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [17d7 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 1297292706604458090, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:10.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c54 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1960 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [18e1 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1c95 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [17d8 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:10.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c55 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1961 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e2 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1c96 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [17d9 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 1297292706604458090, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:10.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c56 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +peer0.org2.example.com | [1962 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e3 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c97 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd1b0 gate 1574140944203465600 evaluation starts +peer1.org1.example.com | [17da 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +orderer0.example.com | "2019-11-19 05:23:10.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c57 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.5µs " +peer0.org2.example.com | [1963 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18e4 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c98 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd1b0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:23:10.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.3µs " +peer0.org2.example.com | [1964 11-19 05:22:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18e5 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c99 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd1b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [17db 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:10.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c59 Sending msg of 28 bytes to 2 on channel businesschannel took 616.8µs" +peer0.org2.example.com | [1965 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e6 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org2.example.com | [1c9a 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [17dc 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +orderer0.example.com | "2019-11-19 05:23:10.867 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5a Sending msg of 28 bytes to 3 on channel businesschannel took 433.5µs" +peer0.org2.example.com | [1966 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [18e7 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9b 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd1b0 principal evaluation fails +peer1.org1.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +orderer0.example.com | "2019-11-19 05:23:10.868 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [18e8 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9c 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd1b0 gate 1574140944203465600 evaluation fails +peer1.org1.example.com | [17dd 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +orderer0.example.com | "2019-11-19 05:23:10.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1967 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [18e9 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9d 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +orderer0.example.com | "2019-11-19 05:23:10.871 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [18ea 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1c9e 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +orderer0.example.com | "2019-11-19 05:23:10.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | [18eb 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > alive: alive: +peer1.org2.example.com | [1c9f 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ca0 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd720 gate 1574140944203763600 evaluation starts +orderer0.example.com | "2019-11-19 05:23:10.995 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5f Sending msg of 28 bytes to 3 on channel testchainid took 26.8µs" +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [18ec 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer1.org1.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer0.org2.example.com | [1968 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18ed 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca1 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17de 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1969 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:10.996 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.2µs " +peer0.org1.example.com | [18ee 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ca2 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd720 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [17df 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [196a 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2019-11-19 05:23:11.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c61 Sending msg of 28 bytes to 2 on channel businesschannel took 124.6µs" +peer0.org1.example.com | [18ef 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ca3 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd720 principal matched by identity 0 +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [196b 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:23:11.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.1µs " +peer0.org1.example.com | [18f0 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ca4 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [17e0 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 b1 2b 82 fa a6 96 ac 93 97 20 bb |0D. B.+....... .| +peer0.org2.example.com | [196c 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2019-11-19 05:23:11.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c63 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [18f1 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | 00000010 22 40 ee 8a dc 91 9d 13 83 6b 5e 10 0a 38 41 c4 |"@.......k^..8A.| +peer0.org2.example.com | [196d 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2019-11-19 05:23:11.368 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.9µs " +peer0.org1.example.com | [18f2 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca5 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000020 9a 1f 36 a2 02 20 0c bf a6 eb 88 70 37 e6 72 fa |..6.. .....p7.r.| +peer0.org2.example.com | [196e 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2019-11-19 05:23:11.369 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c66 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [18f3 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000030 07 51 4b b2 f1 06 5f 16 ac 3b 21 b6 2e 7d 8a 8a |.QK..._..;!..}..| +peer0.org2.example.com | [196f 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2019-11-19 05:23:11.366 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c64 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +peer0.org1.example.com | [18f4 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000040 a9 e6 d5 f1 a0 31 |.....1| +peer0.org2.example.com | [1970 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004160c60 gate 1574140935951219400 evaluation starts +orderer0.example.com | "2019-11-19 05:23:11.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c67 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [18f5 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [17e1 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1971 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004160c60 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2019-11-19 05:23:11.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c68 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [18f6 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [17e2 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1972 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004160c60 processing identity 0 with bytes of 1151ae0 +orderer0.example.com | "2019-11-19 05:23:11.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.5µs " +peer1.org2.example.com | [1ca6 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd720 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [18f7 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17e3 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1973 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004160c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2019-11-19 05:23:11.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c6a Sending msg of 28 bytes to 2 on channel businesschannel took 587.2µs" +peer1.org2.example.com | [1ca7 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd720 gate 1574140944203763600 evaluation succeeds +peer0.org1.example.com | [18f8 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17e4 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1974 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004160c60 principal evaluation fails +orderer0.example.com | "2019-11-19 05:23:11.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c6b Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +peer1.org2.example.com | [1ca8 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [18f9 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [17e5 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:11.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 468µs " +peer0.org2.example.com | [1975 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004160c60 gate 1574140935951219400 evaluation fails +peer1.org2.example.com | [1ca9 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [18fa 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17e6 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:11.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1976 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1caa 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [18fb 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17e7 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:11.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 8.4713ms " +peer0.org2.example.com | [1977 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1cab 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [18fc 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [17e8 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:11.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1978 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1cac 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [18fd 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [17e9 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:11.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c70 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1979 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041611d0 gate 1574140935951563200 evaluation starts +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [18fe 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [17ea 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:11.995 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c71 Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +peer0.org2.example.com | [197a 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041611d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1cad 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [18ff 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17eb 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2019-11-19 05:23:11.997 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7533ms " +peer0.org2.example.com | [197b 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041611d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [1901 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [17ec 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:12.363 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c73 Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +peer0.org2.example.com | [197c 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041611d0 principal matched by identity 0 +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | [1900 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17ed 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:12.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c74 Sending msg of 28 bytes to 3 on channel businesschannel took 6.9µs" +peer0.org2.example.com | [197d 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [1902 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 bc da 02 d2 92 5c c2 d8 0e 4e 85 00 4b c3 9a |......\...N..K..| +peer1.org1.example.com | [17ee 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:12.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.5µs " +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | 00000010 b5 31 27 89 fe 62 b5 de 15 e4 69 07 7b 81 42 d7 |.1'..b....i.{.B.| +peer1.org1.example.com | [17ef 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:12.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 39.7µs " +peer0.org2.example.com | [197e 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [1cae 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1903 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 73 33 59 a4 bd a2 78 2a df 54 |0E.!..s3Y...x*.T| +peer1.org1.example.com | [17f0 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +orderer0.example.com | "2019-11-19 05:23:12.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c77 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [1caf 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 00 d3 7b 4e 19 43 e2 57 7e df 8f 28 a6 6e da 03 |..{N.C.W~..(.n..| +peer1.org1.example.com | [17f1 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 16 1c 59 2d 2a c6 fd 60 d7 71 78 2f 73 a7 a0 |B..Y-*..`.qx/s..| +orderer0.example.com | "2019-11-19 05:23:12.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c78 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [1cb0 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 32 a9 cf ce a8 02 20 55 a7 9f 8e 13 5b 30 b7 91 |2..... U....[0..| +peer1.org1.example.com | 00000010 1d 72 dd 1b d4 0f 9d 42 0c 8a cc 28 3a 3e e4 90 |.r.....B...(:>..| +orderer0.example.com | "2019-11-19 05:23:12.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c79 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [1cb1 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 96 cd d7 e2 85 79 b2 01 c9 35 c2 f1 a9 38 c5 40 |.....y...5...8.@| +peer1.org1.example.com | [17f2 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 15 c6 d0 a6 6c 8f 35 87 3d ca |0E.!......l.5.=.| +orderer0.example.com | "2019-11-19 05:23:12.458 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c7a Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1cb2 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 71 b7 09 f3 b1 7c 44 |q....|D| +peer1.org1.example.com | 00000010 c8 f2 ec 21 31 ed 69 6d b1 66 0f 52 3c 7e 75 ea |...!1.im.f.R<~u.| +orderer0.example.com | "2019-11-19 05:23:12.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85µs " +peer0.org2.example.com | [197f 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041611d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1cb3 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1904 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 6c 20 07 fa 84 02 20 70 ad d7 87 61 21 2c 47 9a |l .... p...a!,G.| +orderer0.example.com | "2019-11-19 05:23:12.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c7c Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +peer0.org2.example.com | [1980 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041611d0 gate 1574140935951563200 evaluation succeeds +peer1.org2.example.com | [1cb4 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1905 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000030 8a 86 35 77 09 3c 37 8a b0 d9 4c 5b 09 34 42 c9 |..5w.<7...L[.4B.| +orderer0.example.com | "2019-11-19 05:23:12.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c7d Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +peer0.org2.example.com | [1981 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1cb5 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1906 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000040 e7 1f 92 2b f2 cc 26 |...+..&| +orderer0.example.com | "2019-11-19 05:23:12.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.6µs " +peer0.org2.example.com | [1982 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cb6 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1907 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [17f3 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:12.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 244.9µs " +peer0.org2.example.com | [1983 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cb7 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1908 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [17f4 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2019-11-19 05:23:12.832 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c80 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1984 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1cb8 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1909 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17f5 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2019-11-19 05:23:12.834 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c81 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1985 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1cb9 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f3d0 gate 1574140944209351100 evaluation starts +peer0.org1.example.com | [190a 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17f6 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2019-11-19 05:23:12.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c82 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1986 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1cba 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f3d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [190b 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17f7 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | "2019-11-19 05:23:12.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c83 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +peer0.org2.example.com | [1987 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [1cbb 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f3d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [190c 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f8 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:12.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146µs " +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1cbc 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [190d 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f9 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:13.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c85 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +peer0.org2.example.com | [1988 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [1cbd 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f3d0 principal evaluation fails +peer0.org1.example.com | [190e 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17fa 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2019-11-19 05:23:13.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c86 Sending msg of 28 bytes to 2 on channel businesschannel took 17.6µs" +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [1cbe 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f3d0 gate 1574140944209351100 evaluation fails +peer0.org1.example.com | [190f 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [17fb 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:13.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.9µs " +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [1cbf 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1910 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17fc 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:13.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 44.2µs " +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [1cc0 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1911 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [17fd 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:13.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c89 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1cc1 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1912 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17fe 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:13.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c8a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1989 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cc2 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f940 gate 1574140944209925700 evaluation starts +peer0.org1.example.com | [1913 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17ff 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2019-11-19 05:23:13.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c8b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [198a 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cc3 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1914 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1800 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2019-11-19 05:23:13.458 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8c Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +peer0.org2.example.com | [198b 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1cc4 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f940 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1915 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1801 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2019-11-19 05:23:13.459 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +peer0.org2.example.com | [198c 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1cc5 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f940 principal matched by identity 0 +peer0.org1.example.com | [1916 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1802 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [198d 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1cc6 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1803 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1917 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [198e 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1804 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1918 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[36mpeer0.org2.example.com | [198f 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1cc7 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1805 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1919 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1990 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1806 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [191a 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1991 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041889e0 gate 1574140935961505200 evaluation starts +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1807 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [191b 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1992 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041889e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1808 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [191c 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1993 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041889e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1809 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [191d 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1994 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041889e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1cc8 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [180a 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [191e 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cc9 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408f940 gate 1574140944209925700 evaluation succeeds +peer0.org2.example.com | [1995 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041889e0 principal evaluation fails +peer1.org1.example.com | [180b 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [191f 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cca 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [180c 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1920 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [1996 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041889e0 gate 1574140935961505200 evaluation fails +peer1.org2.example.com | [1ccb 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [180d 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1921 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1997 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ccc 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [180e 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1922 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1998 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ccd 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [180f 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1923 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1999 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1cce 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1810 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1924 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [199a 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188f50 gate 1574140935962330200 evaluation starts +peer1.org2.example.com | [1ccf 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1811 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1925 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [199b 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188f50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1812 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd0 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1926 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [199c 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188f50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1813 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cd1 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1927 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [199d 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188f50 principal matched by identity 0 +peer1.org1.example.com | [1814 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd2 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1928 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [199e 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1815 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cd3 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1929 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1816 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cd4 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [192a 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [199f 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1817 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd5 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [192b 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1818 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cd6 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8ad0 gate 1574140944211564900 evaluation starts +peer0.org1.example.com | [192c 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [181a 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd7 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [192d 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1819 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd8 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8ad0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [192e 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [181b 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cd9 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [192f 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [19a0 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188f50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [181c 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cda 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8ad0 principal evaluation fails +peer0.org1.example.com | [1930 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19a1 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188f50 gate 1574140935962330200 evaluation succeeds +peer1.org1.example.com | [181d 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cdb 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8ad0 gate 1574140944211564900 evaluation fails +peer0.org2.example.com | [19a2 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1931 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [181e 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cdc 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19a3 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1932 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [181f 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cdd 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19a4 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1933 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1820 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cde 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [19a5 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1934 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1821 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cdf 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f9040 gate 1574140944212306600 evaluation starts +peer0.org2.example.com | [19a6 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1935 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1822 11-19 05:22:19.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ce0 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f9040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [19a7 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1936 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ce1 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f9040 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1823 11-19 05:22:19.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [19a8 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1937 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 gate 1574140935816088900 evaluation starts +peer1.org2.example.com | [1ce2 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f9040 principal matched by identity 0 +peer1.org1.example.com | [1824 11-19 05:22:19.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [19a9 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1938 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ce3 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1825 11-19 05:22:19.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19aa 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1939 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1826 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [19ab 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [193a 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 principal matched by identity 0 +peer1.org2.example.com | [1ce4 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1827 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [19ac 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [193b 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b b1 8f 0a 39 ad 76 56 b8 3f 78 c4 d4 5b 44 c9 |....9.vV.?x..[D.| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1828 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [19ad 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 46 ad f7 77 3f 31 fc 9d c8 05 73 5d 2f cf 75 0b |F..w?1....s]/.u.| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1829 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19ae 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [193c 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 ee 7e 54 58 69 da e3 f1 09 7d |0E.!...~TXi....}| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [182a 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19af 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 d0 c6 cf f1 8c 3a 3e 09 72 51 49 bf f1 42 fe 50 |.....:>.rQI..B.P| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [182b 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19b0 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 43 41 c4 13 f8 02 20 33 50 8a 7f 1b 73 db 30 6d |CA.... 3P...s.0m| +peer1.org2.example.com | [1ce5 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f9040 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [182c 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19b1 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa330 gate 1574140935965920600 evaluation starts +peer0.org1.example.com | 00000030 9b 66 64 db 65 ab 6b c9 3f 50 bb f9 75 34 4d b8 |.fd.e.k.?P..u4M.| +peer1.org2.example.com | [1ce6 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f9040 gate 1574140944212306600 evaluation succeeds +peer1.org1.example.com | [182d 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19b2 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 4f 6b fb 3a 94 9b d6 |Ok.:...| +peer1.org2.example.com | [1ce7 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [182e 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19b3 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa330 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [193d 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ce8 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [182f 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [19b4 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [193e 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 gate 1574140935816088900 evaluation succeeds +peer1.org2.example.com | [1ce9 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1830 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19b5 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa330 principal evaluation fails +peer0.org1.example.com | [193f 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1cea 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1831 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [19b6 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa330 gate 1574140935965920600 evaluation fails +peer0.org1.example.com | [1940 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ceb 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1832 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [19b7 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1941 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1833 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19b8 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1942 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1cec 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1834 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1943 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [19b9 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1835 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1944 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [19ba 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa8a0 gate 1574140935967043400 evaluation starts +peer1.org1.example.com | [1836 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1945 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [19bb 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa8a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1837 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1946 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [19bc 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa8a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1838 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1947 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1ced 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [19bd 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa8a0 principal matched by identity 0 +peer1.org1.example.com | [1839 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1948 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [19be 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [183a 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1949 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cee 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [194a 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [183b 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [19bf 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [194b 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [183c 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [194c 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [183d 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387e880 gate 1574140939846522100 evaluation starts +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [194d 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [183e 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387e880 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [194e 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [183f 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387e880 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1cef 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [194f 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1840 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387e880 principal matched by identity 0 +peer1.org2.example.com | [1cf0 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [19c0 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa8a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1950 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1841 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +peer1.org2.example.com | [1cf1 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19c1 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa8a0 gate 1574140935967043400 evaluation succeeds +peer1.org1.example.com | 00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +peer0.org1.example.com | [1951 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1cf2 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19c2 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1842 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +peer0.org1.example.com | [1952 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1cf3 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19c3 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +peer0.org1.example.com | [1953 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [19c4 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1cf4 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +peer0.org1.example.com | [1954 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [19c5 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1cf5 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +peer0.org1.example.com | [1955 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [19c6 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1cf6 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 cd f9 67 25 28 fc 53 |..g%(.S| +peer0.org1.example.com | [1956 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1cf7 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1843 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387e880 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1957 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 gate 1574140935835973600 evaluation starts +peer0.org2.example.com | [19c7 11-19 05:22:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1cf8 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1844 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387e880 gate 1574140939846522100 evaluation succeeds +peer0.org1.example.com | [1958 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1cf9 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1845 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1959 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [1cfa 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113120 gate 1574140944216729300 evaluation starts +peer1.org1.example.com | [1846 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [195a 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 principal matched by identity 0 +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [1cfb 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113120 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1847 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [195b 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1cfc 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113120 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1848 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer0.org2.example.com | [19c8 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [1cfd 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1849 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [195c 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1cfe 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113120 principal evaluation fails +peer1.org1.example.com | [184a 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer0.org2.example.com | [19c9 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [1cff 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [184b 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [1d00 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113120 gate 1574140944216729300 evaluation fails +peer1.org1.example.com | [184c 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [1d02 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [184d 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [1d03 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [184e 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [195d 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1d04 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [184f 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [195e 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 gate 1574140935835973600 evaluation succeeds +peer0.org2.example.com | [19ca 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d05 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113690 gate 1574140944218352900 evaluation starts +peer1.org1.example.com | [1850 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [195f 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19cb 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d06 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1851 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1960 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19cc 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d07 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113690 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1852 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1961 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [19cd 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d08 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113690 principal matched by identity 0 +peer1.org1.example.com | [1853 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1962 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [19ce 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d09 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1854 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1963 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [19cf 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1855 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1964 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [19d0 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d0a 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1856 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1965 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [19d1 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1857 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1966 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [19d2 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8730 gate 1574140935973807900 evaluation starts +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1858 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1967 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [19d3 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8730 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1859 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1968 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19d4 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8730 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [185a 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151021 +peer0.org1.example.com | [1969 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19d5 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1d0b 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113690 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [185b 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B2E1A584B8E77CB7B1EB3AFBCDF13459234A03AB14D6752299072F04CBAC2BFB +peer0.org1.example.com | [196a 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19d6 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8730 principal evaluation fails +peer1.org2.example.com | [1d0c 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113690 gate 1574140944218352900 evaluation succeeds +peer1.org1.example.com | [185c 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [196b 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [1d0d 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [19d7 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8730 gate 1574140935973807900 evaluation fails +peer1.org1.example.com | [185d 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [196c 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d0e 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [19d8 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [196d 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [185e 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [1d0f 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [19d9 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [196e 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [185f 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d10 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [19da 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [196f 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1860 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d11 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [19db 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8ca0 gate 1574140935974693100 evaluation starts +peer0.org1.example.com | [1970 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1861 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [19dc 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1971 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1862 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d12 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [19dd 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8ca0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1972 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > alive: alive: alive: +peer1.org1.example.com | [1863 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [19de 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8ca0 principal matched by identity 0 +peer0.org1.example.com | [1973 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1864 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [19df 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1974 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1865 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1975 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1866 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [19e0 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1976 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1867 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d13 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [1977 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1868 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [1978 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1869 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d01 11-19 05:22:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [1979 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [186a 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d14 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [197a 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [186b 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [19e1 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8ca0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [197b 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [186c 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [19e2 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c8ca0 gate 1574140935974693100 evaluation succeeds +peer0.org1.example.com | [197c 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [186d 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [19e3 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [197d 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [186e 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 e1 a5 84 b8 e7 7c b7 b1 eb 3a fb cd f1 34 59 |......|...:...4Y| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [19e4 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [197f 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 23 4a 03 ab 14 d6 75 22 99 07 2f 04 cb ac 2b fb |#J....u"../...+.| +peer1.org2.example.com | [1d16 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e5 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [197e 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [186f 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 90 f9 8e f6 d6 c2 69 17 9c 02 03 |0D. U......i....| +peer1.org2.example.com | [1d17 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e6 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1980 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 aa 5b cc bf 7f 28 59 33 01 e4 54 0a c7 23 5e 97 |.[...(Y3..T..#^.| +peer1.org2.example.com | [1d18 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [19e7 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1981 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 4a 04 c8 03 02 20 55 84 0f 30 af 13 80 2e 14 ba |J.... U..0......| +peer1.org2.example.com | [1d19 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [19e8 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1982 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 14 2a 06 0b 07 2c b4 fd 1b 5f 00 39 09 26 34 d9 |.*...,..._.9.&4.| +peer1.org2.example.com | [1d1a 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [19e9 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1983 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 65 fb 17 39 76 b8 |e..9v.| +peer1.org2.example.com | [1d1b 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [19ea 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1984 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1870 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [1d1c 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [19eb 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1985 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [1d1d 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [19ec 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1986 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1871 11-19 05:22:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 02 05 75 ae 8b 41 5f d6 9a a4 |0E.!....u..A_...| +peer1.org2.example.com | [1d1e 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041375f0 gate 1574140944222723900 evaluation starts +peer0.org2.example.com | [19ed 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1987 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 c1 3d 6b a2 b3 16 d7 49 07 c9 06 b9 d3 5d d7 61 |.=k....I.....].a| +peer1.org2.example.com | [1d1f 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041375f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [19ee 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1988 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 ac c1 b1 57 ed 02 20 64 73 6b f5 6b a6 14 25 21 |...W.. dsk.k..%!| +peer1.org2.example.com | [1d20 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041375f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [19ef 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1989 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 9f ff c0 8d c8 0a ea cc 44 e5 17 83 a5 09 2c 68 |........D.....,h| +peer1.org2.example.com | [1d21 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041375f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [19f0 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [198a 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 55 b9 5c 0f 92 04 30 |U.\...0| +peer1.org2.example.com | [1d22 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041375f0 principal evaluation fails +peer0.org2.example.com | [19f1 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [198b 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1872 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1d23 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041375f0 gate 1574140944222723900 evaluation fails +peer0.org2.example.com | [19f2 11-19 05:22:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [198c 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1873 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1d24 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19f3 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [198d 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1874 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d25 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19f4 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [19f5 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1875 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [198e 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [19f6 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d26 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [198f 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [1876 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [19f7 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d27 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137b60 gate 1574140944223401600 evaluation starts +peer0.org1.example.com | [1990 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +peer1.org1.example.com | [1877 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [19f8 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d28 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer1.org1.example.com | [1878 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19f9 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d29 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137b60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1991 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer1.org1.example.com | [1879 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [19fa 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e8080 gate 1574140935980849900 evaluation starts +peer1.org2.example.com | [1d2a 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137b60 principal matched by identity 0 +peer0.org1.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer1.org1.example.com | [187a 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1d2b 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [19fb 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e8080 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +peer1.org1.example.com | [187b 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [19fc 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e8080 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer1.org1.example.com | [187c 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d2c 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [19fd 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e8080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer1.org1.example.com | [187d 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [19fe 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e8080 principal evaluation fails +peer0.org1.example.com | [1992 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | [187e 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [19ff 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e8080 gate 1574140935980849900 evaluation fails +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [187f 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1a00 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1993 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 b1 2b 82 fa a6 96 ac 93 97 20 bb |0D. B.+....... .| +peer1.org1.example.com | [1880 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1a01 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 22 40 ee 8a dc 91 9d 13 83 6b 5e 10 0a 38 41 c4 |"@.......k^..8A.| +peer1.org1.example.com | [1881 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d2d 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137b60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a02 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000020 9a 1f 36 a2 02 20 0c bf a6 eb 88 70 37 e6 72 fa |..6.. .....p7.r.| +peer1.org1.example.com | [1882 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4350 gate 1574140939912206500 evaluation starts +peer1.org2.example.com | [1d2e 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137b60 gate 1574140944223401600 evaluation succeeds +peer0.org2.example.com | [1a03 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e85f0 gate 1574140935981797000 evaluation starts +peer0.org1.example.com | 00000030 07 51 4b b2 f1 06 5f 16 ac 3b 21 b6 2e 7d 8a 8a |.QK..._..;!..}..| +peer1.org1.example.com | [1883 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4350 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d2f 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a04 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e85f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 a9 e6 d5 f1 a0 31 |.....1| +peer1.org1.example.com | [1884 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4350 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1d30 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a05 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e85f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1994 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1885 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4350 principal matched by identity 0 +peer1.org2.example.com | [1d31 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a06 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e85f0 principal matched by identity 0 +peer0.org1.example.com | [1995 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1886 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +peer1.org2.example.com | [1d32 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a07 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1996 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +peer1.org2.example.com | [1d15 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1997 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1887 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +peer1.org2.example.com | [1d33 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a08 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1998 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | 00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +peer1.org2.example.com | [1d34 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [1999 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +peer1.org2.example.com | [1d35 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [199a 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +peer1.org2.example.com | [1d36 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [199b 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 cd f9 67 25 28 fc 53 |..g%(.S| +peer1.org2.example.com | [1d37 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [199c 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [1888 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4350 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1d38 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a09 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e85f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [199d 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1889 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4350 gate 1574140939912206500 evaluation succeeds +peer1.org2.example.com | [1d39 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a0a 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e85f0 gate 1574140935981797000 evaluation succeeds +peer0.org1.example.com | [199e 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [188a 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d3a 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a0b 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [199f 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [188b 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a0c 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [19a0 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [1d3b 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [188c 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a0d 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1d3c 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a1 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [188d 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a0e 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1d3d 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19a2 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [188e 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a0f 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d3e 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a3 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [188f 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a10 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d3f 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19a4 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1890 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [1a11 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d40 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [19a5 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1891 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 e1 a5 84 b8 e7 7c b7 b1 eb 3a fb cd f1 34 59 |......|...:...4Y| +peer0.org2.example.com | [1a12 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d41 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19a6 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 23 4a 03 ab 14 d6 75 22 99 07 2f 04 cb ac 2b fb |#J....u"../...+.| +peer0.org2.example.com | [1a13 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d42 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [19a7 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1892 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 90 f9 8e f6 d6 c2 69 17 9c 02 03 |0D. U......i....| +peer0.org2.example.com | [1a14 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d43 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19a8 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 aa 5b cc bf 7f 28 59 33 01 e4 54 0a c7 23 5e 97 |.[...(Y3..T..#^.| +peer0.org2.example.com | [1a15 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d44 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19a9 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 4a 04 c8 03 02 20 55 84 0f 30 af 13 80 2e 14 ba |J.... U..0......| +peer0.org2.example.com | [1a16 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d45 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [19aa 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a17 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9780 gate 1574140935983423200 evaluation starts +peer1.org1.example.com | 00000030 14 2a 06 0b 07 2c b4 fd 1b 5f 00 39 09 26 34 d9 |.*...,..._.9.&4.| +peer1.org2.example.com | [1d46 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [19ab 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a18 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 65 fb 17 39 76 b8 |e..9v.| +peer1.org2.example.com | [1d47 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [19ac 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a19 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9780 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1893 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d48 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157650 gate 1574140944759216700 evaluation starts +peer0.org1.example.com | [19ad 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a1a 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1894 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d49 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157650 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [19ae 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a1b 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9780 principal evaluation fails +peer1.org1.example.com | [1895 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4a 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157650 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [19af 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1a1c 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9780 gate 1574140935983423200 evaluation fails +peer1.org1.example.com | [1896 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4b 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [19b0 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1a1d 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1897 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d4c 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157650 principal evaluation fails +peer0.org1.example.com | [19b1 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1a1e 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1898 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d4d 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157650 gate 1574140944759216700 evaluation fails +peer0.org1.example.com | [19b2 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1a1f 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1899 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4e 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19b3 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [1a20 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9cf0 gate 1574140935983910300 evaluation starts +peer1.org1.example.com | [189a 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d4f 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19b4 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a21 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9cf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [189b 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1d50 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [19b5 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a22 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9cf0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [189c 11-19 05:22:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d51 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157bc0 gate 1574140944759635200 evaluation starts +peer0.org1.example.com | [19b6 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1a23 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9cf0 principal matched by identity 0 +peer1.org1.example.com | [189d 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d52 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [19b7 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a24 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [189e 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d53 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157bc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [19b8 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [189f 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d54 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157bc0 principal matched by identity 0 +peer0.org1.example.com | [19ba 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a25 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [18a0 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d55 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 67 5c b1 72 7a 4f c3 3a 17 75 b5 16 bc 91 e4 |7g\.rzO.:.u.....| +peer0.org1.example.com | [19b9 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [18a1 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 73 db 42 94 fb 0a b9 44 e1 f2 89 ff 65 57 30 3b |s.B....D....eW0;| +peer0.org1.example.com | [19bb 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [18a2 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d56 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 4c c1 13 6f af ed c4 9d 61 32 |0E.!..L..o....a2| +peer0.org1.example.com | [19bc 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [18a3 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960350 gate 1574140939921524800 evaluation starts +peer1.org2.example.com | 00000010 67 11 86 ac 8f 05 51 e1 65 5e 10 ba f3 40 0e 42 |g.....Q.e^...@.B| +peer0.org1.example.com | [19bd 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [18a4 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960350 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 df a3 f6 c6 91 02 20 19 56 22 f1 09 f8 7f 8e c9 |...... .V"......| +peer0.org1.example.com | [19be 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a26 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9cf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [18a5 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960350 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000030 28 ea eb ad c5 a1 58 89 a4 3e ea 5b 06 47 5c e5 |(.....X..>.[.G\.| +peer0.org1.example.com | [19bf 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a27 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e9cf0 gate 1574140935983910300 evaluation succeeds +peer1.org1.example.com | [18a6 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960350 principal matched by identity 0 +peer1.org2.example.com | 00000040 d3 2c db 5d e2 c9 c7 |.,.]...| +peer0.org1.example.com | [19c0 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a28 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [18a7 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer1.org2.example.com | [1d57 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157bc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [19c1 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a29 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer1.org2.example.com | [1d58 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004157bc0 gate 1574140944759635200 evaluation succeeds +peer0.org1.example.com | [19c2 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a2a 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [18a8 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer1.org2.example.com | [1d59 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [19c3 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a2b 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer1.org2.example.com | [1d5a 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [19c4 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a2c 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer1.org2.example.com | [1d5b 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [19c5 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer0.org1.example.com | [19c6 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d5c 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a2d 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer0.org1.example.com | [19c7 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1d5d 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [18a9 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960350 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [19c8 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101C +peer1.org2.example.com | [1d5e 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [18aa 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960350 gate 1574140939921524800 evaluation succeeds +peer0.org1.example.com | [19c9 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3362263D579EAF29474F55E87B9462511C07F3F664956E4ED9C059ACE5CAA3D9 +peer1.org2.example.com | [1d5f 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [18ab 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19ca 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1d60 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [18ac 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19cb 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1d61 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1a2e 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [18ad 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [19cc 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [1d62 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [18ae 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [19cd 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d63 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a2f 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [18af 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19ce 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d64 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [18b0 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19cf 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\210p" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d65 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [18b1 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [19d0 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d66 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [18b2 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 e1 a5 84 b8 e7 7c b7 b1 eb 3a fb cd f1 34 59 |......|...:...4Y| +peer0.org1.example.com | [19d1 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d67 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | 00000010 23 4a 03 ab 14 d6 75 22 99 07 2f 04 cb ac 2b fb |#J....u"../...+.| +peer0.org1.example.com | [19d2 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d68 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a30 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18b3 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 90 f9 8e f6 d6 c2 69 17 9c 02 03 |0D. U......i....| +peer0.org1.example.com | [19d4 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d69 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a31 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 aa 5b cc bf 7f 28 59 33 01 e4 54 0a c7 23 5e 97 |.[...(Y3..T..#^.| +peer0.org1.example.com | [19d3 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\210p" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6a 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a32 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 4a 04 c8 03 02 20 55 84 0f 30 af 13 80 2e 14 ba |J.... U..0......| +peer0.org1.example.com | [19d5 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d6b 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a33 11-19 05:22:15.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 14 2a 06 0b 07 2c b4 fd 1b 5f 00 39 09 26 34 d9 |.*...,..._.9.&4.| +peer0.org1.example.com | [19d6 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6c 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1a34 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 65 fb 17 39 76 b8 |e..9v.| +peer0.org1.example.com | [19d7 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d6d 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a35 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18b4 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19d8 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6e 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1a36 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18b5 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19d9 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6f 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a37 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18b6 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19da 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d70 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a38 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [18b7 11-19 05:22:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19db 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d71 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a39 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [18b8 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [19dc 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1d72 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a3a 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [18b9 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [19dd 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +peer1.org2.example.com | [1d73 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a3b 11-19 05:22:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18ba 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +peer1.org2.example.com | [1d74 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a3c 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [18bb 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19de 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +peer1.org2.example.com | [1d75 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a3d 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [18bc 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +peer1.org2.example.com | [1d76 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a3e 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18bd 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +peer1.org2.example.com | [1d77 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a3f 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18be 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +peer1.org2.example.com | [1d78 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a40 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18bf 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 cf c7 3e 31 88 70 |..>1.p| +peer1.org2.example.com | [1d79 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a41 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18c0 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19df 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d7a 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a42 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18c1 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e0 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d7b 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a43 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18c2 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e1 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d7c 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer0.org2.example.com | [1a44 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [18c3 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19e2 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1d7d 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer0.org2.example.com | [1a45 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c4 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19e3 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d7e 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +peer0.org2.example.com | [1a46 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c5 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19e4 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d7f 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a47 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c6 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19e5 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a48 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d80 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [18c7 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19e6 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a49 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1d81 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 a7 b6 cb c2 7b c6 53 be d5 88 13 31 d3 f4 98 |.....{.S....1...| +peer1.org1.example.com | [18c8 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [19e7 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a4a 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 fd 8e c2 6b e0 43 df 9b bf 32 d0 dd e8 07 f6 9d |...k.C...2......| +peer1.org1.example.com | [18c9 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e8 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a4b 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d82 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 d2 10 02 ed 2e f6 80 0f fe 7f 46 |0D. S..........F| +peer0.org1.example.com | [19e9 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [18ca 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a4c 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 3b 99 6a af 3d 51 ea 53 6a 83 b0 48 81 f1 a1 58 |;.j.=Q.Sj..H...X| +peer0.org1.example.com | [19ea 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 gate 1574140938841579200 evaluation starts +peer1.org1.example.com | [18cb 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a4d 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 f2 1f a6 05 02 20 67 37 00 03 bb 49 62 bc c8 88 |..... g7...Ib...| +peer0.org1.example.com | [19eb 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18cc 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a4e 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 b7 f1 85 f1 9f 50 05 37 bb dd 06 2b 80 2d cd 65 |.....P.7...+.-.e| +peer0.org1.example.com | [19ec 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [18cd 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a4f 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 94 eb d5 36 b8 9b |...6..| +peer0.org1.example.com | [19ed 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 principal matched by identity 0 +peer1.org1.example.com | [18ce 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a50 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d83 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19ee 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +peer1.org1.example.com | [18cf 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1a51 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e1d0 gate 1574140938844182400 evaluation starts +peer1.org2.example.com | [1d84 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer0.org1.example.com | 00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +peer1.org1.example.com | [18d0 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974cb0 gate 1574140940382627000 evaluation starts +peer0.org2.example.com | [1a52 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e1d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d85 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer0.org1.example.com | [19ef 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +peer1.org1.example.com | [18d1 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a53 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e1d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1d86 11-19 05:22:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | 00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +peer1.org1.example.com | [18d2 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974cb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1a54 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e1d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1d87 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +peer1.org1.example.com | [18d3 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974cb0 principal matched by identity 0 +peer0.org2.example.com | [1a55 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e1d0 principal evaluation fails +peer1.org2.example.com | [1d88 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151023 +peer0.org1.example.com | 00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +peer1.org1.example.com | [18d4 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 05 53 1b 4a 7c d7 b7 da 6b a0 89 cf 28 8b 66 | .S.J|...k...(.f| +peer0.org2.example.com | [1a56 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e1d0 gate 1574140938844182400 evaluation fails +peer1.org2.example.com | [1d89 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CFFA3D6FC7B3BBFC9BB18E0C177386F8A6B206CC50FA4769656D713186314494 +peer0.org1.example.com | 00000040 03 19 f7 9c b7 51 |.....Q| +peer1.org1.example.com | 00000010 1c 82 13 57 2b 06 e3 ab a3 ad a7 d2 b8 b4 cc e1 |...W+...........| +peer0.org2.example.com | [1a57 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d8a 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [19f0 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [18d5 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 64 41 c8 3a 6d f5 c3 f7 b0 44 0f |0D. udA.:m....D.| +peer0.org2.example.com | [1a58 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d8b 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [19f1 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 gate 1574140938841579200 evaluation succeeds +peer1.org1.example.com | 00000010 21 d7 fd fe ab 97 aa 2f 3d 87 67 05 6a 5f 89 fb |!....../=.g.j_..| +peer0.org2.example.com | [1a59 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1d8c 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [19f2 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 18 8c 13 82 02 20 32 03 24 3f fc 94 4b c9 a5 74 |..... 2.$?..K..t| +peer0.org2.example.com | [1a5a 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e740 gate 1574140938847403800 evaluation starts +peer1.org2.example.com | [1d8d 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [19f3 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 d3 48 06 c0 66 f0 05 8e 5a ed 36 9c f7 4f 05 2c |.H..f...Z.6..O.,| +peer0.org2.example.com | [1a5b 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e740 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d8e 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19f4 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 5d 6a 1c 82 5c 1a |]j..\.| +peer0.org2.example.com | [1a5c 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e740 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1d8f 11-19 05:22:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19f5 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [18d6 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974cb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a5d 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e740 principal matched by identity 0 +peer1.org2.example.com | [1d90 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19f6 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [18d7 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974cb0 gate 1574140940382627000 evaluation succeeds +peer0.org2.example.com | [1a5e 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +peer1.org2.example.com | [1d91 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [19f7 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18d8 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +peer1.org2.example.com | [1d92 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19f8 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [18d9 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a5f 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +peer1.org2.example.com | [1d93 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19f9 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +peer1.org1.example.com | [18da 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +peer1.org2.example.com | [1d94 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer1.org1.example.com | [18db 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +peer1.org2.example.com | [1d95 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [19fa 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer1.org1.example.com | [18dc 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +peer1.org2.example.com | [1d97 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer1.org1.example.com | [18dd 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | 00000040 cf c7 3e 31 88 70 |..>1.p| +peer1.org2.example.com | [1d98 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +peer1.org1.example.com | [18de 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1a60 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e740 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1d96 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer1.org1.example.com | [18df 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1a61 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422e740 gate 1574140938847403800 evaluation succeeds +peer1.org2.example.com | [1d99 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer1.org1.example.com | [18e0 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1a62 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d9a 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19fb 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18e1 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a63 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d9b 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19fc 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18e2 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a64 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1d9c 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19fd 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18e3 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a65 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1d9d 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19ff 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [18e4 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d9e 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1a66 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1a00 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [18e5 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d9f 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf fa 3d 6f c7 b3 bb fc 9b b1 8e 0c 17 73 86 f8 |..=o.........s..| +peer0.org2.example.com | [1a67 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1a01 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18e6 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 a6 b2 06 cc 50 fa 47 69 65 6d 71 31 86 31 44 94 |....P.Giemq1.1D.| +peer0.org2.example.com | [1a68 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1a02 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [18e7 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da0 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 0e b7 00 a9 c3 77 64 95 c1 68 |0E.!.......wd..h| +peer0.org2.example.com | [1a69 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [19fe 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [18e8 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 fa bb 2b 6b f5 ff 40 df 80 d8 85 d8 9c 3d 26 f7 |..+k..@......=&.| +peer0.org2.example.com | [1a6a 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1a03 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [18e9 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000020 d2 17 58 d2 30 02 20 59 01 bd f7 32 fb ff bf 1e |..X.0. Y...2....| +peer0.org2.example.com | [1a6b 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a04 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [18ea 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 bd 42 88 ab b2 85 25 98 a3 b4 22 9a 9c 90 a4 e0 |.B....%...".....| +peer0.org2.example.com | [1a6c 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a05 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +peer1.org1.example.com | [18eb 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 37 3a 31 b1 9c 17 e8 |7:1....| +peer0.org2.example.com | [1a6d 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +peer1.org1.example.com | [18ec 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1da1 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a6e 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | [1a06 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +peer1.org1.example.com | [18ed 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1da2 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a6f 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +peer1.org1.example.com | [18ee 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da3 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a70 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +peer1.org1.example.com | [18ef 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da4 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a71 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +peer1.org1.example.com | [18f0 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1da5 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a72 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000040 cf c7 3e 31 88 70 |..>1.p| +peer1.org1.example.com | [18f1 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da6 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a73 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:1\210p" > alive: alive: alive:\trQI\277\361B\376PCA\304\023\370\002 3P\212\177\033s\3330m\233fd\333e\253k\311?P\273\371u4M\270Ok\373:\224\233\326" > +peer0.org1.example.com | [1a07 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [1da7 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [18f2 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a74 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [1da8 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18f3 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a75 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a08 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 7d 35 b2 20 5a 67 0d 9c ea ef |0E.!..}5. Zg....| +peer1.org2.example.com | [1da9 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [18f4 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a76 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 3a 08 c2 99 13 03 81 35 62 82 4d 67 03 e4 a8 4b |:......5b.Mg...K| +peer1.org2.example.com | [1daa 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18f5 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a77 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 a6 2e 37 65 bf 02 20 7d c7 b2 27 df b6 59 82 d2 |..7e.. }..'..Y..| +peer1.org2.example.com | [1dab 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18f6 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a78 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 bb e4 82 79 17 a9 cb 02 38 59 41 65 2f c1 e4 9a |...y....8YAe/...| +peer1.org2.example.com | [1dac 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [18f7 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a79 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 d3 1b 70 24 38 cd 9f |..p$8..| +peer1.org2.example.com | [1dad 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [18f8 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1a7a 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a09 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1dae 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [18f9 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a7b 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a0a 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1daf 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6890 gate 1574140945776471200 evaluation starts +peer1.org1.example.com | [18fa 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a7c 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a0b 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1db0 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6890 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18fb 11-19 05:22:20.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1a7d 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [1a0c 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1db1 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6890 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [18fc 11-19 05:22:20.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151022 +peer0.org2.example.com | [1a7e 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a0d 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1db2 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [18fd 11-19 05:22:20.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9A9FC88DC86E76F4D77E4E833D20D0D04CBA7F1017D688FB00E34CB937BC6D2F +peer0.org2.example.com | [1a7f 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a0e 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1db3 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6890 principal evaluation fails +peer1.org1.example.com | [18fe 11-19 05:22:20.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1a80 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a0f 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1db4 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6890 gate 1574140945776471200 evaluation fails +peer1.org1.example.com | [18ff 11-19 05:22:20.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1a81 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a10 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +peer1.org2.example.com | [1db5 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1900 11-19 05:22:20.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [1a82 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | 00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +peer1.org2.example.com | [1db6 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1901 11-19 05:22:20.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1a83 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer0.org1.example.com | [1a11 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +peer1.org2.example.com | [1db7 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1902 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer0.org1.example.com | 00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +peer1.org2.example.com | [1db8 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6e00 gate 1574140945776902700 evaluation starts +peer1.org1.example.com | [1903 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a84 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer0.org1.example.com | 00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +peer1.org2.example.com | [1db9 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6e00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1904 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer0.org1.example.com | 00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +peer1.org2.example.com | [1dba 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6e00 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1905 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer0.org1.example.com | 00000040 cf c7 3e 31 88 70 |..>1.p| +peer1.org2.example.com | [1dbb 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6e00 principal matched by identity 0 +peer1.org1.example.com | [1906 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer0.org1.example.com | [1a12 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1dbc 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 7d d9 69 99 26 6d 9b f9 e2 cd e4 c1 43 12 8d |.}.i.&m......C..| +peer1.org1.example.com | [1907 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer1.org2.example.com | 00000010 7a bc 34 1b e3 01 c1 e5 f3 dd 1a 2d 93 a5 cd 2d |z.4........-...-| +peer0.org1.example.com | [1a13 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1908 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a85 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | [1dbd 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cc 3e f1 56 1b ea 6a 4c f1 5f |0E.!...>.V..jL._| +peer0.org1.example.com | [1a14 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1909 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | 00000010 3a ee a4 0a 56 75 00 9d 5c c5 89 1c eb e7 c3 2c |:...Vu..\......,| +peer0.org1.example.com | [1a15 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [190a 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a86 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 96 5c c2 28 60 2a 61 fe 8b c0 |0E.!...\.(`*a...| +peer1.org2.example.com | 00000020 e3 ca 46 84 ac 02 20 53 f3 a7 5b e3 78 dc 91 cf |..F... S..[.x...| +peer0.org1.example.com | [1a16 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [190b 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 f4 71 dc 9e e9 7c c1 cc b8 7c 72 d7 37 4e 24 1f |.q...|...|r.7N$.| +peer1.org2.example.com | 00000030 5c e2 40 72 f1 02 50 4e 50 ca f6 4e 9b 89 d4 28 |\.@r..PNP..N...(| +peer0.org1.example.com | [1a17 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [190c 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000020 9c 7e cf 5d 26 02 20 05 1b 2e f9 a4 3c d8 53 f6 |.~.]&. .....<.S.| +peer1.org2.example.com | 00000040 17 dd b8 ca aa 68 ca |.....h.| +peer0.org1.example.com | [1a18 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [190d 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 1c e2 6a 61 ad d9 95 01 f2 f0 6b 19 d3 b5 35 c7 |..ja......k...5.| +peer1.org2.example.com | [1dbe 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6e00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a19 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [190e 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 3b 9a 07 97 62 f3 e3 |;...b..| +peer1.org2.example.com | [1dbf 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6e00 gate 1574140945776902700 evaluation succeeds +peer0.org1.example.com | [1a1a 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [190f 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a87 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1dc0 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1a1b 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1910 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a88 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [1dc1 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1a1c 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1911 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a89 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1a1d 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 gate 1574140938867201900 evaluation starts +peer1.org2.example.com | [1dc2 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1912 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a8a 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1a1e 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1dc3 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1913 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [1a8b 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1a1f 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1dc4 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1914 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a8c 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a20 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 principal matched by identity 0 +peer1.org2.example.com | [1dc5 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1a8d 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1915 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a21 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +peer1.org2.example.com | [1dc6 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1a8e 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1916 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +peer1.org2.example.com | [1dc7 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1a8f 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [1917 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a22 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +peer1.org2.example.com | [1dc8 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1a90 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1918 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +peer1.org2.example.com | [1dc9 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a91 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1919 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +peer1.org2.example.com | [1dca 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a92 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [191a 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +peer1.org2.example.com | [1dcb 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a93 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\trQI\277\361B\376PCA\304\023\370\002 3P\212\177\033s\3330m\233fd\333e\253k\311?P\273\371u4M\270Ok\373:\224\233\326" > +peer1.org1.example.com | [191b 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2c40 gate 1574140940821522200 evaluation starts +peer0.org1.example.com | 00000040 29 8b ad a5 19 09 |).....| +peer1.org2.example.com | [1dcc 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a94 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [191c 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2c40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a23 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1dcd 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a95 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [191d 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2c40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1a24 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 gate 1574140938867201900 evaluation succeeds +peer1.org2.example.com | [1dce 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a96 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [191e 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2c40 principal matched by identity 0 +peer0.org1.example.com | [1a25 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1dcf 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a97 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [191f 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 cc 25 aa 71 10 1a d1 25 a7 62 88 c2 1c b8 51 |..%.q...%.b....Q| +peer0.org1.example.com | [1a26 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1dd0 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a98 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 c4 0f 4f 3d 2f 1d c1 a5 c7 59 b8 6f 92 c8 94 6e |..O=/....Y.o...n| +peer0.org1.example.com | [1a27 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1dd1 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a99 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1920 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 57 25 7a 99 a9 4c 02 03 ba e1 3a |0D. .W%z..L....:| +peer0.org1.example.com | [1a28 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1dd2 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a9a 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 33 26 cf 22 76 8d e6 01 86 e5 ca 38 39 3e db 84 |3&."v......89>..| +peer0.org1.example.com | [1a29 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1dd3 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1a9b 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 e9 f5 46 1c 02 20 61 4f ff 44 ec 0d 44 a2 0e db |..F.. aO.D..D...| +peer0.org1.example.com | [1a2a 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dd4 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a9c 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 db f8 98 7b 7b d1 48 6e a8 02 04 aa fd a3 c4 86 |...{{.Hn........| +peer0.org1.example.com | [1a2b 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1dd5 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1a9d 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 b1 8a 25 86 2b ef |..%.+.| +peer0.org1.example.com | [1a2c 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +peer1.org2.example.com | [1dd6 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a9e 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1921 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2c40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer1.org2.example.com | [1dd7 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a9f 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1922 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2c40 gate 1574140940821522200 evaluation succeeds +peer0.org1.example.com | [1a2d 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer1.org2.example.com | [1dd8 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1aa0 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1923 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer1.org2.example.com | [1dd9 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aa1 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1924 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +peer1.org2.example.com | [1dda 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1aa2 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1925 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer1.org2.example.com | [1ddb 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1aa3 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1926 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer1.org2.example.com | [1ddc 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aa4 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1927 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1a2e 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ddd 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1aa5 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1928 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1a2f 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dde 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aa6 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004280ba0 gate 1574140939755464900 evaluation starts +peer1.org1.example.com | [1929 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1ddf 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a30 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aa7 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004280ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [192a 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1de0 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a31 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aa8 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004280ba0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [192b 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1de1 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a32 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aa9 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004280ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [192c 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de2 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a33 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1aaa 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004280ba0 principal evaluation fails +peer1.org1.example.com | [192d 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de3 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a34 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1aab 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004280ba0 gate 1574140939755464900 evaluation fails +peer1.org1.example.com | [192e 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de4 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a35 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aac 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [192f 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1de5 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a36 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1aad 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1930 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1de6 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a38 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aae 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1931 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1de7 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1a37 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1aaf 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004281110 gate 1574140939758076400 evaluation starts +peer1.org1.example.com | [1932 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1de8 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 3d 1d 4c 32 af 15 52 ca a6 3e 45 4b 5e 92 57 |.=.L2..R..>EK^.W| +peer0.org1.example.com | [1a39 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ab0 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004281110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1933 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 bc 4b cc fb 15 73 2b 2e 00 e5 10 67 ce a3 0c e3 |.K...s+....g....| +peer0.org1.example.com | [1a3a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ab1 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004281110 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1934 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1de9 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 1f 0d 29 0e 9b ff 6f b6 8f 0e |0E.!....)...o...| +peer0.org1.example.com | [1a3c 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ab2 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004281110 principal matched by identity 0 +peer1.org1.example.com | [1935 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000010 60 0b 76 28 11 58 af 03 e1 bf b4 9f 9f 34 f6 52 |`.v(.X.......4.R| +peer0.org1.example.com | [1a3b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ab3 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 16 1c 59 2d 2a c6 fd 60 d7 71 78 2f 73 a7 a0 |B..Y-*..`.qx/s..| +peer1.org1.example.com | [1936 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 e6 6d 13 60 0b 02 20 40 da 86 7a e7 8d b9 1c 61 |.m.`.. @..z....a| +peer0.org1.example.com | [1a3d 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 1d 72 dd 1b d4 0f 9d 42 0c 8a cc 28 3a 3e e4 90 |.r.....B...(:>..| +peer1.org1.example.com | [1937 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 ad d4 98 90 fc bc 86 d3 2d a7 ad 9f 6c d7 9c 77 |........-...l..w| +peer0.org1.example.com | [1a3e 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ab4 11-19 05:22:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 15 c6 d0 a6 6c 8f 35 87 3d ca |0E.!......l.5.=.| +peer1.org1.example.com | [1938 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000040 8b fe c1 b5 ad ba e0 |.......| +peer0.org1.example.com | [1a3f 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 c8 f2 ec 21 31 ed 69 6d b1 66 0f 52 3c 7e 75 ea |...!1.im.f.R<~u.| +peer1.org1.example.com | [1939 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1dea 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a40 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 6c 20 07 fa 84 02 20 70 ad d7 87 61 21 2c 47 9a |l .... p...a!,G.| +peer1.org1.example.com | [193a 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1deb 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1a41 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000030 8a 86 35 77 09 3c 37 8a b0 d9 4c 5b 09 34 42 c9 |..5w.<7...L[.4B.| +peer1.org1.example.com | [193b 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1dec 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1a42 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 e7 1f 92 2b f2 cc 26 |...+..&| +peer1.org1.example.com | [193c 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ded 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1a43 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ab5 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004281110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [193d 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1dee 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1a44 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ab6 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004281110 gate 1574140939758076400 evaluation succeeds +peer1.org1.example.com | [193e 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1def 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a45 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ab7 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [193f 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1df0 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a46 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ab8 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1940 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1df1 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a47 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 gate 1574140939312523800 evaluation starts +peer0.org2.example.com | [1ab9 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1941 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1df2 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a48 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1aba 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1942 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1df3 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a49 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1abb 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1943 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1df4 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a4a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 principal matched by identity 0 +peer0.org2.example.com | [1abc 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1944 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1df5 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1a4b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1945 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1abd 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1df6 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1946 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1abe 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1df7 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1a4c 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1947 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1abf 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1df8 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [1948 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [1ac0 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1df9 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [1949 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ac1 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dfa 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [194a 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ac2 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dfb 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [194b 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ac3 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1dfc 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a4d 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [194c 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ac4 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dfd 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a4e 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 gate 1574140939312523800 evaluation succeeds +peer1.org1.example.com | [194d 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1ac5 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1dfe 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [194e 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer0.org1.example.com | [1a4f 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ac6 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dff 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer0.org1.example.com | [1a50 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ac7 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e00 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [194f 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer0.org1.example.com | [1a51 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ac8 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e01 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer0.org1.example.com | [1a52 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ac9 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e02 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer0.org1.example.com | [1a53 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [1aca 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e03 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1acb 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e04 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer0.org1.example.com | [1a54 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [1acc 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e05 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1950 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1acd 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [1e06 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1ace 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1e07 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1951 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 75 45 d8 99 09 11 04 4f 78 b0 |0E.!..uE.....Ox.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1acf 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e08 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 65 dd 19 21 aa 77 4c 4b c0 d0 57 c9 71 70 dd 2b |e..!.wLK..W.qp.+| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1ad0 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1e09 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 b4 ec 76 f5 45 02 20 73 cc fd 98 44 ba b9 26 54 |..v.E. s...D..&T| +peer0.org1.example.com | [1a55 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1ad1 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1e0a 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 17 43 40 a7 2b 4b 3a 59 4c ac c2 ef 6b 60 9a 69 |.C@.+K:YL...k`.i| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1ad2 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e0b 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 ef 5c 01 52 3d db 57 |.\.R=.W| +peer0.org1.example.com | [1a56 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1ad3 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1e0c 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [1952 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1ad4 11-19 05:22:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e0d 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1953 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1ad5 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1e0e 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1954 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1ad6 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e0f 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1955 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1ad7 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1e10 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1956 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1a57 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ad8 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e11 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1957 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a58 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ad9 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e12 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1958 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a59 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ada 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e13 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1959 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | [1a5a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1adb 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e14 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [195a 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a5b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1adc 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e15 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [195b 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a5c 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1add 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e16 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [195c 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a5d 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ade 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e17 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [195d 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [1a5e 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1adf 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e18 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [195e 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a5f 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 gate 1574140939316267300 evaluation starts +peer0.org2.example.com | [1ae0 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e19 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fb960 gate 1574140946840005700 evaluation starts +peer1.org1.example.com | [195f 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a60 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ae1 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [1e1a 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fb960 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1960 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a61 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1e1b 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fb960 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1961 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ae2 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a62 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 principal matched by identity 0 +peer1.org2.example.com | [1e1c 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fb960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1962 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ae3 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [1a63 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1e1d 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fb960 principal evaluation fails +peer1.org1.example.com | [1963 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ae4 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1e1e 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fb960 gate 1574140946840005700 evaluation fails +peer1.org1.example.com | [1964 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ae5 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1a64 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1e1f 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1965 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ae6 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1e20 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1966 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ae7 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [1e21 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1967 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ae8 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [1e22 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fbed0 gate 1574140946840482600 evaluation starts +peer1.org1.example.com | [1968 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ae9 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1e23 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fbed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1969 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aea 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a65 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e24 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fbed0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [196a 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aeb 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a66 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 gate 1574140939316267300 evaluation succeeds +peer1.org2.example.com | [1e25 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fbed0 principal matched by identity 0 +peer1.org1.example.com | [196b 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aec 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a67 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e26 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer1.org1.example.com | [196c 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aed 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a68 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [196d 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer0.org2.example.com | [1aee 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a69 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [196e 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [1e27 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer0.org2.example.com | [1aef 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a6a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [196f 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer0.org2.example.com | [1af0 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a6b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1970 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer0.org2.example.com | [1af1 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a6c 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1971 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer0.org2.example.com | [1af2 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a6d 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1972 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer0.org2.example.com | [1af3 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a6e 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1973 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e28 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fbed0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1af4 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a6f 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e29 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fbed0 gate 1574140946840482600 evaluation succeeds +peer1.org1.example.com | [1974 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1af5 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a70 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e2a 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1975 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1af6 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a71 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e2b 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1976 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1af7 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e2c 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1977 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a72 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1af8 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1e2d 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1978 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1a73 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1af9 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15101E +peer1.org2.example.com | [1e2e 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1979 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a74 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1afa 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 73D1FE6AA749F3078D3F73538C9087FB8E00D1B11F4C91D5CB233762D338685C +peer1.org2.example.com | [1e2f 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [197a 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a75 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1afb 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1e30 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [197b 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1afc 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1e31 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [197c 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a76 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 gate 1574140939319121200 evaluation starts +peer0.org2.example.com | [1afd 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [1e32 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [197d 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a77 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1afe 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e33 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [197e 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a78 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1aff 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1e34 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [197f 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a79 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 principal matched by identity 0 +peer1.org2.example.com | [1e35 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b00 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1980 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada620 gate 1574140943457404700 evaluation starts +peer0.org1.example.com | [1a7a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1e36 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [1b01 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1981 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada620 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1e37 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b02 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1982 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada620 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1a7b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1e38 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b03 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1983 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada620 principal matched by identity 0 +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1e39 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b04 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1984 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [1e3a 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b05 11-19 05:22:19.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [1e3b 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b06 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1985 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1e3c 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b08 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +peer0.org1.example.com | [1a7c 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e3d 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > alive: +peer0.org2.example.com | [1b07 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +peer0.org1.example.com | [1a7d 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 gate 1574140939319121200 evaluation succeeds +peer1.org2.example.com | [1e3e 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b09 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +peer0.org1.example.com | [1a7e 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e3f 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b0a 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 d4 ee 0e e0 32 5d |....2]| +peer0.org1.example.com | [1a7f 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e40 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b0b 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1986 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada620 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a80 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e41 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b0c 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1987 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada620 gate 1574140943457404700 evaluation succeeds +peer0.org1.example.com | [1a81 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e42 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b0d 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +peer1.org1.example.com | [1988 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a82 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [1e43 11-19 05:22:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | 00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +peer1.org1.example.com | [1989 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [1e44 11-19 05:22:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b0e 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +peer1.org1.example.com | [198a 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a83 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [1e45 11-19 05:22:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +peer1.org1.example.com | [198b 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [1e46 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [198c 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1e47 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [198d 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1e48 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 cd f9 67 25 28 fc 53 |..g%(.S| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [198e 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1b0f 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | [1e49 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1a84 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [198f 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1e4c 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a85 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1990 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1b10 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 79 25 47 91 2c 42 bf 8f 47 16 |0E.!..y%G.,B..G.| +peer1.org2.example.com | [1e4a 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1991 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a86 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 47 51 bc f4 b5 74 d5 9a 23 eb e8 c4 1f 21 0c 60 |GQ...t..#....!.`| +peer1.org2.example.com | [1e4d 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1992 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a87 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 71 78 32 78 d6 02 20 66 ba d8 df d8 8a 2c ba 09 |qx2x.. f.....,..| +peer1.org2.example.com | [1e4b 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1993 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a88 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 b9 37 db f6 47 b4 4d f2 2a d1 5a 25 24 2e 57 66 |.7..G.M.*.Z%$.Wf| +peer1.org2.example.com | [1e4e 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1994 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [1a89 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000040 18 2f 65 67 32 eb a6 |./eg2..| +peer1.org2.example.com | [1e4f 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1995 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a8a 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b11 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1e50 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1996 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a8b 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1b12 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e51 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1997 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a8c 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 gate 1574140939327322200 evaluation starts +peer0.org2.example.com | [1b13 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1e53 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1998 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a8d 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b14 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e52 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1999 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a8e 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1b15 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e54 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [199a 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a8f 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 principal matched by identity 0 +peer0.org2.example.com | [1b16 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e55 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [199b 11-19 05:22:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\333\204\351\365F\034\002 aO\377D\354\rD\242\016\333\333\370\230{{\321Hn\250\002\004\252\375\243\304\206\261\212%\206+\357" > alive: alive: alive: +peer0.org1.example.com | [1a90 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [1b18 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1e56 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [199c 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1b17 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e57 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [199d 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a91 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [1e58 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b19 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [199e 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [1e59 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1b1a 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [199f 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [1e5a 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151024 +peer0.org2.example.com | [1b1b 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19a0 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [1e5b 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BE3B2D53797E96B43BA5002F344BF498BC4E210F9185BAC552F6B29368314300 +peer0.org2.example.com | [1b1c 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19a1 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [1e5c 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1b1d 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [19a2 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a92 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e5d 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1b1e 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [19a3 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a93 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 gate 1574140939327322200 evaluation succeeds +peer1.org2.example.com | [1e5e 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [1b1f 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [19a4 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a94 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e5f 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\226\200\371" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b20 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f86a0 gate 1574140939857039200 evaluation starts +peer1.org1.example.com | [19a5 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a95 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e60 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\226\200\371" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b21 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f86a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [19a6 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a96 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e61 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b22 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f86a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [19a7 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a97 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e62 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b23 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f86a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [19a8 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a98 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [1e63 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b24 11-19 05:22:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f86a0 principal evaluation fails +peer1.org1.example.com | [19a9 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [1e64 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b25 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f86a0 gate 1574140939857039200 evaluation fails +peer0.org1.example.com | [1a99 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [19aa 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e65 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b26 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [19ab 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e66 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1b27 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [19ac 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e67 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer0.org2.example.com | [1b28 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [19ad 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer0.org2.example.com | [1b29 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [19ae 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e68 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer0.org2.example.com | [1b2a 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8c30 gate 1574140939861562800 evaluation starts +peer0.org1.example.com | [1a9a 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19af 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer0.org2.example.com | [1b2b 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8c30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a9b 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [19b0 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af67e0 gate 1574140943636181500 evaluation starts +peer1.org2.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer0.org2.example.com | [1b2c 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8c30 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1a9c 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [19b1 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af67e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer0.org2.example.com | [1b2d 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8c30 principal matched by identity 0 +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [19b2 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af67e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer0.org2.example.com | [1b2e 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +peer0.org1.example.com | [1a9d 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [19b3 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af67e0 principal matched by identity 0 +peer1.org2.example.com | [1e69 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [19b4 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1e6a 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b2f 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1e6b 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [19b5 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | 00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1e6c 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 79 99 af 5a 0d 54 9c 45 31 24 8e |0D. gy..Z.T.E1$.| +peer0.org2.example.com | 00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +peer0.org1.example.com | [1a9e 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000010 c2 76 62 07 48 91 af 23 8d ce c4 20 57 34 11 cc |.vb.H..#... W4..| +peer0.org2.example.com | 00000040 97 98 2a f0 ef af ab |..*....| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000020 0e f2 ed c0 02 20 08 0a 6e 5c 97 30 94 be d0 3b |..... ..n\.0...;| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1b30 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8c30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | 00000030 84 8d 18 ba 47 ed 07 41 ef c7 71 8a a4 23 b7 31 |....G..A..q..#.1| +peer0.org1.example.com | [1a9f 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [1b31 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8c30 gate 1574140939861562800 evaluation succeeds +peer1.org1.example.com | [19b6 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af67e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000040 01 9e 4f 6c 47 82 |..OlG.| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1b32 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [19b7 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af67e0 gate 1574140943636181500 evaluation succeeds +peer1.org2.example.com | [1e6d 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1b33 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [19b8 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e6e 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1b34 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [19b9 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e6f 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1b35 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [19ba 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e70 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1aa0 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b36 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [19bb 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e71 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1aa1 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b37 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19bc 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [1e73 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b38 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [1aa2 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e74 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b39 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +peer1.org1.example.com | [19bd 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [1aa3 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e72 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [1aa4 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e75 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b3a 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [1aa5 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e76 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [1aa6 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e77 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [1aa7 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e78 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +peer1.org1.example.com | [19be 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aa8 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 gate 1574140939333651700 evaluation starts +peer1.org2.example.com | [1e79 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 cd f9 67 25 28 fc 53 |..g%(.S| +peer1.org1.example.com | [19bf 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aa9 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e7a 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1b3b 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [19c0 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1aaa 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1e7b 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b3c 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [19c1 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1aab 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 principal matched by identity 0 +peer0.org2.example.com | [1b3d 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e7c 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [19c2 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1aac 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [1b3e 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1e7d 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19c3 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1b3f 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer1.org2.example.com | [1e7e 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19c4 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1aad 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer1.org2.example.com | [1e7f 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [19c5 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [1b40 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer1.org2.example.com | [1e80 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [19c6 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer1.org2.example.com | [1e81 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [19c7 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7ff0 gate 1574140943641006600 evaluation starts +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer1.org2.example.com | [1e82 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427c590 gate 1574140947473198900 evaluation starts +peer1.org1.example.com | [19c8 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7ff0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer1.org2.example.com | [1e83 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427c590 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [19c9 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7ff0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1aae 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer1.org2.example.com | [1e84 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427c590 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [19ca 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7ff0 principal matched by identity 0 +peer0.org1.example.com | [1aaf 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 gate 1574140939333651700 evaluation succeeds +peer0.org2.example.com | [1b41 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1e85 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427c590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [19cb 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [1ab0 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b42 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e86 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427c590 principal evaluation fails +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1ab1 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b43 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e87 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427c590 gate 1574140947473198900 evaluation fails +peer1.org1.example.com | [19cc 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [1ab2 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b44 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e88 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1ab3 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b45 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e89 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [1ab4 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b46 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [1e8a 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [1ab5 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b47 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +peer1.org2.example.com | [1e8b 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427cb00 gate 1574140947473544600 evaluation starts +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1ab6 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +peer1.org2.example.com | [1e8c 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427cb00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [19cd 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7ff0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ab7 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b48 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +peer1.org2.example.com | [1e8d 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427cb00 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [19ce 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7ff0 gate 1574140943641006600 evaluation succeeds +peer0.org1.example.com | [1ab8 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +peer1.org2.example.com | [1e8e 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427cb00 principal matched by identity 0 +peer1.org1.example.com | [19cf 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ab9 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +peer1.org2.example.com | [1e8f 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer1.org1.example.com | [19d0 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1aba 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +peer1.org2.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer1.org1.example.com | [19d1 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1abb 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 cd f9 67 25 28 fc 53 |..g%(.S| +peer1.org2.example.com | [1e90 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer1.org1.example.com | [19d2 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b49 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1abc 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 gate 1574140939338261600 evaluation starts +peer1.org2.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer1.org1.example.com | [19d3 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1b4a 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1abd 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1b4b 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1abe 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer1.org1.example.com | [19d4 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1b4c 11-19 05:22:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1abf 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 principal matched by identity 0 +peer1.org2.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1b4d 11-19 05:22:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer0.org1.example.com | [1ac0 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1e91 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427cb00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1e92 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427cb00 gate 1574140947473544600 evaluation succeeds +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1b4e 11-19 05:22:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer0.org1.example.com | [1ac1 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1e93 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1e94 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [19d5 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [1e95 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [19d6 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [1e96 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [19d7 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1e97 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1b4f 11-19 05:22:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ac2 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e98 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19d8 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [1b50 11-19 05:22:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ac3 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 gate 1574140939338261600 evaluation succeeds +peer1.org2.example.com | [1e99 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1b51 11-19 05:22:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ac4 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e9a 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1b52 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac5 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1b53 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ac6 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e9b 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1b54 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac7 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer1.org1.example.com | [19d9 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b55 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1ac8 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer1.org1.example.com | [19da 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b56 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ac9 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer1.org1.example.com | [19db 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer0.org2.example.com | [1b57 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1aca 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer1.org1.example.com | [19dc 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer0.org2.example.com | [1b58 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1acb 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [19dd 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e9c 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b59 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1acc 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510081801 +peer1.org1.example.com | [19de 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e9d 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b5a 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1acd 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9F57D1024DB60A9FA6A848BC0A5839990C7F194D4F33226901DDC2541E6DD0F9 +peer1.org1.example.com | [19df 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e9e 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5b 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ace 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer1.org1.example.com | [19e0 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e9f 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5c 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1acf 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [19e1 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dc030 gate 1574140943649584900 evaluation starts +peer1.org2.example.com | [1ea0 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b5d 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004302d80 gate 1574140939892210100 evaluation starts +peer0.org1.example.com | [1ad0 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [19e2 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dc030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ea1 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5e 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004302d80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ad1 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [19e3 11-19 05:22:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dc030 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1ea2 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b5f 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004302d80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1ad2 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e4 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dc030 principal matched by identity 0 +peer1.org2.example.com | [1ea3 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1b60 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004302d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1ad3 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e5 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1ea4 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer0.org2.example.com | [1b61 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004302d80 principal evaluation fails +peer0.org1.example.com | [1ad4 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer0.org2.example.com | [1b62 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004302d80 gate 1574140939892210100 evaluation fails +peer0.org1.example.com | [1ad5 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e6 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1ea5 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer0.org2.example.com | [1b63 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ad6 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer0.org2.example.com | [1b64 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ad7 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer0.org2.example.com | [1b65 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1ad8 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer0.org2.example.com | [1b66 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043032f0 gate 1574140939893769500 evaluation starts +peer0.org1.example.com | [1ada 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer0.org2.example.com | [1b67 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043032f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ad9 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e7 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dc030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ea6 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b68 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043032f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1adb 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e8 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dc030 gate 1574140943649584900 evaluation succeeds +peer1.org2.example.com | [1ea7 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b69 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043032f0 principal matched by identity 0 +peer0.org1.example.com | [1adc 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [19e9 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ea8 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b6a 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 e1 a5 84 b8 e7 7c b7 b1 eb 3a fb cd f1 34 59 |......|...:...4Y| +peer0.org1.example.com | [1add 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [19ea 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ea9 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 23 4a 03 ab 14 d6 75 22 99 07 2f 04 cb ac 2b fb |#J....u"../...+.| +peer0.org1.example.com | [1ade 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19eb 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1eaa 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b6b 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 90 f9 8e f6 d6 c2 69 17 9c 02 03 |0D. U......i....| +peer0.org1.example.com | [1adf 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19ec 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1eab 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 aa 5b cc bf 7f 28 59 33 01 e4 54 0a c7 23 5e 97 |.[...(Y3..T..#^.| +peer0.org1.example.com | [1ae1 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19ed 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eac 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 4a 04 c8 03 02 20 55 84 0f 30 af 13 80 2e 14 ba |J.... U..0......| +peer0.org1.example.com | [1ae0 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [19ee 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ead 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 14 2a 06 0b 07 2c b4 fd 1b 5f 00 39 09 26 34 d9 |.*...,..._.9.&4.| +peer0.org1.example.com | [1ae2 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19ef 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1eae 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 65 fb 17 39 76 b8 |e..9v.| +peer0.org1.example.com | [1ae3 11-19 05:22:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19f0 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1eaf 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b6c 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043032f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ae4 11-19 05:22:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19f1 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1eb0 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b6d 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043032f0 gate 1574140939893769500 evaluation succeeds +peer0.org1.example.com | [1ae5 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [19f2 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1eb1 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b6e 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1ae6 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19f3 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1eb2 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b6f 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1ae7 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19f4 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1eb3 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b70 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ae8 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [19f5 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd1e0 gate 1574140943655949100 evaluation starts +peer1.org2.example.com | [1eb4 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b71 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ae9 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [19f6 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd1e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1eb5 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b72 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1aea 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19f7 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd1e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1eb6 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b73 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1aeb 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19f8 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd1e0 principal matched by identity 0 +peer1.org2.example.com | [1eb7 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [1b74 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [19f9 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [1aec 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eb8 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b75 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1aed 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eb9 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b76 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [19fa 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [1aee 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eba 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b77 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1aef 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ebb 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b78 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [1af0 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ebc 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [1b79 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [1af1 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ebd 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b7a 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1af2 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b7b 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ebe 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [19fb 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd1e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1af3 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1b7c 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ebf 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [19fc 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040dd1e0 gate 1574140943655949100 evaluation succeeds +peer0.org1.example.com | [1af4 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b7d 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec0 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19fd 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1af5 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b7e 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ec1 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1af6 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19fe 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b7f 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\trQI\277\361B\376PCA\304\023\370\002 3P\212\177\033s\3330m\233fd\333e\253k\311?P\273\371u4M\270Ok\373:\224\233\326" > +peer1.org2.example.com | [1ec2 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1af7 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19ff 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b80 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ec3 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 16 88 c3 34 f0 2e b2 4f fb eb 2e 89 31 98 ab |....4...O....1..| +peer0.org1.example.com | [1af8 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a00 11-19 05:22:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b81 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 05 f1 a7 ba c4 1c f0 0f dd 77 00 0d 29 84 8a ec |.........w..)...| +peer0.org1.example.com | [1af9 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a01 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1b82 11-19 05:22:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec4 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 00 8f 9f bc aa 50 5e 3b 0c d0 |0E.!.......P^;..| +peer0.org1.example.com | [1afa 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1b83 11-19 05:22:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 68 de 2a 21 a1 37 3f d2 fa b3 82 91 7b c8 c0 8f |h.*!.7?.....{...| +peer1.org2.example.com | 00000020 2b 03 83 fe 66 02 20 71 da 64 15 61 94 c3 cf 1b |+...f. q.d.a....| +peer1.org1.example.com | [1a02 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1b84 11-19 05:22:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | 00000030 6b 0d be b6 d9 7d a2 04 cc 3a d7 c6 26 67 89 1e |k....}...:..&g..| +peer0.org1.example.com | [1afb 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 gate 1574140939438122400 evaluation starts +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1b85 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 f4 77 3f 23 c9 6a ac |.w?#.j.| +peer0.org1.example.com | [1afc 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1b86 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ec5 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [1afd 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1b87 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [1afe 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 principal matched by identity 0 +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1b88 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ec6 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c ad 89 ed 60 08 bf 52 62 59 7f 44 |0D. l...`..RbY.D| +peer0.org1.example.com | [1aff 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +peer1.org1.example.com | [1a03 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b89 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 ad 50 5e c6 71 2b 0c e4 91 f8 a5 0e 30 99 66 c6 |.P^.q+......0.f.| +peer0.org1.example.com | 00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +peer1.org1.example.com | [1a04 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b8a 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 52 df 5c e8 02 20 5c 81 c6 71 58 3b 4d ba 85 15 |R.\.. \..qX;M...| +peer0.org1.example.com | [1b00 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +peer1.org1.example.com | [1a05 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b8b 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 3a fa ac c3 e6 23 8b 9f 7d f8 ce 4e af 19 c5 db |:....#..}..N....| +peer0.org1.example.com | 00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +peer1.org1.example.com | [1a06 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b8c 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 de e9 15 0a 96 bf |......| +peer0.org1.example.com | 00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +peer1.org1.example.com | [1a07 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b8d 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec7 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | 00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +peer1.org1.example.com | [1a08 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b8e 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec8 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | 00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +peer1.org1.example.com | [1a09 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b8f 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1ec9 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1a0a 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b90 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1eca 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1b01 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a0b 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1b91 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ecb 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1b02 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 gate 1574140939438122400 evaluation succeeds +peer1.org1.example.com | [1a0c 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b92 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ecc 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b03 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a0d 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1b93 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ecd 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b04 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a0e 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040eac40 gate 1574140943668004200 evaluation starts +peer0.org2.example.com | [1b94 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ece 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b05 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a0f 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040eac40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b95 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435ad00 gate 1574140939961603000 evaluation starts +peer1.org2.example.com | [1ecf 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [1b06 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a10 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040eac40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1b96 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435ad00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ed0 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b07 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a11 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040eac40 principal matched by identity 0 +peer0.org2.example.com | [1b97 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435ad00 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1ed1 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b08 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1a12 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [1b98 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435ad00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1ed2 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b09 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1b99 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435ad00 principal evaluation fails +peer1.org2.example.com | [1ed3 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [1b0a 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1a13 11-19 05:22:23.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [1b9a 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435ad00 gate 1574140939961603000 evaluation fails +peer1.org2.example.com | [1ed4 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b0b 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [1b9b 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ed5 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b0c 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [1b9c 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b0d 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ed6 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [1b9d 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1b0e 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ed7 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1b9e 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b270 gate 1574140939963632100 evaluation starts +peer0.org1.example.com | [1b0f 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org2.example.com | [1ed8 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a14 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040eac40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1b9f 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b270 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b10 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ed9 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [1a15 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040eac40 gate 1574140943668004200 evaluation succeeds +peer0.org2.example.com | [1ba0 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b270 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1b11 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eda 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a16 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ba1 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b270 principal matched by identity 0 +peer0.org1.example.com | [1b12 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1edb 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a17 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ba2 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [1b13 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1edc 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a18 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [1b14 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1edd 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a19 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ba3 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [1b15 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ede 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a1a 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [1b16 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > alive: alive: +peer1.org2.example.com | [1edf 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [1b17 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ee0 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a1b 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [1b18 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ee1 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d020 gate 1574140947906013600 evaluation starts +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [1b19 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ee2 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1ba4 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b270 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ee3 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d020 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1b1a 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1ba5 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b270 gate 1574140939963632100 evaluation succeeds +peer1.org2.example.com | [1ee4 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1b1b 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 20 ff d9 79 4a b8 0a ce d3 a0 c3 89 e5 cd 03 |. ..yJ..........| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1ba6 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ee5 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d020 principal evaluation fails +peer0.org1.example.com | 00000010 a6 f7 aa fb 18 50 0c 68 a4 29 63 4b 46 63 5c 3d |.....P.h.)cKFc\=| +peer0.org2.example.com | [1ba7 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1a1c 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [1ee6 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d020 gate 1574140947906013600 evaluation fails +peer0.org1.example.com | [1b1c 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 6f 92 65 34 4b f4 db 03 33 31 9e |0D. .o.e4K...31.| +peer0.org2.example.com | [1ba8 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [1ee7 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 3d f1 08 a3 73 b8 96 70 10 b5 8d 76 f4 93 ac eb |=...s..p...v....| +peer0.org2.example.com | [1ba9 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a1d 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [1ee8 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 cd 6e 3b 4a 02 20 5b 2a a4 87 2f 74 37 d0 ea 82 |.n;J. [*../t7...| +peer0.org2.example.com | [1baa 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [1ee9 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 79 ad 3b df f3 63 8a 32 ba 53 55 73 dd b2 a6 be |y.;..c.2.SUs....| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [1eea 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d590 gate 1574140947908565800 evaluation starts +peer0.org1.example.com | 00000040 30 83 28 b6 a5 b4 |0.(...| +peer0.org2.example.com | [1bab 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [1eeb 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b1d 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [1eec 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d590 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1a1e 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eed 11-19 05:22:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d590 principal matched by identity 0 +peer0.org1.example.com | [1b1e 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 17 76 fe 9c d5 86 fe b4 41 70 32 |0D. \.v......Ap2| +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1a1f 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eee 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 16 8e 12 24 53 5d 8a 00 ed 9f dd d1 00 73 cb |....$S].......s.| +peer0.org1.example.com | 00000010 c9 34 11 7a 4a 1f b5 bb 80 e2 a6 37 e2 54 dd d8 |.4.zJ......7.T..| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1a20 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 08 a2 1d 4d d5 e9 1a 3f a3 bb 47 c6 1e c2 b9 6a |...M...?..G....j| +peer0.org1.example.com | 00000020 e2 9f d5 b1 02 20 0c d8 a9 29 02 fa b0 5c 24 3e |..... ...)...\$>| +peer0.org2.example.com | [1bac 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1a21 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eef 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 8a ba c9 bc 71 19 d5 48 61 b7 |0E.!......q..Ha.| +peer0.org1.example.com | 00000030 40 51 6b dd 10 71 b6 15 e0 5a b4 0b aa 8f ad 77 |@Qk..q...Z.....w| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1a22 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | 00000010 b4 63 e0 cd d0 f4 a1 4e 6c 3e 92 48 4a a1 4f 4e |.c.....Nl>.HJ.ON| +peer0.org1.example.com | 00000040 43 f1 61 3f 8c 22 |C.a?."| +peer0.org2.example.com | [1bad 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1a23 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 ef 5e 40 12 e4 02 20 01 7e e5 df 6a 9c 52 b5 38 |.^@... .~..j.R.8| +peer0.org1.example.com | [1b1f 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [1a24 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 9c 8f 8b cc db 00 38 15 8e 81 b2 b4 a9 d1 83 43 |......8........C| +peer0.org1.example.com | [1b20 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [1a25 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000040 14 12 ad a2 f2 d6 df |.......| +peer0.org1.example.com | [1b21 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [1a26 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ef0 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d590 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b22 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1a27 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ef1 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426d590 gate 1574140947908565800 evaluation succeeds +peer0.org1.example.com | [1b23 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 551137968960121392, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1bae 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a28 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1ef2 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1b24 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1baf 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a29 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b25 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 551137968960121392, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ef3 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1a2a 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bb0 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b26 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ef4 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a2b 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1bb1 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b27 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ef5 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a2c 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1bb2 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b28 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ef6 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a2d 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1bb3 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b29 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ef7 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1a2e 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142af0 gate 1574140943682044300 evaluation starts +peer0.org2.example.com | [1bb4 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b2a 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ef8 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1a2f 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1bb5 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b2b 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ef9 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1a30 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142af0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1bb6 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377100 gate 1574140939966010900 evaluation starts +peer0.org1.example.com | [1b2c 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1efa 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1a31 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142af0 principal matched by identity 0 +peer0.org2.example.com | [1bb7 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b2d 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org2.example.com | [1efb 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a32 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [1bb8 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377100 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1b2e 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org2.example.com | [1efc 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [1bb9 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1b2f 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1efd 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [1a33 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [1bba 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377100 principal evaluation fails +peer0.org1.example.com | [1b30 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org2.example.com | [1efe 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [1bbb 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377100 gate 1574140939966010900 evaluation fails +peer0.org1.example.com | [1b31 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1eff 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [1bbc 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b32 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c bc b3 61 f5 ed 65 48 3a 12 5b dd 40 40 28 11 |...a..eH:.[.@@(.| +peer1.org2.example.com | [1f00 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [1bbd 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 a9 be 9a 04 f4 dd 36 f5 e2 b5 da 36 e8 53 73 bb |......6....6.Ss.| +peer1.org2.example.com | [1f01 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [1bbe 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1b33 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 20 e1 d8 5e 7c 53 e6 3c 55 8a |0E.!.. ..^|S. DEBU Exiting, replying with alive:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > alive: alive: alive: +peer1.org1.example.com | [1a34 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142af0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1bbf 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377670 gate 1574140939966258600 evaluation starts +peer0.org1.example.com | 00000010 23 ad e2 9b d0 e0 10 fc 39 95 bc c8 fb 59 10 94 |#.......9....Y..| +peer1.org2.example.com | [1f03 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a35 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142af0 gate 1574140943682044300 evaluation succeeds +peer0.org2.example.com | [1bc0 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377670 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 b3 96 4b ca 77 02 20 57 8f fb 85 18 05 c3 a4 83 |..K.w. W........| +peer1.org2.example.com | [1f04 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a36 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bc1 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377670 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000030 44 c9 c4 1d c0 da 68 9f 4d aa dd 78 27 39 66 2e |D.....h.M..x'9f.| +peer1.org2.example.com | [1f05 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a37 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bc2 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377670 principal matched by identity 0 +peer0.org1.example.com | 00000040 05 b3 c4 f7 2f 41 96 |..../A.| +peer1.org2.example.com | [1f06 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a38 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1bc3 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1b34 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [1f07 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a39 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [1f08 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a3a 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bc4 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1b35 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 70 82 a3 9b e5 ae 7c aa 5d c8 |0E.!..p.....|.].| +peer1.org2.example.com | [1f09 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a3b 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | 00000010 8e 3a c0 ff 42 5a 8f 80 e1 f8 d6 34 a0 52 d4 23 |.:..BZ.....4.R.#| +peer1.org2.example.com | [1f0a 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | 00000020 1e f9 a9 7c f3 02 20 5c 0f 18 f4 2e 45 60 dd dd |...|.. \....E`..| +peer1.org1.example.com | [1a3c 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f0b 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | 00000030 81 fa a5 f1 a7 32 c0 ed ee 57 89 fe 79 1f 71 42 |.....2...W..y.qB| +peer1.org1.example.com | [1a3d 11-19 05:22:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f0c 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | 00000040 b3 07 39 b3 0e cd c8 |..9....| +peer1.org1.example.com | [1a3e 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1f0d 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bc5 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377670 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b36 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a3f 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f0e 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [1bc6 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377670 gate 1574140939966258600 evaluation succeeds +peer0.org1.example.com | [1b37 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [1a40 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1f0f 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bc7 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1b38 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a41 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f10 11-19 05:22:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bc8 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1b39 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a42 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [1f11 11-19 05:22:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bc9 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b3a 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1297292706604458090, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1a43 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f12 11-19 05:22:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1bca 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b3b 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [1a44 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bcb 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f13 11-19 05:22:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b3c 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1297292706604458090, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a45 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bcc 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f14 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b3d 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a46 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bcd 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [1f15 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b3e 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a47 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [1f16 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b3f 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a48 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bce 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1f17 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b40 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a49 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1f18 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b41 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [1a4a 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [1f19 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b42 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a4b 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [1f1a 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b43 11-19 05:22:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1a4c 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1f1b 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b44 11-19 05:22:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101D +peer1.org1.example.com | [1a4d 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bcf 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f1c 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b45 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 42161C592D2AC6FD60D771782F73A7A01D72DD1BD40F9D420C8ACC283A3EE490 +peer1.org1.example.com | [1a4e 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd0 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f1d 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b46 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1a4f 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd1 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1f1e 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b47 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1a50 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bd2 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f1f 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b48 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [1a51 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd3 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f20 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b49 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1a52 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd4 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1f21 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b4a 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a53 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd5 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1f22 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b4b 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a54 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bd6 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1f23 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ccf0 gate 1574140948200586400 evaluation starts +peer0.org1.example.com | [1b4c 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1a55 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd7 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004393050 gate 1574140939967492400 evaluation starts +peer1.org2.example.com | [1f24 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ccf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b4d 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a56 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd8 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004393050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f25 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ccf0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1b4e 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1a57 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd9 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004393050 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1f26 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ccf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1b4f 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a58 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bda 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004393050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1f27 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ccf0 principal evaluation fails +peer0.org1.example.com | [1b50 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1bdb 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004393050 principal evaluation fails +peer1.org2.example.com | [1f28 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ccf0 gate 1574140948200586400 evaluation fails +peer0.org1.example.com | [1b52 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1a59 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bdc 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004393050 gate 1574140939967492400 evaluation fails +peer0.org1.example.com | [1b53 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a5a 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bdd 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f29 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a5b 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b54 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1bde 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f2a 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a5c 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a5d 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b55 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bdf 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1f2b 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1a5e 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [1b51 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f2c 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d260 gate 1574140948202968500 evaluation starts +peer1.org1.example.com | [1a5f 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b56 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1be0 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043935c0 gate 1574140939967764000 evaluation starts +peer1.org1.example.com | [1a60 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1be1 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043935c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a61 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b57 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f2d 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d260 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1be2 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043935c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1a62 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b58 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f2e 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d260 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1be3 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043935c0 principal matched by identity 0 +peer1.org1.example.com | [1a63 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b59 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f2f 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d260 principal matched by identity 0 +peer0.org2.example.com | [1be4 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1a64 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1b5a 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [1f30 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1a65 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b5b 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1be5 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1a66 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b5c 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f31 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1a67 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b5d 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1a68 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b5e 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1a69 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b5f 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1a6a 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b60 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1be6 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043935c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a6b 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b61 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f32 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d260 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1be7 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043935c0 gate 1574140939967764000 evaluation succeeds +peer1.org1.example.com | [1a6c 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84f80 gate 1574140943838141600 evaluation starts +peer0.org1.example.com | [1b62 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f33 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d260 gate 1574140948202968500 evaluation succeeds +peer0.org2.example.com | [1be8 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1a6d 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84f80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b63 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f34 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1be9 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1a6e 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84f80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1b64 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f35 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1bea 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a6f 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84f80 principal matched by identity 0 +peer0.org1.example.com | [1b65 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [1beb 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f36 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a70 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 56 09 a6 c3 d9 9b 49 97 c4 98 5f 43 79 49 71 |.V.....I..._CyIq| +peer0.org1.example.com | [1b66 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bec 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [1f37 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 0c 1b 9a f3 ea fb d3 43 79 24 55 9e 3d 12 30 53 |.......Cy$U.=.0S| +peer0.org1.example.com | [1b67 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1f38 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [1b68 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a71 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 5d 6d be 18 15 50 10 0b 95 b1 |0E.!..]m...P....| +peer0.org2.example.com | [1bed 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [1b69 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 47 3c b3 21 72 95 6b 75 34 59 9c dd c1 a1 14 11 |G<.!r.ku4Y......| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [1f39 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [1b6a 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | 00000020 89 8d f7 b8 d2 02 20 33 84 59 ef b6 bd ae c1 ee |...... 3.Y......| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [1b6b 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 f7 cc 0b 57 1f bc 2b 4c 5c 3a 3b 6e 38 b4 9b a6 |...W..+L\:;n8...| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000040 bc 54 0a c5 ac b9 7d |.T....}| +peer0.org1.example.com | [1b6c 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1a72 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84f80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b6d 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bee 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1a73 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84f80 gate 1574140943838141600 evaluation succeeds +peer0.org1.example.com | [1b6e 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bef 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f3a 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1a74 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b6f 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1bf0 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a75 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b70 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1f3b 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [1bf1 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a76 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b71 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [1bf2 11-19 05:22:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a77 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b72 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 gate 1574140939836631100 evaluation starts +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [1bf3 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a78 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1b73 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [1bf4 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a79 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1b74 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1bf5 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a7a 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1b75 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 principal matched by identity 0 +peer1.org2.example.com | [1f3c 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bf6 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2dd0 gate 1574140939973234000 evaluation starts +peer1.org1.example.com | [1a7b 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1b76 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +peer1.org2.example.com | [1f3d 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bf7 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2dd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a7c 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +peer1.org2.example.com | [1f3e 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1bf8 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2dd0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1a7d 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b77 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +peer1.org2.example.com | [1f3f 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bf9 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1a7e 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +peer1.org2.example.com | [1f40 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bfa 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2dd0 principal evaluation fails +peer1.org1.example.com | [1a7f 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +peer1.org2.example.com | [1f41 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bfb 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2dd0 gate 1574140939973234000 evaluation fails +peer1.org1.example.com | [1a80 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | 00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +peer1.org2.example.com | [1f42 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1bfc 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a81 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 cd f9 67 25 28 fc 53 |..g%(.S| +peer1.org2.example.com | [1f43 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1bfd 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a82 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b78 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1f44 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1bfe 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1a83 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b79 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 gate 1574140939836631100 evaluation succeeds +peer1.org2.example.com | [1f45 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043330f0 gate 1574140948212674600 evaluation starts +peer0.org2.example.com | [1bff 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b3340 gate 1574140939974491000 evaluation starts +peer1.org1.example.com | [1a84 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b7a 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f46 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043330f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c00 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b3340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a85 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1b7b 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f47 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043330f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c01 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b3340 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1a86 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b7c 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1f48 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043330f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c02 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b3340 principal matched by identity 0 +peer1.org1.example.com | [1a87 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b7d 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f49 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043330f0 principal evaluation fails +peer0.org2.example.com | [1c03 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1a88 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1b7e 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f4a 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043330f0 gate 1574140948212674600 evaluation fails +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1a89 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151023 +peer0.org1.example.com | [1b7f 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1f4b 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c04 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1a8a 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ACFDD30A61640A7BDD3E5FFC13269FA17A6C150D690E4AEDB92EC07A79C3D3F0 +peer0.org1.example.com | [1b80 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1f4c 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1a8b 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1b81 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1f4d 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1a8c 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1b82 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1f4e 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004333660 gate 1574140948214966600 evaluation starts +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1a8d 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [1b83 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f4f 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004333660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1a8e 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b84 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f50 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004333660 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c05 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b3340 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a8f 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b85 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f51 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004333660 principal matched by identity 0 +peer0.org2.example.com | [1c06 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b3340 gate 1574140939974491000 evaluation succeeds +peer0.org1.example.com | [1b86 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [1a90 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f52 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1c07 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1b87 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a91 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1c08 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1b88 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a92 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f53 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1c09 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b89 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a93 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1c0a 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b8a 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1a94 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1c0b 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a95 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b8b 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1c0c 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a96 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b8c 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c0d 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1a97 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b8d 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c0e 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f54 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004333660 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a98 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b8e 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c0f 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f55 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004333660 gate 1574140948214966600 evaluation succeeds +peer1.org1.example.com | [1a99 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b8f 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f56 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c10 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a9a 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b90 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f57 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c11 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a9b 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b91 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f58 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c12 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a9c 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b92 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f59 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c13 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a9d 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1b93 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1f5a 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c14 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a9e 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer0.org1.example.com | [1b94 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 e1 a5 84 b8 e7 7c b7 b1 eb 3a fb cd f1 34 59 |......|...:...4Y| +peer1.org2.example.com | [1f5b 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c15 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer0.org1.example.com | 00000010 23 4a 03 ab 14 d6 75 22 99 07 2f 04 cb ac 2b fb |#J....u"../...+.| +peer1.org2.example.com | [1f5c 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [1c16 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a9f 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer0.org1.example.com | [1b95 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 90 f9 8e f6 d6 c2 69 17 9c 02 03 |0D. U......i....| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1c17 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer0.org1.example.com | 00000010 aa 5b cc bf 7f 28 59 33 01 e4 54 0a c7 23 5e 97 |.[...(Y3..T..#^.| +peer1.org2.example.com | [1f5d 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [1c18 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4720 gate 1574140939979334500 evaluation starts +peer1.org1.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer0.org1.example.com | 00000020 4a 04 c8 03 02 20 55 84 0f 30 af 13 80 2e 14 ba |J.... U..0......| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [1c19 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer0.org1.example.com | 00000030 14 2a 06 0b 07 2c b4 fd 1b 5f 00 39 09 26 34 d9 |.*...,..._.9.&4.| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [1c1a 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer0.org1.example.com | 00000040 65 fb 17 39 76 b8 |e..9v.| +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [1c1b 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4720 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1aa0 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1b96 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1c1d 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1aa1 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [1f5e 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c1c 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa2 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1b97 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 02 05 75 ae 8b 41 5f d6 9a a4 |0E.!....u..A_...| +peer1.org2.example.com | [1f5f 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c1e 11-19 05:22:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4720 principal evaluation fails +peer1.org1.example.com | [1aa3 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 c1 3d 6b a2 b3 16 d7 49 07 c9 06 b9 d3 5d d7 61 |.=k....I.....].a| +peer1.org2.example.com | [1f60 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c20 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 ac c1 b1 57 ed 02 20 64 73 6b f5 6b a6 14 25 21 |...W.. dsk.k..%!| +peer1.org1.example.com | [1aa4 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1f61 11-19 05:22:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c21 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 9f ff c0 8d c8 0a ea cc 44 e5 17 83 a5 09 2c 68 |........D.....,h| +peer1.org1.example.com | [1aa5 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f62 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c1f 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4720 gate 1574140939979334500 evaluation fails +peer0.org1.example.com | 00000040 55 b9 5c 0f 92 04 30 |U.\...0| +peer1.org1.example.com | [1aa6 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f63 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c23 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b98 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1aa7 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1f64 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c24 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b99 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1aa8 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1f65 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c25 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1b9a 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1aa9 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1f66 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b010 gate 1574140948221004400 evaluation starts +peer0.org2.example.com | [1c26 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4c90 gate 1574140939981327400 evaluation starts +peer0.org1.example.com | [1b9b 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1aaa 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9c70 gate 1574140943906343900 evaluation starts +peer1.org2.example.com | [1f67 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b010 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c27 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4c90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b9c 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1aab 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9c70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f68 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b010 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c28 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4c90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1b9d 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aac 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9c70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1f69 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c29 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4c90 principal matched by identity 0 +peer0.org1.example.com | [1b9e 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aad 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9c70 principal matched by identity 0 +peer1.org2.example.com | [1f6a 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b010 principal evaluation fails +peer0.org2.example.com | [1c2a 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1b9f 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aae 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 56 09 a6 c3 d9 9b 49 97 c4 98 5f 43 79 49 71 |.V.....I..._CyIq| +peer1.org2.example.com | [1f6b 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b010 gate 1574140948221004400 evaluation fails +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1ba0 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | 00000010 0c 1b 9a f3 ea fb d3 43 79 24 55 9e 3d 12 30 53 |.......Cy$U.=.0S| +peer1.org2.example.com | [1f6c 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c2b 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1ba1 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aaf 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 5d 6d be 18 15 50 10 0b 95 b1 |0E.!..]m...P....| +peer1.org2.example.com | [1f6d 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [1ba2 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 47 3c b3 21 72 95 6b 75 34 59 9c dd c1 a1 14 11 |G<.!r.ku4Y......| +peer1.org2.example.com | [1f6e 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [1ba3 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 89 8d f7 b8 d2 02 20 33 84 59 ef b6 bd ae c1 ee |...... 3.Y......| +peer1.org2.example.com | [1f6f 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b580 gate 1574140948223307000 evaluation starts +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000030 f7 cc 0b 57 1f bc 2b 4c 5c 3a 3b 6e 38 b4 9b a6 |...W..+L\:;n8...| +peer0.org1.example.com | [1ba4 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [1f70 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | 00000040 bc 54 0a c5 ac b9 7d |.T....}| +peer0.org1.example.com | [1ba5 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f71 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b580 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c22 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ab0 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9c70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ba6 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f72 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b580 principal matched by identity 0 +peer0.org2.example.com | [1c2c 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ab1 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9c70 gate 1574140943906343900 evaluation succeeds +peer0.org1.example.com | [1ba7 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f73 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [1c2d 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4c90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ab2 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ba8 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1c2e 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4c90 gate 1574140939981327400 evaluation succeeds +peer1.org1.example.com | [1ab3 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ba9 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f74 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [1c2f 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1ab4 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1baa 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1c30 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1ab5 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1bab 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c31 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1ab6 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bac 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c32 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1ab7 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bad 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c33 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1ab8 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1bae 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c34 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f75 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b580 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ab9 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac fd d3 0a 61 64 0a 7b dd 3e 5f fc 13 26 9f a1 |....ad.{.>_..&..| +peer0.org1.example.com | [1baf 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f76 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435b580 gate 1574140948223307000 evaluation succeeds +peer0.org2.example.com | [1c35 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 7a 6c 15 0d 69 0e 4a ed b9 2e c0 7a 79 c3 d3 f0 |zl..i.J....zy...| +peer0.org1.example.com | [1bb0 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f77 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c36 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1aba 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 96 29 b3 a4 b9 10 6c 1b e2 20 |0E.!...)....l.. | +peer0.org1.example.com | [1bb1 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f78 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c37 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 fb b0 e1 87 f9 f7 32 0d 52 1e b2 4f 2e bf fb 68 |......2.R..O...h| +peer0.org1.example.com | [1bb2 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f79 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [1c38 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 06 d2 e9 76 a8 02 20 5b 95 ce 18 de b2 37 a3 e5 |...v.. [.....7..| +peer0.org1.example.com | [1bb3 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f7a 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c39 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 fa 9f 2d da 92 1b d3 8a 72 17 61 cf 6a 05 3e 25 |..-.....r.a.j.>%| +peer0.org1.example.com | [1bb4 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f7b 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c3a 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 80 0c 10 b1 b3 bf 55 |......U| +peer0.org1.example.com | [1bb5 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f7c 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1c3b 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5e20 gate 1574140939987357300 evaluation starts +peer1.org1.example.com | [1abb 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bb6 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f7d 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c3c 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5e20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1abc 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bb7 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [1f7e 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c3d 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5e20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1abd 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bb8 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f7f 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c3e 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1abe 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bb9 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1f80 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c3f 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5e20 principal evaluation fails +peer1.org1.example.com | [1abf 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bba 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f81 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c40 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5e20 gate 1574140939987357300 evaluation fails +peer1.org1.example.com | [1ac0 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bbb 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f82 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c41 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ac1 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bbc 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1f83 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c42 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ac2 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1f84 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bbd 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c43 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1ac3 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac fd d3 0a 61 64 0a 7b dd 3e 5f fc 13 26 9f a1 |....ad.{.>_..&..| +peer1.org2.example.com | [1f85 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bbe 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c44 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f6390 gate 1574140939988287100 evaluation starts +peer1.org1.example.com | 00000010 7a 6c 15 0d 69 0e 4a ed b9 2e c0 7a 79 c3 d3 f0 |zl..i.J....zy...| +peer1.org2.example.com | [1f86 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1bbf 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 gate 1574140940382450200 evaluation starts +peer0.org2.example.com | [1c45 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f6390 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ac4 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 96 29 b3 a4 b9 10 6c 1b e2 20 |0E.!...)....l.. | +peer1.org2.example.com | [1f87 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bc0 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c46 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f6390 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 fb b0 e1 87 f9 f7 32 0d 52 1e b2 4f 2e bf fb 68 |......2.R..O...h| +peer1.org2.example.com | [1f88 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bc1 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c47 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f6390 principal matched by identity 0 +peer1.org1.example.com | 00000020 06 d2 e9 76 a8 02 20 5b 95 ce 18 de b2 37 a3 e5 |...v.. [.....7..| +peer1.org2.example.com | [1f89 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1bc2 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 principal matched by identity 0 +peer0.org2.example.com | [1c48 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000030 fa 9f 2d da 92 1b d3 8a 72 17 61 cf 6a 05 3e 25 |..-.....r.a.j.>%| +peer1.org2.example.com | [1f8a 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1bc3 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 05 53 1b 4a 7c d7 b7 da 6b a0 89 cf 28 8b 66 | .S.J|...k...(.f| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | 00000040 80 0c 10 b1 b3 bf 55 |......U| +peer1.org2.example.com | [1f8b 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 1c 82 13 57 2b 06 e3 ab a3 ad a7 d2 b8 b4 cc e1 |...W+...........| +peer0.org2.example.com | [1c49 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1ac5 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [1f8c 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378710 gate 1574140948230696300 evaluation starts +peer0.org1.example.com | [1bc4 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 64 41 c8 3a 6d f5 c3 f7 b0 44 0f |0D. udA.:m....D.| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [1f8d 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 21 d7 fd fe ab 97 aa 2f 3d 87 67 05 6a 5f 89 fb |!....../=.g.j_..| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [1f8e 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378710 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1ac6 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 ae 43 40 5a b9 36 e2 1b d3 1c |0E.!...C@Z.6....| +peer0.org1.example.com | 00000020 18 8c 13 82 02 20 32 03 24 3f fc 94 4b c9 a5 74 |..... 2.$?..K..t| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [1f8f 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 16 27 f2 24 32 fa ed bd 99 1e 02 d7 a8 04 39 95 |.'.$2.........9.| +peer0.org1.example.com | 00000030 d3 48 06 c0 66 f0 05 8e 5a ed 36 9c f7 4f 05 2c |.H..f...Z.6..O.,| +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [1f90 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378710 principal evaluation fails +peer1.org1.example.com | 00000020 45 be 2e bb c4 02 20 77 b2 d2 08 1d 1a ff 2a fc |E..... w......*.| +peer0.org1.example.com | 00000040 5d 6a 1c 82 5c 1a |]j..\.| +peer0.org2.example.com | [1c4a 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f6390 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1f91 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378710 gate 1574140948230696300 evaluation fails +peer1.org1.example.com | 00000030 c9 0f 0c 26 5e 75 95 9b 8c ab 6e a9 b3 37 43 6c |...&^u....n..7Cl| +peer0.org1.example.com | [1bc5 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c4b 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f6390 gate 1574140939988287100 evaluation succeeds +peer1.org2.example.com | [1f92 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 ea 6a db a1 e8 08 94 |.j.....| +peer0.org1.example.com | [1bc6 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 gate 1574140940382450200 evaluation succeeds +peer0.org2.example.com | [1c4c 11-19 05:22:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f93 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ac7 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1bc7 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c4d 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f94 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1ac8 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1bc8 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c4e 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1f95 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378c80 gate 1574140948232507200 evaluation starts +peer1.org1.example.com | [1ac9 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bc9 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c4f 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f96 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378c80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1aca 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bca 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c50 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [1f97 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378c80 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1acb 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bcb 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [1f98 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378c80 principal matched by identity 0 +peer1.org1.example.com | [1acc 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bcc 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1c51 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [1f99 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1acd 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bcd 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1ace 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bce 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [1f9a 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1acf 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1bcf 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1ad0 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer0.org1.example.com | [1bd0 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer0.org1.example.com | [1bd1 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c52 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1ad1 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer0.org1.example.com | [1bd2 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer0.org1.example.com | [1bd3 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c53 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [1f9b 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378c80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer0.org1.example.com | [1bd4 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [1f9c 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378c80 gate 1574140948232507200 evaluation succeeds +peer1.org1.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer0.org1.example.com | [1bd5 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [1f9d 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer0.org1.example.com | [1bd6 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [1f9e 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1ad2 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bd7 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [1f9f 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ad3 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd8 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c54 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fa0 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ad4 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1bd9 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1c55 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fa1 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [1ad5 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bda 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c56 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [1ad6 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1bdb 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c57 11-19 05:22:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fa2 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [1ad7 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bdc 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1c58 11-19 05:22:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [1ad8 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bdd 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1c59 11-19 05:22:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1ad9 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1bde 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c5a 11-19 05:22:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1ada 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1bdf 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1c5b 11-19 05:22:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510081801 +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1adb 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1be0 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c5c 11-19 05:22:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2905F462E2D68D2F1CDBBD49D4574DBEA776A7C9E420252D76E8DB808DCB4B2F +peer1.org2.example.com | [1fa3 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1adc 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ce460 gate 1574140943942496600 evaluation starts +peer0.org1.example.com | [1be1 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1c5d 11-19 05:22:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer1.org2.example.com | [1fa4 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1add 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ce460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1be2 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1c5e 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fa5 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ade 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ce460 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1be3 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fa6 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c5f 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1adf 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ce460 principal matched by identity 0 +peer0.org1.example.com | [1be4 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fa7 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c60 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ae0 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +peer0.org1.example.com | [1be5 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fa8 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c61 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be6 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +peer1.org2.example.com | [1fa9 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c62 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1be7 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1ae1 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +peer1.org2.example.com | [1faa 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c63 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be8 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +peer1.org2.example.com | [1fab 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c64 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be9 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +peer1.org2.example.com | [1fac 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c65 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bea 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +peer1.org2.example.com | [1fad 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c66 11-19 05:22:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1beb 11-19 05:22:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 d4 ee 0e e0 32 5d |....2]| +peer1.org2.example.com | [1fae 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043986e0 gate 1574140948238998300 evaluation starts +peer0.org2.example.com | [1c67 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bec 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ae2 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ce460 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1faf 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043986e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c68 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bed 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ae3 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ce460 gate 1574140943942496600 evaluation succeeds +peer1.org2.example.com | [1fb0 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043986e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c69 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bee 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ae4 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fb1 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043986e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c6a 11-19 05:22:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bef 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [1ae5 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fb2 11-19 05:22:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043986e0 principal evaluation fails +peer0.org2.example.com | [1c6b 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bf0 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ae6 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1fb3 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043986e0 gate 1574140948238998300 evaluation fails +peer0.org2.example.com | [1c6c 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bf1 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ae7 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1fb4 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c6d 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [1bf2 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ae8 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fb5 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c6e 11-19 05:22:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf3 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ae9 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fb6 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c6f 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bf4 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1aea 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1fb7 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004398c50 gate 1574140948240510000 evaluation starts +peer0.org2.example.com | [1c70 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf5 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1aeb 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac fd d3 0a 61 64 0a 7b dd 3e 5f fc 13 26 9f a1 |....ad.{.>_..&..| +peer1.org2.example.com | [1fb8 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004398c50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c71 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bf6 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 7a 6c 15 0d 69 0e 4a ed b9 2e c0 7a 79 c3 d3 f0 |zl..i.J....zy...| +peer1.org2.example.com | [1fb9 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004398c50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c72 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1bf7 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 gate 1574140940542530800 evaluation starts +peer1.org1.example.com | [1aec 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 96 29 b3 a4 b9 10 6c 1b e2 20 |0E.!...)....l.. | +peer1.org2.example.com | [1fba 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004398c50 principal matched by identity 0 +peer0.org2.example.com | [1c73 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 05 53 1b 4a 7c d7 b7 da 6b a0 89 cf 28 8b 66 | .S.J|...k...(.f| +peer1.org1.example.com | 00000010 fb b0 e1 87 f9 f7 32 0d 52 1e b2 4f 2e bf fb 68 |......2.R..O...h| +peer0.org1.example.com | [1bf8 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 1c 82 13 57 2b 06 e3 ab a3 ad a7 d2 b8 b4 cc e1 |...W+...........| +peer1.org2.example.com | [1fbb 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000020 06 d2 e9 76 a8 02 20 5b 95 ce 18 de b2 37 a3 e5 |...v.. [.....7..| +peer0.org1.example.com | [1bf9 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c74 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 64 41 c8 3a 6d f5 c3 f7 b0 44 0f |0D. udA.:m....D.| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | 00000030 fa 9f 2d da 92 1b d3 8a 72 17 61 cf 6a 05 3e 25 |..-.....r.a.j.>%| +peer0.org1.example.com | [1bfa 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 principal matched by identity 0 +peer0.org2.example.com | 00000010 21 d7 fd fe ab 97 aa 2f 3d 87 67 05 6a 5f 89 fb |!....../=.g.j_..| +peer1.org2.example.com | [1fbc 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000040 80 0c 10 b1 b3 bf 55 |......U| +peer0.org1.example.com | [1bfb 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 39 ca 75 7f 5a f0 f2 73 50 50 34 ab da b7 40 |!9.u.Z..sPP4...@| +peer0.org2.example.com | 00000020 18 8c 13 82 02 20 32 03 24 3f fc 94 4b c9 a5 74 |..... 2.$?..K..t| +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1aed 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 87 2d 4c 96 82 06 22 11 40 9f 7d 59 55 7a 67 ae |.-L...".@.}YUzg.| +peer0.org2.example.com | 00000030 d3 48 06 c0 66 f0 05 8e 5a ed 36 9c f7 4f 05 2c |.H..f...Z.6..O.,| +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1aee 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bfc 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e e1 dc 67 a7 d6 6a 92 47 46 a4 a0 |0D. ...g..j.GF..| +peer0.org2.example.com | 00000040 5d 6a 1c 82 5c 1a |]j..\.| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1aef 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 1f 01 7e f7 52 dd 30 c1 14 4c 17 11 dc dc b8 03 |..~.R.0..L......| +peer0.org2.example.com | [1c75 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1af0 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 2e 54 5b a5 02 20 34 95 f8 10 2c 50 85 41 5a af |.T[.. 4...,P.AZ.| +peer0.org2.example.com | [1c76 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1fbd 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004398c50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1af1 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 27 d4 97 0f 2f 65 9f bb 35 b9 a9 74 18 3a 1a c8 |'.../e..5..t.:..| +peer0.org2.example.com | [1c77 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1fbe 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004398c50 gate 1574140948240510000 evaluation succeeds +peer1.org1.example.com | [1af2 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 b5 99 5d 21 53 0a |..]!S.| +peer0.org2.example.com | [1c78 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1fbf 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1af3 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bfd 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c79 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1fc0 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1af4 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bfe 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 gate 1574140940542530800 evaluation succeeds +peer0.org2.example.com | [1c7a 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fc1 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1af5 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bff 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c7b 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fc2 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1af6 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c00 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c7c 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fc3 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af7 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c01 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c7d 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fc4 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af8 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c02 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c7e 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fc5 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1af9 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c03 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c7f 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fc6 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1afa 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c04 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [1c80 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1fc7 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1afb 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c05 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c81 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fc8 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1afc 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c06 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c82 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fc9 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1afd 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c07 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fca 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c83 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1afe 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee eb 25 35 d1 0a b7 e1 f3 50 78 2b 6f 61 05 d6 |..%5.....Px+oa..| +peer0.org1.example.com | [1c08 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 222188947551341445, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1fcb 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004399de0 gate 1574140948244344600 evaluation starts +peer0.org2.example.com | [1c84 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000010 d1 e0 94 66 fe 07 85 dc de 18 1f d1 64 23 f1 b0 |...f........d#..| +peer0.org1.example.com | [1c09 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 222188947551341445, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fcc 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004399de0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c85 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1aff 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a6 15 85 4a d0 43 e7 bc ee d0 e7 |0D. $...J.C.....| +peer0.org1.example.com | [1c0a 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fcd 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004399de0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c86 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 26 b2 f2 84 25 83 8c 72 02 cb b5 ef 6b 54 6f ee |&...%..r....kTo.| +peer0.org1.example.com | [1c0b 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1fce 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004399de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c87 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000020 44 76 b3 62 02 20 3e 42 73 f5 97 25 82 65 2a a0 |Dv.b. >Bs..%.e*.| +peer0.org1.example.com | [1c0c 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fcf 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004399de0 principal evaluation fails +peer0.org2.example.com | [1c88 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 a3 10 af 38 b9 5b ce 8e d4 c3 41 49 01 f5 87 87 |...8.[....AI....| +peer0.org1.example.com | [1c0d 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fd0 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004399de0 gate 1574140948244344600 evaluation fails +peer0.org2.example.com | [1c89 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000040 0b 3c 84 bd 7e 2d |.<..~-| +peer0.org1.example.com | [1c0e 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fd1 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c8a 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b01 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer0.org1.example.com | [1c0f 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fd2 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c8b 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b00 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c10 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [1fd3 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c8c 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b02 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c11 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 9f c8 8d c8 6e 76 f4 d7 7e 4e 83 3d 20 d0 d0 |.....nv..~N.= ..| +peer1.org2.example.com | [1fd4 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2350 gate 1574140948245698100 evaluation starts +peer0.org2.example.com | [1c8d 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b03 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 4c ba 7f 10 17 d6 88 fb 00 e3 4c b9 37 bc 6d 2f |L.........L.7.m/| +peer1.org2.example.com | [1fd5 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c8e 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c12 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 8c 2a 05 1c a7 3b 35 02 98 ee c0 |0D. ..*...;5....| +peer1.org1.example.com | [1b04 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1fd6 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2350 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1c8f 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 9c 13 d3 ea 8c da be 2b b7 7c 97 c2 98 be a3 68 |.......+.|.....h| +peer1.org1.example.com | [1b05 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [1fd7 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2350 principal matched by identity 0 +peer0.org2.example.com | [1c90 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 de 29 38 c0 02 20 1d 22 46 25 fb e1 40 7d 4e c2 |.)8.. ."F%..@}N.| +peer1.org1.example.com | [1b06 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 67 5c b1 72 7a 4f c3 3a 17 75 b5 16 bc 91 e4 |7g\.rzO.:.u.....| +peer1.org2.example.com | [1fd8 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [1c91 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 71 b3 c1 9c 5e 69 2c 94 c5 2b 39 00 e3 59 31 d5 |q...^i,..+9..Y1.| +peer1.org1.example.com | 00000010 73 db 42 94 fb 0a b9 44 e1 f2 89 ff 65 57 30 3b |s.B....D....eW0;| +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1c92 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000040 51 09 98 7a 2d f2 |Q..z-.| +peer1.org1.example.com | [1b07 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 4c c1 13 6f af ed c4 9d 61 32 |0E.!..L..o....a2| +peer1.org2.example.com | [1fd9 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [1c93 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c13 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 67 11 86 ac 8f 05 51 e1 65 5e 10 ba f3 40 0e 42 |g.....Q.e^...@.B| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1c94 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1c14 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000020 df a3 f6 c6 91 02 20 19 56 22 f1 09 f8 7f 8e c9 |...... .V"......| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1c95 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c15 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000030 28 ea eb ad c5 a1 58 89 a4 3e ea 5b 06 47 5c e5 |(.....X..>.[.G\.| +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1c96 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c16 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000040 d3 2c db 5d e2 c9 c7 |.,.]...| +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1c97 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c17 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1b08 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1fda 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2350 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c98 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c18 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b09 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1fdb 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b2350 gate 1574140948245698100 evaluation succeeds +peer0.org2.example.com | [1c99 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c19 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b0a 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1c9a 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004444610 gate 1574140940779139100 evaluation starts +peer1.org2.example.com | [1fdc 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1c1a 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b0b 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1c9b 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004444610 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fdd 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1c1b 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b0c 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1c9c 11-19 05:22:20.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004444610 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1fde 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c1c 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b0d 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c9d 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004444610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1fdf 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1c1d 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b0e 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c9e 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004444610 principal evaluation fails +peer1.org2.example.com | [1fe0 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [1c1e 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1b0f 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c9f 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004444610 gate 1574140940779139100 evaluation fails +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1c1f 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b10 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ca0 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fe1 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [1c20 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1b11 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ca1 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1c21 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b12 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ca2 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [1c22 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b13 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ca3 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004413d70 gate 1574140940785581900 evaluation starts +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [1c23 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b14 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ca4 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004413d70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1c24 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b15 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ca5 11-19 05:22:20.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004413d70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1fe2 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [1c25 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b16 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ca6 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004413d70 principal matched by identity 0 +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [1c26 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b17 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ca7 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1fe3 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [1c27 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b18 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ca8 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15101F +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [1c28 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b19 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ca9 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 97CC25AA71101AD125A76288C21CB851C40F4F3D2F1DC1A5C759B86F92C8946E +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | [1c29 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1b1a 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1caa 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [1c2a 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b1b 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cab 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [1c2b 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1b1c 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cac 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [1fe4 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c2c 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b1d 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1cad 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1fe5 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c2d 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b1e 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cae 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fe6 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c2e 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1b1f 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1caf 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 9f c8 8d c8 6e 76 f4 d7 7e 4e 83 3d 20 d0 d0 |.....nv..~N.= ..| +peer1.org2.example.com | [1fe7 11-19 05:22:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b20 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c2f 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 4c ba 7f 10 17 d6 88 fb 00 e3 4c b9 37 bc 6d 2f |L.........L.7.m/| +peer1.org2.example.com | [1fe8 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b21 11-19 05:22:24.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c30 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1cb0 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 8c 2a 05 1c a7 3b 35 02 98 ee c0 |0D. ..*...;5....| +peer1.org2.example.com | [1fe9 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b22 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c31 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 gate 1574140940817469300 evaluation starts +peer0.org2.example.com | 00000010 9c 13 d3 ea 8c da be 2b b7 7c 97 c2 98 be a3 68 |.......+.|.....h| +peer1.org2.example.com | [1fea 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b23 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c32 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 de 29 38 c0 02 20 1d 22 46 25 fb e1 40 7d 4e c2 |.)8.. ."F%..@}N.| +peer1.org2.example.com | [1feb 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1b24 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c33 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000030 71 b3 c1 9c 5e 69 2c 94 c5 2b 39 00 e3 59 31 d5 |q...^i,..+9..Y1.| +peer1.org2.example.com | [1fec 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b25 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c34 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 principal matched by identity 0 +peer0.org2.example.com | 00000040 51 09 98 7a 2d f2 |Q..z-.| +peer1.org2.example.com | [1fed 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1b26 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c35 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 cc 25 aa 71 10 1a d1 25 a7 62 88 c2 1c b8 51 |..%.q...%.b....Q| +peer0.org2.example.com | [1cb1 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004413d70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1fee 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b27 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 c4 0f 4f 3d 2f 1d c1 a5 c7 59 b8 6f 92 c8 94 6e |..O=/....Y.o...n| +peer0.org2.example.com | [1cb2 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004413d70 gate 1574140940785581900 evaluation succeeds +peer1.org2.example.com | [1fef 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b28 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1c36 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 57 25 7a 99 a9 4c 02 03 ba e1 3a |0D. .W%z..L....:| +peer0.org2.example.com | [1cb3 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ff0 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1b29 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 33 26 cf 22 76 8d e6 01 86 e5 ca 38 39 3e db 84 |3&."v......89>..| +peer0.org2.example.com | [1cb4 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ff1 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1b2a 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 e9 f5 46 1c 02 20 61 4f ff 44 ec 0d 44 a2 0e db |..F.. aO.D..D...| +peer0.org2.example.com | [1cb5 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1ff2 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1b2b 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 db f8 98 7b 7b d1 48 6e a8 02 04 aa fd a3 c4 86 |...{{.Hn........| +peer0.org2.example.com | [1cb6 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1ff3 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c66f0 gate 1574140949764381100 evaluation starts +peer1.org1.example.com | [1b2c 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 b1 8a 25 86 2b ef |..%.+.| +peer0.org2.example.com | [1cb7 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ff4 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c66f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1b2d 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c37 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1cb8 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1ff5 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c66f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1b2e 11-19 05:22:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c38 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 gate 1574140940817469300 evaluation succeeds +peer0.org2.example.com | [1cb9 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1ff6 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c66f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1b2f 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c39 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1cba 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1b30 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3b60 gate 1574140945382085500 evaluation starts +peer1.org2.example.com | [1ff7 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c66f0 principal evaluation fails +peer0.org1.example.com | [1c3a 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1cbb 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1b31 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3b60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ff8 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c66f0 gate 1574140949764381100 evaluation fails +peer0.org1.example.com | [1c3b 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1cbc 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b32 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3b60 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [1ff9 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c3c 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1cbd 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b33 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3b60 principal matched by identity 0 +peer1.org2.example.com | [1ffa 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c3d 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cbe 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b34 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf fa 3d 6f c7 b3 bb fc 9b b1 8e 0c 17 73 86 f8 |..=o.........s..| +peer1.org2.example.com | [1ffb 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1c3e 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1cbf 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 a6 b2 06 cc 50 fa 47 69 65 6d 71 31 86 31 44 94 |....P.Giemq1.1D.| +peer1.org2.example.com | [1ffc 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c6c60 gate 1574140949767050800 evaluation starts +peer0.org1.example.com | [1c3f 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1cc0 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b35 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 0e b7 00 a9 c3 77 64 95 c1 68 |0E.!.......wd..h| +peer1.org2.example.com | [1ffd 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c6c60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c40 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1cc1 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000010 fa bb 2b 6b f5 ff 40 df 80 d8 85 d8 9c 3d 26 f7 |..+k..@......=&.| +peer1.org2.example.com | [1ffe 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c6c60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1c41 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc2 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 d2 17 58 d2 30 02 20 59 01 bd f7 32 fb ff bf 1e |..X.0. Y...2....| +peer1.org2.example.com | [1fff 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c6c60 principal matched by identity 0 +peer0.org1.example.com | [1c43 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc3 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000030 bd 42 88 ab b2 85 25 98 a3 b4 22 9a 9c 90 a4 e0 |.B....%...".....| +peer1.org2.example.com | [2000 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 41 52 3c 90 05 94 1e d1 d3 ff 2a 66 5a b4 d2 |.AR<.......*fZ..| +peer0.org1.example.com | [1c44 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc5 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000040 37 3a 31 b1 9c 17 e8 |7:1....| +peer1.org2.example.com | 00000010 a1 ca 8b 07 f6 b3 51 27 d5 3b bc aa 21 78 4e 35 |......Q'.;..!xN5| +peer0.org1.example.com | [1c42 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1cc4 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b36 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3b60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2001 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 9e 33 20 5b 6d 39 50 dd 4d 5d |0E.!...3 [m9P.M]| +peer0.org1.example.com | [1c45 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc6 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b37 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3b60 gate 1574140945382085500 evaluation succeeds +peer1.org2.example.com | 00000010 99 78 13 92 00 78 2a 3a 3e 1d f3 5d 5d 7e 4a 51 |.x...x*:>..]]~JQ| +peer0.org1.example.com | [1c46 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc7 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b38 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 8e 35 e1 72 0a 02 20 36 7b 45 3f dc bc 56 cc 0b |.5.r.. 6{E?..V..| +peer0.org1.example.com | [1c47 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc8 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b39 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 72 c2 96 89 71 b6 82 db 37 19 91 a1 d5 80 cf da |r...q...7.......| +peer0.org1.example.com | [1c48 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc9 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b3a 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 cd 18 83 a8 75 66 76 |....ufv| +peer0.org1.example.com | [1c49 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cca 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b3b 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2002 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c6c60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c4a 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ccb 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b3c 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2003 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c6c60 gate 1574140949767050800 evaluation succeeds +peer0.org1.example.com | [1c4b 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1ccc 11-19 05:22:20.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b3d 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2004 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1c4c 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ccd 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2005 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1b3e 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c4d 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cce 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2006 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1b3f 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c4e 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ccf 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2007 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1b40 11-19 05:22:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1c4f 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cd0 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2008 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b41 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c50 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cd1 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2009 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1b42 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c51 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd2 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [200a 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1b43 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cd3 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c52 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [200b 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1b44 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cd4 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c53 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [200c 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1b45 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd5 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c54 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [200d 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b46 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd6 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c55 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [200e 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b47 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cd7 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c56 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [200f 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b48 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cd8 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c57 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2010 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b49 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd9 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c58 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2011 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4b 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cda 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c59 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2012 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4a 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cdb 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c5a 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2013 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4c 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cdc 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c5b 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2014 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4d 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cdd 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c5c 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2015 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4e 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cde 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c5e 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2016 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4f 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cdf 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c5d 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2017 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1b50 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ce0 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c5f 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2018 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b51 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ce1 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c60 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2019 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1b52 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ce2 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c61 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [201a 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [201b 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b53 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c62 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [201c 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b54 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1ce3 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c63 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [201d 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b55 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ce4 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c64 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [201e 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b56 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1ce5 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c65 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [201f 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b57 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ce6 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c66 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2020 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b58 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ce7 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c67 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2022 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b59 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ce8 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c68 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2021 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b5a 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ce9 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [1c69 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2023 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b5b 11-19 05:22:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [1cea 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c6a 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2024 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b5c 11-19 05:22:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1ceb 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c6b 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2025 11-19 05:22:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b5d 11-19 05:22:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151024 +peer0.org2.example.com | [1cec 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c6c 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2026 11-19 05:22:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b5e 11-19 05:22:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 867DD96999266D9BF9E2CDE4C143128D7ABC341BE301C1E5F3DD1A2D93A5CD2D +peer0.org1.example.com | [1c6d 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ced 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2027 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b5f 11-19 05:22:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c6e 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cee 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2028 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b60 11-19 05:22:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1c6f 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cef 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2029 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 36 3a 6b 40 6e 36 81 79 18 1f 5f f6 a3 c7 23 |.6:k@n6.y.._...#| +peer1.org1.example.com | [1b61 11-19 05:22:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [1c70 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cf0 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 9e be 5b fb 87 d4 12 62 9f cb 29 01 98 b4 50 5a |..[....b..)...PZ| +peer1.org1.example.com | [1b62 11-19 05:22:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1c71 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cf1 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [202a 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 27 c3 8f d1 6e fb 1b a4 e2 2f |0E.!..'...n..../| +peer1.org1.example.com | [1b63 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c72 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cf2 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 05 06 82 64 e1 04 85 46 88 a6 e7 ec 03 f9 83 91 |...d...F........| +peer1.org1.example.com | [1b64 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c73 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cf3 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000020 83 27 f7 ba f4 02 20 0b 03 a7 b0 3b 66 52 9d ec |.'.... ....;fR..| +peer1.org1.example.com | [1b65 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c74 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cf4 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000030 d5 b4 b7 93 09 a8 c7 a7 00 37 e5 34 43 f1 e9 5e |.........7.4C..^| +peer1.org1.example.com | [1b66 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c75 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cf5 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000040 3d f3 61 d0 fa 91 f4 |=.a....| +peer1.org1.example.com | [1b67 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c76 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cf6 11-19 05:22:22.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044961e0 gate 1574140942849844700 evaluation starts +peer1.org2.example.com | [202b 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c77 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b68 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1cf7 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044961e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [202c 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer0.org1.example.com | [1c78 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b69 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1cf8 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044961e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [202d 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer0.org1.example.com | [1c79 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b6a 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cf9 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044961e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [202e 11-19 05:22:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c7a 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b6b 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cfa 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044961e0 principal evaluation fails +peer1.org2.example.com | [202f 11-19 05:22:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151025 +peer0.org1.example.com | [1c7b 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b6c 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cfb 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044961e0 gate 1574140942849844700 evaluation fails +peer1.org2.example.com | [2030 11-19 05:22:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 11CCDC5781E12071523778D10EE641C39A7B3589EEFCBCA29149E0F556A325CF +peer0.org1.example.com | [1c7c 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b6d 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cfc 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2031 11-19 05:22:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c7d 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b6e 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cfd 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2032 11-19 05:22:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1c7e 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b6f 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cfe 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2033 11-19 05:22:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [1c7f 11-19 05:22:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b70 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cff 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004496750 gate 1574140942852087300 evaluation starts +peer1.org2.example.com | [2034 11-19 05:22:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1c80 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101E +peer1.org1.example.com | [1b71 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d00 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004496750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2035 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c81 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 257ABBBDD507E271EA07C28A1C76CCDD64C310FE62ECA69CF8C6132AB57DA7DB +peer1.org1.example.com | [1b72 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d01 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004496750 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2036 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c82 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b73 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d02 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004496750 principal matched by identity 0 +peer1.org2.example.com | [2037 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c83 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1b74 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [1d03 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer1.org2.example.com | [2038 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c84 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [1b75 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer1.org2.example.com | [2039 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c85 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b76 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d04 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer1.org2.example.com | [203a 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c86 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b77 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer1.org2.example.com | [203b 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c88 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b78 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer1.org2.example.com | [203c 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c89 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b79 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer1.org2.example.com | [203d 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c8b 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b7a 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer1.org2.example.com | [203e 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b7b 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c87 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d05 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004496750 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [203f 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b7c 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418b320 gate 1574140945806388500 evaluation starts +peer0.org1.example.com | [1c8a 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d06 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004496750 gate 1574140942852087300 evaluation succeeds +peer1.org2.example.com | [2040 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b7d 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418b320 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c8c 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d07 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2041 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b7e 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418b320 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1c8d 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d08 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2042 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b7f 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418b320 principal matched by identity 0 +peer0.org1.example.com | [1c8e 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d09 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2043 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b80 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 3d 1d 4c 32 af 15 52 ca a6 3e 45 4b 5e 92 57 |.=.L2..R..>EK^.W| +peer0.org1.example.com | [1c91 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d0a 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2044 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 bc 4b cc fb 15 73 2b 2e 00 e5 10 67 ce a3 0c e3 |.K...s+....g....| +peer0.org1.example.com | [1c8f 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c92 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c93 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d0b 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b81 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 1f 0d 29 0e 9b ff 6f b6 8f 0e |0E.!....)...o...| +peer0.org1.example.com | [1c90 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c94 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2045 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0c 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000010 60 0b 76 28 11 58 af 03 e1 bf b4 9f 9f 34 f6 52 |`.v(.X.......4.R| +peer0.org1.example.com | [1c96 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2046 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0d 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1d0e 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1d0f 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1c95 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c97 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2047 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c98 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer1.org1.example.com | 00000020 e6 6d 13 60 0b 02 20 40 da 86 7a e7 8d b9 1c 61 |.m.`.. @..z....a| +peer0.org2.example.com | [1d10 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2048 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2049 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 ad d4 98 90 fc bc 86 d3 2d a7 ad 9f 6c d7 9c 77 |........-...l..w| +peer0.org2.example.com | [1d11 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [204a 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer1.org1.example.com | 00000040 8b fe c1 b5 ad ba e0 |.......| +peer0.org2.example.com | [1d12 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [204b 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c99 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer1.org1.example.com | [1b82 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418b320 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d13 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [204c 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer1.org1.example.com | [1b83 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418b320 gate 1574140945806388500 evaluation succeeds +peer0.org2.example.com | [1d14 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [204d 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer1.org1.example.com | [1b84 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d15 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [204e 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer1.org1.example.com | [1b85 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d16 11-19 05:22:22.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [204f 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer1.org1.example.com | [1b86 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d17 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2050 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c9a 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b87 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d18 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2051 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1c9b 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b88 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d19 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2052 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c9c 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b89 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1d1a 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\333\204\351\365F\034\002 aO\377D\354\rD\242\016\333\333\370\230{{\321Hn\250\002\004\252\375\243\304\206\261\212%\206+\357" > +peer1.org2.example.com | [2053 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c9d 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b8a 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1d1b 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2054 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c9e 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d1c 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2055 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c9f 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ca0 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca1 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2056 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ca2 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer0.org2.example.com | [1d1d 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b8b 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2057 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d2e0 gate 1574140950784955100 evaluation starts +peer0.org1.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer0.org2.example.com | [1d1e 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b8c 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2058 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d2e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ca3 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer0.org2.example.com | [1d1f 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b8d 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2059 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d2e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer0.org1.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer0.org2.example.com | [1d20 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [205a 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer0.org2.example.com | [1d21 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b8e 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [205b 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d2e0 principal evaluation fails +peer0.org1.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer0.org2.example.com | [1d22 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [1b8f 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [205c 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d2e0 gate 1574140950784955100 evaluation fails +peer0.org1.example.com | [1ca4 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d23 11-19 05:22:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b90 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [205d 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ca5 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d24 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:mB_l\270\226=(\353\221\305\030\373\217\032\206\277\004G9" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b91 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [205e 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ca6 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d25 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b92 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [205f 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1ca7 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d26 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:mB_l\270\226=(\353\221\305\030\373\217\032\206\277\004G9" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b93 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2060 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d850 gate 1574140950785629000 evaluation starts +peer0.org1.example.com | [1ca8 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d27 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [1b94 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2061 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ca9 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b95 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d28 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +peer1.org2.example.com | [2062 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d850 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1b96 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1caa 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +peer1.org2.example.com | [2063 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d850 principal matched by identity 0 +peer1.org1.example.com | [1b97 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cab 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer0.org2.example.com | [1d29 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +peer1.org2.example.com | [2064 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e4 30 87 86 5f d1 01 bc e0 9a 62 f0 c5 66 0f |..0.._.....b..f.| +peer1.org1.example.com | [1b98 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer0.org2.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +peer1.org2.example.com | 00000010 24 87 6e 3d 09 99 e7 1d 24 7c 6e 74 48 bc f0 d7 |$.n=....$|ntH...| +peer1.org1.example.com | [1b99 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1cac 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer0.org2.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +peer1.org2.example.com | [2065 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 ed 6c cd e1 53 cb 09 94 a1 4a bd |0D. '.l..S....J.| +peer1.org1.example.com | [1b9a 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer0.org2.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +peer1.org1.example.com | [1b9b 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 51 7c 17 78 79 07 bd 93 bd bd d1 ed 3c 2f fd 0a |Q|.xy....... DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 f7 c7 bc b6 02 20 19 e7 0c 56 ce 6b 98 5e 56 37 |..... ...V.k.^V7| +peer0.org1.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer0.org2.example.com | [1d2a 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [1b9d 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 5f ad 34 af 1f b5 87 c3 74 aa e6 f8 83 38 26 58 |_.4.....t....8&X| +peer0.org1.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [1b9e 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 eb 83 a1 96 30 fb |....0.| +peer0.org1.example.com | [1cad 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [1d2b 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ce c5 63 a5 4e 13 39 23 31 73 |0E.!....c.N.9#1s| +peer1.org1.example.com | [1b9f 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2066 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | 00000010 c6 74 aa cd 15 1c 8f f5 5a 9f 14 c0 18 70 ff b4 |.t......Z....p..| +peer1.org1.example.com | [1ba0 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2067 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440d850 gate 1574140950785629000 evaluation succeeds +peer0.org1.example.com | [1cae 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 75 45 d8 99 09 11 04 4f 78 b0 |0E.!..uE.....Ox.| +peer0.org2.example.com | 00000020 47 70 83 77 4a 02 20 27 5a 55 4d 90 31 c8 da 97 |Gp.wJ. 'ZUM.1...| +peer1.org1.example.com | [1ba1 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2068 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 65 dd 19 21 aa 77 4c 4b c0 d0 57 c9 71 70 dd 2b |e..!.wLK..W.qp.+| +peer0.org2.example.com | 00000030 29 29 3e 6d 42 5f 6c b8 96 3d 28 eb 91 c5 18 fb |))>mB_l..=(.....| +peer1.org1.example.com | [1ba2 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2069 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 b4 ec 76 f5 45 02 20 73 cc fd 98 44 ba b9 26 54 |..v.E. s...D..&T| +peer0.org2.example.com | 00000040 8f 1a 86 bf 04 47 39 |.....G9| +peer1.org1.example.com | [1ba3 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [206a 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 17 43 40 a7 2b 4b 3a 59 4c ac c2 ef 6b 60 9a 69 |.C@.+K:YL...k`.i| +peer0.org2.example.com | [1d2c 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1ba4 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [206b 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 ef 5c 01 52 3d db 57 |.\.R=.W| +peer0.org2.example.com | [1d2d 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1ba5 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [206c 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1caf 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1d2e 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1ba6 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [206d 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1cb0 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1d2f 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1ba7 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\320>\254M\034\377\271\207\025\273#u" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [206e 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1cb1 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d30 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1ba8 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [206f 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1cb2 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d31 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ba9 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\320>\254M\034\377\271\207\025\273#u" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2070 11-19 05:22:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1cb3 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d32 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1baa 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2072 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cb4 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d33 11-19 05:22:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bab 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer1.org2.example.com | [2073 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cb5 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1d34 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer1.org2.example.com | [2071 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1cb6 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d35 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bac 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer1.org2.example.com | [2074 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cb7 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d36 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer1.org2.example.com | [2075 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1cb8 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d37 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer1.org2.example.com | [2076 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cb9 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d38 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:mB_l\270\226=(\353\221\305\030\373\217\032\206\277\004G9" > > alive:\333\204\351\365F\034\002 aO\377D\354\rD\242\016\333\333\370\230{{\321Hn\250\002\004\252\375\243\304\206\261\212%\206+\357" > +peer1.org1.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer1.org2.example.com | [2077 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1cba 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d39 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer1.org2.example.com | [2078 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cbb 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d3a 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bad 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [2079 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1cbc 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d3b 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [207a 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cbd 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d3c 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bae 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 6d 81 c9 9a e4 26 6d 7c 3f 04 |0E.!..m....&m|?.| +peer1.org2.example.com | [207b 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1cbe 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d3d 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 27 22 20 f4 09 f6 2c a7 1f 1f 8c 0a b5 66 ba 71 |'" ...,......f.q| +peer1.org2.example.com | [207c 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cbf 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d3e 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 1f fd 1a 14 00 02 20 49 74 3d 54 4a 26 18 87 24 |...... It=TJ&..$| +peer1.org2.example.com | [207d 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc0 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d3f 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 38 5d e6 63 d8 67 f6 f3 72 89 3e d0 3e ac 4d 1c |8].c.g..r.>.>.M.| +peer1.org2.example.com | [207e 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc1 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d40 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 ff b9 87 15 bb 23 75 |.....#u| +peer1.org2.example.com | [207f 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc2 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d41 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1baf 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2080 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d42 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc3 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1bb0 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [2081 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d43 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc4 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1bb1 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2082 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d44 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc5 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1bb2 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2083 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d45 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc6 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1bb3 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2084 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d46 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc7 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 gate 1574140943316690400 evaluation starts +peer1.org1.example.com | [1bb4 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2085 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d47 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc8 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1bb5 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2086 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d48 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [1cc9 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1bb6 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2087 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1cca 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 principal matched by identity 0 +peer0.org2.example.com | [1d49 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb7 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [2088 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ccb 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [1d4a 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [1bb8 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2089 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [1d4b 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1bb9 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [208a 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ccc 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [1d4c 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1bba 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [208b 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d4d 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1bbb 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\320>\254M\034\377\271\207\025\273#u" > > alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [208c 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d4e 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1bbc 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [208d 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d4f 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1bbd 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [208e 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d50 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ccd 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1bbe 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [208f 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [1d52 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cce 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 gate 1574140943316690400 evaluation succeeds +peer1.org1.example.com | [1bbf 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2090 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 ac df e1 3e fa 6a 10 1c 43 e3 dd 09 00 d2 8f |G...>.j..C......| +peer0.org2.example.com | [1d51 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ccf 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bc0 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 1f 9a c7 2b ef cd 44 cc 44 cf f7 f3 8e fa 6a 4e |...+..D.D.....jN| +peer0.org2.example.com | [1d54 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cd0 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bc1 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2091 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 69 e4 bc 09 64 39 d0 2d 93 7f 64 |0D. ]i...d9.-..d| +peer0.org2.example.com | [1d53 11-19 05:22:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cd1 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1bc2 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 45 dc 9c 77 21 09 bf 79 05 46 d3 99 9b 98 59 a6 |E..w!..y.F....Y.| +peer0.org2.example.com | [1d55 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cd2 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1bc3 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 82 ad 78 26 02 20 38 20 f1 58 d2 be 62 84 23 fe |..x&. 8 .X..b.#.| +peer0.org2.example.com | [1d56 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cd5 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1bc4 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 02 53 af 51 7c fc b0 b7 ec 6b 5c d2 ac 3d a0 5a |.S.Q|....k\..=.Z| +peer0.org2.example.com | [1d57 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1bc5 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 41 d6 08 6e d7 63 |A..n.c| +peer0.org2.example.com | [1d58 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cd6 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1bc6 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2092 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d59 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1bc7 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2093 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1d5a 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1bc8 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2094 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1d5b 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1bc9 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2095 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1d5c 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1bca 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2096 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1d5d 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cd7 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bcb 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [2097 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d5e 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cd3 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bcc 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2098 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d5f 11-19 05:22:23.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1cd4 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bcd 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2099 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d60 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151020 +peer0.org1.example.com | [1cd8 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bce 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [209a 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d61 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A15609A6C3D99B4997C4985F437949710C1B9AF3EAFBD3437924559E3D123053 +peer1.org1.example.com | [1bcf 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [1cd9 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [209b 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d62 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1bd0 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cda 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [209c 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d63 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1bd1 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cdb 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [209d 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d64 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [1bd2 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cdc 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [209e 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d65 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bd3 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cdd 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [209f 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d66 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1bd4 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cde 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [20a0 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bd5 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1d67 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cdf 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 gate 1574140943324429800 evaluation starts +peer1.org2.example.com | [20a1 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bd6 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d68 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ce0 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20a2 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bd7 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d69 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1ce1 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [20a3 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bd8 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d6a 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ce2 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 principal matched by identity 0 +peer1.org2.example.com | [20a4 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d6b 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bd9 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ce3 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [20a5 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d6c 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bda 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [20a6 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d6d 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bdb 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ce4 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [20a7 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d6e 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bdc 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [20a8 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d6f 11-19 05:22:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bdd 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed490 gate 1574140947457612400 evaluation starts +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [20a9 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d70 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bde 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed490 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [1d71 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20aa 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bdf 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed490 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1d72 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [20ab 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1be0 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed490 principal matched by identity 0 +peer0.org1.example.com | [1ce5 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d73 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [20ac 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1be1 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer0.org1.example.com | [1ce6 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 gate 1574140943324429800 evaluation succeeds +peer0.org2.example.com | [1d74 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 56 09 a6 c3 d9 9b 49 97 c4 98 5f 43 79 49 71 |.V.....I..._CyIq| +peer1.org2.example.com | [20ad 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer0.org1.example.com | [1ce7 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 0c 1b 9a f3 ea fb d3 43 79 24 55 9e 3d 12 30 53 |.......Cy$U.=.0S| +peer1.org2.example.com | [20ae 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1be2 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer0.org1.example.com | [1ce8 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d75 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 5d 6d be 18 15 50 10 0b 95 b1 |0E.!..]m...P....| +peer1.org2.example.com | [20af 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer0.org1.example.com | [1ce9 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 47 3c b3 21 72 95 6b 75 34 59 9c dd c1 a1 14 11 |G<.!r.ku4Y......| +peer1.org2.example.com | [20b0 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer0.org1.example.com | [1cea 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 89 8d f7 b8 d2 02 20 33 84 59 ef b6 bd ae c1 ee |...... 3.Y......| +peer1.org2.example.com | [20b1 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer0.org1.example.com | [1ceb 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000030 f7 cc 0b 57 1f bc 2b 4c 5c 3a 3b 6e 38 b4 9b a6 |...W..+L\:;n8...| +peer1.org2.example.com | [20b2 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | 00000040 bc 54 0a c5 ac b9 7d |.T....}| +peer1.org2.example.com | [20b3 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1be3 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed490 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1cec 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1d76 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [20b4 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1be4 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed490 gate 1574140947457612400 evaluation succeeds +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1d77 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [20b5 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1be5 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1d78 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20b6 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1be6 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1d79 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [20b7 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488310 gate 1574140950856268800 evaluation starts +peer1.org1.example.com | [1be7 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1d7a 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [20b8 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488310 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1be8 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ced 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d7b 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +peer1.org2.example.com | [20b9 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488310 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1be9 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1cee 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +peer1.org2.example.com | [20ba 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1bea 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1cef 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d7c 11-19 05:22:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +peer1.org2.example.com | [20bb 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488310 principal evaluation fails +peer1.org1.example.com | [1beb 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1cf0 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +peer1.org2.example.com | [20bc 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488310 gate 1574140950856268800 evaluation fails +peer1.org1.example.com | [1bec 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1cf1 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +peer1.org2.example.com | [20bd 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bed 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1cf2 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +peer1.org2.example.com | [20be 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bee 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cf3 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 d4 ee 0e e0 32 5d |....2]| +peer1.org2.example.com | [20bf 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1bef 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cf4 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d7d 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20c0 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488880 gate 1574140950856537900 evaluation starts +peer1.org1.example.com | [1bf0 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cf5 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d7e 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c1 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488880 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1bf1 11-19 05:22:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [1cf6 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [20c2 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488880 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1d7f 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bf2 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cf7 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [20c3 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488880 principal matched by identity 0 +peer0.org2.example.com | [1d80 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bf3 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cf8 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 gate 1574140943332950700 evaluation starts +peer1.org2.example.com | [20c4 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer0.org2.example.com | [1d81 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bf4 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cf9 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer0.org2.example.com | [1d82 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bf5 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cfa 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [20c5 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer0.org2.example.com | [1d83 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1bf6 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cfb 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 principal matched by identity 0 +peer1.org2.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer0.org2.example.com | [1d84 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 56 09 a6 c3 d9 9b 49 97 c4 98 5f 43 79 49 71 |.V.....I..._CyIq| +peer1.org1.example.com | [1bf7 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cfc 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer1.org1.example.com | [1bf8 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\226\200\371" > alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer0.org2.example.com | 00000010 0c 1b 9a f3 ea fb d3 43 79 24 55 9e 3d 12 30 53 |.......Cy$U.=.0S| +peer1.org1.example.com | [1bf9 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cfd 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer0.org2.example.com | [1d85 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 5d 6d be 18 15 50 10 0b 95 b1 |0E.!..]m...P....| +peer1.org1.example.com | [1bfa 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000010 47 3c b3 21 72 95 6b 75 34 59 9c dd c1 a1 14 11 |G<.!r.ku4Y......| +peer1.org2.example.com | [20c6 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488880 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1bfb 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000020 89 8d f7 b8 d2 02 20 33 84 59 ef b6 bd ae c1 ee |...... 3.Y......| +peer1.org2.example.com | [20c7 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488880 gate 1574140950856537900 evaluation succeeds +peer1.org1.example.com | [1bfc 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000030 f7 cc 0b 57 1f bc 2b 4c 5c 3a 3b 6e 38 b4 9b a6 |...W..+L\:;n8...| +peer1.org2.example.com | [20c8 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1bfd 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | 00000040 bc 54 0a c5 ac b9 7d |.T....}| +peer1.org2.example.com | [20c9 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1bfe 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cfe 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d86 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [20ca 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1bff 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cff 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 gate 1574140943332950700 evaluation succeeds +peer0.org2.example.com | [1d87 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [20cb 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c00 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [20cc 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d88 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c01 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20cd 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1d00 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d89 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1c02 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [20ce 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1d01 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d8a 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20cf 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1d02 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d8b 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c03 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [20d0 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1d03 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d8c 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d8d 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c04 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d04 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [1d8e 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [20d1 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c05 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1d8f 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [20d2 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c06 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d05 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [1d90 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [20d3 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c07 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1d91 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451fd50 gate 1574140943867021700 evaluation starts +peer1.org2.example.com | [20d4 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [1c08 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1d92 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451fd50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20d5 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c09 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1d93 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451fd50 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [20d6 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c0a 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1d94 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451fd50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [20d7 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c0b 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d06 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1d95 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451fd50 principal evaluation fails +peer1.org2.example.com | [20d8 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1c0c 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1d96 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451fd50 gate 1574140943867021700 evaluation fails +peer1.org2.example.com | [20d9 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:T\244cG\377|Uf\325VN\316\344&\233A\347:\356w\214\002 B\324\322c\230*8\031W0\302\033\332\213I\032\225b\335\217<\255W\004mp2S2z\013E" > +peer1.org1.example.com | [1c0d 11-19 05:22:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d07 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1d97 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20da 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c0e 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002997f80 gate 1574140947640040500 evaluation starts +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1d98 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20db 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c0f 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002997f80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1d99 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [20dc 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c10 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002997f80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1d9a 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045382c0 gate 1574140943867317000 evaluation starts +peer1.org2.example.com | [20dd 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c11 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002997f80 principal matched by identity 0 +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1d9b 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045382c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20de 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c12 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [1d08 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d9c 11-19 05:22:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045382c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [20df 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1d09 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d9d 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045382c0 principal matched by identity 0 +peer1.org2.example.com | [20e0 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c13 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [1d0a 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d9e 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +peer1.org2.example.com | [20e1 11-19 05:22:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1d0b 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +peer1.org2.example.com | [20e2 11-19 05:22:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [1d0c 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d9f 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +peer1.org2.example.com | [20e3 11-19 05:22:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [20e4 11-19 05:22:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | 00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +peer1.org2.example.com | [20e5 11-19 05:22:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c14 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002997f80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +peer0.org1.example.com | [1d0d 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [20e6 11-19 05:22:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1c15 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002997f80 gate 1574140947640040500 evaluation succeeds +peer0.org2.example.com | 00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +peer0.org1.example.com | [1d0e 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [20e7 11-19 05:22:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [1c16 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +peer0.org1.example.com | [1d0f 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [20e8 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c17 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1da0 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045382c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d10 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 gate 1574140943336078200 evaluation starts +peer1.org2.example.com | [20e9 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c18 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1da1 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045382c0 gate 1574140943867317000 evaluation succeeds +peer0.org1.example.com | [1d11 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20ea 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c19 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1da2 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1d12 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [20eb 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c1a 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [1da3 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1d13 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 principal matched by identity 0 +peer1.org2.example.com | [20ec 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1da4 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d14 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [20ed 11-19 05:22:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1c1b 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [1da5 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [20ee 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1da6 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1d15 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [20ef 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1da7 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20f0 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1da8 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [20f1 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1da9 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +peer1.org2.example.com | [20f2 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1c1c 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +peer1.org2.example.com | [20f3 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1daa 11-19 05:22:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +peer1.org2.example.com | [20f4 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d16 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c1d 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +peer1.org2.example.com | [20f5 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d17 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 gate 1574140943336078200 evaluation succeeds +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +peer1.org2.example.com | [20f6 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d18 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +peer1.org2.example.com | [20f7 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1d19 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | 00000040 d4 ee 0e e0 32 5d |....2]| +peer1.org2.example.com | [20f8 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151026 +peer0.org1.example.com | [1d1a 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1dab 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20f9 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3A274C10128C30FD84E9AF08AFB1480C9853ED1EFAFCD2FE8E8EA3C3238BFDBB +peer0.org1.example.com | [1d1b 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c1e 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dac 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20fa 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1d1c 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c1f 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dad 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20fb 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1d1d 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c20 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1dae 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [20fc 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [1d1e 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1c21 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1daf 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20fd 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1c22 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1db0 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [20fe 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1d1f 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1c23 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1db1 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 56 09 a6 c3 d9 9b 49 97 c4 98 5f 43 79 49 71 |.V.....I..._CyIq| +peer1.org2.example.com | [20ff 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\272\246\277jF[W\221\366x\3254?=-o_D&\350{\305$\002 \\\326\361\n\275\332\016R\2643\364\223\370\033\376\257\273&\023\234\211\027\366\360&\026\250H\250JV\252" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1c24 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 0c 1b 9a f3 ea fb d3 43 79 24 55 9e 3d 12 30 53 |.......Cy$U.=.0S| +peer1.org2.example.com | [2100 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1c25 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1db2 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 5d 6d be 18 15 50 10 0b 95 b1 |0E.!..]m...P....| +peer1.org2.example.com | [2101 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1c26 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419be10 gate 1574140947646081900 evaluation starts +peer0.org2.example.com | 00000010 47 3c b3 21 72 95 6b 75 34 59 9c dd c1 a1 14 11 |G<.!r.ku4Y......| +peer1.org2.example.com | [2102 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1c27 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419be10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 89 8d f7 b8 d2 02 20 33 84 59 ef b6 bd ae c1 ee |...... 3.Y......| +peer1.org2.example.com | [2104 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d20 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1c28 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419be10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000030 f7 cc 0b 57 1f bc 2b 4c 5c 3a 3b 6e 38 b4 9b a6 |...W..+L\:;n8...| +peer1.org2.example.com | [2105 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1c29 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419be10 principal matched by identity 0 +peer0.org2.example.com | 00000040 bc 54 0a c5 ac b9 7d |.T....}| +peer1.org2.example.com | [2106 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\272\246\277jF[W\221\366x\3254?=-o_D&\350{\305$\002 \\\326\361\n\275\332\016R\2643\364\223\370\033\376\257\273&\023\234\211\027\366\360&\026\250H\250JV\252" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d21 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1c2a 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [1db3 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | [2107 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2103 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1c2b 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [1db5 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c bf e6 01 b3 79 87 e4 bc 5f b1 29 |0D. <....y..._.)| +peer1.org2.example.com | [2108 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000010 bf 7b 20 b1 9a f5 b7 f8 5e 6d e4 e7 76 19 52 92 |.{ .....^m..v.R.| +peer1.org2.example.com | [2109 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000020 45 7e 5f 0c 02 20 6a 66 c1 c8 dc 09 0a 66 3d 3b |E~_.. jf.....f=;| +peer1.org2.example.com | [210a 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d22 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | 00000030 93 37 b2 dc df 06 7a fd a2 83 b9 10 17 82 f5 f1 |.7....z.........| +peer1.org2.example.com | [210b 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d23 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | 00000040 70 2a cf db 6c 50 |p*..lP| +peer1.org2.example.com | [210c 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d24 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c2c 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419be10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1db4 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [210d 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1d25 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c2d 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419be10 gate 1574140947646081900 evaluation succeeds +peer0.org2.example.com | [1db6 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [210e 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer0.org1.example.com | [1d26 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c2e 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1db7 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer0.org1.example.com | [1d27 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c2f 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1db8 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [210f 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer0.org1.example.com | [1d28 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c30 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1db9 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer0.org1.example.com | [1d29 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c31 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1dba 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer0.org1.example.com | [1d2a 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 gate 1574140943337339300 evaluation starts +peer1.org1.example.com | [1c32 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dbb 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer0.org1.example.com | [1d2b 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c33 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer0.org2.example.com | [1dbc 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1d2c 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1c34 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [2110 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | [1dbd 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d2d 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 principal matched by identity 0 +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1dbe 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d2e 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1c35 11-19 05:22:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [2111 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 2f 42 28 76 3a bd bb 3e ba a6 |0E.!../B(v:..>..| +peer0.org2.example.com | [1dbf 11-19 05:22:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | 00000010 bf 6a 46 5b 57 91 f6 78 d5 34 3f 3d 2d 6f 5f 44 |.jF[W..x.4?=-o_D| +peer0.org2.example.com | [1dc0 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d2f 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | 00000020 26 e8 7b c5 24 02 20 5c d6 f1 0a bd da 0e 52 b4 |&.{.$. \......R.| +peer0.org2.example.com | [1dc1 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000030 33 f4 93 f8 1b fe af bb 26 13 9c 89 17 f6 f0 26 |3.......&......&| +peer0.org2.example.com | [1dc2 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1c36 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 16 a8 48 a8 4a 56 aa |..H.JV.| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [1c37 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dc3 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1c38 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2112 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1dc4 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d080 gate 1574140943931896100 evaluation starts +peer1.org2.example.com | [2113 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2114 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dc5 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d080 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c39 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d30 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2115 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dc6 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d080 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1c3a 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2116 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d31 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 gate 1574140943337339300 evaluation succeeds +peer0.org2.example.com | [1dc7 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1c3b 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2118 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1d32 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1dc8 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d080 principal evaluation fails +peer1.org1.example.com | [1c3c 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2117 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d33 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1dc9 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d080 gate 1574140943931896100 evaluation fails +peer1.org1.example.com | [1c3d 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2119 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer0.org1.example.com | [1d34 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1dca 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c3e 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025397c0 gate 1574140947651718900 evaluation starts +peer1.org2.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer0.org1.example.com | [1d35 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1dcb 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c3f 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025397c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [211a 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer0.org1.example.com | [1d36 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dcc 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1c40 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025397c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer0.org1.example.com | [1d37 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dcd 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d5f0 gate 1574140943935481200 evaluation starts +peer1.org1.example.com | [1c41 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025397c0 principal matched by identity 0 +peer1.org2.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer0.org1.example.com | [1d38 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1dce 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d5f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c42 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer0.org1.example.com | [1d39 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1dcf 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d5f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer0.org1.example.com | [1d3a 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1dd0 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d5f0 principal matched by identity 0 +peer1.org1.example.com | [1c43 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [1d3b 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [211b 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1dd1 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac fd d3 0a 61 64 0a 7b dd 3e 5f fc 13 26 9f a1 |....ad.{.>_..&..| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [1d3c 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [211c 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 7a 6c 15 0d 69 0e 4a ed b9 2e c0 7a 79 c3 d3 f0 |zl..i.J....zy...| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | [1d3d 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [211d 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dd2 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 96 29 b3 a4 b9 10 6c 1b e2 20 |0E.!...)....l.. | +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [1d3e 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 gate 1574140943338058200 evaluation starts +peer1.org2.example.com | [211e 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | 00000010 fb b0 e1 87 f9 f7 32 0d 52 1e b2 4f 2e bf fb 68 |......2.R..O...h| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [1d3f 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [211f 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 06 d2 e9 76 a8 02 20 5b 95 ce 18 de b2 37 a3 e5 |...v.. [.....7..| +peer1.org1.example.com | [1c44 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025397c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d40 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2120 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000030 fa 9f 2d da 92 1b d3 8a 72 17 61 cf 6a 05 3e 25 |..-.....r.a.j.>%| +peer1.org1.example.com | [1c45 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025397c0 gate 1574140947651718900 evaluation succeeds +peer0.org1.example.com | [1d41 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 principal matched by identity 0 +peer1.org2.example.com | [2121 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 80 0c 10 b1 b3 bf 55 |......U| +peer1.org1.example.com | [1c46 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d42 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [2122 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1dd3 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d5f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c47 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [2123 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1dd4 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d5f0 gate 1574140943935481200 evaluation succeeds +peer1.org1.example.com | [1c48 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d43 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [2124 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1dd5 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1c49 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [2125 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1dd6 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1c4a 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [2126 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d7430 gate 1574140951476071700 evaluation starts +peer0.org2.example.com | [1dd7 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c4b 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [2127 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d7430 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1dd8 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c4c 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [2128 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d7430 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1dd9 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1c4d 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d44 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2129 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d7430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1dda 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1c4e 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d45 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 gate 1574140943338058200 evaluation succeeds +peer1.org2.example.com | [212a 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d7430 principal evaluation fails +peer1.org1.example.com | [1c4f 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ddb 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1d46 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [212b 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d7430 gate 1574140951476071700 evaluation fails +peer1.org1.example.com | [1c50 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ddc 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1d47 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [212c 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c51 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ddd 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1d48 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [212d 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c52 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d2950 gate 1574140947657172800 evaluation starts +peer0.org2.example.com | [1dde 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d49 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [212e 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1c53 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d2950 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ddf 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d4a 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [212f 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d79a0 gate 1574140951479585700 evaluation starts +peer1.org1.example.com | [1c54 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d2950 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1de0 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d4b 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2130 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d79a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c55 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d2950 principal matched by identity 0 +peer0.org2.example.com | [1de1 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [1d4c 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2131 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d79a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1c56 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [1de2 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4d 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2132 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d79a0 principal matched by identity 0 +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1de3 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4e 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2133 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer1.org1.example.com | [1c57 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [1de4 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4f 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [1de5 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1d50 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2134 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [1de6 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d51 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [1de7 11-19 05:22:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d52 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1de8 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d53 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer1.org1.example.com | [1c58 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d2950 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1de9 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer0.org1.example.com | [1d54 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [1c59 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d2950 gate 1574140947657172800 evaluation succeeds +peer0.org2.example.com | [1dea 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2135 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d79a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d55 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c5a 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1deb 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2136 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d79a0 gate 1574140951479585700 evaluation succeeds +peer0.org1.example.com | [1d56 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c5b 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1dec 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2137 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1d57 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c5c 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ded 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2138 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1d58 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [1c5d 11-19 05:22:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1dee 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2139 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d59 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c5e 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1def 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [213a 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d5a 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1df0 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [213b 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1d5b 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1c5f 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1df1 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d5c 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [1df2 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [213c 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d5d 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1df3 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [213d 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d5e 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1df4 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [213e 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d5f 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1df5 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [213f 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d60 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c60 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1df6 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2140 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d61 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c61 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1df7 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2141 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1d62 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c62 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df8 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2142 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer0.org1.example.com | [1d63 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c63 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df9 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer0.org1.example.com | [1d64 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c64 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dfa 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2143 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer0.org1.example.com | [1d65 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c65 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1dfb 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458eb80 gate 1574140943963599200 evaluation starts +peer1.org2.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer0.org1.example.com | [1d66 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [1c66 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer0.org2.example.com | [1dfc 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458eb80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d67 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c67 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer0.org2.example.com | [1dfd 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458eb80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1d68 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c68 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer0.org2.example.com | [1dfe 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458eb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1d69 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c69 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2144 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1dff 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458eb80 principal evaluation fails +peer0.org1.example.com | [1d6a 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c6a 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2145 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1e00 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458eb80 gate 1574140943963599200 evaluation fails +peer0.org1.example.com | [1d6b 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c6b 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e23b0 gate 1574140947664404900 evaluation starts +peer1.org2.example.com | [2146 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e01 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d6c 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c6c 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e23b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2147 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e02 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d6d 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c6d 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e23b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2148 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e03 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1c6e 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e23b0 principal matched by identity 0 +peer0.org1.example.com | [1d6e 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 gate 1574140943450160700 evaluation starts +peer1.org2.example.com | [2149 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e04 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f0f0 gate 1574140943967058500 evaluation starts +peer1.org1.example.com | [1c6f 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | [1d6f 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [214a 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e05 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [1d70 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [214b 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e06 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f0f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1c70 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | [1d71 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 principal matched by identity 0 +peer1.org2.example.com | [214c 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e07 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f0f0 principal matched by identity 0 +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | [1d72 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +peer1.org2.example.com | [214d 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e08 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +peer1.org2.example.com | [214e 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | [1d73 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +peer1.org2.example.com | [214f 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e09 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | 00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +peer1.org2.example.com | [2150 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1c71 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e23b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +peer1.org2.example.com | [2151 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1c72 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e23b0 gate 1574140947664404900 evaluation succeeds +peer0.org1.example.com | 00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +peer1.org2.example.com | [2152 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1c73 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 d4 ee 0e e0 32 5d |....2]| +peer1.org2.example.com | [2153 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1c74 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d74 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2154 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e0a 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f0f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c75 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d75 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 gate 1574140943450160700 evaluation succeeds +peer1.org2.example.com | [2155 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [1e0b 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f0f0 gate 1574140943967058500 evaluation succeeds +peer1.org1.example.com | [1c76 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d76 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2156 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e0c 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1c77 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [1d77 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2157 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e0d 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [1d78 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2158 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e0e 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c78 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [1d79 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2159 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e0f 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [1d7a 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [215a 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [1e10 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [1d7b 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [215b 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [1d7c 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [215c 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e11 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [1d7d 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [215d 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c79 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7e 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [215e 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c7a 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7f 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [215f 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c7b 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d80 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [2160 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1c7c 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d81 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e12 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [2161 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer1.org1.example.com | [1c7d 11-19 05:22:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d82 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer1.org1.example.com | [1c7e 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d83 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e13 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [2162 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer1.org1.example.com | [1c7f 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d84 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer1.org1.example.com | [1c80 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d85 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer1.org1.example.com | [1c81 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e3bc0 gate 1574140947670500500 evaluation starts +peer0.org1.example.com | [1d86 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer1.org1.example.com | [1c82 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e3bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d87 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\333\204\351\365F\034\002 aO\377D\354\rD\242\016\333\333\370\230{{\321Hn\250\002\004\252\375\243\304\206\261\212%\206+\357" > alive: alive: +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer1.org1.example.com | [1c83 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e3bc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1d88 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e14 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2163 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [1c84 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e3bc0 principal matched by identity 0 +peer0.org1.example.com | [1d89 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e15 11-19 05:22:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [1c85 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [1d8a 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e16 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2164 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 ab a7 53 22 ca a0 36 b2 36 57 |0E.!....S"..6.6W| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1d8b 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e17 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 f2 89 3b 7e 51 83 91 62 f1 b0 1f c7 f0 be bc df |..;~Q..b........| +peer1.org1.example.com | [1c86 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [1d8c 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e18 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 1a ec 7b 12 42 02 20 28 d1 f6 b3 b9 96 54 8a 42 |..{.B. (.....T.B| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1d8d 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e19 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 ea 6c 19 f2 e2 97 01 b7 3f c2 05 76 ec 5e 89 fc |.l......?..v.^..| +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [1d8e 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 1a 37 39 f3 26 4e e2 |.79.&N.| +peer0.org2.example.com | [1e1a 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [1d8f 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2165 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1e1b 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1d90 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2166 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1e1c 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6f80 gate 1574140943970193500 evaluation starts +peer0.org1.example.com | [1d91 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c87 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e3bc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2167 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1e1d 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6f80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d92 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [1c88 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e3bc0 gate 1574140947670500500 evaluation succeeds +peer1.org2.example.com | [2168 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1e1e 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6f80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1d93 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c89 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2169 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1e1f 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1d94 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c8a 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [216a 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e20 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6f80 principal evaluation fails +peer0.org1.example.com | [1d95 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c8b 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [216b 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e21 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6f80 gate 1574140943970193500 evaluation fails +peer0.org1.example.com | [1d96 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c8c 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [216c 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e22 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d97 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [1c8d 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [216d 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | [1e23 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d98 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [216e 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e24 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1d99 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c8e 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [216f 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e25 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a74f0 gate 1574140943970515200 evaluation starts +peer0.org1.example.com | [1d9a 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [2170 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e26 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a74f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d9b 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [2171 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" secret_envelope: > alive:T\244cG\377|Uf\325VN\316\344&\233A\347:\356w\214\002 B\324\322c\230*8\031W0\302\033\332\213I\032\225b\335\217<\255W\004mp2S2z\013E" > +peer0.org2.example.com | [1e27 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a74f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1d9c 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [2172 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e28 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a74f0 principal matched by identity 0 +peer0.org1.example.com | [1d9d 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [2173 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e29 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1d9e 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c8f 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2174 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1d9f 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c90 11-19 05:22:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2175 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e2a 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1da0 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c91 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [2176 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1da1 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c92 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [2177 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1da2 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [1c93 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [2178 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1da3 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c94 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [2179 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1da4 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c95 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e2b 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a74f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [217a 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1da5 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c96 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e2c 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a74f0 gate 1574140943970515200 evaluation succeeds +peer1.org2.example.com | [217b 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1da6 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c97 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e2d 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [217c 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1da7 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c98 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e2e 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [217d 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1da8 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1c99 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e2f 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [217e 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1da9 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c9a 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e30 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [217f 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452baa0 gate 1574140951918921400 evaluation starts +peer1.org1.example.com | [1c9b 11-19 05:22:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1daa 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e31 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2180 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452baa0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c9c 11-19 05:22:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1dab 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e32 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [2181 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452baa0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1c9d 11-19 05:22:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [1dac 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e33 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2182 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452baa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1c9e 11-19 05:22:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1dad 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e34 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2183 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452baa0 principal evaluation fails +peer1.org1.example.com | [1c9f 11-19 05:22:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1dae 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e35 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2184 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452baa0 gate 1574140951918921400 evaluation fails +peer1.org1.example.com | [1ca0 11-19 05:22:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1daf 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1e36 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2185 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ca1 11-19 05:22:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db0 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 gate 1574140943845809700 evaluation starts +peer0.org2.example.com | [1e37 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2186 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ca2 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1db1 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e38 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2187 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1ca3 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db2 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1e39 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2188 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540010 gate 1574140951920548200 evaluation starts +peer1.org1.example.com | [1ca4 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1db3 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 principal matched by identity 0 +peer0.org2.example.com | [1e3a 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2189 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540010 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ca5 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db4 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 56 09 a6 c3 d9 9b 49 97 c4 98 5f 43 79 49 71 |.V.....I..._CyIq| +peer0.org2.example.com | [1e3b 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [218a 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540010 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1ca6 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 0c 1b 9a f3 ea fb d3 43 79 24 55 9e 3d 12 30 53 |.......Cy$U.=.0S| +peer0.org2.example.com | [1e3c 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8900 gate 1574140943978911500 evaluation starts +peer1.org2.example.com | [218b 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540010 principal matched by identity 0 +peer1.org1.example.com | [1ca7 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db5 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 5d 6d be 18 15 50 10 0b 95 b1 |0E.!..]m...P....| +peer0.org2.example.com | [1e3d 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8900 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [218c 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer1.org1.example.com | [1ca8 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 47 3c b3 21 72 95 6b 75 34 59 9c dd c1 a1 14 11 |G<.!r.ku4Y......| +peer0.org2.example.com | [1e3e 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8900 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer1.org1.example.com | [1ca9 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 89 8d f7 b8 d2 02 20 33 84 59 ef b6 bd ae c1 ee |...... 3.Y......| +peer0.org2.example.com | [1e3f 11-19 05:22:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [218d 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer1.org1.example.com | [1caa 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 f7 cc 0b 57 1f bc 2b 4c 5c 3a 3b 6e 38 b4 9b a6 |...W..+L\:;n8...| +peer0.org2.example.com | [1e40 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8900 principal evaluation fails +peer1.org2.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer1.org1.example.com | [1cab 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 bc 54 0a c5 ac b9 7d |.T....}| +peer0.org2.example.com | [1e41 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8900 gate 1574140943978911500 evaluation fails +peer1.org2.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer1.org1.example.com | [1cac 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db6 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e42 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer1.org1.example.com | [1cad 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1db7 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 gate 1574140943845809700 evaluation succeeds +peer0.org2.example.com | [1e43 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer1.org1.example.com | [1cae 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db8 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e44 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [218e 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540010 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1caf 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db9 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e45 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8e70 gate 1574140943980961000 evaluation starts +peer1.org2.example.com | [218f 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540010 gate 1574140951920548200 evaluation succeeds +peer1.org1.example.com | [1cb0 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dba 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e46 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8e70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2190 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1cb1 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dbb 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e47 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8e70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2191 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1cb2 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dbc 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e48 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8e70 principal matched by identity 0 +peer1.org2.example.com | [2192 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1cb3 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dbd 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1e49 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [2193 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1cb4 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dbe 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [2194 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cb5 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dbf 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1e4a 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [2195 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1cb6 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dc0 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [2196 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1cb7 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dc1 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [2197 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1cb8 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dc2 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [2198 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1cb9 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dc3 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [2199 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cba 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dc4 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | [1e4b 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8e70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [219a 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cbb 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [1dc5 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e4c 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c8e70 gate 1574140943980961000 evaluation succeeds +peer1.org2.example.com | [219b 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [1cbc 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dc6 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e4d 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [219c 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cbd 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dc7 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e4e 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [219d 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cbe 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dc8 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e4f 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [219e 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cbf 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dc9 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1e50 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [219f 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1cc0 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dca 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e51 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21a0 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > alive: alive:T\244cG\377|Uf\325VN\316\344&\233A\347:\356w\214\002 B\324\322c\230*8\031W0\302\033\332\213I\032\225b\335\217<\255W\004mp2S2z\013E" > +peer1.org1.example.com | [1cc1 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1dcb 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e52 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21a1 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cc2 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dcc 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e53 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [21a2 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cc3 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1dcd 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e54 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21a3 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cc4 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1dce 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e55 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21a4 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cc5 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1dcf 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e56 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [21a5 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cc6 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1dd0 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [1e57 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [21a6 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc7 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1dd1 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac fd d3 0a 61 64 0a 7b dd 3e 5f fc 13 26 9f a1 |....ad.{.>_..&..| +peer0.org2.example.com | [1e58 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [21a7 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc8 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 7a 6c 15 0d 69 0e 4a ed b9 2e c0 7a 79 c3 d3 f0 |zl..i.J....zy...| +peer0.org2.example.com | [1e59 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6000 gate 1574140943982136900 evaluation starts +peer1.org2.example.com | [21a8 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cc9 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fe20 gate 1574140947852002900 evaluation starts +peer0.org1.example.com | [1dd2 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 96 29 b3 a4 b9 10 6c 1b e2 20 |0E.!...)....l.. | +peer0.org2.example.com | [1e5a 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6000 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21a9 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cca 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fe20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 fb b0 e1 87 f9 f7 32 0d 52 1e b2 4f 2e bf fb 68 |......2.R..O...h| +peer0.org2.example.com | [1e5b 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6000 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [21aa 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ccb 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fe20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000020 06 d2 e9 76 a8 02 20 5b 95 ce 18 de b2 37 a3 e5 |...v.. [.....7..| +peer0.org2.example.com | [1e5c 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [21ab 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ccc 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fe20 principal matched by identity 0 +peer0.org1.example.com | 00000030 fa 9f 2d da 92 1b d3 8a 72 17 61 cf 6a 05 3e 25 |..-.....r.a.j.>%| +peer0.org2.example.com | [1e5d 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6000 principal evaluation fails +peer1.org2.example.com | [21ac 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [1ccd 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 16 88 c3 34 f0 2e b2 4f fb eb 2e 89 31 98 ab |....4...O....1..| +peer0.org1.example.com | 00000040 80 0c 10 b1 b3 bf 55 |......U| +peer0.org2.example.com | [1e5e 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6000 gate 1574140943982136900 evaluation fails +peer1.org2.example.com | [21ad 11-19 05:22:32.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 05 f1 a7 ba c4 1c f0 0f dd 77 00 0d 29 84 8a ec |.........w..)...| +peer0.org1.example.com | [1dd3 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [1e5f 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21ae 11-19 05:22:32.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cce 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 00 8f 9f bc aa 50 5e 3b 0c d0 |0E.!.......P^;..| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [1e60 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21af 11-19 05:22:32.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 68 de 2a 21 a1 37 3f d2 fa b3 82 91 7b c8 c0 8f |h.*!.7?.....{...| +peer0.org1.example.com | [1dd4 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 ae 43 40 5a b9 36 e2 1b d3 1c |0E.!...C@Z.6....| +peer0.org2.example.com | [1e61 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [21b0 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | 00000020 2b 03 83 fe 66 02 20 71 da 64 15 61 94 c3 cf 1b |+...f. q.d.a....| +peer0.org1.example.com | 00000010 16 27 f2 24 32 fa ed bd 99 1e 02 d7 a8 04 39 95 |.'.$2.........9.| +peer1.org2.example.com | [21b1 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e62 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6570 gate 1574140943982418700 evaluation starts +peer1.org1.example.com | 00000030 6b 0d be b6 d9 7d a2 04 cc 3a d7 c6 26 67 89 1e |k....}...:..&g..| +peer0.org1.example.com | 00000020 45 be 2e bb c4 02 20 77 b2 d2 08 1d 1a ff 2a fc |E..... w......*.| +peer1.org2.example.com | [21b2 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e63 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6570 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 f4 77 3f 23 c9 6a ac |.w?#.j.| +peer0.org1.example.com | 00000030 c9 0f 0c 26 5e 75 95 9b 8c ab 6e a9 b3 37 43 6c |...&^u....n..7Cl| +peer1.org2.example.com | [21b3 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e64 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6570 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1ccf 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fe20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 ea 6a db a1 e8 08 94 |.j.....| +peer1.org2.example.com | [21b4 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e65 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6570 principal matched by identity 0 +peer1.org1.example.com | [1cd0 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fe20 gate 1574140947852002900 evaluation succeeds +peer0.org1.example.com | [1dd5 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [21b5 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e66 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1cd1 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1dd6 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [21b6 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1cd2 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1dd7 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [21b7 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e67 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1cd3 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1dd8 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [21b8 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1cd4 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1dd9 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [21b9 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1cd5 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1dda 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21ba 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1cd6 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1ddb 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21bb 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1cd7 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ddc 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21bc 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e68 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6570 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1cd8 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1ddd 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [21bd 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e69 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6570 gate 1574140943982418700 evaluation succeeds +peer1.org1.example.com | [1cd9 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1dde 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21be 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e6a 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1cda 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ddf 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21bf 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e6b 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1cdb 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1de0 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21c0 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1e6c 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1cdc 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21c1 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045705f0 gate 1574140952199826000 evaluation starts +peer0.org1.example.com | [1de1 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e6d 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1cdd 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [21c2 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045705f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1de2 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e6e 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1cde 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21c3 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045705f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1de3 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:%\200\014\020\261\263\277U" secret_envelope: > alive: +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1cdf 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21c4 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045705f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1de4 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e6f 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1ce0 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21c5 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045705f0 principal evaluation fails +peer0.org1.example.com | [1de5 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [1ce1 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21c6 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045705f0 gate 1574140952199826000 evaluation fails +peer0.org1.example.com | [1de6 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [21c7 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ce2 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\226\200\371" > alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > +peer0.org1.example.com | [1de7 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [21c8 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ce3 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1de8 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [21c9 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1ce4 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1de9 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e70 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [21ca 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570b60 gate 1574140952202005200 evaluation starts +peer1.org1.example.com | [1ce5 11-19 05:22:27.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1dea 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [21cb 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570b60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ce6 11-19 05:22:27.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151025 +peer0.org1.example.com | [1deb 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e71 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [21cc 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570b60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1ce7 11-19 05:22:27.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 02168E1224535D8A00ED9FDDD10073CB08A21D4DD5E91A3FA3BB47C61EC2B96A +peer0.org1.example.com | [1dec 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [21cd 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570b60 principal matched by identity 0 +peer1.org1.example.com | [1ce8 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1ded 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [21ce 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1ce9 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1dee 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1cea 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [1def 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [21cf 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1ceb 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1df0 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org2.example.com | [1e72 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1cec 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1df1 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org2.example.com | [1e73 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1ced 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1df2 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1e74 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1cee 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1df3 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510091801 +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1cef 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1df4 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EEEB2535D10AB7E1F350782B6F6105D6D1E09466FE0785DCDE181FD16423F1B0 +peer0.org2.example.com | [1e75 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [21d0 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cf0 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1df5 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [21d1 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570b60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1cf1 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1df6 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [21d2 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570b60 gate 1574140952202005200 evaluation succeeds +peer1.org1.example.com | [1cf2 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1df7 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [21d3 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1cf3 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1df8 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [21d4 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1cf4 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1df9 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e76 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21d5 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1cf5 11-19 05:22:27.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dfa 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1e77 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21d6 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1cf6 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dfb 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e78 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [21d7 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf7 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dfc 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e79 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21d8 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf8 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dfd 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [1e7a 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1cf9 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [21d9 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1dfe 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e7b 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1cfa 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 16 8e 12 24 53 5d 8a 00 ed 9f dd d1 00 73 cb |....$S].......s.| +peer1.org2.example.com | [21da 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1dff 11-19 05:22:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [1e7c 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 08 a2 1d 4d d5 e9 1a 3f a3 bb 47 c6 1e c2 b9 6a |...M...?..G....j| +peer1.org2.example.com | [21db 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e00 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1e7d 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1cfb 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 8a ba c9 bc 71 19 d5 48 61 b7 |0E.!......q..Ha.| +peer1.org2.example.com | [21dc 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e01 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101F +peer0.org2.example.com | [1e7e 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fec50 gate 1574140943984525400 evaluation starts +peer1.org1.example.com | 00000010 b4 63 e0 cd d0 f4 a1 4e 6c 3e 92 48 4a a1 4f 4e |.c.....Nl>.HJ.ON| +peer1.org2.example.com | [21dd 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e02 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37675CB1727A4FC33A1775B516BC91E473DB4294FB0AB944E1F289FF6557303B +peer0.org2.example.com | [1e7f 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fec50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 ef 5e 40 12 e4 02 20 01 7e e5 df 6a 9c 52 b5 38 |.^@... .~..j.R.8| +peer1.org2.example.com | [21de 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e03 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1e80 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fec50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000030 9c 8f 8b cc db 00 38 15 8e 81 b2 b4 a9 d1 83 43 |......8........C| +peer1.org2.example.com | [21df 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571cf0 gate 1574140952209061900 evaluation starts +peer0.org1.example.com | [1e04 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1e81 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fec50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000040 14 12 ad a2 f2 d6 df |.......| +peer1.org2.example.com | [21e0 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571cf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e05 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | [1e82 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fec50 principal evaluation fails +peer1.org1.example.com | [1cfc 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [21e1 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571cf0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1e06 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1e83 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fec50 gate 1574140943984525400 evaluation fails +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [21e2 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1e07 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e84 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1cfd 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 81 89 0d fb 58 c6 7b 29 36 bb |0E.!......X.{)6.| +peer1.org2.example.com | [21e3 11-19 05:22:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571cf0 principal evaluation fails +peer0.org1.example.com | [1e08 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e85 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 bf 73 5d 53 0e 24 70 1b e5 44 93 7b 4e e9 53 fe |.s]S.$p..D.{N.S.| +peer1.org2.example.com | [21e4 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571cf0 gate 1574140952209061900 evaluation fails +peer0.org1.example.com | [1e09 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e86 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000020 7d ca e7 e4 86 02 20 06 bf 43 8a e4 af 69 3d 10 |}..... ..C...i=.| +peer1.org2.example.com | [21e5 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e0a 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1e87 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff1c0 gate 1574140943984807100 evaluation starts +peer1.org1.example.com | 00000030 68 f3 4f ae 22 05 d7 63 98 08 1f 95 e2 ed fe 37 |h.O."..c.......7| +peer1.org2.example.com | [21e6 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e0b 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e88 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 53 cc c7 9b 4d 71 20 |S...Mq | +peer1.org2.example.com | [21e7 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1e0c 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1e89 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff1c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1cfe 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [21e8 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458e260 gate 1574140952210846600 evaluation starts +peer0.org1.example.com | [1e0d 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1e8a 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff1c0 principal matched by identity 0 +peer1.org1.example.com | [1cff 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [21e9 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458e260 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e0e 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e8b 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1d00 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21ea 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458e260 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1e0f 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1d01 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21eb 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458e260 principal matched by identity 0 +peer0.org1.example.com | [1e10 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e8c 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1d02 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [21ec 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [1e11 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1d03 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [1e12 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1d04 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21ed 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1d05 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e13 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1d06 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1e14 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1d07 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 16 8e 12 24 53 5d 8a 00 ed 9f dd d1 00 73 cb |....$S].......s.| +peer0.org1.example.com | [1e15 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e8d 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff1c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000010 08 a2 1d 4d d5 e9 1a 3f a3 bb 47 c6 1e c2 b9 6a |...M...?..G....j| +peer0.org1.example.com | [1e16 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e8e 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff1c0 gate 1574140943984807100 evaluation succeeds +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1d08 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 8a ba c9 bc 71 19 d5 48 61 b7 |0E.!......q..Ha.| +peer0.org1.example.com | [1e17 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e8f 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21ee 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458e260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 b4 63 e0 cd d0 f4 a1 4e 6c 3e 92 48 4a a1 4f 4e |.c.....Nl>.HJ.ON| +peer0.org1.example.com | [1e18 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1e90 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21ef 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458e260 gate 1574140952210846600 evaluation succeeds +peer1.org1.example.com | 00000020 ef 5e 40 12 e4 02 20 01 7e e5 df 6a 9c 52 b5 38 |.^@... .~..j.R.8| +peer0.org1.example.com | [1e19 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e91 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [21f0 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 9c 8f 8b cc db 00 38 15 8e 81 b2 b4 a9 d1 83 43 |......8........C| +peer0.org1.example.com | [1e1a 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e92 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [21f1 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 14 12 ad a2 f2 d6 df |.......| +peer0.org1.example.com | [1e1b 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e93 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [21f2 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d09 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e1c 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [21f3 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1d0a 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e1d 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e94 11-19 05:22:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [21f4 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1d0b 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e1e 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1d0c 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e1f 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [21f5 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1d0d 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e20 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 gate 1574140945394734400 evaluation starts +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [1d0e 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1e21 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [1d0f 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer0.org1.example.com | [1e22 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1e95 11-19 05:22:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:%\200\014\020\261\263\277U" > alive:\333\204\351\365F\034\002 aO\377D\354\rD\242\016\333\333\370\230{{\321Hn\250\002\004\252\375\243\304\206\261\212%\206+\357" > +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer0.org1.example.com | [1e23 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 principal matched by identity 0 +peer0.org2.example.com | [1e96 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1d10 11-19 05:22:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer0.org1.example.com | [1e24 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf fa 3d 6f c7 b3 bb fc 9b b1 8e 0c 17 73 86 f8 |..=o.........s..| +peer0.org2.example.com | [1e97 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21f6 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer0.org1.example.com | 00000010 a6 b2 06 cc 50 fa 47 69 65 6d 71 31 86 31 44 94 |....P.Giemq1.1D.| +peer0.org2.example.com | [1e98 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer0.org1.example.com | [1e25 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 0e b7 00 a9 c3 77 64 95 c1 68 |0E.!.......wd..h| +peer0.org2.example.com | [1e99 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21f7 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer0.org1.example.com | 00000010 fa bb 2b 6b f5 ff 40 df 80 d8 85 d8 9c 3d 26 f7 |..+k..@......=&.| +peer0.org2.example.com | [1e9a 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer0.org1.example.com | 00000020 d2 17 58 d2 30 02 20 59 01 bd f7 32 fb ff bf 1e |..X.0. Y...2....| +peer0.org2.example.com | [1e9b 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1d11 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 bd 42 88 ab b2 85 25 98 a3 b4 22 9a 9c 90 a4 e0 |.B....%...".....| +peer0.org2.example.com | [1e9c 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1d12 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 37 3a 31 b1 9c 17 e8 |7:1....| +peer0.org2.example.com | [1e9d 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1d13 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1e9e 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e26 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [21f8 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d14 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e9f 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e27 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 gate 1574140945394734400 evaluation succeeds +peer1.org2.example.com | [21f9 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d15 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ea0 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e28 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21fa 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d16 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ea1 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e29 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21fb 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d17 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ea2 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e2a 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [21fc 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d18 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ea3 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e2b 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [21fd 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d19 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ea4 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e2c 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [21fe 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d1a 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ea5 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e2d 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [21ff 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d1b 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354a1f0 gate 1574140947944053200 evaluation starts +peer0.org2.example.com | [1ea6 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046249d0 gate 1574140943998680500 evaluation starts +peer0.org1.example.com | [1e2e 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2200 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d1c 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354a1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ea7 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046249d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e2f 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2201 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d1d 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354a1f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1ea8 11-19 05:22:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046249d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1e30 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2202 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1d1e 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354a1f0 principal matched by identity 0 +peer0.org2.example.com | [1ea9 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046249d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1e31 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2203 11-19 05:22:32.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a8340 gate 1574140952219944400 evaluation starts +peer1.org1.example.com | [1d1f 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer0.org2.example.com | [1eaa 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046249d0 principal evaluation fails +peer0.org1.example.com | [1e32 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2204 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a8340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer0.org2.example.com | [1eab 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046249d0 gate 1574140943998680500 evaluation fails +peer0.org1.example.com | [1e33 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2205 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a8340 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1d20 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer0.org2.example.com | [1eac 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e34 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2206 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a8340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer0.org2.example.com | [1ead 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e35 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2207 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a8340 principal evaluation fails +peer1.org1.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer0.org1.example.com | [1e36 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2208 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a8340 gate 1574140952219944400 evaluation fails +peer0.org2.example.com | [1eae 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer0.org1.example.com | [1e37 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2209 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1eaf 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624f40 gate 1574140944001591600 evaluation starts +peer1.org1.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer1.org2.example.com | [220a 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1eb0 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624f40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d21 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354a1f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e38 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [220b 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1eb1 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624f40 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1d22 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354a1f0 gate 1574140947944053200 evaluation succeeds +peer0.org1.example.com | [1e39 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [220c 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a88b0 gate 1574140952222675400 evaluation starts +peer0.org2.example.com | [1eb2 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624f40 principal matched by identity 0 +peer1.org1.example.com | [1d23 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e3a 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [220d 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a88b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1eb3 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1d24 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e3b 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [220e 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a88b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1d25 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e3c 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [220f 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a88b0 principal matched by identity 0 +peer0.org2.example.com | [1eb4 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1d26 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e3d 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2210 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1d27 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e3e 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1d28 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e3f 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2211 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1d29 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e40 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1d2a 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e41 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1eb5 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624f40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d2b 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1e42 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1eb6 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624f40 gate 1574140944001591600 evaluation succeeds +peer1.org1.example.com | [1d2c 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 16 8e 12 24 53 5d 8a 00 ed 9f dd d1 00 73 cb |....$S].......s.| +peer0.org1.example.com | [1e43 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1eb7 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 08 a2 1d 4d d5 e9 1a 3f a3 bb 47 c6 1e c2 b9 6a |...M...?..G....j| +peer0.org1.example.com | [1e44 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2212 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a88b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1eb8 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1d2d 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 8a ba c9 bc 71 19 d5 48 61 b7 |0E.!......q..Ha.| +peer0.org1.example.com | [1e45 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2213 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a88b0 gate 1574140952222675400 evaluation succeeds +peer0.org2.example.com | [1eb9 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 b4 63 e0 cd d0 f4 a1 4e 6c 3e 92 48 4a a1 4f 4e |.c.....Nl>.HJ.ON| +peer0.org1.example.com | [1e46 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2214 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1eba 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 ef 5e 40 12 e4 02 20 01 7e e5 df 6a 9c 52 b5 38 |.^@... .~..j.R.8| +peer0.org1.example.com | [1e47 11-19 05:22:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is # examples/chaincode/go/chaincode_example02 +peer1.org2.example.com | [2215 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ebb 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 9c 8f 8b cc db 00 38 15 8e 81 b2 b4 a9 d1 83 43 |......8........C| +peer0.org1.example.com | /tmp/go-link-810691446/000001.o: In function `pluginOpen': +peer1.org2.example.com | [2216 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ebc 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 14 12 ad a2 f2 d6 df |.......| +peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer1.org2.example.com | [2217 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ebd 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d2e 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | /tmp/go-link-810691446/000021.o: In function `mygetgrouplist': +peer1.org2.example.com | [2218 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ebe 11-19 05:22:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d2f 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer1.org2.example.com | [2219 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ebf 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d30 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | /tmp/go-link-810691446/000020.o: In function `mygetgrgid_r': +peer1.org2.example.com | [221a 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [1ec0 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d31 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [1ec1 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d32 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer0.org1.example.com | /tmp/go-link-810691446/000020.o: In function `mygetgrnam_r': +peer1.org2.example.com | [221b 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [1ec2 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer1.org2.example.com | [221c 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [1ec3 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d33 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer0.org1.example.com | /tmp/go-link-810691446/000020.o: In function `mygetpwnam_r': +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [1ec4 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [1ec5 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer0.org1.example.com | /tmp/go-link-810691446/000020.o: In function `mygetpwuid_r': +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [1ec6 11-19 05:22:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [1ec7 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | /tmp/go-link-810691446/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +peer1.org1.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer1.org2.example.com | [221d 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ec8 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer1.org1.example.com | [1d34 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [221e 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ec9 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e48 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d35 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [221f 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1eca 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1e49 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d36 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [2220 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ecb 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e4a 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d37 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2221 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ecc 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e4b 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d38 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2222 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [1ecd 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e4c 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [1d39 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1ece 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e4d 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 7d d9 69 99 26 6d 9b f9 e2 cd e4 c1 43 12 8d |.}.i.&m......C..| +peer1.org1.example.com | [1d3a 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2223 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [1ecf 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 7a bc 34 1b e3 01 c1 e5 f3 dd 1a 2d 93 a5 cd 2d |z.4........-...-| +peer1.org1.example.com | [1d3b 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [1ed0 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e4e 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cc 3e f1 56 1b ea 6a 4c f1 5f |0E.!...>.V..jL._| +peer1.org1.example.com | [1d3c 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [1ed1 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 3a ee a4 0a 56 75 00 9d 5c c5 89 1c eb e7 c3 2c |:...Vu..\......,| +peer1.org1.example.com | [1d3d 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [1ed2 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464a940 gate 1574140944754639800 evaluation starts +peer0.org1.example.com | 00000020 e3 ca 46 84 ac 02 20 53 f3 a7 5b e3 78 dc 91 cf |..F... S..[.x...| +peer1.org1.example.com | [1d3e 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc7b0 gate 1574140947950485500 evaluation starts +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [1ed3 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464a940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 5c e2 40 72 f1 02 50 4e 50 ca f6 4e 9b 89 d4 28 |\.@r..PNP..N...(| +peer1.org1.example.com | [1d3f 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc7b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2224 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ed4 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464a940 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000040 17 dd b8 ca aa 68 ca |.....h.| +peer1.org1.example.com | [1d40 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc7b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2225 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ed5 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464a940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1e4f 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d41 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc7b0 principal matched by identity 0 +peer1.org2.example.com | [2226 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ed6 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464a940 principal evaluation fails +peer0.org1.example.com | [1e50 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1d42 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 16 88 c3 34 f0 2e b2 4f fb eb 2e 89 31 98 ab |....4...O....1..| +peer1.org2.example.com | [2227 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ed7 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464a940 gate 1574140944754639800 evaluation fails +peer0.org1.example.com | [1e51 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000010 05 f1 a7 ba c4 1c f0 0f dd 77 00 0d 29 84 8a ec |.........w..)...| +peer1.org2.example.com | [2228 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ed8 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e52 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1d43 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 00 8f 9f bc aa 50 5e 3b 0c d0 |0E.!.......P^;..| +peer1.org2.example.com | [2229 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ed9 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e53 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | 00000010 68 de 2a 21 a1 37 3f d2 fa b3 82 91 7b c8 c0 8f |h.*!.7?.....{...| +peer1.org2.example.com | [222a 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1eda 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1e54 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 2b 03 83 fe 66 02 20 71 da 64 15 61 94 c3 cf 1b |+...f. q.d.a....| +peer1.org2.example.com | [222b 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1edb 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464aeb0 gate 1574140944755083600 evaluation starts +peer0.org1.example.com | [1e55 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 6b 0d be b6 d9 7d a2 04 cc 3a d7 c6 26 67 89 1e |k....}...:..&g..| +peer1.org2.example.com | [222c 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1edc 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464aeb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e56 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 f4 77 3f 23 c9 6a ac |.w?#.j.| +peer1.org2.example.com | [222d 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ce740 gate 1574140952233930600 evaluation starts +peer0.org2.example.com | [1edd 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464aeb0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1e57 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d44 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc7b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [222e 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ce740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ede 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464aeb0 principal matched by identity 0 +peer0.org1.example.com | [1e58 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d45 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bc7b0 gate 1574140947950485500 evaluation succeeds +peer1.org2.example.com | [222f 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ce740 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1edf 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 67 5c b1 72 7a 4f c3 3a 17 75 b5 16 bc 91 e4 |7g\.rzO.:.u.....| +peer0.org1.example.com | [1e59 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d46 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2230 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ce740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000010 73 db 42 94 fb 0a b9 44 e1 f2 89 ff 65 57 30 3b |s.B....D....eW0;| +peer0.org1.example.com | [1e5a 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d47 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2231 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ce740 principal evaluation fails +peer0.org2.example.com | [1ee0 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 4c c1 13 6f af ed c4 9d 61 32 |0E.!..L..o....a2| +peer0.org1.example.com | [1e5b 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d48 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2232 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ce740 gate 1574140952233930600 evaluation fails +peer0.org2.example.com | 00000010 67 11 86 ac 8f 05 51 e1 65 5e 10 ba f3 40 0e 42 |g.....Q.e^...@.B| +peer0.org1.example.com | [1e5c 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d49 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2233 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 df a3 f6 c6 91 02 20 19 56 22 f1 09 f8 7f 8e c9 |...... .V"......| +peer0.org1.example.com | [1e5d 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d4a 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2234 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 28 ea eb ad c5 a1 58 89 a4 3e ea 5b 06 47 5c e5 |(.....X..>.[.G\.| +peer0.org1.example.com | [1e5e 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d4b 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2235 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000040 d3 2c db 5d e2 c9 c7 |.,.]...| +peer0.org1.example.com | [1e5f 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d4c 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2236 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cecb0 gate 1574140952236090500 evaluation starts +peer0.org2.example.com | [1ee1 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464aeb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e60 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d4d 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2237 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cecb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ee2 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464aeb0 gate 1574140944755083600 evaluation succeeds +peer0.org1.example.com | [1e61 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d4e 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2238 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cecb0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1e62 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ee3 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1d4f 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2239 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cecb0 principal matched by identity 0 +peer0.org1.example.com | [1e63 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ee4 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1d50 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [223a 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1ee5 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e64 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1d51 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [1ee6 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e65 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d52 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [223b 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [1ee7 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e66 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1d53 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ee8 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [1e67 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d54 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ee9 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org1.example.com | [1e68 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d55 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1eea 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org1.example.com | [1e69 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d56 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1eeb 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org1.example.com | [1e6a 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d57 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1eec 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [223c 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cecb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e6b 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d58 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1eed 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [223d 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cecb0 gate 1574140952236090500 evaluation succeeds +peer0.org1.example.com | [1e6c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d59 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1eee 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [223e 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1e6d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d5a 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [1eef 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [223f 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1e6e 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d5b 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 73 47 08 96 62 d1 b0 dc 3a b7 fd dd 2c 4e f0 |LsG..b...:...,N.| +peer0.org2.example.com | [1ef0 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2240 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e6f 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | 00000010 fc 2b 25 a8 81 1c 1a a4 e4 f6 6a d3 7a 11 d2 c9 |.+%.......j.z...| +peer0.org2.example.com | [1ef1 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2241 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e70 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d5c 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 70 16 38 85 29 22 9a 44 68 92 |0E.!..p.8.)".Dh.| +peer0.org2.example.com | [1ef2 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2242 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e71 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 44 5e 62 66 e7 3e ec 68 17 87 e4 cf 91 de 9e ef |D^bf.>.h........| +peer0.org2.example.com | [1ef3 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2243 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e72 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 e3 48 d7 4d 42 02 20 5b 68 af e2 22 ab b9 8c a5 |.H.MB. [h.."....| +peer0.org2.example.com | [1ef4 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2244 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [1e73 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 5d bf 64 62 cb ce 14 2f f0 02 13 51 42 1d d4 fe |].db.../...QB...| +peer0.org2.example.com | [1ef5 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [1e74 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000040 6a 4b 82 ff c5 cc 73 |jK....s| +peer0.org2.example.com | [1ef6 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2245 11-19 05:22:32.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [1e75 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d5d 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ef7 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [1e76 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1d5e 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer0.org2.example.com | [1ef8 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [1e77 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 gate 1574140945820643800 evaluation starts +peer1.org1.example.com | [1d5f 11-19 05:22:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer0.org2.example.com | [1ef9 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [1e78 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d60 11-19 05:22:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer0.org2.example.com | [1efa 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1e79 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1d61 11-19 05:22:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer0.org2.example.com | [1efb 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2246 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e7a 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 principal matched by identity 0 +peer1.org1.example.com | [1d62 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1efc 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2247 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e7b 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 3d 1d 4c 32 af 15 52 ca a6 3e 45 4b 5e 92 57 |.=.L2..R..>EK^.W| +peer1.org1.example.com | [1d63 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1efd 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2248 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 bc 4b cc fb 15 73 2b 2e 00 e5 10 67 ce a3 0c e3 |.K...s+....g....| +peer1.org1.example.com | [1d64 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1efe 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2249 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e7c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 1f 0d 29 0e 9b ff 6f b6 8f 0e |0E.!....)...o...| +peer1.org1.example.com | [1d65 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1eff 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [224a 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 60 0b 76 28 11 58 af 03 e1 bf b4 9f 9f 34 f6 52 |`.v(.X.......4.R| +peer1.org1.example.com | [1d66 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 41 52 3c 90 05 94 1e d1 d3 ff 2a 66 5a b4 d2 |.AR<.......*fZ..| +peer0.org2.example.com | [1f00 11-19 05:22:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [224b 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000020 e6 6d 13 60 0b 02 20 40 da 86 7a e7 8d b9 1c 61 |.m.`.. @..z....a| +peer1.org1.example.com | 00000010 a1 ca 8b 07 f6 b3 51 27 d5 3b bc aa 21 78 4e 35 |......Q'.;..!xN5| +peer0.org2.example.com | [1f01 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [224c 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000030 ad d4 98 90 fc bc 86 d3 2d a7 ad 9f 6c d7 9c 77 |........-...l..w| +peer1.org1.example.com | [1d67 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 9e 33 20 5b 6d 39 50 dd 4d 5d |0E.!...3 [m9P.M]| +peer0.org2.example.com | [1f02 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [224d 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000040 8b fe c1 b5 ad ba e0 |.......| +peer1.org1.example.com | 00000010 99 78 13 92 00 78 2a 3a 3e 1d f3 5d 5d 7e 4a 51 |.x...x*:>..]]~JQ| +peer0.org2.example.com | [1f03 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [224e 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ea660 gate 1574140952242592500 evaluation starts +peer1.org1.example.com | 00000020 8e 35 e1 72 0a 02 20 36 7b 45 3f dc bc 56 cc 0b |.5.r.. 6{E?..V..| +peer0.org1.example.com | [1e7d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f04 11-19 05:22:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [224f 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ea660 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 72 c2 96 89 71 b6 82 db 37 19 91 a1 d5 80 cf da |r...q...7.......| +peer0.org1.example.com | [1e7e 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 gate 1574140945820643800 evaluation succeeds +peer0.org2.example.com | [1f05 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer1.org2.example.com | [2250 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ea660 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000040 cd 18 83 a8 75 66 76 |....ufv| +peer0.org1.example.com | [1e7f 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f06 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer1.org2.example.com | [2251 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ea660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1d68 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e80 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f07 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2252 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ea660 principal evaluation fails +peer1.org1.example.com | [1d69 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1e81 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f08 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510091801 +peer1.org2.example.com | [2253 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ea660 gate 1574140952242592500 evaluation fails +peer1.org1.example.com | [1d6a 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1e82 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f09 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 06A7B6CBC27BC653BED5881331D3F498FD8EC26BE043DF9BBF32D0DDE807F69D +peer1.org2.example.com | [2254 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d6b 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1e83 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f0a 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer1.org2.example.com | [2255 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d6c 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1e84 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1f0b 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2256 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1d6d 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e85 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1f0c 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2257 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045eabd0 gate 1574140952243957200 evaluation starts +peer1.org1.example.com | [1d6e 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e86 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2258 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045eabd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f0d 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d6f 11-19 05:22:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e87 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2259 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045eabd0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1f0e 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d70 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e88 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [225a 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045eabd0 principal matched by identity 0 +peer0.org2.example.com | [1f0f 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1d71 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e89 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [225b 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [1f10 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d72 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e8a 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1f11 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d73 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1e8b 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f12 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [225c 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1d74 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e8c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f13 11-19 05:22:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1d75 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1e8d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f14 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [1e8e 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d76 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f15 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [1e8f 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d77 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f16 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [1e90 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d78 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f17 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [225d 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045eabd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e91 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d79 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f18 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf fa 3d 6f c7 b3 bb fc 9b b1 8e 0c 17 73 86 f8 |..=o.........s..| +peer1.org2.example.com | [225e 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045eabd0 gate 1574140952243957200 evaluation succeeds +peer0.org1.example.com | [1e92 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d7a 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 a6 b2 06 cc 50 fa 47 69 65 6d 71 31 86 31 44 94 |....P.Giemq1.1D.| +peer1.org2.example.com | [225f 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1e93 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d7b 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f19 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 0e b7 00 a9 c3 77 64 95 c1 68 |0E.!.......wd..h| +peer1.org2.example.com | [2260 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1e94 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d7c 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 fa bb 2b 6b f5 ff 40 df 80 d8 85 d8 9c 3d 26 f7 |..+k..@......=&.| +peer1.org2.example.com | [2261 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e95 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d7d 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 d2 17 58 d2 30 02 20 59 01 bd f7 32 fb ff bf 1e |..X.0. Y...2....| +peer1.org2.example.com | [2262 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e96 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d7e 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 bd 42 88 ab b2 85 25 98 a3 b4 22 9a 9c 90 a4 e0 |.B....%...".....| +peer1.org2.example.com | [2263 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e97 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d7f 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 37 3a 31 b1 9c 17 e8 |7:1....| +peer1.org2.example.com | [2264 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e98 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d80 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f1a 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2265 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e99 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d81 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f1b 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2266 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e9a 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d82 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f1c 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2267 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e9b 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d83 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [1f1d 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2268 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e9c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1d84 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f1e 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2269 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e9d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d85 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f1f 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [226a 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e9e 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d86 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f20 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [226b 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ebd60 gate 1574140952245109600 evaluation starts +peer0.org1.example.com | [1e9f 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1d87 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f21 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [226c 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ebd60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ea0 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d88 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f22 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [226d 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ebd60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1ea1 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d89 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f23 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [226e 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ebd60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1ea2 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d8a 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1f24 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [226f 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ebd60 principal evaluation fails +peer1.org1.example.com | [1d8b 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23150 gate 1574140950375018900 evaluation starts +peer0.org1.example.com | [1ea3 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f25 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2270 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ebd60 gate 1574140952245109600 evaluation fails +peer1.org1.example.com | [1d8c 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23150 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ea4 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [1f26 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2271 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d8d 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23150 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1ea5 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f28 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2272 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d8e 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23150 principal matched by identity 0 +peer0.org1.example.com | [1ea6 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1f29 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2273 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1d8f 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 cc dc 57 81 e1 20 71 52 37 78 d1 0e e6 41 c3 |...W.. qR7x...A.| +peer0.org1.example.com | [1ea7 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f27 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2274 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046022d0 gate 1574140952247562500 evaluation starts +peer1.org1.example.com | 00000010 9a 7b 35 89 ee fc bc a2 91 49 e0 f5 56 a3 25 cf |.{5......I..V.%.| +peer0.org1.example.com | [1ea8 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1f2a 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2275 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046022d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ea9 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d90 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 3c 30 6a b8 1e de 79 66 49 3e 54 |0D. 7<0j...yfI>T| +peer0.org2.example.com | [1f2b 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2276 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046022d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1eaa 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 a4 63 47 ff 7c 55 66 d5 56 4e ce e4 26 9b 41 e7 |.cG.|Uf.VN..&.A.| +peer0.org2.example.com | [1f2c 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2277 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046022d0 principal matched by identity 0 +peer0.org1.example.com | [1eab 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 3a ee 77 8c 02 20 42 d4 d2 63 98 2a 38 19 57 30 |:.w.. B..c.*8.W0| +peer1.org2.example.com | [2278 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [1f2d 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1eac 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 c2 1b da 8b 49 1a 95 62 dd 8f 3c ad 57 04 6d 70 |....I..b..<.W.mp| +peer1.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | 00000040 32 53 32 7a 0b 45 |2S2z.E| +peer0.org2.example.com | [1f2e 11-19 05:22:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ead 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2279 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1d91 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23150 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f2f 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1eae 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1d92 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23150 gate 1574140950375018900 evaluation succeeds +peer0.org2.example.com | [1f30 11-19 05:22:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eaf 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1d93 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f31 11-19 05:22:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1eb0 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1d94 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f32 11-19 05:22:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eb1 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1d95 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f33 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [1eb2 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [227a 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046022d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d96 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f34 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1eb3 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [227b 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046022d0 gate 1574140952247562500 evaluation succeeds +peer1.org1.example.com | [1d97 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f35 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d98 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1eb4 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [227c 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f36 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f37 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1eb5 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [227d 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1d99 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1f38 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1eb6 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d9a 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [227e 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f39 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1eb7 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d9b 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [227f 11-19 05:22:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f3a 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1eb8 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d9c 11-19 05:22:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2280 11-19 05:22:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [1f3b 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1eb9 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d9d 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [1f3c 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1eba 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d9e 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2281 11-19 05:22:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [1f3d 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d9f 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ebb 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [1f3e 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1da0 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ebc 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [1f3f 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685680 gate 1574140945776932300 evaluation starts +peer1.org1.example.com | [1da1 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ebd 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151020 +peer1.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [1f40 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685680 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1da2 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ebe 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FF398E060DB645EF9756A038D0C9FA3F8844B5AFEFBD61F602A1EB43E032304 +peer1.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [1f41 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685680 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1da3 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ebf 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2282 11-19 05:22:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f42 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1da4 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec0 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2283 11-19 05:22:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f43 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685680 principal evaluation fails +peer1.org1.example.com | [1da5 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1ec1 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [2284 11-19 05:22:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f44 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685680 gate 1574140945776932300 evaluation fails +peer1.org1.example.com | [1da6 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec2 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\320>\254M\034\377\271\207\025\273#u" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2285 11-19 05:22:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f45 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1da7 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec3 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2286 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f46 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1da8 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1ec4 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2287 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f47 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1da9 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ec5 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2288 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f48 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685bf0 gate 1574140945777434600 evaluation starts +peer1.org1.example.com | [1daa 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ec6 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2289 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f49 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1dab 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ec7 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [228a 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [1f4a 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685bf0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1dac 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ec8 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [228b 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f4b 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685bf0 principal matched by identity 0 +peer1.org1.example.com | [1dad 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ec9 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\320>\254M\034\377\271\207\025\273#u" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [228c 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [1f4c 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 7d d9 69 99 26 6d 9b f9 e2 cd e4 c1 43 12 8d |.}.i.&m......C..| +peer1.org1.example.com | [1dae 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1eca 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [228d 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 7a bc 34 1b e3 01 c1 e5 f3 dd 1a 2d 93 a5 cd 2d |z.4........-...-| +peer1.org1.example.com | [1daf 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ecb 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [228e 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [1db0 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f4d 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cc 3e f1 56 1b ea 6a 4c f1 5f |0E.!...>.V..jL._| +peer0.org1.example.com | [1ecc 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | MIICDjCCAbSgAwIBAgIRAN+s1O7GI0UOMZvmoXtLQ1YwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [1db1 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 3a ee a4 0a 56 75 00 9d 5c c5 89 1c eb e7 c3 2c |:...Vu..\......,| +peer0.org1.example.com | [1ecd 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [1db2 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 e3 ca 46 84 ac 02 20 53 f3 a7 5b e3 78 dc 91 cf |..F... S..[.x...| +peer0.org1.example.com | [1ece 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [1db3 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 5c e2 40 72 f1 02 50 4e 50 ca f6 4e 9b 89 d4 28 |\.@r..PNP..N...(| +peer0.org1.example.com | [1ecf 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +peer0.org2.example.com | 00000040 17 dd b8 ca aa 68 ca |.....h.| +peer1.org1.example.com | [1db4 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ed0 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [1f4e 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685bf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1db5 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ed1 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org2.example.com | [1f4f 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004685bf0 gate 1574140945777434600 evaluation succeeds +peer1.org1.example.com | [1db6 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1ed2 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer1.org2.example.com | CCqGSM49AwEHA0IABLwiaJeJ09sTdw1MBVFS4IREZVAH8wN2uMKkrIa8umfpr/In +peer0.org2.example.com | [1f50 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1db7 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151026 +peer0.org1.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer1.org2.example.com | RebO70d5f9RXjMamMvpVELq15f/FJggdIovxyjijTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org2.example.com | [1f51 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1db8 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D3E43087865FD101BCE09A62F0C5660F24876E3D0999E71D247C6E7448BCF0D7 +peer0.org1.example.com | [1ed3 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer1.org2.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org2.example.com | [1f52 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1db9 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer1.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQCaK9TwZhkZlKcM6m+SNiI0 +peer0.org2.example.com | [1f53 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1dba 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer1.org2.example.com | E0GWKJ8reffQGfFs/3HOTwIgagYUi0kZAQPl5hFBQns2vt2nCPA+hmOrUD0pfqND +peer0.org2.example.com | [1f54 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dbb 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer1.org2.example.com | 93Q= +peer0.org2.example.com | [1f55 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1dbc 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [1f56 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1dbd 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ed4 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [228f 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603910 gate 1574140952707429500 evaluation starts +peer0.org2.example.com | [1f57 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1dbe 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [2290 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f58 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1dbf 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ed5 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 6d 81 c9 9a e4 26 6d 7c 3f 04 |0E.!..m....&m|?.| +peer1.org2.example.com | [2291 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603910 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1f59 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc0 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000010 27 22 20 f4 09 f6 2c a7 1f 1f 8c 0a b5 66 ba 71 |'" ...,......f.q| +peer1.org2.example.com | [2292 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org2.example.com | [1f5a 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc1 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000020 1f fd 1a 14 00 02 20 49 74 3d 54 4a 26 18 87 24 |...... It=TJ&..$| +peer1.org2.example.com | [2293 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [1f5b 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc2 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 38 5d e6 63 d8 67 f6 f3 72 89 3e d0 3e ac 4d 1c |8].c.g..r.>.>.M.| +peer1.org2.example.com | [2294 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603910 principal matched by identity 0 +peer0.org2.example.com | [1f5c 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc3 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000040 ff b9 87 15 bb 23 75 |.....#u| +peer1.org2.example.com | [2295 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 0d 36 5c c2 99 17 5c 05 c5 bc 28 a1 0a dc 0e |..6\...\...(....| +peer0.org2.example.com | [1f5d 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc4 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 a9 d9 9a 1d 15 76 b5 14 9a aa c7 7d a4 05 ce 06 |.....v.....}....| +peer0.org1.example.com | [1ed6 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1f5e 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc5 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2296 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 89 09 0c 4c a8 6d 1e de 3e e6 |0E.!.....L.m..>.| +peer0.org1.example.com | [1ed7 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1f5f 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc6 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 e7 6f 22 2e 6f 80 73 b1 b4 c5 65 0e 30 cc a7 bc |.o".o.s...e.0...| +peer0.org1.example.com | [1ed8 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f60 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc7 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 2f 42 63 5f f7 02 20 0e ee b7 c2 40 91 2c 1a 49 |/Bc_.. ....@.,.I| +peer0.org1.example.com | [1ed9 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f61 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc8 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 c7 26 e6 15 a7 74 3b f4 9c eb d5 b9 c9 a9 1f 06 |.&...t;.........| +peer0.org1.example.com | [1eda 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f62 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc9 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 a8 55 af 77 b4 6a dc |.U.w.j.| +peer0.org1.example.com | [1edb 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f63 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1dca 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2297 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603910 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1edc 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f64 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dcb 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2298 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603910 gate 1574140952707429500 evaluation succeeds +peer0.org1.example.com | [1edd 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f65 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1dcc 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [2299 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [1ede 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1f66 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dcd 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [229a 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [1edf 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer0.org2.example.com | [1f67 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dce 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [229b 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer0.org2.example.com | [1f68 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dcf 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [229c 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [1ee0 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer0.org2.example.com | [1f69 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dd0 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [229d 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer0.org2.example.com | [1f6a 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [229e 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org1.example.com | [1dd1 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer0.org2.example.com | [1f6b 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [229f 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dd2 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e4 30 87 86 5f d1 01 bc e0 9a 62 f0 c5 66 0f |..0.._.....b..f.| +peer0.org1.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer0.org2.example.com | [1f6c 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [22a0 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | 00000010 24 87 6e 3d 09 99 e7 1d 24 7c 6e 74 48 bc f0 d7 |$.n=....$|ntH...| +peer0.org1.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer0.org2.example.com | [1f6d 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22a1 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org1.example.com | [1dd3 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 ed 6c cd e1 53 cb 09 94 a1 4a bd |0D. '.l..S....J.| +peer0.org1.example.com | [1ee1 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f6e 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [22a2 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | 00000010 51 7c 17 78 79 07 bd 93 bd bd d1 ed 3c 2f fd 0a |Q|.xy....... DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f6f 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22a3 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer1.org1.example.com | 00000020 f7 c7 bc b6 02 20 19 e7 0c 56 ce 6b 98 5e 56 37 |..... ...V.k.^V7| +peer0.org1.example.com | [1ee3 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f70 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [22a4 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org1.example.com | 00000030 5f ad 34 af 1f b5 87 c3 74 aa e6 f8 83 38 26 58 |_.4.....t....8&X| +peer0.org1.example.com | [1ee4 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f71 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22a5 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org1.example.com | 00000040 eb 83 a1 96 30 fb |....0.| +peer0.org1.example.com | [1ee5 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f72 11-19 05:22:25.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [22a6 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer1.org1.example.com | [1dd4 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ee6 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f73 11-19 05:22:25.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151021 +peer1.org2.example.com | [22a7 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org1.example.com | [1dd5 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ee7 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f74 11-19 05:22:25.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 983D1D4C32AF1552CAA63E454B5E9257BC4BCCFB15732B2E00E51067CEA30CE3 +peer1.org2.example.com | [22a8 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [1dd6 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ee8 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f75 11-19 05:22:25.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [22a9 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004572900 env 0xc00463a690 txn 0 +peer1.org1.example.com | [1dd7 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ee9 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [1f76 11-19 05:22:25.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [22aa 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00463a690 +peer1.org1.example.com | [1dd8 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eea 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer0.org2.example.com | [1f77 11-19 05:22:25.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [22ab 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +peer1.org1.example.com | [1dd9 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer0.org2.example.com | [1f78 11-19 05:22:25.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [22ac 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [1dda 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1eeb 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer0.org2.example.com | [1f79 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22ad 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [1ddb 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer0.org2.example.com | [1f7a 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22ae 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [1ddc 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer0.org2.example.com | [1f7b 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22af 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ddd 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer0.org2.example.com | [1f7c 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [22b0 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [1dde 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer0.org2.example.com | [1f7d 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [1ddf 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1eec 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f7e 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [1de0 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1eed 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f7f 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [1de1 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1eee 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f80 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [1de2 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f448e0 gate 1574140950833166400 evaluation starts +peer0.org1.example.com | [1eef 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f81 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [1de3 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f448e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ef0 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f82 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | [1de4 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f448e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1ef1 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f83 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org1.example.com | [1de5 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f448e0 principal matched by identity 0 +peer0.org1.example.com | [1ef2 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1f84 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer1.org1.example.com | [1de6 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 ac df e1 3e fa 6a 10 1c 43 e3 dd 09 00 d2 8f |G...>.j..C......| +peer0.org1.example.com | [1ef3 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f85 11-19 05:22:25.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | 00000010 1f 9a c7 2b ef cd 44 cc 44 cf f7 f3 8e fa 6a 4e |...+..D.D.....jN| +peer0.org1.example.com | [1ef4 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f86 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer1.org1.example.com | [1de7 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 69 e4 bc 09 64 39 d0 2d 93 7f 64 |0D. ]i...d9.-..d| +peer0.org1.example.com | [1ef5 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f87 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer1.org1.example.com | 00000010 45 dc 9c 77 21 09 bf 79 05 46 d3 99 9b 98 59 a6 |E..w!..y.F....Y.| +peer0.org1.example.com | [1ef6 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ef7 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer1.org1.example.com | 00000020 82 ad 78 26 02 20 38 20 f1 58 d2 be 62 84 23 fe |..x&. 8 .X..b.#.| +peer0.org1.example.com | [1ef8 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [1f88 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 02 53 af 51 7c fc b0 b7 ec 6b 5c d2 ac 3d a0 5a |.S.Q|....k\..=.Z| +peer0.org1.example.com | [1ef9 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [22b1 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org2.example.com | [1f89 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | 00000040 41 d6 08 6e d7 63 |A..n.c| +peer0.org1.example.com | [1efa 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [22b2 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [1f8a 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 3d 1d 4c 32 af 15 52 ca a6 3e 45 4b 5e 92 57 |.=.L2..R..>EK^.W| +peer1.org1.example.com | [1de8 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f448e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1efb 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22b3 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | 00000010 bc 4b cc fb 15 73 2b 2e 00 e5 10 67 ce a3 0c e3 |.K...s+....g....| +peer1.org1.example.com | [1de9 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f448e0 gate 1574140950833166400 evaluation succeeds +peer0.org1.example.com | [1efc 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22b4 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [1f8b 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 1f 0d 29 0e 9b ff 6f b6 8f 0e |0E.!....)...o...| +peer1.org1.example.com | [1dea 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1efd 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22b5 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +peer0.org2.example.com | 00000010 60 0b 76 28 11 58 af 03 e1 bf b4 9f 9f 34 f6 52 |`.v(.X.......4.R| +peer0.org1.example.com | [1efe 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1deb 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +peer0.org2.example.com | 00000020 e6 6d 13 60 0b 02 20 40 da 86 7a e7 8d b9 1c 61 |.m.`.. @..z....a| +peer0.org1.example.com | [1eff 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dec 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [22b6 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +peer0.org2.example.com | 00000030 ad d4 98 90 fc bc 86 d3 2d a7 ad 9f 6c d7 9c 77 |........-...l..w| +peer0.org1.example.com | [1f00 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f01 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f02 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f03 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f04 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 gate 1574140947313249400 evaluation starts +peer0.org1.example.com | [1f05 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f06 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1f07 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 principal matched by identity 0 +peer0.org1.example.com | [1f08 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org1.example.com | [1f09 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org1.example.com | [1f0a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f0b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 gate 1574140947313249400 evaluation succeeds +peer0.org1.example.com | [1f0c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f0d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f0e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f0f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f10 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [1f11 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [1f12 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f13 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f14 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ded 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f15 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dee 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 8b fe c1 b5 ad ba e0 |.......| +peer1.org2.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +peer0.org1.example.com | [1f16 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1def 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1f8c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +peer0.org1.example.com | [1f17 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1df0 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1f8d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +peer0.org1.example.com | [1f18 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1df1 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1f8e 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR| +peer0.org1.example.com | [1f19 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1df2 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1f8f 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [22b7 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [1f1a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 gate 1574140947314467600 evaluation starts +peer1.org1.example.com | [1df3 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f90 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22b8 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004638a80, header channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +peer0.org1.example.com | [1f1b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1df4 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f91 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22b9 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [1f1c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1df5 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f92 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22ba 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [1f1d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 principal matched by identity 0 +peer1.org1.example.com | [1df6 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f93 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22bb 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [1f1e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1df7 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f94 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22bc 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1df8 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f95 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22bd 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +peer0.org1.example.com | [1f1f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1df9 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f96 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [22be 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [1dfa 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f97 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22bf 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004648000 +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [1dfb 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22c0 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f98 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [1dfc 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [22c1 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f99 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1dfd 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22c2 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f9a 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f20 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1dfe 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22c3 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f9b 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1f21 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 gate 1574140947314467600 evaluation succeeds +peer1.org1.example.com | [1dff 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1f9c 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22c4 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f22 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e00 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f9d 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [22c5 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f23 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e02 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f9e 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22c6 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [1f24 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e01 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f9f 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22c7 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3dc0dcf4-784e-494a-bd6f-894eb0ae1c10] +peer0.org1.example.com | [1f25 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e03 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa0 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [22c8 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3dc0dcf4-784e-494a-bd6f-894eb0ae1c10] +peer0.org1.example.com | [1f26 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1e04 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fa1 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [22c9 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 gate 1574140952733936500 evaluation starts +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1e05 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fa2 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [22ca 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f27 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1e06 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa3 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f6ec0 gate 1574140946849430300 evaluation starts +peer1.org2.example.com | [22cb 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1e07 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fa4 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f6ec0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22cc 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 principal matched by identity 0 +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1e08 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa5 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f6ec0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [22cd 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 68 1c ad b4 bb c1 55 d5 00 b1 31 73 81 e6 77 |.h.....U...1s..w| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1e09 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fa6 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f6ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000010 13 bb 9b 26 85 b6 a1 2a 9b 2a 9e ae d6 7f 89 36 |...&...*.*.....6| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1e0a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa7 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f6ec0 principal evaluation fails +peer1.org2.example.com | [22ce 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a9 11 75 e6 b6 d8 fc 3f dc e6 f1 |0D. $..u....?...| +peer0.org1.example.com | [1f28 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e0b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fa8 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f6ec0 gate 1574140946849430300 evaluation fails +peer1.org2.example.com | 00000010 05 18 53 bd 79 20 d0 5e 12 b1 96 67 4f 41 cc 77 |..S.y .^...gOA.w| +peer0.org1.example.com | [1f29 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e0c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa9 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 d2 c8 ab 9d 02 20 0f d1 40 05 e3 ff 8b ab b4 77 |..... ..@......w| +peer0.org1.example.com | [1f2a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [1faa 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e0d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 0b 32 e1 20 48 7e 06 ea 74 97 31 23 a3 14 40 56 |.2. H~..t.1#..@V| +peer0.org1.example.com | [1f2b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fab 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1e0e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 b8 2d a4 d4 aa 2c |.-...,| +peer0.org1.example.com | [1f2c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fac 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f7430 gate 1574140946849702500 evaluation starts +peer1.org1.example.com | [1e0f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [22cf 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f2d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fad 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f7430 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e10 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [22d0 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [1fae 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f7430 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1f2e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e11 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer1.org2.example.com | [22d1 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 skipping identity 0 because it has already been used +peer0.org2.example.com | [1faf 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f7430 principal matched by identity 0 +peer0.org1.example.com | [1f2f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer1.org2.example.com | [22d2 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 principal evaluation fails +peer0.org2.example.com | [1fb0 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer0.org1.example.com | [1f30 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e12 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer1.org2.example.com | [22d3 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cbd0 gate 1574140952733936500 evaluation succeeds +peer0.org2.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer0.org1.example.com | [1f31 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer1.org2.example.com | [22d4 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org2.example.com | [1fb1 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer0.org1.example.com | [1f32 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer1.org2.example.com | [22d5 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org2.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer0.org1.example.com | [1f33 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer1.org2.example.com | [22d6 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org2.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer0.org1.example.com | [1f34 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 gate 1574140947315749200 evaluation starts +peer1.org1.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer1.org2.example.com | [22d7 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer0.org2.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer0.org1.example.com | [1f35 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e13 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [22d8 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer0.org2.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer0.org1.example.com | [1f36 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [22d9 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ac4b3543-025f-4dd9-ad5b-57ef930d868c] +peer0.org2.example.com | [1fb2 11-19 05:22:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f7430 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f37 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 principal matched by identity 0 +peer1.org1.example.com | [1e14 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 c3 c8 0e 4c ab 0d 76 8e 80 e3 e3 |0D. C...L..v....| +peer1.org2.example.com | [22da 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [1fb3 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f7430 gate 1574140946849702500 evaluation succeeds +peer0.org1.example.com | [1f38 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | 00000010 a7 f4 27 58 7f d7 b8 97 dd 27 ea f5 ae 7b 66 1f |..'X.....'...{f.| +peer1.org2.example.com | [22db 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ac4b3543-025f-4dd9-ad5b-57ef930d868c] +peer0.org2.example.com | [1fb4 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | 00000020 5a 4d b0 31 02 20 42 d6 0c 5f d7 0e bf 0c a5 af |ZM.1. B.._......| +peer1.org2.example.com | [22dc 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer0.org2.example.com | [1fb5 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1f39 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000030 30 e7 08 1b d8 b0 b0 bc 13 d8 35 fb b6 a2 0b c6 |0.........5.....| +peer1.org2.example.com | [22dd 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [72b66a27-e640-49b4-a442-8cd89d498e2c] +peer0.org2.example.com | [1fb6 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | 00000040 c5 6e b2 28 42 a9 |.n.(B.| +peer1.org2.example.com | [22de 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [1e15 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1fb7 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22df 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [72b66a27-e640-49b4-a442-8cd89d498e2c] +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [1e16 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [1fb8 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [22e0 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 gate 1574140952749921800 evaluation starts +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1e17 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1fb9 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [22e1 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f3a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1e18 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1fba 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [22e2 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1f3b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 gate 1574140947315749200 evaluation succeeds +peer1.org1.example.com | [1e19 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1fbb 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [22e3 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [1f3c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e1a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fbc 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [22e4 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [1f3d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e1b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fbd 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22e5 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [1f3e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e1c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fbe 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22e6 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1f3f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e1d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [1fbf 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22e7 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [1f40 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [1e1e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fc0 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [22e8 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [1e1f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fc1 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22e9 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 principal matched by identity 0 +peer0.org1.example.com | [1f41 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [1e20 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1fc2 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22ea 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1e21 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1fc3 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [1e22 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fc4 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [22eb 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1e23 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fc5 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > alive: alive: alive: +peer1.org2.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [1e24 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fc6 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +peer0.org1.example.com | [1f42 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1e25 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fc7 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1e26 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fc8 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR| +peer0.org1.example.com | [1f43 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1e27 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fc9 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22ec 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1e28 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fca 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22ed 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1fcb 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e29 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [22ee 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 skipping identity 0 because it has already been used +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1fcc 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e2a 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [22ef 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 principal evaluation fails +peer0.org2.example.com | [1fcd 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e2b 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f44 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22f0 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465db20 gate 1574140952749921800 evaluation succeeds +peer0.org2.example.com | [1fce 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e2c 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f45 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22f1 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org2.example.com | [1fcf 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [1e2d 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f46 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [22f2 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b appears to be valid +peer0.org2.example.com | [1fd0 11-19 05:22:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e2e 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f47 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22f3 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004648000 +peer0.org2.example.com | [1fd1 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\226\200\371" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e2f 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f48 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22f4 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004572900 env 0xc00463a690 txn 0 +peer0.org2.example.com | [1fd2 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e30 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f49 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [22f5 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [1e31 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [1fd3 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\226\200\371" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f4a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [22f6 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 42ms +peer1.org1.example.com | [1e32 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fd4 11-19 05:22:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1f4b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [22f7 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [1e33 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fd5 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer0.org1.example.com | [1f4c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 gate 1574140947317056500 evaluation starts +peer1.org2.example.com | [22f8 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [1e34 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer0.org1.example.com | [1f4d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22f9 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org1.example.com | [1e35 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [1fd6 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer0.org1.example.com | [1f4e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [22fa 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [1e36 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer0.org1.example.com | [1f4f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 principal matched by identity 0 +peer1.org2.example.com | [22fb 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [1e37 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer0.org1.example.com | [1f50 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [22fc 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [1e38 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [22fd 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer1.org1.example.com | [1e39 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer0.org1.example.com | [1f51 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [22fe 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [1e3a 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fd7 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [22ff 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org1.example.com | [1e3b 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [2300 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [1e3c 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fd8 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 79 99 af 5a 0d 54 9c 45 31 24 8e |0D. gy..Z.T.E1$.| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [2301 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer1.org1.example.com | [1e3d 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 c2 76 62 07 48 91 af 23 8d ce c4 20 57 34 11 cc |.vb.H..#... W4..| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [2302 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] marked as valid by state validator +peer1.org1.example.com | [1e3e 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 0e f2 ed c0 02 20 08 0a 6e 5c 97 30 94 be d0 3b |..... ..n\.0...;| +peer0.org1.example.com | [1f52 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2303 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004573d80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004573dc0), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc004573e00)} +peer1.org1.example.com | [1e3f 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 84 8d 18 ba 47 ed 07 41 ef c7 71 8a a4 23 b7 31 |....G..A..q..#.1| +peer0.org1.example.com | [1f53 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 gate 1574140947317056500 evaluation succeeds +peer1.org2.example.com | [2304 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [1e40 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000040 01 9e 4f 6c 47 82 |..OlG.| +peer0.org1.example.com | [1f54 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2305 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [1e41 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1fd9 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1f55 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2306 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [1e42 11-19 05:22:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1fda 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1f56 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2307 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc00467fd10)}} +peer0.org2.example.com | [1fdb 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e43 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030216e0 gate 1574140951460028400 evaluation starts +peer0.org1.example.com | [1f57 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2308 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer0.org2.example.com | [1fdc 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1e44 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030216e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f58 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2309 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org2.example.com | [1fdd 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1e45 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030216e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1f59 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [230a 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org2.example.com | [1fde 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e46 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030216e0 principal matched by identity 0 +peer0.org1.example.com | [1f5a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [230b 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org2.example.com | [1fdf 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e47 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer0.org1.example.com | [1f5b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [230c 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer0.org2.example.com | [1fe0 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [230d 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org2.example.com | [1fe1 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [1e48 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer0.org1.example.com | [1f5c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [230e 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer0.org2.example.com | [1fe2 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [230f 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [1fe3 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [1fe4 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2310 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 78 102 48 116 47 73 97 110 78 52 83 84 110 47 74 99 90 52 75 86 99 56 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 119 79 84 73 48 77 68 65 49 79 84 65 119 87 104 99 78 77 106 107 119 79 84 73 120 77 68 65 49 79 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 65 116 51 73 56 50 72 52 50 66 114 10 83 47 52 109 68 69 103 111 73 71 49 115 86 86 97 73 72 82 48 116 47 99 110 53 113 106 50 115 57 116 72 70 108 88 49 88 114 103 112 53 121 72 119 55 110 90 107 73 103 66 105 70 114 50 87 110 87 119 49 83 84 73 106 56 10 100 118 106 105 53 101 122 47 100 98 43 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 73 53 114 108 100 66 47 51 50 78 78 121 108 43 73 98 56 53 53 52 85 71 86 67 68 99 72 88 101 78 78 73 110 83 66 110 88 88 67 122 76 84 85 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 70 50 121 56 69 87 104 49 79 118 69 99 101 121 84 68 71 71 70 114 100 78 119 47 118 106 49 65 86 51 52 105 82 76 57 102 66 57 78 80 72 57 55 65 105 65 52 70 89 114 81 10 115 122 57 106 106 56 74 50 69 111 118 79 121 111 49 113 118 84 73 107 97 113 82 109 89 116 67 120 86 114 101 105 52 73 87 43 105 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 123 134 205 91 127 19 119 223 142 95 33 89 88 139 160 240 169 174 39 73 196 39 205 206 19 243 42 163 78 92 145 113 2 32 67 229 109 135 57 220 108 162 175 85 117 255 116 194 119 34 166 128 238 123 94 203 64 153 249 248 8 104 176 61 166 5]} 0x152c9b0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0027f8210 0xc0027630e0 {{0 0} 0 0 0 0} {false}})]} +peer1.org1.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [1fe5 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\226\200\371" secret_envelope: > alive: +peer1.org2.example.com | [2311 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [1fe6 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2312 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0004c2040})} +peer1.org1.example.com | [1e49 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030216e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f5d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [1fe7 11-19 05:22:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2313 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org1.example.com | [1e4a 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030216e0 gate 1574140951460028400 evaluation succeeds +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [1fe8 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2314 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org1.example.com | [1e4b 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f5e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [1fe9 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2315 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org1.example.com | [1e4c 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [1fea 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2316 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org1.example.com | [1e4d 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [1feb 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2317 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xaf, 0xe8, 0x73, 0x33, 0x36, 0xd, 0xf9, 0x12, 0x19, 0x79, 0xd, 0x24, 0x42, 0x5b, 0x7d, 0xa9, 0x98, 0xab, 0xce, 0xdc, 0x98, 0x36, 0x45, 0x6e, 0x26, 0x2b, 0x86, 0x76, 0x6a, 0x37, 0x47, 0x75} txOffsets= +peer1.org1.example.com | [1e4e 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [1fec 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | txId=afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b locPointer=offset=70, bytesLength=3516 +peer1.org1.example.com | [1e4f 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [1fed 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | ] +peer1.org1.example.com | [1e50 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1f5f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fee 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2318 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to txid-index +peer1.org1.example.com | [1e51 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1f60 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fef 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2319 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx number:[0] ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to blockNumTranNum index +peer1.org1.example.com | [1e52 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1f61 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [231a 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81397], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org2.example.com | [1ff0 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e53 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [231b 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org1.example.com | [1f62 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ff1 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e54 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [231c 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org1.example.com | [1f63 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ff2 11-19 05:22:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e55 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [231d 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org1.example.com | [1f64 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ff3 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e56 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [231e 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [1f65 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ff4 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e57 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org2.example.com | [231f 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [1f66 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ff5 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [1e58 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2320 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [1f67 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 gate 1574140947318550900 evaluation starts +peer0.org2.example.com | [1ff6 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e59 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2321 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [1f68 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ff7 11-19 05:22:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [1e5a 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2322 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [1f69 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [1ff8 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e5b 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2323 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [1f6a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 principal matched by identity 0 +peer0.org2.example.com | [1ff9 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1e5c 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2324 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org1.example.com | [1f6b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [1ffa 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e5d 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2325 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [1ffb 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1e5e 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2326 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer0.org1.example.com | [1f6c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [1ffc 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e5f 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2327 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8c549594-363c-4b4d-a284-b51a218e06a9] +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [1ffd 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e60 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2328 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [1ffe 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e61 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2329 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [1fff 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e62 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [232a 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [2000 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e63 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [232b 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8c549594-363c-4b4d-a284-b51a218e06a9] +peer0.org1.example.com | [1f6d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2001 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e64 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [232c 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer0.org1.example.com | [1f6e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 gate 1574140947318550900 evaluation succeeds +peer0.org2.example.com | [2002 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e66 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [232d 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1f6f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2003 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e65 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [232e 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E49FD3F4FE999EEC15...08031A0C0A0565787030321203312E30 +peer0.org1.example.com | [1f70 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2004 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e67 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [232f 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA5298887885AC33A118FECABA764CFB7EDFA16EB60068DB8ADD1902AE1728C6 +peer0.org1.example.com | [1f71 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2005 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e68 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [2330 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [1f72 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2006 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e69 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [2331 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer0.org1.example.com | [1f73 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2007 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e6a 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2332 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [1f74 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2008 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2009 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2333 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer0.org1.example.com | [1f75 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [200a 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e6b 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2334 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer0.org1.example.com | [1f76 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [200b 11-19 05:22:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e6c 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2335 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer0.org1.example.com | [1f77 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [200c 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1e6d 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2336 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer0.org1.example.com | [1f78 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [200d 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151022 +peer1.org1.example.com | [1e6e 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2337 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 41ms (state_validation=9ms block_and_pvtdata_commit=19ms state_commit=9ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer0.org1.example.com | [1f79 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [200e 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E91688C334F02EB24FFBEB2E893198AB05F1A7BAC41CF00FDD77000D29848AEC +peer1.org1.example.com | [1e6f 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [2338 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1f7a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [200f 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1e70 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2339 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E49FD3F4FE999EEC15...08041A0C0A0565787030321203312E30 +peer0.org1.example.com | [1f7b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 gate 1574140947319340900 evaluation starts +peer1.org1.example.com | [1e71 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [233a 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DFDF15FE6FA0AB7DB43CDD817371D2855E06D279DD053E7B75BB4D0DB06E6417 +peer0.org1.example.com | [1f7c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e72 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2010 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [233b 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org1.example.com | [1f7d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1e73 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [233c 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2011 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [1f7e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 principal matched by identity 0 +peer1.org1.example.com | [1e74 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848fa0 gate 1574140951639014600 evaluation starts +peer1.org2.example.com | [233d 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2012 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f7f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [1e75 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848fa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [233e 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2013 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [1e76 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848fa0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [233f 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2014 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f80 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [1e77 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848fa0 principal matched by identity 0 +peer1.org2.example.com | [2340 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2015 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [1e78 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [2341 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2016 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [2342 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2017 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1e79 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [2343 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2018 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [2344 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2019 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f81 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [2345 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [201a 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f82 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 gate 1574140947319340900 evaluation succeeds +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [2346 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [201b 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f83 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [2347 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004679d50 gate 1574140954770629700 evaluation starts +peer0.org2.example.com | [201c 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e7a 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848fa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f84 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2348 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004679d50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [201d 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e7b 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003848fa0 gate 1574140951639014600 evaluation succeeds +peer0.org1.example.com | [1f85 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2349 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004679d50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [201e 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e7c 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f86 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [234a 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004679d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [201f 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e7d 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f87 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [234b 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004679d50 principal evaluation fails +peer0.org2.example.com | [2020 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1e7e 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f88 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [234c 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004679d50 gate 1574140954770629700 evaluation fails +peer0.org2.example.com | [2021 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 16 88 c3 34 f0 2e b2 4f fb eb 2e 89 31 98 ab |....4...O....1..| +peer1.org1.example.com | [1e7f 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f89 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [234d 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 05 f1 a7 ba c4 1c f0 0f dd 77 00 0d 29 84 8a ec |.........w..)...| +peer1.org1.example.com | [1e80 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [1f8a 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [234e 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2022 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 00 8f 9f bc aa 50 5e 3b 0c d0 |0E.!.......P^;..| +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [1f8b 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [234f 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000010 68 de 2a 21 a1 37 3f d2 fa b3 82 91 7b c8 c0 8f |h.*!.7?.....{...| +peer1.org1.example.com | [1e81 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [1f8c 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2350 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047082c0 gate 1574140954773499600 evaluation starts +peer0.org2.example.com | 00000020 2b 03 83 fe 66 02 20 71 da 64 15 61 94 c3 cf 1b |+...f. q.d.a....| +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [1f8d 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2351 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047082c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 6b 0d be b6 d9 7d a2 04 cc 3a d7 c6 26 67 89 1e |k....}...:..&g..| +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [1f8e 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2352 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047082c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000040 f4 77 3f 23 c9 6a ac |.w?#.j.| +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [1f8f 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2353 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047082c0 principal matched by identity 0 +peer0.org2.example.com | [2023 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [1f90 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2354 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 f0 c4 7c 3e 88 17 f1 a3 8e 02 c3 b4 36 af 7c |...|>........6.|| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [1f91 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [1e82 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 dd a4 e4 b8 dd d8 f7 59 6b f2 94 75 2b 47 3e 33 |.......Yk..u+G>3| +peer0.org2.example.com | [2024 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c ad 89 ed 60 08 bf 52 62 59 7f 44 |0D. l...`..RbY.D| +peer0.org1.example.com | [1f92 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [2355 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 74 6d 61 d7 92 d0 37 5c d1 7f 37 |0D. .tma...7\..7| +peer0.org2.example.com | 00000010 ad 50 5e c6 71 2b 0c e4 91 f8 a5 0e 30 99 66 c6 |.P^.q+......0.f.| +peer0.org1.example.com | [1f93 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e83 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000010 80 ea ae 9e 58 af 59 33 01 05 07 28 d5 45 ec 8e |....X.Y3...(.E..| +peer0.org2.example.com | 00000020 52 df 5c e8 02 20 5c 81 c6 71 58 3b 4d ba 85 15 |R.\.. \..qX;M...| +peer0.org1.example.com | [1f94 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000020 43 bb 26 11 02 20 55 94 b5 d2 83 b2 30 e8 0c 9d |C.&.. U.....0...| +peer0.org2.example.com | 00000030 3a fa ac c3 e6 23 8b 9f 7d f8 ce 4e af 19 c5 db |:....#..}..N....| +peer0.org1.example.com | [1f95 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | 00000040 de e9 15 0a 96 bf |......| +peer1.org2.example.com | 00000030 e8 26 0a ef 92 8f 74 4a bd 3b 42 ab 65 15 26 aa |.&....tJ.;B.e.&.| +peer0.org1.example.com | [1f96 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [2025 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | 00000040 4e 3a cb a4 63 be |N:..c.| +peer0.org1.example.com | [1f97 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [2026 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2356 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047082c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f98 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e84 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2357 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047082c0 gate 1574140954773499600 evaluation succeeds +peer0.org2.example.com | [2027 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f99 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e85 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2358 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2028 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f9a 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e86 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2359 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2029 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f9b 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e87 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [235a 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [202a 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f9c 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e88 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [235b 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [202b 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f9d 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e89 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [235c 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [202c 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1f9e 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e8a 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [235d 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [202d 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 16 88 c3 34 f0 2e b2 4f fb eb 2e 89 31 98 ab |....4...O....1..| +peer0.org1.example.com | [1f9f 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e8b 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [235e 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 05 f1 a7 ba c4 1c f0 0f dd 77 00 0d 29 84 8a ec |.........w..)...| +peer0.org1.example.com | [1fa0 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e8c 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003952e30 gate 1574140951643737000 evaluation starts +peer1.org2.example.com | [235f 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [202e 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 00 8f 9f bc aa 50 5e 3b 0c d0 |0E.!.......P^;..| +peer0.org1.example.com | [1fa1 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e8d 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003952e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2360 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | 00000010 68 de 2a 21 a1 37 3f d2 fa b3 82 91 7b c8 c0 8f |h.*!.7?.....{...| +peer0.org1.example.com | [1fa2 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e8e 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003952e30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2361 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 2b 03 83 fe 66 02 20 71 da 64 15 61 94 c3 cf 1b |+...f. q.d.a....| +peer0.org1.example.com | [1fa3 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [1e8f 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003952e30 principal matched by identity 0 +peer1.org2.example.com | [2362 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 6b 0d be b6 d9 7d a2 04 cc 3a d7 c6 26 67 89 1e |k....}...:..&g..| +peer0.org1.example.com | [1fa4 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e90 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [2363 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 f4 77 3f 23 c9 6a ac |.w?#.j.| +peer0.org1.example.com | [1fa5 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [2364 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [202f 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1fa6 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e91 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [2365 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2030 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1fa7 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [2366 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2031 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fa8 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [2367 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2032 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [1fa9 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [2368 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2033 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer0.org1.example.com | [1faa 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [2369 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer0.org1.example.com | [1fab 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 gate 1574140947467234600 evaluation starts +peer1.org1.example.com | [1e92 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003952e30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [236a 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2034 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer0.org1.example.com | [1fac 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e93 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003952e30 gate 1574140951643737000 evaluation succeeds +peer1.org2.example.com | [236b 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer0.org1.example.com | [1fad 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1e94 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [236c 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer0.org1.example.com | [1fae 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 principal matched by identity 0 +peer1.org1.example.com | [1e95 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [236d 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer0.org1.example.com | [1faf 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer1.org1.example.com | [1e96 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [236e 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer0.org1.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer1.org1.example.com | [1e97 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [236f 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2035 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1fb0 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer1.org1.example.com | [1e98 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2370 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2036 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer1.org1.example.com | [1e99 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [2371 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2037 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer1.org1.example.com | [1e9a 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2372 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2038 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer1.org1.example.com | [1e9b 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2373 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2039 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer1.org1.example.com | [1e9c 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2374 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [203a 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fb1 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2375 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e9d 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [203b 11-19 05:22:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [1fb2 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 gate 1574140947467234600 evaluation succeeds +peer1.org2.example.com | [2376 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e9e 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [203c 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 16 88 c3 34 f0 2e b2 4f fb eb 2e 89 31 98 ab |....4...O....1..| +peer0.org1.example.com | [1fb3 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2377 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e9f 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 05 f1 a7 ba c4 1c f0 0f dd 77 00 0d 29 84 8a ec |.........w..)...| +peer0.org1.example.com | [1fb4 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2378 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ea0 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [203d 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 00 8f 9f bc aa 50 5e 3b 0c d0 |0E.!.......P^;..| +peer0.org1.example.com | [1fb5 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2379 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ea1 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 68 de 2a 21 a1 37 3f d2 fa b3 82 91 7b c8 c0 8f |h.*!.7?.....{...| +peer0.org1.example.com | [1fb6 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [237a 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [1ea2 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000020 2b 03 83 fe 66 02 20 71 da 64 15 61 94 c3 cf 1b |+...f. q.d.a....| +peer0.org1.example.com | [1fb7 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [237b 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ea3 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4a210 gate 1574140951648537900 evaluation starts +peer0.org2.example.com | 00000030 6b 0d be b6 d9 7d a2 04 cc 3a d7 c6 26 67 89 1e |k....}...:..&g..| +peer0.org1.example.com | [1fb8 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [237c 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1ea4 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4a210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 f4 77 3f 23 c9 6a ac |.w?#.j.| +peer0.org1.example.com | [1fb9 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [237d 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1ea5 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4a210 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [203e 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1fba 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [237e 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ea6 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4a210 principal matched by identity 0 +peer0.org2.example.com | [203f 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1fbb 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1ea7 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [237f 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2040 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fbc 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [2380 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2041 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1fbd 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ea8 11-19 05:22:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [2381 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2042 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fbe 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [2382 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fbf 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2043 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [2383 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fc0 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2044 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [2384 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [1fc1 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2045 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [2385 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2046 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1fc2 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ea9 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4a210 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2386 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2047 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1fc3 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > alive: alive:\226\200\371" > alive:\352[\006G\\\345\323,\333]\342\311\307" > +peer1.org1.example.com | [1eaa 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4a210 gate 1574140951648537900 evaluation succeeds +peer1.org2.example.com | [2387 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2048 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1fc4 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eab 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2388 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2049 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca3d0 gate 1574140947862931800 evaluation starts +peer0.org1.example.com | [1fc5 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1eac 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2389 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [204a 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca3d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1fc6 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ead 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [238a 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [204b 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca3d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1fc7 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eae 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [238b 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [204c 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1fc8 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eaf 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [238c 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734d50 gate 1574140954866024500 evaluation starts +peer0.org2.example.com | [204d 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca3d0 principal evaluation fails +peer0.org1.example.com | [1fc9 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [238d 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734d50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [204e 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca3d0 gate 1574140947862931800 evaluation fails +peer0.org1.example.com | [1fca 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb0 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [238e 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734d50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [204f 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fcb 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [238f 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2050 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fcc 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [2390 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734d50 principal evaluation fails +peer0.org2.example.com | [2051 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1fcd 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [2391 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734d50 gate 1574140954866024500 evaluation fails +peer0.org2.example.com | [2052 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca940 gate 1574140947863199100 evaluation starts +peer0.org1.example.com | [1fce 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [2392 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2053 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1fcf 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [1eb1 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2393 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2054 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca940 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1fd0 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1eb2 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2394 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2055 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca940 principal matched by identity 0 +peer0.org1.example.com | [1fd1 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eb3 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2395 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047352c0 gate 1574140954869688500 evaluation starts +peer0.org2.example.com | [2056 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +peer0.org1.example.com | [1fd2 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2396 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047352c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1eb4 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +peer0.org1.example.com | [1fd3 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2397 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047352c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1eb5 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2057 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +peer0.org1.example.com | [1fd4 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [2398 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047352c0 principal matched by identity 0 +peer1.org1.example.com | [1eb6 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +peer0.org1.example.com | [1fd5 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2399 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer1.org1.example.com | [1eb7 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +peer0.org1.example.com | [1fd6 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer1.org1.example.com | [1eb8 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +peer0.org1.example.com | [1fd7 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [239a 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer1.org1.example.com | [1eb9 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4ba20 gate 1574140951653783300 evaluation starts +peer0.org2.example.com | 00000040 26 42 c3 02 0b 22 |&B..."| +peer0.org1.example.com | [1fd8 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer1.org1.example.com | [1eba 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4ba20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2058 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca940 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1fd9 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer1.org1.example.com | [1ebb 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4ba20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2059 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ca940 gate 1574140947863199100 evaluation succeeds +peer0.org1.example.com | [1fda 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer1.org1.example.com | [1ebc 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4ba20 principal matched by identity 0 +peer0.org2.example.com | [205a 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1fdb 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer1.org1.example.com | [1ebd 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [205b 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1fdc 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [239b 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047352c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [205c 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1fdd 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ebe 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [239c 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047352c0 gate 1574140954869688500 evaluation succeeds +peer0.org2.example.com | [205d 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1fde 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [239d 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [205e 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1fdf 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [239e 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [205f 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fe0 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [239f 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2060 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [1fe1 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a0 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2061 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +peer1.org1.example.com | [1ebf 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4ba20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1fe2 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a1 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +peer1.org1.example.com | [1ec0 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4ba20 gate 1574140951653783300 evaluation succeeds +peer0.org1.example.com | [1fe3 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23a2 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2062 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +peer1.org1.example.com | [1ec1 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fe4 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a3 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +peer1.org1.example.com | [1ec2 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fe5 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [23a4 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +peer1.org1.example.com | [1ec3 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1fe6 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23a5 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +peer1.org1.example.com | [1ec4 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1fe7 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [23a6 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 48 86 43 3e 96 80 f9 |H.C>...| +peer1.org1.example.com | [1ec5 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [1fe8 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23a7 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2063 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [1fe9 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23a8 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2064 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ec6 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org1.example.com | [1fea 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [23a9 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [2065 11-19 05:22:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org1.example.com | [1feb 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [23aa 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [2066 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fec 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23ab 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [2067 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fed 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 gate 1574140947840673100 evaluation starts +peer1.org2.example.com | [23ac 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [2068 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fee 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23ad 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ec7 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2069 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [1fef 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [23ae 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ec8 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [206a 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ff0 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 principal matched by identity 0 +peer1.org2.example.com | [23af 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ec9 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [206b 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ff1 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 16 88 c3 34 f0 2e b2 4f fb eb 2e 89 31 98 ab |....4...O....1..| +peer1.org2.example.com | [23b0 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > alive: alive:T\244cG\377|Uf\325VN\316\344&\233A\347:\356w\214\002 B\324\322c\230*8\031W0\302\033\332\213I\032\225b\335\217<\255W\004mp2S2z\013E" > +peer1.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [206c 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 05 f1 a7 ba c4 1c f0 0f dd 77 00 0d 29 84 8a ec |.........w..)...| +peer1.org2.example.com | [23b1 11-19 05:22:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer1.org1.example.com | [1eca 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [206d 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ff2 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 00 8f 9f bc aa 50 5e 3b 0c d0 |0E.!.......P^;..| +peer1.org2.example.com | [23b2 11-19 05:22:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [206e 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 68 de 2a 21 a1 37 3f d2 fa b3 82 91 7b c8 c0 8f |h.*!.7?.....{...| +peer1.org2.example.com | [23b3 11-19 05:22:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +peer1.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [206f 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 2b 03 83 fe 66 02 20 71 da 64 15 61 94 c3 cf 1b |+...f. q.d.a....| +peer1.org2.example.com | [23b4 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [2070 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000030 6b 0d be b6 d9 7d a2 04 cc 3a d7 c6 26 67 89 1e |k....}...:..&g..| +peer1.org2.example.com | [23b5 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [2071 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4750 gate 1574140947919257200 evaluation starts +peer0.org1.example.com | 00000040 f4 77 3f 23 c9 6a ac |.w?#.j.| +peer1.org2.example.com | [23b6 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 8d 96 2d 85 24 61 25 90 a1 76 bb a3 bf d1 4d |...-.$a%..v....M| +peer1.org1.example.com | [1ecb 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2072 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4750 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ff3 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 a9 b3 a5 e8 fa 2f 64 6c b9 9b ba 5f e4 58 fa 3d |...../dl..._.X.=| +peer1.org1.example.com | [1ecc 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2073 11-19 05:22:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4750 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1ff4 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 gate 1574140947840673100 evaluation succeeds +peer1.org2.example.com | [23b7 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 4e f4 11 74 3c f5 6f 81 f9 9c 11 |0D. .N..t<.o....| +peer1.org1.example.com | [1ecd 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2074 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1ff5 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 be 9c 6b 3c bf 65 ff ed ee 10 21 95 cc b1 0e ba |..k<.e....!.....| +peer1.org1.example.com | [1ece 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2075 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4750 principal evaluation fails +peer0.org1.example.com | [1ff6 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 c8 17 c3 20 02 20 5c 16 a0 ab d8 84 74 ab d9 de |... . \.....t...| +peer1.org1.example.com | [1ecf 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2076 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4750 gate 1574140947919257200 evaluation fails +peer0.org1.example.com | [1ff7 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 c3 91 71 3e c9 66 22 24 3b f2 48 19 e7 99 df fa |..q>.f"$;.H.....| +peer1.org1.example.com | [1ed0 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2077 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ff8 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 da 0e 07 a2 c9 cf |......| +peer1.org1.example.com | [1ed1 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2078 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ff9 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [23b8 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ed2 11-19 05:22:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2079 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1ffa 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [23b9 11-19 05:22:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org1.example.com | [1ed3 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040aba50 gate 1574140951660185500 evaluation starts +peer0.org2.example.com | [207a 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4cc0 gate 1574140947921885400 evaluation starts +peer0.org1.example.com | [1ffb 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1ed4 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040aba50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23ba 11-19 05:22:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer0.org2.example.com | [207b 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ffc 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1ed5 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040aba50 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [23bb 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [207c 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4cc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [1ffd 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1ed6 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040aba50 principal matched by identity 0 +peer1.org2.example.com | [23bc 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [207d 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4cc0 principal matched by identity 0 +peer0.org1.example.com | [1ffe 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ed7 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [23bd 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [207e 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 16 8e 12 24 53 5d 8a 00 ed 9f dd d1 00 73 cb |....$S].......s.| +peer0.org1.example.com | [1fff 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [23be 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 08 a2 1d 4d d5 e9 1a 3f a3 bb 47 c6 1e c2 b9 6a |...M...?..G....j| +peer0.org1.example.com | [2000 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ed8 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [23bf 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [207f 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 8a ba c9 bc 71 19 d5 48 61 b7 |0E.!......q..Ha.| +peer0.org1.example.com | [2001 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [23c0 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 b4 63 e0 cd d0 f4 a1 4e 6c 3e 92 48 4a a1 4f 4e |.c.....Nl>.HJ.ON| +peer0.org1.example.com | [2002 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [23c1 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 ef 5e 40 12 e4 02 20 01 7e e5 df 6a 9c 52 b5 38 |.^@... .~..j.R.8| +peer0.org1.example.com | [2003 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [23c2 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 9c 8f 8b cc db 00 38 15 8e 81 b2 b4 a9 d1 83 43 |......8........C| +peer0.org1.example.com | [2004 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [23c3 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 14 12 ad a2 f2 d6 df |.......| +peer0.org1.example.com | [2005 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ed9 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040aba50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [23c4 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2080 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4cc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2006 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > alive: alive:\226\200\371" > alive:\352[\006G\\\345\323,\333]\342\311\307" > +peer1.org1.example.com | [1eda 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040aba50 gate 1574140951660185500 evaluation succeeds +peer1.org2.example.com | [23c5 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2081 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e4cc0 gate 1574140947921885400 evaluation succeeds +peer0.org1.example.com | [2007 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1edb 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23c6 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2082 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2008 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1edc 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23c7 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2083 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2009 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1edd 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23c8 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2084 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [200a 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ede 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [23c9 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476cdc0 gate 1574140955344591200 evaluation starts +peer0.org2.example.com | [2085 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [200b 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1edf 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23ca 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476cdc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [200c 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2086 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ee0 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23cb 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476cdc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [200d 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [2087 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1ee1 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [23cc 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476cdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [200e 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 16 8e 12 24 53 5d 8a 00 ed 9f dd d1 00 73 cb |....$S].......s.| +peer0.org2.example.com | [2088 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1ee2 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23cd 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476cdc0 principal evaluation fails +peer0.org1.example.com | 00000010 08 a2 1d 4d d5 e9 1a 3f a3 bb 47 c6 1e c2 b9 6a |...M...?..G....j| +peer0.org2.example.com | [2089 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1ee3 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23ce 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476cdc0 gate 1574140955344591200 evaluation fails +peer0.org1.example.com | [200f 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 8a ba c9 bc 71 19 d5 48 61 b7 |0E.!......q..Ha.| +peer0.org2.example.com | [208a 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1ee4 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [23cf 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 b4 63 e0 cd d0 f4 a1 4e 6c 3e 92 48 4a a1 4f 4e |.c.....Nl>.HJ.ON| +peer0.org2.example.com | [208b 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ee5 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [23d0 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 ef 5e 40 12 e4 02 20 01 7e e5 df 6a 9c 52 b5 38 |.^@... .~..j.R.8| +peer0.org2.example.com | [208c 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ee6 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23d1 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 9c 8f 8b cc db 00 38 15 8e 81 b2 b4 a9 d1 83 43 |......8........C| +peer0.org2.example.com | [208d 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ee7 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002920be0 gate 1574140951663601000 evaluation starts +peer1.org2.example.com | [23d2 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476d330 gate 1574140955347143800 evaluation starts +peer0.org1.example.com | 00000040 14 12 ad a2 f2 d6 df |.......| +peer0.org2.example.com | [208e 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [1ee8 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002920be0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23d3 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476d330 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [208f 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2010 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | [1ee9 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002920be0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [23d4 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476d330 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2090 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1eea 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002920be0 principal matched by identity 0 +peer1.org2.example.com | [23d5 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476d330 principal matched by identity 0 +peer0.org2.example.com | [2091 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2011 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 81 89 0d fb 58 c6 7b 29 36 bb |0E.!......X.{)6.| +peer1.org1.example.com | [1eeb 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [23d6 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org2.example.com | [2092 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 bf 73 5d 53 0e 24 70 1b e5 44 93 7b 4e e9 53 fe |.s]S.$p..D.{N.S.| +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org2.example.com | [2093 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" > alive: alive:\226\200\371" > alive: +peer0.org1.example.com | 00000020 7d ca e7 e4 86 02 20 06 bf 43 8a e4 af 69 3d 10 |}..... ..C...i=.| +peer1.org1.example.com | [1eec 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [23d7 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org2.example.com | [2094 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 68 f3 4f ae 22 05 d7 63 98 08 1f 95 e2 ed fe 37 |h.O."..c.......7| +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org2.example.com | [2095 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 53 cc c7 9b 4d 71 20 |S...Mq | +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org2.example.com | [2096 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2012 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org2.example.com | [2097 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2013 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org2.example.com | [2098 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2014 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1eed 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002920be0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2099 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [23d8 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476d330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2015 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1eee 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002920be0 gate 1574140951663601000 evaluation succeeds +peer0.org2.example.com | [209a 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23d9 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476d330 gate 1574140955347143800 evaluation succeeds +peer0.org1.example.com | [2016 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1eef 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [209b 11-19 05:22:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [23da 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2017 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ef0 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [209c 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23db 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2018 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ef1 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [209d 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [23dc 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2019 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ef2 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [209e 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23dd 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [201a 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [1ef3 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [209f 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [23de 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [201b 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [20a0 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23df 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [201c 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ef4 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer0.org2.example.com | [20a1 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23e0 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [201d 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [20a2 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23e1 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [201e 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > alive:\352[\006G\\\345\323,\333]\342\311\307" > +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [23e2 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [20a3 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [201f 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [23e3 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [20a4 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2020 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [23e4 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476de70 gate 1574140955349550800 evaluation starts +peer0.org2.example.com | [20a5 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2021 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ef5 11-19 05:22:31.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23e5 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476de70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20a6 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2022 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ef6 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23e6 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476de70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [20a7 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2023 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ef7 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23e7 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476de70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [20a8 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2024 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ef8 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [23e8 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476de70 principal evaluation fails +peer0.org2.example.com | [20a9 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805220 gate 1574140947956043300 evaluation starts +peer0.org1.example.com | [2025 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ef9 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23e9 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476de70 gate 1574140955349550800 evaluation fails +peer0.org2.example.com | [20aa 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805220 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2026 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1efa 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23ea 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [20ab 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805220 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2027 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1efb 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [23eb 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [20ac 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2028 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1efc 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [23ec 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [20ad 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805220 principal evaluation fails +peer0.org1.example.com | [2029 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1efd 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23ed 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047883e0 gate 1574140955349808600 evaluation starts +peer0.org2.example.com | [20ae 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805220 gate 1574140947956043300 evaluation fails +peer0.org1.example.com | [202a 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1efe 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [23ee 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047883e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20af 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [202b 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eff 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [23ef 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047883e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [20b0 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [202c 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f00 11-19 05:22:31.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23f0 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047883e0 principal matched by identity 0 +peer0.org2.example.com | [20b1 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [202d 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer1.org1.example.com | [1f01 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [23f1 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org2.example.com | [20b2 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805790 gate 1574140947956467700 evaluation starts +peer0.org1.example.com | [202e 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer1.org1.example.com | [1f02 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org2.example.com | [20b3 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805790 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23f2 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org1.example.com | [202f 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f03 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [20b4 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805790 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org1.example.com | [2030 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100A1801 +peer1.org1.example.com | [1f04 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20b5 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805790 principal matched by identity 0 +peer1.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org1.example.com | [2031 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4C7347089662D1B0DC3AB7FDDD2C4EF0FC2B25A8811C1AA4E4F66AD37A11D2C9 +peer1.org1.example.com | [1f05 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [20b6 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org1.example.com | [2032 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer1.org1.example.com | [1f06 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org1.example.com | [2033 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f07 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [20b7 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [23f3 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047883e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2034 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f08 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [23f4 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047883e0 gate 1574140955349808600 evaluation succeeds +peer1.org1.example.com | [1f09 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2035 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [23f5 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1f0a 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2036 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [23f6 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1f0b 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2037 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [23f7 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f0c 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2038 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20b8 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805790 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [23f8 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f0d 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2039 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20b9 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805790 gate 1574140947956467700 evaluation succeeds +peer1.org2.example.com | [23f9 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f0e 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [203a 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [20ba 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23fa 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f10 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [203b 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20bb 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23fb 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f0f 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [203c 11-19 05:22:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 +peer0.org2.example.com | [20bc 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23fc 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [1f11 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [203d 11-19 05:22:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org2.example.com | [20bd 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [23fd 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [203e 11-19 05:22:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org2.example.com | [20be 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [1f12 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [23fe 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [203f 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [1f13 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [23ff 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2040 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151021 +peer0.org2.example.com | [20bf 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [1f14 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2400 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2041 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9641523C9005941ED1D3FF2A665AB4D2A1CA8B07F6B35127D53BBCAA21784E35 +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [1f15 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2401 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2042 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1f16 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2402 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2043 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1f17 11-19 05:22:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2403 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2044 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1f18 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2045 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2404 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20c0 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1f19 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2046 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2405 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1f1a 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2047 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2406 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20c1 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1f1b 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2048 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2407 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [1f1c 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2049 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2408 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [1f1d 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [204a 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2409 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [1f1e 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [204b 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [240a 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [1f1f 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [204c 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [240b 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756f00 gate 1574140955359013800 evaluation starts +peer0.org2.example.com | [20c2 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f20 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [204d 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [240c 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756f00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20c3 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f21 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [204e 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [240d 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756f00 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1f22 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20c4 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [204f 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer1.org2.example.com | [240e 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1f23 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [20c5 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2050 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [240f 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756f00 principal evaluation fails +peer1.org1.example.com | [1f24 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [20c6 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2051 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2410 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756f00 gate 1574140955359013800 evaluation fails +peer1.org1.example.com | [1f25 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20c7 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2052 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2411 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f26 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [20c8 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2053 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2412 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f27 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [20c9 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2054 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2413 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1f28 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20ca 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048369d0 gate 1574140947968410700 evaluation starts +peer0.org1.example.com | [2055 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2414 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004757470 gate 1574140955361226200 evaluation starts +peer0.org2.example.com | [20cb 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048369d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f29 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2056 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2415 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004757470 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20cc 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048369d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1f2a 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2057 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2416 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004757470 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [20cd 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048369d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1f2b 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2058 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2417 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004757470 principal matched by identity 0 +peer0.org2.example.com | [20ce 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048369d0 principal evaluation fails +peer1.org1.example.com | [1f2c 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2059 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 41 52 3c 90 05 94 1e d1 d3 ff 2a 66 5a b4 d2 |.AR<.......*fZ..| +peer1.org2.example.com | [2418 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org2.example.com | [20cf 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048369d0 gate 1574140947968410700 evaluation fails +peer1.org1.example.com | [1f2d 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 a1 ca 8b 07 f6 b3 51 27 d5 3b bc aa 21 78 4e 35 |......Q'.;..!xN5| +peer1.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org2.example.com | [20d0 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f2e 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [205a 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 9e 33 20 5b 6d 39 50 dd 4d 5d |0E.!...3 [m9P.M]| +peer1.org2.example.com | [2419 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org2.example.com | [20d1 11-19 05:22:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f2f 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0f10 gate 1574140951857982800 evaluation starts +peer0.org1.example.com | 00000010 99 78 13 92 00 78 2a 3a 3e 1d f3 5d 5d 7e 4a 51 |.x...x*:>..]]~JQ| +peer1.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org2.example.com | [20d2 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1f30 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0f10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org1.example.com | 00000020 8e 35 e1 72 0a 02 20 36 7b 45 3f dc bc 56 cc 0b |.5.r.. 6{E?..V..| +peer0.org2.example.com | [20d3 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004836f40 gate 1574140947970584000 evaluation starts +peer1.org1.example.com | [1f31 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0f10 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org1.example.com | 00000030 72 c2 96 89 71 b6 82 db 37 19 91 a1 d5 80 cf da |r...q...7.......| +peer0.org2.example.com | [20d4 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004836f40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f32 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0f10 principal matched by identity 0 +peer1.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org1.example.com | 00000040 cd 18 83 a8 75 66 76 |....ufv| +peer0.org2.example.com | [20d5 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004836f40 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1f33 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer1.org2.example.com | [241a 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004757470 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [205b 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [20d6 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004836f40 principal matched by identity 0 +peer1.org1.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer1.org2.example.com | [241b 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004757470 gate 1574140955361226200 evaluation succeeds +peer0.org1.example.com | [205c 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20d7 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1f34 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer1.org2.example.com | [241c 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [205d 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer1.org2.example.com | [241d 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [205e 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20d8 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer1.org2.example.com | [241e 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [205f 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer1.org2.example.com | [241f 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2060 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer1.org2.example.com | [2420 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2061 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1f35 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0f10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2421 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2062 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [1f36 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0f10 gate 1574140951857982800 evaluation succeeds +peer1.org2.example.com | [2422 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2063 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [20d9 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004836f40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f37 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2423 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2064 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20da 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004836f40 gate 1574140947970584000 evaluation succeeds +peer1.org1.example.com | [1f38 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2065 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2424 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [20db 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1f39 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2066 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2425 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20dc 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1f3a 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2067 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2426 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20dd 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f3b 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2068 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2427 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [20de 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f3c 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2069 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 gate 1574140950388685500 evaluation starts +peer1.org2.example.com | [2428 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [20df 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f3d 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [206a 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2429 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [20e0 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f3e 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [206b 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [242a 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba770 gate 1574140955362239200 evaluation starts +peer0.org2.example.com | [20e1 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [1f3f 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [206c 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 principal matched by identity 0 +peer1.org2.example.com | [242b 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba770 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [1f40 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [206d 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 cc dc 57 81 e1 20 71 52 37 78 d1 0e e6 41 c3 |...W.. qR7x...A.| +peer1.org2.example.com | [242c 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba770 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [20e2 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [1f41 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 9a 7b 35 89 ee fc bc a2 91 49 e0 f5 56 a3 25 cf |.{5......I..V.%.| +peer1.org2.example.com | [242d 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [1f42 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [206e 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 3c 30 6a b8 1e de 79 66 49 3e 54 |0D. 7<0j...yfI>T| +peer1.org2.example.com | [242e 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba770 principal evaluation fails +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1f43 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | 00000010 a4 63 47 ff 7c 55 66 d5 56 4e ce e4 26 9b 41 e7 |.cG.|Uf.VN..&.A.| +peer1.org2.example.com | [242f 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba770 gate 1574140955362239200 evaluation fails +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1f44 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 3a ee 77 8c 02 20 42 d4 d2 63 98 2a 38 19 57 30 |:.w.. B..c.*8.W0| +peer1.org2.example.com | [2430 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1f45 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 c2 1b da 8b 49 1a 95 62 dd 8f 3c ad 57 04 6d 70 |....I..b..<.W.mp| +peer1.org2.example.com | [2431 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [20e3 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f46 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 32 53 32 7a 0b 45 |2S2z.E| +peer1.org2.example.com | [2432 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [20e4 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f47 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [206f 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2433 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bace0 gate 1574140955362493200 evaluation starts +peer0.org2.example.com | [20e5 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2070 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 gate 1574140950388685500 evaluation succeeds +peer1.org1.example.com | [1f48 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > alive: alive: alive: +peer1.org2.example.com | [2434 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bace0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20e6 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2071 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f49 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2435 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bace0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [20e7 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2072 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f4a 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2436 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bace0 principal matched by identity 0 +peer0.org2.example.com | [20e8 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2073 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f4b 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2437 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org2.example.com | [20e9 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2074 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f4c 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151027 +peer1.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org2.example.com | [20ea 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f4d 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ED5B558072A52CD47560F0796A404EAB4E0331712BD964DE3DFCAEF5027DAFA2 +peer0.org1.example.com | [2075 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2438 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org2.example.com | [20eb 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048508f0 gate 1574140947977439100 evaluation starts +peer1.org1.example.com | [1f4e 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2076 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org2.example.com | [20ec 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048508f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f4f 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2077 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org2.example.com | [20ed 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048508f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1f50 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [2078 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org2.example.com | [20ee 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048508f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1f51 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2079 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org2.example.com | [20ef 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048508f0 principal evaluation fails +peer1.org1.example.com | [1f52 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [207a 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2439 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bace0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [20f0 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048508f0 gate 1574140947977439100 evaluation fails +peer1.org1.example.com | [1f54 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [207b 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [243a 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bace0 gate 1574140955362493200 evaluation succeeds +peer0.org2.example.com | [20f1 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f55 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [207c 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [243b 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20f2 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f56 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [207d 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [243c 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1f57 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [207e 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [243d 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [20f3 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1f58 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [207f 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [243e 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [20f4 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850e60 gate 1574140947977739400 evaluation starts +peer1.org1.example.com | [1f59 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer0.org1.example.com | [2080 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [243f 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20f5 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850e60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer0.org1.example.com | [2081 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2440 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20f6 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850e60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1f5a 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer0.org1.example.com | [2082 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2441 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [20f7 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850e60 principal matched by identity 0 +peer1.org1.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer0.org1.example.com | [2083 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2442 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151027 +peer0.org2.example.com | [20f8 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer0.org1.example.com | [2084 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2443 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 243A00BC696EF213077424F545D6DEAAC82EFAED3E0E087451BB9AF4A42756E8 +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer0.org1.example.com | [2085 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2444 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [20f9 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer0.org1.example.com | [2086 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2445 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [1f5b 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | [2087 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2446 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2088 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2447 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [1f5c 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 60 ac ca e2 93 21 13 13 c3 c4 e1 |0D. 5`....!.....| +peer0.org1.example.com | [2089 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2448 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | 00000010 00 c1 68 80 12 21 ac ea ae c6 bd 30 54 08 7a 16 |..h..!.....0T.z.| +peer0.org1.example.com | [208a 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2449 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20fa 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850e60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000020 4b c1 f0 59 02 20 01 b9 15 2b 01 ff 43 58 45 b6 |K..Y. ...+..CXE.| +peer0.org1.example.com | [208b 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [244a 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [20fb 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850e60 gate 1574140947977739400 evaluation succeeds +peer1.org1.example.com | 00000030 28 1a b2 fb ac 9b 7a bf e4 23 2f d5 55 6c 39 77 |(.....z..#/.Ul9w| +peer0.org1.example.com | [208c 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [244b 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20fc 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 6e 68 b9 a1 66 8f |nh..f.| +peer0.org1.example.com | [208d 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [244c 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [20fd 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1f5d 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [208e 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [244d 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20fe 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f5e 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [208f 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [244e 11-19 05:22:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [20ff 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f5f 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2090 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [244f 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2100 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [1f60 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2091 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2450 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [1f53 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2092 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2451 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2101 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | [1f61 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2093 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2452 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [1f62 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2094 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2453 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | [1f63 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2095 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-1.0 +peer1.org2.example.com | [2454 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [1f64 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2096 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +peer1.org2.example.com | [2455 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [2097 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +peer1.org1.example.com | [1f65 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2456 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2102 11-19 05:22:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2098 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +peer1.org1.example.com | [1f66 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2457 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2103 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2099 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +peer1.org1.example.com | [1f67 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2458 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2104 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [209a 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:1.0 's authentication is authorized +peer1.org1.example.com | [1f68 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2459 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 3a 00 bc 69 6e f2 13 07 74 24 f5 45 d6 de aa |$:..in...t$.E...| +peer0.org2.example.com | [2105 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [209b 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [1f69 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer1.org2.example.com | 00000010 c8 2e fa ed 3e 0e 08 74 51 bb 9a f4 a4 27 56 e8 |....>..tQ....'V.| +peer0.org2.example.com | [2106 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer0.org1.example.com | [209c 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [245a 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 87 8d e1 a2 9c bd 35 2b 82 00 |0E.!........5+..| +peer0.org2.example.com | [2107 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f6a 11-19 05:22:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer0.org1.example.com | [209d 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:1.0 +peer1.org2.example.com | 00000010 b5 85 be 42 91 7e 25 23 ee b5 0b d2 23 76 6d f5 |...B.~%#....#vm.| +peer0.org2.example.com | [2108 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer0.org1.example.com | [209e 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED +peer1.org2.example.com | 00000020 ab e6 5e 75 42 02 20 08 f3 e3 7f f3 ea b1 91 6b |..^uB. ........k| +peer0.org2.example.com | [2109 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer0.org1.example.com | [209f 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"exp02:1.0" +peer1.org2.example.com | 00000030 bb aa 34 d7 eb c2 78 5e 41 d6 60 1b ff f5 bb 3f |..4...x^A.`....?| +peer0.org2.example.com | [210a 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866670 gate 1574140947982239900 evaluation starts +peer1.org1.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer0.org1.example.com | [20a0 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"exp02:1.0" +peer1.org2.example.com | 00000040 c7 da 72 ab d1 8c c8 |..r....| +peer0.org2.example.com | [210b 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866670 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer0.org1.example.com | [20a1 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"exp02:1.0" +peer1.org2.example.com | [245b 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [210c 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866670 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1f6b 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [20a2 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [245c 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [210d 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1f6c 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20a3 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [245d 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [210e 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866670 principal evaluation fails +peer1.org1.example.com | [1f6d 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [20a4 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer1.org2.example.com | [245e 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [210f 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866670 gate 1574140947982239900 evaluation fails +peer1.org1.example.com | [1f6e 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20a5 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] handling PUT_STATE from chaincode +peer1.org2.example.com | [245f 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2460 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2110 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20a6 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Completed PUT_STATE. Sending RESPONSE +peer1.org2.example.com | [2461 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 3a 00 bc 69 6e f2 13 07 74 24 f5 45 d6 de aa |$:..in...t$.E...| +peer0.org2.example.com | [2111 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f6f 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20a7 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer1.org2.example.com | 00000010 c8 2e fa ed 3e 0e 08 74 51 bb 9a f4 a4 27 56 e8 |....>..tQ....'V.| +peer0.org2.example.com | [2112 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1f70 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [20a8 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] handling PUT_STATE from chaincode +peer1.org2.example.com | [2462 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 87 8d e1 a2 9c bd 35 2b 82 00 |0E.!........5+..| +peer0.org2.example.com | [2113 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866be0 gate 1574140947985349200 evaluation starts +peer1.org1.example.com | [1f71 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [20a9 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Completed PUT_STATE. Sending RESPONSE +peer1.org2.example.com | 00000010 b5 85 be 42 91 7e 25 23 ee b5 0b d2 23 76 6d f5 |...B.~%#....#vm.| +peer0.org2.example.com | [2114 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866be0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f72 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20aa 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | 00000020 ab e6 5e 75 42 02 20 08 f3 e3 7f f3 ea b1 91 6b |..^uB. ........k| +peer0.org2.example.com | [2115 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866be0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1f73 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [20ab 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] notifying Txid:afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, channelID:businesschannel +peer1.org2.example.com | 00000030 bb aa 34 d7 eb c2 78 5e 41 d6 60 1b ff f5 bb 3f |..4...x^A.`....?| +peer0.org2.example.com | [2116 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866be0 principal matched by identity 0 +peer1.org1.example.com | [1f74 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20ac 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | 00000040 c7 da 72 ab d1 8c c8 |..r....| +peer0.org2.example.com | [2117 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [1f75 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20ad 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][afc2f7b1] Exit chaincode: name:"lscc" (34332ms) +peer1.org2.example.com | [2463 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [1f76 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [20ae 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [2464 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2118 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [1f77 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [20af 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +peer1.org2.example.com | [2465 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [1f78 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20b0 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] Exit +peer1.org2.example.com | [2466 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [1f79 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e7efc0 gate 1574140951935558800 evaluation starts +peer0.org1.example.com | [20b1 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] Entry chaincode: name:"lscc" +peer1.org2.example.com | [2467 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [1f7a 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e7efc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20b2 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] escc for chaincode name:"lscc" is escc +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [2468 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f7b 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e7efc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [20b3 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, chaincode: lscc} +peer0.org2.example.com | [2119 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866be0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2469 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [1f7c 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e7efc0 principal matched by identity 0 +peer0.org1.example.com | [20b4 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A202004FDA5AFFB449ECC63CD9FA045...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [20b5 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9A681CADB4BBC155D500B1317381E67713BB9B2685B6A12A9B2A9EAED67F8936 +peer0.org1.example.com | [20b6 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, chaincode: lscc} +peer0.org2.example.com | [211a 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004866be0 gate 1574140947985349200 evaluation succeeds +peer1.org1.example.com | [1f7d 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer0.org1.example.com | [20b7 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] Exit +peer0.org2.example.com | [211b 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [246a 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer0.org1.example.com | [20b8 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +peer0.org2.example.com | [211c 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [246b 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f7e 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer0.org1.example.com | [20b9 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45600 +peer0.org2.example.com | [211d 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [246c 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer0.org1.example.com | [20ba 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45600 grpc.code=OK grpc.call_duration=34.340689s +peer0.org2.example.com | [211e 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [246d 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer0.org1.example.com | [20bb 11-19 05:22:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [211f 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [246e 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer0.org1.example.com | [20bc 11-19 05:22:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2120 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [246f 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer0.org1.example.com | [20bd 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2121 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2470 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f7f 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e7efc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20be 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2122 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2471 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f80 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e7efc0 gate 1574140951935558800 evaluation succeeds +peer0.org1.example.com | [20bf 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [2123 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2473 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f81 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20c0 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2474 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2124 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f82 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [20c1 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2475 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2125 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f83 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [20c2 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2476 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2126 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f84 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20c3 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2477 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2127 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f85 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20c4 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2472 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2128 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f86 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20c5 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2478 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2129 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f87 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20c6 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2479 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [212a 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004867fc0 gate 1574140947987318500 evaluation starts +peer1.org1.example.com | [1f88 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20c7 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [247a 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [212b 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004867fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f89 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [20c8 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [247b 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [212c 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004867fc0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1f8a 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer0.org1.example.com | [20c9 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [247c 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151028 +peer0.org2.example.com | [212d 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004867fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer0.org1.example.com | [20ca 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [247d 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F634998755686D0B95FEA4533C8B3B271D5D408EDBDD3CD72610F7B7EC602E8D +peer1.org1.example.com | [1f8b 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer0.org1.example.com | [20cb 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [247e 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [212e 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004867fc0 principal evaluation fails +peer1.org1.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer0.org1.example.com | [20cc 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [247f 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [212f 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004867fc0 gate 1574140947987318500 evaluation fails +peer1.org1.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer0.org1.example.com | [20cd 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2480 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [2130 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer0.org1.example.com | [20ce 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2481 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2131 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer0.org1.example.com | [20cf 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2482 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2132 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1f8c 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20d0 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2133 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004888530 gate 1574140947987757300 evaluation starts +peer1.org2.example.com | [2483 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f8d 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20d1 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2134 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004888530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2484 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f8e 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20d2 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2135 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004888530 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2485 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f8f 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20d3 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2136 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004888530 principal matched by identity 0 +peer1.org2.example.com | [2486 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f90 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20d4 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2137 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [2489 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f91 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [20d5 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [2487 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f92 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [20d6 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e4 30 87 86 5f d1 01 bc e0 9a 62 f0 c5 66 0f |..0.._.....b..f.| +peer0.org2.example.com | [2138 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [2488 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f93 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer0.org1.example.com | 00000010 24 87 6e 3d 09 99 e7 1d 24 7c 6e 74 48 bc f0 d7 |$.n=....$|ntH...| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [248b 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer0.org1.example.com | [20d7 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 ed 6c cd e1 53 cb 09 94 a1 4a bd |0D. '.l..S....J.| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [248a 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f94 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer0.org1.example.com | 00000010 51 7c 17 78 79 07 bd 93 bd bd d1 ed 3c 2f fd 0a |Q|.xy....... DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer0.org1.example.com | 00000020 f7 c7 bc b6 02 20 19 e7 0c 56 ce 6b 98 5e 56 37 |..... ...V.k.^V7| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [248d 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer0.org1.example.com | 00000030 5f ad 34 af 1f b5 87 c3 74 aa e6 f8 83 38 26 58 |_.4.....t....8&X| +peer0.org2.example.com | [2139 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004888530 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [248e 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer0.org1.example.com | 00000040 eb 83 a1 96 30 fb |....0.| +peer0.org2.example.com | [213a 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004888530 gate 1574140947987757300 evaluation succeeds +peer1.org2.example.com | [248f 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer0.org1.example.com | [20d8 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [213b 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2490 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer1.org1.example.com | [1f95 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [20d9 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [213c 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer1.org1.example.com | [1f96 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [20da 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [213d 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2491 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer1.org1.example.com | [1f97 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20db 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [213e 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer1.org1.example.com | [1f98 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20dc 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [213f 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer1.org1.example.com | [1f99 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20dd 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2140 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer1.org1.example.com | [1f9a 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20de 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2141 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer1.org1.example.com | [1f9b 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20df 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2142 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2492 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f9c 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20e0 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2143 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2493 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f9d 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20e1 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2144 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2494 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1f9e 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [20e2 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2145 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2495 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f9f 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer0.org2.example.com | [2146 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20e3 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer1.org2.example.com | [2496 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2147 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048896c0 gate 1574140947989373200 evaluation starts +peer0.org1.example.com | [20e4 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fa0 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer1.org2.example.com | [2497 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2148 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048896c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20e5 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer1.org2.example.com | [2498 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2149 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048896c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [20e6 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer1.org2.example.com | [2499 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [214a 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048896c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [20e7 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [249a 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer0.org2.example.com | [214b 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048896c0 principal evaluation fails +peer0.org1.example.com | [20e8 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [249b 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer0.org2.example.com | [214c 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048896c0 gate 1574140947989373200 evaluation fails +peer0.org1.example.com | [20e9 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [249c 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3a10 gate 1574140955474828700 evaluation starts +peer1.org1.example.com | [1fa1 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [214d 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20ea 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [249d 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3a10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1fa2 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [214e 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20eb 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [249e 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3a10 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1fa3 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [214f 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [20ec 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [249f 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1fa4 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2150 11-19 05:22:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004889c30 gate 1574140947989967100 evaluation starts +peer0.org1.example.com | [20ed 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24a0 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3a10 principal evaluation fails +peer1.org1.example.com | [1fa5 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2151 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004889c30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20ee 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24a1 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3a10 gate 1574140955474828700 evaluation fails +peer1.org1.example.com | [1fa6 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2152 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004889c30 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [20ef 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24a2 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fa7 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2153 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004889c30 principal matched by identity 0 +peer0.org1.example.com | [20f0 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [24a3 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fa8 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2154 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org1.example.com | [20f1 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [24a4 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1fa9 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org1.example.com | [20f2 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24a5 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3f80 gate 1574140955475121000 evaluation starts +peer1.org1.example.com | [1faa 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2155 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org1.example.com | [20f3 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24a6 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3f80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1fab 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5e90 gate 1574140951969557800 evaluation starts +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org1.example.com | [20f4 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24a7 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3f80 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1fac 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5e90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org1.example.com | [20f5 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24a8 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3f80 principal matched by identity 0 +peer1.org1.example.com | [1fad 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5e90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org1.example.com | [20f6 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24a9 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer1.org1.example.com | [1fae 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5e90 principal matched by identity 0 +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org1.example.com | [20f7 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer1.org1.example.com | [1faf 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer0.org2.example.com | [2156 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004889c30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20f8 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24aa 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer1.org1.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer0.org2.example.com | [2157 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004889c30 gate 1574140947989967100 evaluation succeeds +peer0.org1.example.com | [20f9 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer1.org1.example.com | [1fb0 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer0.org2.example.com | [2158 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [20fa 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer1.org1.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer0.org2.example.com | [2159 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [20fb 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer1.org1.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer0.org2.example.com | [215a 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20fc 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer1.org1.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer0.org2.example.com | [215b 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [24ab 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3f80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20fd 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer0.org2.example.com | [215c 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [24ac 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e3f80 gate 1574140955475121000 evaluation succeeds +peer0.org1.example.com | [20fe 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fb1 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5e90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [24ad 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [20ff 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fb2 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5e90 gate 1574140951969557800 evaluation succeeds +peer0.org2.example.com | [215d 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [24ae 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2100 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1fb3 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [24af 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2101 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1fb4 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [24b0 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2102 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1fb5 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [24b1 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2103 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 gate 1574140950833484200 evaluation starts +peer1.org1.example.com | [1fb6 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [24b2 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2104 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1fb7 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [215e 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24b3 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [2105 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1fb8 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [215f 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24b4 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer0.org1.example.com | [2106 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 principal matched by identity 0 +peer1.org1.example.com | [1fb9 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2160 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org1.example.com | [2107 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 ac df e1 3e fa 6a 10 1c 43 e3 dd 09 00 d2 8f |G...>.j..C......| +peer1.org1.example.com | [1fba 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2161 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24b5 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org1.example.com | 00000010 1f 9a c7 2b ef cd 44 cc 44 cf f7 f3 8e fa 6a 4e |...+..D.D.....jN| +peer1.org1.example.com | [1fbb 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2162 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer0.org1.example.com | [2108 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 69 e4 bc 09 64 39 d0 2d 93 7f 64 |0D. ]i...d9.-..d| +peer1.org1.example.com | [1fbc 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2163 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer0.org1.example.com | 00000010 45 dc 9c 77 21 09 bf 79 05 46 d3 99 9b 98 59 a6 |E..w!..y.F....Y.| +peer1.org1.example.com | [1fbd 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2164 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer0.org1.example.com | 00000020 82 ad 78 26 02 20 38 20 f1 58 d2 be 62 84 23 fe |..x&. 8 .X..b.#.| +peer1.org1.example.com | [1fbe 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2165 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer0.org1.example.com | 00000030 02 53 af 51 7c fc b0 b7 ec 6b 5c d2 ac 3d a0 5a |.S.Q|....k\..=.Z| +peer1.org1.example.com | [1fbf 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2166 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [24b6 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 41 d6 08 6e d7 63 |A..n.c| +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [1fc0 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4536 bytes, seq: 3}, Envelope: 4566 bytes, Signature: 0 bytes +peer1.org2.example.com | [24b7 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2109 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2167 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [1fc1 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [24b8 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [210a 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 gate 1574140950833484200 evaluation succeeds +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [1fc2 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [24b9 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [210b 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [1fc3 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [24ba 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [210c 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [1fc4 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [24bb 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [210d 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [1fc5 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [24bc 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [210e 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2168 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fc6 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [210f 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2169 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [24bd 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fc7 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [2110 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [216a 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [24be 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | [2111 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [216b 11-19 05:22:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24bf 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [2112 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org2.example.com | [216c 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | [2113 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [24c0 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org2.example.com | [216d 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +peer0.org1.example.com | [2114 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer0.org2.example.com | [216e 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [2115 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer0.org2.example.com | [216f 11-19 05:22:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | [2116 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer0.org2.example.com | [2170 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 +peer0.org1.example.com | [2117 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer0.org2.example.com | [2171 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | +Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | [2118 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c1 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | [2172 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | [2119 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2173 11-19 05:22:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +peer0.org1.example.com | [211a 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c2 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 72 08 7d db 7a 94 cf 59 ae e9 a3 |0D. &r.}.z..Y...| +peer0.org2.example.com | [2174 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +peer0.org1.example.com | [211b 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 8e 6c ad ea 36 87 75 a3 ae d1 7c d6 c9 e4 c6 06 |.l..6.u...|.....| +peer0.org2.example.com | [2175 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | rkc= +peer0.org1.example.com | [211c 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 b0 29 7a 32 02 20 12 3a e4 b8 3b 44 a7 1c a2 fa |.)z2. .:..;D....| +peer0.org2.example.com | [2176 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [211d 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000030 a5 90 70 1a 4e c2 f0 29 ce ee b9 76 a2 fd 17 18 |..p.N..)...v....| +peer0.org2.example.com | [2177 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [1fc8 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b100 gate 1574140952765302700 evaluation starts +peer0.org1.example.com | [211e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 7d aa d3 8b f8 b8 |}.....| +peer0.org2.example.com | [2178 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fc9 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [211f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c3 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2179 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1fca 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b100 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2120 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [24c4 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [217a 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fcb 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [2121 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24c5 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [217b 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fcc 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [2122 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24c6 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [217c 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1fcd 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b100 principal matched by identity 0 +peer0.org1.example.com | [2123 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24c7 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [217d 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1fce 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d b0 62 ef 1e 31 f9 96 b2 bb 11 77 0d 77 07 1b |m.b..1.....w.w..| +peer0.org1.example.com | [2124 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24c8 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [217e 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 df f7 7d cb 1d bf 8d 2c 66 5f f8 1e b3 54 9f 11 |..}....,f_...T..| +peer0.org1.example.com | [2125 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24c9 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [217f 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829ef0 gate 1574140949773699500 evaluation starts +peer1.org1.example.com | [1fcf 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 f0 74 c5 a5 31 5c 21 0c dc e3 79 |0D. @.t..1\!...y| +peer0.org1.example.com | [2126 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24ca 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2180 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829ef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 17 f7 68 fd 8c eb 2a 10 c6 ac 70 4b f3 71 34 c2 |..h...*...pK.q4.| +peer0.org1.example.com | [2127 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24cb 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer0.org2.example.com | [2181 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829ef0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000020 63 f8 74 a1 02 20 10 32 ae 4b 4d e8 92 aa 09 77 |c.t.. .2.KM....w| +peer0.org1.example.com | [2128 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org2.example.com | [2182 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000030 c3 32 c2 a2 c5 ba 9d 0a 40 1d 58 71 96 ae 7d 05 |.2......@.Xq..}.| +peer0.org1.example.com | [2129 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24cc 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org2.example.com | [2183 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829ef0 principal evaluation fails +peer1.org1.example.com | 00000040 6e 67 ab b1 5b 69 |ng..[i| +peer0.org1.example.com | [212a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer0.org2.example.com | [2184 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829ef0 gate 1574140949773699500 evaluation fails +peer1.org1.example.com | [1fd0 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b100 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [212b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer0.org2.example.com | [2185 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fd1 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b100 gate 1574140952765302700 evaluation succeeds +peer0.org1.example.com | [212c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer0.org2.example.com | [2186 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fd2 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [212d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer0.org2.example.com | [2187 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1fd3 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [212e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24cd 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2188 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4460 gate 1574140949775111000 evaluation starts +peer1.org1.example.com | [1fd4 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [212f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24ce 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2189 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4460 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1fd5 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2130 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151022 +peer1.org2.example.com | [24cf 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [218a 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4460 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [1fd6 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4536 bytes, seq: 3}, Envelope: 4566 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [2131 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C5EC319E2A891A25F1D4E3D17856065D8B9A249C989D3A5367D9B4ACA1E42DA +peer1.org2.example.com | [24d0 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [218b 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4460 principal matched by identity 0 +peer1.org1.example.com | [1fd7 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer0.org1.example.com | [2132 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24d1 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [218c 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 41 52 3c 90 05 94 1e d1 d3 ff 2a 66 5a b4 d2 |.AR<.......*fZ..| +peer1.org1.example.com | [1fd8 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [2133 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [24d2 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 a1 ca 8b 07 f6 b3 51 27 d5 3b bc aa 21 78 4e 35 |......Q'.;..!xN5| +peer1.org1.example.com | [1fd9 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org1.example.com | [2134 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [1fda 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [2135 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [24d3 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [218d 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 9e 33 20 5b 6d 39 50 dd 4d 5d |0E.!...3 [m9P.M]| +peer1.org1.example.com | [1fdb 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer0.org1.example.com | [2136 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24d4 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 99 78 13 92 00 78 2a 3a 3e 1d f3 5d 5d 7e 4a 51 |.x...x*:>..]]~JQ| +peer1.org1.example.com | [1fdc 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer0.org1.example.com | [2137 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [24d5 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 8e 35 e1 72 0a 02 20 36 7b 45 3f dc bc 56 cc 0b |.5.r.. 6{E?..V..| +peer1.org1.example.com | [1fdd 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org1.example.com | [2138 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24d6 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 72 c2 96 89 71 b6 82 db 37 19 91 a1 d5 80 cf da |r...q...7.......| +peer1.org1.example.com | [1fde 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer0.org1.example.com | [2139 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [24d7 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 cd 18 83 a8 75 66 76 |....ufv| +peer1.org1.example.com | [1fdf 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer0.org1.example.com | [213a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [24d8 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850c70 gate 1574140955486627800 evaluation starts +peer0.org2.example.com | [218e 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4460 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1fe0 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [213b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d9 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850c70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [218f 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4460 gate 1574140949775111000 evaluation succeeds +peer1.org1.example.com | [1fe1 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003206400 env 0xc004027860 txn 0 +peer1.org2.example.com | [24da 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850c70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [213c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2190 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1fe2 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004027860 +peer1.org2.example.com | [24db 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [213d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2191 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1fe3 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +peer1.org2.example.com | [24dc 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850c70 principal evaluation fails +peer0.org1.example.com | [213e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2192 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1fe4 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [24dd 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004850c70 gate 1574140955486627800 evaluation fails +peer0.org1.example.com | [213f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2193 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1fe5 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [24de 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2140 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2194 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fe6 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [24df 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2141 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2195 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [24e0 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1fe7 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2142 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2196 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [24e1 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048511e0 gate 1574140955487079800 evaluation starts +peer1.org1.example.com | [1fe8 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [2143 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2197 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [24e2 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048511e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [2144 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2198 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [24e3 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048511e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [2145 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer0.org2.example.com | [2199 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e4 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048511e0 principal matched by identity 0 +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer0.org2.example.com | [219a 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e5 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [2146 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer0.org2.example.com | [219b 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer0.org2.example.com | [219c 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e6 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer0.org2.example.com | [219d 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer0.org2.example.com | [219e 11-19 05:22:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer1.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer0.org2.example.com | [219f 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer1.org2.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer1.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | [21a0 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e7 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048511e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | [2147 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [21a1 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e8 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048511e0 gate 1574140955487079800 evaluation succeeds +peer1.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | [2148 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [21a2 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [24e9 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | [2149 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21a3 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24ea 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [214a 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21a4 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24eb 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1fe9 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [214b 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [21a5 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [24ec 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1feb 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [214c 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [21a6 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24ed 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fec 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [214d 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21a7 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24ee 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fed 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [214e 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [24ef 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [1fee 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [214f 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [21a8 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24f0 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer0.org1.example.com | [2150 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer0.org2.example.com | [21a9 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer1.org1.example.com | [1fef 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +peer0.org1.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer1.org2.example.com | [24f1 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer1.org1.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +peer0.org1.example.com | [2151 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer0.org2.example.com | [21aa 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer1.org1.example.com | [1ff0 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +peer0.org1.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer0.org2.example.com | [21ab 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer1.org1.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +peer0.org1.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer0.org2.example.com | [21ac 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer1.org1.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +peer0.org1.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer0.org2.example.com | [21ad 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer1.org1.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +peer0.org1.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer0.org2.example.com | [21ae 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24f2 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR| +peer0.org1.example.com | [2152 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [21af 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24f3 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fea 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2153 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [21b0 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24f4 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ff1 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2154 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21b1 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24f5 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ff2 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2155 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21b2 11-19 05:22:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer1.org2.example.com | [24f6 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ff4 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2156 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f7 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21b3 11-19 05:22:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer1.org1.example.com | [1ff5 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2157 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f8 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21b4 11-19 05:22:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1ff6 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2158 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ff3 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [24f9 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24fa 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2159 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ff7 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002f74000, header channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +peer1.org2.example.com | [24fb 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215a 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [21b5 11-19 05:22:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC15100A1801 +peer1.org1.example.com | [1ff8 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [24fc 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [215b 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer0.org2.example.com | [21b6 11-19 05:22:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F0363A6B406E368179181F5FF6A3C7239EBE5BFB87D412629FCB290198B4505A +peer1.org1.example.com | [1ff9 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [24fd 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer0.org2.example.com | [21b7 11-19 05:22:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer1.org1.example.com | [1ffa 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org2.example.com | [24fe 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [215c 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer0.org2.example.com | [21b8 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ffb 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [24ff 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer0.org2.example.com | [21b9 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ffc 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +peer1.org2.example.com | [2500 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer0.org2.example.com | [21ba 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ffd 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org2.example.com | [2501 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer0.org2.example.com | [21bb 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ffe 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002f6c000 +peer1.org2.example.com | [2502 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004827d10 gate 1574140955678693300 evaluation starts +peer0.org1.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer0.org2.example.com | [21bc 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1fff 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer1.org2.example.com | [2503 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004827d10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [215d 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [21bd 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2000 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [cf1bb7c8-1753-4b7d-9d74-5eb4f0ba9772] +peer1.org2.example.com | [2504 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004827d10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [21be 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2001 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cf1bb7c8-1753-4b7d-9d74-5eb4f0ba9772] +peer1.org2.example.com | [2505 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004827d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [215e 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 c3 c8 0e 4c ab 0d 76 8e 80 e3 e3 |0D. C...L..v....| +peer0.org2.example.com | [21bf 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [2002 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 gate 1574140952786433900 evaluation starts +peer1.org2.example.com | [2506 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004827d10 principal evaluation fails +peer0.org1.example.com | 00000010 a7 f4 27 58 7f d7 b8 97 dd 27 ea f5 ae 7b 66 1f |..'X.....'...{f.| +peer0.org2.example.com | [21c0 11-19 05:22:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2003 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2507 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004827d10 gate 1574140955678693300 evaluation fails +peer0.org1.example.com | 00000020 5a 4d b0 31 02 20 42 d6 0c 5f d7 0e bf 0c a5 af |ZM.1. B.._......| +peer0.org2.example.com | [21c1 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2004 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2508 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 30 e7 08 1b d8 b0 b0 bc 13 d8 35 fb b6 a2 0b c6 |0.........5.....| +peer0.org2.example.com | [21c2 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2005 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 principal matched by identity 0 +peer1.org2.example.com | [2509 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 c5 6e b2 28 42 a9 |.n.(B.| +peer0.org2.example.com | [21c3 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2006 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 68 1c ad b4 bb c1 55 d5 00 b1 31 73 81 e6 77 |.h.....U...1s..w| +peer1.org2.example.com | [250a 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [215f 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [21c4 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000010 13 bb 9b 26 85 b6 a1 2a 9b 2a 9e ae d6 7f 89 36 |...&...*.*.....6| +peer1.org2.example.com | [250b 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880280 gate 1574140955679126500 evaluation starts +peer0.org1.example.com | [2160 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [21c5 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 cc dc 57 81 e1 20 71 52 37 78 d1 0e e6 41 c3 |...W.. qR7x...A.| +peer1.org1.example.com | [2007 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a9 11 75 e6 b6 d8 fc 3f dc e6 f1 |0D. $..u....?...| +peer1.org2.example.com | [250c 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880280 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2161 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 9a 7b 35 89 ee fc bc a2 91 49 e0 f5 56 a3 25 cf |.{5......I..V.%.| +peer1.org1.example.com | 00000010 05 18 53 bd 79 20 d0 5e 12 b1 96 67 4f 41 cc 77 |..S.y .^...gOA.w| +peer1.org2.example.com | [250d 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880280 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2162 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21c6 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 3c 30 6a b8 1e de 79 66 49 3e 54 |0D. 7<0j...yfI>T| +peer1.org1.example.com | 00000020 d2 c8 ab 9d 02 20 0f d1 40 05 e3 ff 8b ab b4 77 |..... ..@......w| +peer1.org2.example.com | [250e 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880280 principal matched by identity 0 +peer0.org1.example.com | [2163 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45614 +peer0.org2.example.com | 00000010 a4 63 47 ff 7c 55 66 d5 56 4e ce e4 26 9b 41 e7 |.cG.|Uf.VN..&.A.| +peer1.org1.example.com | 00000030 0b 32 e1 20 48 7e 06 ea 74 97 31 23 a3 14 40 56 |.2. H~..t.1#..@V| +peer1.org2.example.com | [250f 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org1.example.com | [2164 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00396a820 +peer0.org2.example.com | 00000020 3a ee 77 8c 02 20 42 d4 d2 63 98 2a 38 19 57 30 |:.w.. B..c.*8.W0| +peer1.org1.example.com | 00000040 b8 2d a4 d4 aa 2c |.-...,| +peer1.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org1.example.com | [2165 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | 00000030 c2 1b da 8b 49 1a 95 62 dd 8f 3c ad 57 04 6d 70 |....I..b..<.W.mp| +peer1.org1.example.com | [2008 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2510 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org1.example.com | [2166 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | 00000040 32 53 32 7a 0b 45 |2S2z.E| +peer1.org1.example.com | [2009 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org1.example.com | [2167 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [21c7 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [200a 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 skipping identity 0 because it has already been used +peer1.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org1.example.com | [2168 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org2.example.com | [21c8 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [200b 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 principal evaluation fails +peer1.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org1.example.com | [2169 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [21c9 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [200c 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64fb0 gate 1574140952786433900 evaluation succeeds +peer1.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org1.example.com | [216a 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 61 20 24 f9 40 c3 0b 77 54 02 da 06 f1 ec d2 |Ca $.@..wT......| +peer0.org2.example.com | [21ca 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [200d 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer1.org2.example.com | [2511 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880280 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 9a e9 07 ae 2a a8 19 7d f4 0d 52 f4 e0 97 10 90 |....*..}..R.....| +peer0.org2.example.com | [21cb 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [200e 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org2.example.com | [2512 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880280 gate 1574140955679126500 evaluation succeeds +peer0.org1.example.com | [216b 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 31 89 0a f1 3f 6c 5d 4f b0 28 b8 |0D. z1...?l]O.(.| +peer0.org2.example.com | [21cc 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [200f 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org2.example.com | [2513 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 0c c2 b6 d4 21 4d 7e 1d 5c 1d 59 e6 bf 68 79 f6 |....!M~.\.Y..hy.| +peer0.org2.example.com | [21cd 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2010 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer1.org2.example.com | [2514 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 7d 4d 48 ed 02 20 21 49 c8 88 3e c0 da 45 6c 93 |}MH.. !I..>..El.| +peer0.org2.example.com | [21ce 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2011 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer1.org2.example.com | [2515 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 ef 7b 57 56 65 fe cf b2 36 73 ba 5c 18 45 16 48 |.{WVe...6s.\.E.H| +peer0.org2.example.com | [21cf 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2012 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8eccb5e2-cedb-448e-9fc9-70422ea5b00f] +peer1.org2.example.com | [2516 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 76 93 d5 11 84 9e |v.....| +peer0.org2.example.com | [21d0 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2013 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2517 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [216c 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [21d1 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2014 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8eccb5e2-cedb-448e-9fc9-70422ea5b00f] +peer1.org2.example.com | [2518 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [216d 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00282f1f0, header 0xc00396ac30 +peer0.org2.example.com | [21d2 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2015 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer1.org2.example.com | [2519 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [216e 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org2.example.com | [21d3 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2016 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [46ced2f2-c991-43cd-8609-592b296541e0] +peer1.org2.example.com | [251a 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [216f 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fc0cfc47] processing txid: fc0cfc4777ad95d6a297506084d00c5bfcca2083c696b69474f17b6a0de8874d +peer0.org2.example.com | [21d4 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2017 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [251b 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2170 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [fc0cfc4777ad95d6a297506084d00c5bfcca2083c696b69474f17b6a0de8874d] +peer0.org2.example.com | [21d5 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2018 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [46ced2f2-c991-43cd-8609-592b296541e0] +peer1.org2.example.com | [251c 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2171 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org2.example.com | [21d6 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2019 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 gate 1574140952789146400 evaluation starts +peer1.org2.example.com | [251d 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2172 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer1.org1.example.com | [201a 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21d7 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [251e 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880e70 gate 1574140955680217200 evaluation starts +peer0.org1.example.com | [2173 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer1.org1.example.com | [201b 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [21d8 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [251f 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880e70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2174 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [201c 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | [21d9 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2520 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880e70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2175 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer1.org1.example.com | [201d 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org2.example.com | [21da 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2176 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 gate 1574140951144108500 evaluation starts +peer1.org2.example.com | [2521 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [201e 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [21db 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2177 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2522 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880e70 principal evaluation fails +peer1.org1.example.com | [201f 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [21dc 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2178 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2523 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004880e70 gate 1574140955680217200 evaluation fails +peer1.org1.example.com | [2020 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org2.example.com | [21dd 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2179 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2524 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2021 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [21de 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [217a 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 principal evaluation fails +peer1.org2.example.com | [2525 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2022 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 principal matched by identity 0 +peer0.org2.example.com | [21df 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [217b 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 gate 1574140951144108500 evaluation fails +peer1.org2.example.com | [2526 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2023 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +peer0.org2.example.com | [21e0 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [217c 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [2527 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048813e0 gate 1574140955680626500 evaluation starts +peer1.org1.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +peer0.org2.example.com | [21e1 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [217d 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [2528 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048813e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2024 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +peer0.org2.example.com | [21e2 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [217e 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer1.org2.example.com | [2529 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048813e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +peer0.org2.example.com | [21e3 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [217f 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 gate 1574140951146335300 evaluation starts +peer1.org2.example.com | [252a 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048813e0 principal matched by identity 0 +peer1.org1.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +peer0.org2.example.com | [21e4 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2180 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [252b 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer1.org1.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +peer0.org2.example.com | [21e5 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2181 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer1.org1.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR| +peer0.org2.example.com | [21e6 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2182 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [252c 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer1.org1.example.com | [2025 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21e7 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2183 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer1.org1.example.com | [2026 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [21e8 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2184 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer1.org1.example.com | [2027 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 skipping identity 0 because it has already been used +peer0.org2.example.com | [21e9 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [2185 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 principal matched by identity 0 +peer1.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer1.org1.example.com | [2028 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 principal evaluation fails +peer0.org2.example.com | [21ea 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2186 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 61 20 24 f9 40 c3 0b 77 54 02 da 06 f1 ec d2 |Ca $.@..wT......| +peer1.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer1.org1.example.com | [2029 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65f00 gate 1574140952789146400 evaluation succeeds +peer0.org2.example.com | [21eb 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 9a e9 07 ae 2a a8 19 7d f4 0d 52 f4 e0 97 10 90 |....*..}..R.....| +peer1.org2.example.com | [252d 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048813e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [202a 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org2.example.com | [21ec 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2187 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 31 89 0a f1 3f 6c 5d 4f b0 28 b8 |0D. z1...?l]O.(.| +peer1.org2.example.com | [252e 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048813e0 gate 1574140955680626500 evaluation succeeds +peer1.org1.example.com | [202b 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b appears to be valid +peer0.org2.example.com | [21ed 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 0c c2 b6 d4 21 4d 7e 1d 5c 1d 59 e6 bf 68 79 f6 |....!M~.\.Y..hy.| +peer1.org2.example.com | [252f 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [202c 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002f6c000 +peer0.org2.example.com | [21ee 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000020 7d 4d 48 ed 02 20 21 49 c8 88 3e c0 da 45 6c 93 |}MH.. !I..>..El.| +peer1.org2.example.com | [2530 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [202d 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003206400 env 0xc004027860 txn 0 +peer0.org2.example.com | [21ef 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 ef 7b 57 56 65 fe cf b2 36 73 ba 5c 18 45 16 48 |.{WVe...6s.\.E.H| +peer1.org2.example.com | [2531 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [202e 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [21f0 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000040 76 93 d5 11 84 9e |v.....| +peer1.org2.example.com | [2532 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [202f 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 17ms +peer0.org2.example.com | [21f1 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2188 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2533 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2030 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [21f2 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2189 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 gate 1574140951146335300 evaluation succeeds +peer1.org2.example.com | [2534 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2031 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [21f3 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [218a 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [2535 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2032 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer0.org2.example.com | [21f4 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [218b 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [2536 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [2033 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [21f5 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [218c 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org2.example.com | [2537 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2034 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [21f6 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925850 gate 1574140950774613500 evaluation starts +peer0.org1.example.com | [218d 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer1.org2.example.com | [2538 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2035 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [21f7 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [218e 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [2539 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2036 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer0.org2.example.com | [21f8 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925850 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [218f 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [fc0cfc4777ad95d6a297506084d00c5bfcca2083c696b69474f17b6a0de8874d] +peer1.org2.example.com | [253a 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2037 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [21f9 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2190 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fc0cfc47] Entry chaincode: name:"exp02" +peer1.org2.example.com | [253b 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2038 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [21fa 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925850 principal evaluation fails +peer0.org1.example.com | [2191 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [253c 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2039 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [21fb 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925850 gate 1574140950774613500 evaluation fails +peer0.org1.example.com | [2192 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fc0cfc47] Exit +peer1.org2.example.com | [253d 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes +peer1.org1.example.com | [203a 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer0.org2.example.com | [21fc 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2193 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fc0cfc4777ad95d6a297506084d00c5bfcca2083c696b69474f17b6a0de8874d] +peer1.org2.example.com | [253e 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes +peer1.org1.example.com | [203b 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] marked as valid by state validator +peer0.org2.example.com | [21fd 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2194 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45614 +peer1.org2.example.com | [253f 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21fe 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [203c 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00325cd80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00325cdc0), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc00325ce40)} +peer0.org1.example.com | [2195 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45614 grpc.code=OK grpc.call_duration=14.7412ms +peer1.org2.example.com | [2540 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21ff 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925dc0 gate 1574140950775086500 evaluation starts +peer1.org1.example.com | [203d 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [2196 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45614: read: connection reset by peer +peer1.org2.example.com | [2541 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [2200 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [203e 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [2197 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2542 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2201 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925dc0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [203f 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [2198 11-19 05:22:31.16 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2543 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [2202 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925dc0 principal matched by identity 0 +peer1.org1.example.com | [2040 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0028208c0)}} +peer0.org1.example.com | [2199 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2544 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a82f0 gate 1574140955726150200 evaluation starts +peer0.org2.example.com | [2203 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e4 30 87 86 5f d1 01 bc e0 9a 62 f0 c5 66 0f |..0.._.....b..f.| +peer1.org1.example.com | [2041 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer0.org1.example.com | [219a 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2545 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a82f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 24 87 6e 3d 09 99 e7 1d 24 7c 6e 74 48 bc f0 d7 |$.n=....$|ntH...| +peer1.org1.example.com | [2042 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [219b 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2546 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a82f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2204 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 ed 6c cd e1 53 cb 09 94 a1 4a bd |0D. '.l..S....J.| +peer1.org1.example.com | [2043 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [219c 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2547 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a82f0 principal matched by identity 0 +peer0.org2.example.com | 00000010 51 7c 17 78 79 07 bd 93 bd bd d1 ed 3c 2f fd 0a |Q|.xy....... DEBU Created metadata tar +peer0.org1.example.com | [219d 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2548 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 ed f2 59 b7 75 b6 39 ba 3e 28 99 8b 0d 78 e8 |...Y.u.9.>(...x.| +peer0.org2.example.com | 00000020 f7 c7 bc b6 02 20 19 e7 0c 56 ce 6b 98 5e 56 37 |..... ...V.k.^V7| +peer1.org1.example.com | [2045 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer0.org1.example.com | [219e 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 20 58 38 ef 5e 0b 8e da 58 bf 65 c1 01 dc 5a f0 | X8.^...X.e...Z.| +peer0.org2.example.com | 00000030 5f ad 34 af 1f b5 87 c3 74 aa e6 f8 83 38 26 58 |_.4.....t....8&X| +peer1.org1.example.com | [2046 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [219f 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2549 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 5c 0d 87 a4 70 1b 10 6c d4 f0 |0E.!..\...p..l..| +peer0.org2.example.com | 00000040 eb 83 a1 96 30 fb |....0.| +peer1.org1.example.com | [2047 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer0.org1.example.com | [21a0 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 3c 50 1f 94 e5 d4 40 42 51 be 8d d2 1a 63 6d 26 | DEBU 0xc004925dc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2048 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [21a1 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 56 71 0a 97 0d 02 20 1f 32 11 be bc fa fa b1 0d |Vq.... .2.......| +peer0.org2.example.com | [2206 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925dc0 gate 1574140950775086500 evaluation succeeds +peer1.org1.example.com | [2049 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 69 116 74 120 69 56 69 56 48 101 56 103 51 104 103 47 118 49 73 88 99 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 80 102 111 117 43 101 66 81 80 122 113 10 51 78 70 87 83 68 43 101 119 75 121 102 77 100 75 79 75 75 112 102 99 104 52 47 104 76 68 47 48 113 52 48 87 53 49 98 82 108 68 84 75 111 76 119 52 73 67 104 121 111 76 79 51 69 90 117 118 90 57 55 100 98 112 119 10 105 113 99 97 66 101 90 68 55 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 76 53 52 122 43 102 79 74 76 54 51 75 110 105 69 120 72 109 98 77 115 48 100 115 107 69 53 102 43 77 106 111 66 79 52 90 78 122 106 89 57 65 50 65 105 65 109 103 70 81 50 10 81 112 81 85 69 114 48 104 49 108 43 75 117 76 55 73 118 84 85 107 98 73 118 79 122 116 113 113 48 99 76 111 54 105 112 114 53 81 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 142 199 17 147 47 183 106 1 67 138 124 9 15 162 0 121 191 223 119 172 136 63 140 163 61 172 114 67 30 234 14 229 2 32 99 138 182 51 225 130 233 249 189 47 251 71 219 211 89 224 109 89 173 59 181 126 181 248 82 33 227 139 23 115 160 58]} 0x152c9b0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00261a600 0xc0024eac00 {{0 0} 0 0 0 0} {false}})]} +peer0.org1.example.com | [21a2 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 ee 8c 6b 2e 31 ba 5d 40 af 6d 64 20 bc b4 1a e9 |..k.1.]@.md ....| +peer0.org2.example.com | [2207 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [204a 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [21a3 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 eb 94 b6 38 ae 9e 3b |...8..;| +peer0.org2.example.com | [2208 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [204b 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00034ec20})} +peer0.org1.example.com | [21a4 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2209 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [254a 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a82f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [204c 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer0.org1.example.com | [21a5 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [220a 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [204d 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer0.org1.example.com | [21a6 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [220b 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [254b 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a82f0 gate 1574140955726150200 evaluation succeeds +peer1.org1.example.com | [204e 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer0.org1.example.com | [21a7 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [220c 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [254c 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [204f 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer0.org1.example.com | [21a8 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [220d 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [254d 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2050 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xaf, 0xe8, 0x73, 0x33, 0x36, 0xd, 0xf9, 0x12, 0x19, 0x79, 0xd, 0x24, 0x42, 0x5b, 0x7d, 0xa9, 0x98, 0xab, 0xce, 0xdc, 0x98, 0x36, 0x45, 0x6e, 0x26, 0x2b, 0x86, 0x76, 0x6a, 0x37, 0x47, 0x75} txOffsets= +peer0.org1.example.com | [21a9 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [220e 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [254e 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | txId=afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b locPointer=offset=70, bytesLength=3516 +peer0.org1.example.com | [21aa 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [220f 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [254f 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | ] +peer0.org1.example.com | [21ab 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2210 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2550 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [2051 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to txid-index +peer0.org1.example.com | [21ac 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2211 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2551 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer1.org1.example.com | [2052 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx number:[0] ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to blockNumTranNum index +peer0.org1.example.com | [21ad 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 gate 1574140951319754900 evaluation starts +peer0.org2.example.com | [2212 11-19 05:22:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2552 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2053 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81396], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org1.example.com | [21ae 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2213 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2553 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [2054 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org1.example.com | [21af 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2214 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2554 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org1.example.com | [2055 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org1.example.com | [21b0 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 principal matched by identity 0 +peer0.org2.example.com | [2215 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2555 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [21b1 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [2056 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org2.example.com | [2216 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2556 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [2057 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [2217 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2557 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21b2 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [2058 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [2218 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2558 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [2059 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [2219 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2559 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [205a 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [221a 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [255a 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [205b 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org2.example.com | [221b 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [255b 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [205c 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [221c 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [255d 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21b3 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [205d 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [221d 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [255c 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org1.example.com | [21b4 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 gate 1574140951319754900 evaluation succeeds +peer1.org1.example.com | [205e 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [221e 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [255e 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org1.example.com | [21b5 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [205f 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer1.org2.example.com | [255f 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org2.example.com | [221f 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21b6 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2062 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer1.org2.example.com | [2560 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org2.example.com | [2220 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b7 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2060 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [af103bfd-c40d-43a5-996e-3877dc9c86c5] +peer1.org2.example.com | [2561 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [2221 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [21b8 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2064 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer1.org2.example.com | [2562 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00449fd00 env 0xc00479bea0 txn 0 +peer0.org2.example.com | [2222 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151023 +peer0.org1.example.com | [21b9 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [2065 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2563 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00479bea0 +peer0.org2.example.com | [2223 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 47ACDFE13EFA6A101C43E3DD0900D28F1F9AC72BEFCD44CC44CFF7F38EFA6A4E +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [2066 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer1.org2.example.com | [2564 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +peer0.org2.example.com | [2224 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [21ba 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [2067 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [af103bfd-c40d-43a5-996e-3877dc9c86c5] +peer1.org2.example.com | [2565 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2225 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [2068 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org2.example.com | [2566 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2226 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [2069 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2567 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2227 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [206a 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F0B3D5E6FC999EEC15...08031A0C0A0565787030321203312E30 +peer1.org2.example.com | [2568 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org2.example.com | [2228 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [206b 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 949DE2F6D31FDCCFB113BF27CED57577E3701B5404E4DFE8AC7D81797E01563C +peer1.org2.example.com | [2569 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2229 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21bb 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [206c 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org2.example.com | [256a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c0 b3 ab 85 aa 28 ac a0 48 cd eb e0 3f c0 10 |......(..H...?..| +peer0.org2.example.com | [222a 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21bc 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2061 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | 00000010 fa ba 63 4b 4c 70 86 bb ba 67 f9 8c 83 44 7d da |..cKLp...g...D}.| +peer0.org2.example.com | [222b 11-19 05:22:30.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21bd 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [206d 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer1.org2.example.com | [256b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ba 1f e0 56 b8 c9 8f 25 b9 ac a3 |0D. +...V...%...| +peer0.org2.example.com | [222c 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21be 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [206e 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer1.org2.example.com | 00000010 12 3b e9 8e 83 b7 ad 48 2a a8 cc bc a2 c1 8d f1 |.;.....H*.......| +peer0.org2.example.com | [222d 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21bf 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [2063 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org2.example.com | 00000020 a6 e6 65 91 02 20 10 fb c7 3f ec 92 df 9d 88 d2 |..e.. ...?......| +peer0.org2.example.com | [222e 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21c0 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [206f 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer1.org2.example.com | 00000030 a5 4a 4a 02 63 87 22 e8 5c dd d5 12 ce 57 f2 ab |.JJ.c.".\....W..| +peer0.org2.example.com | [222f 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21c1 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2070 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 23ms (state_validation=1ms block_and_pvtdata_commit=12ms state_commit=7ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer1.org2.example.com | 00000040 85 6b 5f 12 56 05 |.k_.V.| +peer0.org2.example.com | [2230 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21c2 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2071 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [256c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [2231 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21c3 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2072 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F0B3D5E6FC999EEC15...08041A0C0A0565787030321203312E30 +peer1.org2.example.com | [256d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003697800, header channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +peer0.org2.example.com | [2232 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21c4 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2073 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D45099C85CBBE26E2392B8A93F6A204DA27355AC96214584EF0D11CC25C65B77 +peer1.org2.example.com | [256e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [2233 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2074 11-19 05:22:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org1.example.com | [21c5 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 gate 1574140951329045400 evaluation starts +peer1.org2.example.com | [256f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [2234 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2075 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [21c6 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2570 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [2235 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2076 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 51 d2 9a 45 1e bb c3 91 2a 56 6c 5b 5e ca cc |.Q..E....*Vl[^..| +peer0.org1.example.com | [21c7 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2571 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [2236 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 f1 f7 4c 0b 4c bc c1 21 45 f9 2d 10 b1 44 05 78 |..L.L..!E.-..D.x| +peer0.org1.example.com | [21c8 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 principal matched by identity 0 +peer1.org2.example.com | [2572 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +peer0.org2.example.com | [2237 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2077 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee d6 d8 d5 f6 d7 b1 69 90 82 94 |0E.!........i...| +peer0.org1.example.com | [21c9 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [2573 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2238 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 cb 2c 71 34 2c 4e 21 b0 30 01 08 60 d5 e6 20 5e |.,q4,N!.0..`.. ^| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [2574 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0025f3000 +peer0.org2.example.com | [2239 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 43 9c 45 fb 82 02 20 4a bd d1 9e 4f c5 21 a5 ac |C.E... J...O.!..| +peer0.org1.example.com | [21ca 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [2575 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5ccff57d-0f98-4a70-a14c-ce7b733f4582] +peer0.org2.example.com | [223a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 e0 11 7a 0c 94 c6 6d 6d 3e 92 e8 9f 56 59 a2 1f |..z...mm>...VY..| +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [2576 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [223b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 04 86 f7 a8 c7 66 35 |.....f5| +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [2577 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5ccff57d-0f98-4a70-a14c-ce7b733f4582] +peer0.org2.example.com | [223c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [2078 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [2578 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [223d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2079 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [2579 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b631708f-1471-4ac2-980e-b5a76d4dbd49] +peer0.org2.example.com | [223e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [207a 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21cb 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [257a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b631708f-1471-4ac2-980e-b5a76d4dbd49] +peer0.org2.example.com | [223f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [207b 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21cc 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 gate 1574140951329045400 evaluation succeeds +peer1.org2.example.com | [257b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 gate 1574140955743889400 evaluation starts +peer0.org2.example.com | [2240 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [207c 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21cd 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [257c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2241 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [21ce 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [207d 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [257d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2242 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [21cf 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [207e 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [257e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 principal matched by identity 0 +peer0.org2.example.com | [2243 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [21d0 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [207f 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 f0 c4 7c 3e 88 17 f1 a3 8e 02 c3 b4 36 af 7c |...|>........6.|| +peer1.org2.example.com | [257f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f a3 74 46 04 ec 07 45 22 0e 52 a6 69 f1 d8 e9 |..tF...E".R.i...| +peer0.org2.example.com | [2244 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049844e0 gate 1574140950857920300 evaluation starts +peer0.org1.example.com | [21d1 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000010 dd a4 e4 b8 dd d8 f7 59 6b f2 94 75 2b 47 3e 33 |.......Yk..u+G>3| +peer1.org2.example.com | 00000010 69 67 64 3d bd 51 5f 4e ea a4 d4 24 59 ab 96 c7 |igd=.Q_N...$Y...| +peer0.org2.example.com | [2245 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049844e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [2080 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 74 6d 61 d7 92 d0 37 5c d1 7f 37 |0D. .tma...7\..7| +peer1.org2.example.com | [2580 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 83 48 62 d2 15 d8 8b 02 94 61 |0E.!...Hb......a| +peer0.org2.example.com | [2246 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049844e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [21d2 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000010 80 ea ae 9e 58 af 59 33 01 05 07 28 d5 45 ec 8e |....X.Y3...(.E..| +peer1.org2.example.com | 00000010 a3 bc 7f a1 61 8c 6a 43 bb 2b c7 21 7f 34 7b b4 |....a.jC.+.!.4{.| +peer0.org2.example.com | [2247 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049844e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000020 43 bb 26 11 02 20 55 94 b5 d2 83 b2 30 e8 0c 9d |C.&.. U.....0...| +peer1.org2.example.com | 00000020 16 d9 74 39 e5 02 20 29 7d 53 f0 81 0a 5f 5b ce |..t9.. )}S..._[.| +peer0.org2.example.com | [2248 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049844e0 principal evaluation fails +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000030 e8 26 0a ef 92 8f 74 4a bd 3b 42 ab 65 15 26 aa |.&....tJ.;B.e.&.| +peer1.org2.example.com | 00000030 cc 8b 9f de 9b 11 47 a5 fe bd d1 5b bf c4 05 d9 |......G....[....| +peer0.org2.example.com | [2249 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049844e0 gate 1574140950857920300 evaluation fails +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000040 4e 3a cb a4 63 be |N:..c.| +peer1.org2.example.com | 00000040 ac 19 ac 2b e3 a2 e5 |...+...| +peer0.org2.example.com | [224a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [2081 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2581 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [224b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21d3 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2082 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2582 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [224c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [21d4 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [2083 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2583 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 skipping identity 0 because it has already been used +peer0.org2.example.com | [224d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004984a50 gate 1574140950858196800 evaluation starts +peer0.org1.example.com | [21d5 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | [2084 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2584 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 principal evaluation fails +peer0.org2.example.com | [224e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004984a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [2085 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2585 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d0360 gate 1574140955743889400 evaluation succeeds +peer0.org2.example.com | [224f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004984a50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [21d6 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [2086 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2586 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5f29632a-90dc-4765-a8ff-ea796c1a64f5] +peer0.org2.example.com | [2250 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004984a50 principal matched by identity 0 +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [2087 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2587 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5f29632a-90dc-4765-a8ff-ea796c1a64f5] +peer0.org2.example.com | [2251 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [2088 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2588 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [2089 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2589 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff appears to be valid +peer0.org2.example.com | [2252 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [208a 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [258a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0025f3000 +peer0.org2.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer0.org1.example.com | [21d7 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [208b 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [258b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00449fd00 env 0xc00479bea0 txn 0 +peer0.org2.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [208c 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [258c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer0.org1.example.com | [21d8 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | [208d 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [258d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 7ms +peer0.org2.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [208e 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [258e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [2253 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004984a50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [208f 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [258f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [2254 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004984a50 gate 1574140950858196800 evaluation succeeds +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [2090 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2590 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer0.org2.example.com | [2255 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [2091 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2591 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [2256 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [21d9 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2093 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2592 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [2257 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [21da 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2094 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2593 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [2258 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [21db 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2092 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2594 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer0.org2.example.com | [2259 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [21dc 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2095 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2595 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [225a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [21dd 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2096 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2596 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [225b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [21de 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2097 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2597 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [225c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [21df 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2098 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2598 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [225d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [21e0 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2099 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2599 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [225e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21e1 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 gate 1574140951340558900 evaluation starts +peer1.org1.example.com | [209a 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [259a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [225f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21e2 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [209b 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [259b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2260 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21e3 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [209c 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [259c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [2261 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | [21e4 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 principal matched by identity 0 +peer1.org1.example.com | [209d 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [259d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] marked as valid by state validator +peer0.org2.example.com | [2262 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21e5 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [209e 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [259e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0046b5b80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0046b5bc0)} +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [2263 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [209f 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [259f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [21e6 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [2264 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20a0 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25a0 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [2265 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [20a1 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [25a1 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | [20a2 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [25a2 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [20a3 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer0.org2.example.com | [2266 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:T\244cG\377|Uf\325VN\316\344&\233A\347:\356w\214\002 B\324\322c\230*8\031W0\302\033\332\213I\032\225b\335\217<\255W\004mp2S2z\013E" > alive: +peer1.org2.example.com | [25a3 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org1.example.com | [21e7 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer0.org2.example.com | [2267 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [25a4 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org1.example.com | [21e8 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 gate 1574140951340558900 evaluation succeeds +peer1.org1.example.com | [20a4 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer0.org2.example.com | [2268 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25a5 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org1.example.com | [21e9 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer0.org2.example.com | [2269 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [21ea 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21eb 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer0.org2.example.com | [226a 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25a6 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x4, 0xe7, 0xc, 0x85, 0x3a, 0x49, 0x30, 0x52, 0x72, 0xab, 0xdb, 0xa8, 0x7b, 0x33, 0xba, 0x1c, 0xf9, 0x58, 0x99, 0xbf, 0x89, 0xa6, 0x5d, 0x1d, 0xca, 0x40, 0x6d, 0xa0, 0xbc, 0x4d, 0x3d, 0x62} txOffsets= +peer0.org1.example.com | [21ec 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer0.org2.example.com | [226b 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | txId=e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff locPointer=offset=70, bytesLength=2977 +peer0.org1.example.com | [21ed 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer0.org2.example.com | [226c 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | ] +peer0.org1.example.com | [21ee 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20a5 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [226d 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25a7 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81467, bytesLength=2977] for tx ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to txid-index +peer0.org1.example.com | [21ef 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [226e 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [25a8 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81467, bytesLength=2977] for tx number:[0] ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to blockNumTranNum index +peer0.org1.example.com | [21f0 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20a6 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 db 9e 6e 26 0c b2 72 69 24 c8 2e |0D. &..n&..ri$..| +peer0.org2.example.com | [226f 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [25a9 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85417], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org2.example.com | [25aa 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org1.example.com | 00000010 6c 99 97 b0 50 e5 19 62 5d df 77 11 30 9a ac c5 |l...P..b].w.0...| +peer0.org2.example.com | [2270 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [25ab 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org1.example.com | [21f1 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 23 b8 6d 93 02 20 5b 6e d4 1e 04 f2 cb 61 de 97 |#.m.. [n.....a..| +peer0.org2.example.com | [2271 11-19 05:22:31.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25ac 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org1.example.com | [21f2 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000030 36 05 80 48 c4 11 b2 82 b9 f1 f6 c9 2e 84 67 14 |6..H..........g.| +peer0.org2.example.com | [2272 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\272\246\277jF[W\221\366x\3254?=-o_D&\350{\305$\002 \\\326\361\n\275\332\016R\2643\364\223\370\033\376\257\273&\023\234\211\027\366\360&\026\250H\250JV\252" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [21f3 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000040 60 c9 fa b3 d6 41 |`....A| +peer0.org2.example.com | [2273 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25ad 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [21f4 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [20a7 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2274 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\272\246\277jF[W\221\366x\3254?=-o_D&\350{\305$\002 \\\326\361\n\275\332\016R\2643\364\223\370\033\376\257\273&\023\234\211\027\366\360&\026\250H\250JV\252" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [25ae 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [21f5 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 gate 1574140951345244400 evaluation starts +peer1.org1.example.com | [20a8 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2275 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [25af 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [21f6 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [20a9 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2276 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer1.org2.example.com | [25b0 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [21f7 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [20aa 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer1.org2.example.com | [25b1 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [21f8 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 principal matched by identity 0 +peer1.org1.example.com | [20ab 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [21f9 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [2277 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer1.org2.example.com | [25b2 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [20ac 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer1.org2.example.com | [25b3 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [20ad 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21fa 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer1.org2.example.com | [25b4 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [20ae 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer1.org2.example.com | [25b5 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20af 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer1.org2.example.com | [25b6 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [20b0 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [2278 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | [25b7 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20b1 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [25b8 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20b2 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21fb 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2279 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 2f 42 28 76 3a bd bb 3e ba a6 |0E.!../B(v:..>..| +peer1.org2.example.com | [25b9 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [20b3 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [21fc 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 gate 1574140951345244400 evaluation succeeds +peer0.org2.example.com | 00000010 bf 6a 46 5b 57 91 f6 78 d5 34 3f 3d 2d 6f 5f 44 |.jF[W..x.4?=-o_D| +peer1.org2.example.com | [25ba 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [21fd 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20b4 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 26 e8 7b c5 24 02 20 5c d6 f1 0a bd da 0e 52 b4 |&.{.$. \......R.| +peer1.org2.example.com | [25bb 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [21fe 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20b5 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 33 f4 93 f8 1b fe af bb 26 13 9c 89 17 f6 f0 26 |3.......&......&| +peer1.org2.example.com | [25bc 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d18e0 gate 1574140955761711900 evaluation starts +peer0.org1.example.com | [21ff 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [20b6 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 16 a8 48 a8 4a 56 aa |..H.JV.| +peer1.org2.example.com | [25bd 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d18e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2200 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [20b7 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [227a 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [25be 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d18e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [20b8 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2201 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [227b 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [25bf 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d18e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [20b9 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2202 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer0.org2.example.com | [227c 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [25c0 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d18e0 principal evaluation fails +peer1.org1.example.com | [20ba 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2203 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [227d 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [25c1 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d18e0 gate 1574140955761711900 evaluation fails +peer1.org1.example.com | [20bb 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2204 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [227e 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [25c2 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20bc 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org1.example.com | [2205 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [227f 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25c3 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org1.example.com | [2206 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2280 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20bd 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org2.example.com | [25c4 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2207 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2281 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org2.example.com | [25c5 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d1e50 gate 1574140955762115900 evaluation starts +peer0.org1.example.com | [2208 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2282 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org2.example.com | [25c6 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d1e50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2209 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2283 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org2.example.com | [25c7 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d1e50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [220a 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2284 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org2.example.com | [25c8 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d1e50 principal matched by identity 0 +peer0.org1.example.com | [220b 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2285 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [20be 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25c9 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org1.example.com | [220c 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 gate 1574140951350180500 evaluation starts +peer0.org2.example.com | [2286 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\272\246\277jF[W\221\366x\3254?=-o_D&\350{\305$\002 \\\326\361\n\275\332\016R\2643\364\223\370\033\376\257\273&\023\234\211\027\366\360&\026\250H\250JV\252" > > alive: +peer1.org1.example.com | [20bf 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org1.example.com | [220d 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2287 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [20c0 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25ca 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org1.example.com | [220e 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2288 11-19 05:22:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20c1 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org1.example.com | [220f 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 principal matched by identity 0 +peer0.org2.example.com | [2289 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20c2 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org1.example.com | [2210 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | [228a 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c3 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [228b 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c4 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036df880 gate 1574140955351011600 evaluation starts +peer1.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org1.example.com | [2211 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | [228c 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c5 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036df880 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25cb 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d1e50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | [228d 11-19 05:22:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20c6 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036df880 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [25cc 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d1e50 gate 1574140955762115900 evaluation succeeds +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | [228e 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [20c7 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036df880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [25cd 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | [228f 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [20c8 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036df880 principal evaluation fails +peer1.org2.example.com | [25ce 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [2290 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c9 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036df880 gate 1574140955351011600 evaluation fails +peer1.org2.example.com | [25cf 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2212 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2291 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20ca 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25d0 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2213 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 gate 1574140951350180500 evaluation succeeds +peer0.org2.example.com | [2292 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20cb 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25d1 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2214 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2293 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20cc 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [25d2 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [2215 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2294 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20cd 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfdf0 gate 1574140955351271300 evaluation starts +peer1.org2.example.com | [25d3 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org1.example.com | [2216 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2295 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20ce 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfdf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25d4 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org1.example.com | [2217 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [20cf 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfdf0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [25d5 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org2.example.com | [2296 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [2218 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | [20d0 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfdf0 principal matched by identity 0 +peer1.org2.example.com | [25d6 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [2297 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | [20d1 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer1.org2.example.com | [25d7 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org2.example.com | [2298 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2219 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer1.org2.example.com | [25d8 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org2.example.com | [2299 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | [20d2 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org2.example.com | [25d9 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org2.example.com | [229a 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org2.example.com | [25da 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 22ms (state_validation=0ms block_and_pvtdata_commit=12ms state_commit=3ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org2.example.com | [229b 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org2.example.com | [25db 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [229c 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org2.example.com | [25dc 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E49FD3F4FE999EEC15...08051A0C0A0565787030321203312E30 +peer0.org2.example.com | [229d 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [221a 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org2.example.com | [25dd 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 11685EEC95402BBE176E6F63E0914A20474313038F06D6DC403D8DF1AAE2F622 +peer0.org2.example.com | [229e 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | [20d3 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfdf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [25de 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer0.org2.example.com | [229f 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [221b 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [20d4 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfdf0 gate 1574140955351271300 evaluation succeeds +peer1.org2.example.com | [25df 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22a0 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [20d5 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25e0 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a1 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [20d6 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25e1 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22a2 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [20d7 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [25e2 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [22a3 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [20d8 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [25e3 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22a4 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [221c 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20d9 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a5 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [25e4 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [221d 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20da 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [22a6 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25e5 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [221e 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [22a7 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [20db 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [25e6 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [221f 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22a8 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [20dc 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer1.org2.example.com | [25e7 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2220 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22a9 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer1.org2.example.com | [25e8 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2221 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [22aa 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [20dd 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org2.example.com | [25e9 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2222 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [22ab 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org2.example.com | [25ea 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930520 gate 1574140955782207200 evaluation starts +peer0.org1.example.com | [2223 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [22ac 11-19 05:22:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org2.example.com | [25eb 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930520 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2224 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 gate 1574140951357411400 evaluation starts +peer0.org2.example.com | [22ad 11-19 05:22:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org2.example.com | [25ec 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930520 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2225 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [22ae 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151024 +peer1.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org2.example.com | [25ed 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2226 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [22af 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0F585F9E845823C00D5527AECC541D9E78E550DB1238071028AED413161439E5 +peer1.org1.example.com | [20de 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25ee 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930520 principal evaluation fails +peer0.org1.example.com | [2227 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 principal matched by identity 0 +peer0.org2.example.com | [22b0 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [20df 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25ef 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930520 gate 1574140955782207200 evaluation fails +peer0.org1.example.com | [2228 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [22b1 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [20e0 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [25f0 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [22b2 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [20e1 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer1.org2.example.com | [25f1 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2229 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [22b3 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer1.org2.example.com | [25f2 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [22b4 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20e2 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org2.example.com | [25f3 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930a90 gate 1574140955783446000 evaluation starts +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [25f4 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930a90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [25f5 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930a90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [22b5 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [25f6 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930a90 principal matched by identity 0 +peer0.org2.example.com | [22b6 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org1.example.com | [222a 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [25f7 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a cc 27 83 b1 e7 ff 4a b4 a4 9e 4f de 82 de e9 |J.'....J...O....| +peer0.org2.example.com | [22b7 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org1.example.com | [222b 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 gate 1574140951357411400 evaluation succeeds +peer1.org2.example.com | 00000010 b2 1a 64 00 36 a8 20 a9 42 c7 26 bb 6f d1 78 fb |..d.6. .B.&.o.x.| +peer0.org2.example.com | [22b8 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20e3 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [222c 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25f8 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 24 ee 38 6d 7d 75 4e ba db 1d de |0D. .$.8m}uN....| +peer0.org2.example.com | [22b9 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [20e4 11-19 05:22:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [222d 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 82 fe d5 e1 0a 39 11 9d 73 73 1e 41 8a 7f a4 08 |.....9..ss.A....| +peer0.org2.example.com | [22ba 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [20e5 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [222e 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 18 9e 0d c9 02 20 43 82 73 95 f0 88 8e 61 1f 36 |..... C.s....a.6| +peer0.org2.example.com | [22bb 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20e6 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [222f 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 69 29 0f bb 93 16 ee e3 e7 c1 29 22 79 b1 09 4c |i)........)"y..L| +peer0.org2.example.com | [22bc 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [20e7 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2230 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 5b 67 24 b0 a4 ed |[g$...| +peer0.org2.example.com | [22bd 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20e8 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2231 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [25f9 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930a90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [22be 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [20e9 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2232 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [25fa 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004930a90 gate 1574140955783446000 evaluation succeeds +peer0.org2.example.com | [22bf 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20ea 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2233 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [25fb 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22c0 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [20eb 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2234 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25fc 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22c1 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [20ec 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2235 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25fd 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [22c2 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer1.org1.example.com | [20ed 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2236 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25fe 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer1.org1.example.com | [20ee 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2237 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25ff 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22c3 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer1.org1.example.com | [20ef 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2238 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2600 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer1.org1.example.com | [20f0 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2239 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2601 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer1.org1.example.com | [20f1 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [223a 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [2602 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer1.org1.example.com | [20f2 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223b 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2603 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer0.org1.example.com | [223c 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20f3 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2604 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22c4 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [20f4 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2605 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [223d 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20f5 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2606 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22c5 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 ab a7 53 22 ca a0 36 b2 36 57 |0E.!....S"..6.6W| +peer0.org1.example.com | [223e 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [20f6 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2607 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 f2 89 3b 7e 51 83 91 62 f1 b0 1f c7 f0 be bc df |..;~Q..b........| +peer0.org1.example.com | [223f 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20f7 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2608 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 1a ec 7b 12 42 02 20 28 d1 f6 b3 b9 96 54 8a 42 |..{.B. (.....T.B| +peer0.org1.example.com | [2240 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20f8 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2609 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ea 6c 19 f2 e2 97 01 b7 3f c2 05 76 ec 5e 89 fc |.l......?..v.^..| +peer0.org1.example.com | [2241 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [20f9 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003873780 gate 1574140955389952500 evaluation starts +peer1.org2.example.com | [260a 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 1a 37 39 f3 26 4e e2 |.79.&N.| +peer0.org1.example.com | [2242 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [20fa 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003873780 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [260b 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22c6 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2243 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20fb 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003873780 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [260c 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22c7 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2244 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20fc 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003873780 principal matched by identity 0 +peer1.org2.example.com | [260d 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22c8 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2245 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20fd 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 3a 00 bc 69 6e f2 13 07 74 24 f5 45 d6 de aa |$:..in...t$.E...| +peer0.org2.example.com | [22c9 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [260e 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2246 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 c8 2e fa ed 3e 0e 08 74 51 bb 9a f4 a4 27 56 e8 |....>..tQ....'V.| +peer0.org2.example.com | [22ca 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [260f 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2247 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20fe 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 87 8d e1 a2 9c bd 35 2b 82 00 |0E.!........5+..| +peer0.org2.example.com | [22cb 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2610 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2248 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 b5 85 be 42 91 7e 25 23 ee b5 0b d2 23 76 6d f5 |...B.~%#....#vm.| +peer1.org2.example.com | [2611 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22cc 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2249 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 ab e6 5e 75 42 02 20 08 f3 e3 7f f3 ea b1 91 6b |..^uB. ........k| +peer1.org2.example.com | [2612 11-19 05:22:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22cd 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [224a 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 bb aa 34 d7 eb c2 78 5e 41 d6 60 1b ff f5 bb 3f |..4...x^A.`....?| +peer1.org2.example.com | [2613 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22ce 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer0.org1.example.com | [224b 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 c7 da 72 ab d1 8c c8 |..r....| +peer1.org2.example.com | [2614 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer0.org1.example.com | [224c 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [20ff 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003873780 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2615 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [22cf 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer0.org1.example.com | [224d 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2100 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003873780 gate 1574140955389952500 evaluation succeeds +peer1.org2.example.com | [2616 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer0.org1.example.com | [224e 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2101 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2617 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer0.org1.example.com | [224f 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2102 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2618 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer0.org1.example.com | [2250 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2103 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2619 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer0.org1.example.com | [2251 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2104 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [261a 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22d0 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2252 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2105 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [261b 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22d1 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2253 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2106 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [261c 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22d2 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2254 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 gate 1574140951481139000 evaluation starts +peer1.org1.example.com | [2107 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [261d 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [22d3 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [2255 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2108 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [261e 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22d4 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer0.org1.example.com | [2256 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2109 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [261f 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer0.org1.example.com | [2257 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 principal matched by identity 0 +peer1.org1.example.com | [210a 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2620 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22d5 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer0.org1.example.com | [2258 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer1.org1.example.com | [210b 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2621 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer0.org1.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer1.org1.example.com | [210c 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2622 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer0.org1.example.com | [2259 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer1.org1.example.com | [210d 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2623 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer0.org1.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer1.org1.example.com | [210e 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2624 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer0.org1.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer1.org1.example.com | [210f 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2625 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [22d6 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer1.org1.example.com | [2110 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2626 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [22d7 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2111 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer1.org2.example.com | [2627 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22d8 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2112 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [225a 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2628 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [22d9 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2113 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [225b 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 gate 1574140951481139000 evaluation succeeds +peer1.org2.example.com | [2629 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [22da 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2114 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [225c 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [262a 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22db 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2115 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [225d 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [262b 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [22dc 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [2116 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [225e 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [262c 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [22dd 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer1.org1.example.com | [2117 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [225f 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [262d 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org2.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer1.org1.example.com | [2118 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2260 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org2.example.com | [22de 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer0.org1.example.com | [2261 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2119 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [262e 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org2.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer0.org1.example.com | [2262 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [211a 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org2.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer0.org1.example.com | [2263 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [211b 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org2.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer0.org1.example.com | [2264 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [211c 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org2.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer0.org1.example.com | [2265 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [211d 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org2.example.com | [22df 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2266 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [211e 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [262f 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | [22e0 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2267 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [211f 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [22e1 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2268 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [2120 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2630 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 e4 9a 98 db 3d cf 13 15 ad c0 |0E.!......=.....| +peer0.org2.example.com | [22e2 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2269 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2121 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 79 a3 2b 83 51 88 12 6c b4 47 ec b8 3f 13 89 1c |y.+.Q..l.G..?...| +peer0.org2.example.com | [22e3 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [226a 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2122 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 0a 5d 2c a2 3b 02 20 25 7a ad 6a c7 89 19 e9 f6 |.],.;. %z.j.....| +peer0.org1.example.com | [226b 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22e4 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2123 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 82 2e b6 11 e6 15 2b 96 73 83 28 dd 56 34 c0 d2 |......+.s.(.V4..| +peer0.org1.example.com | [226c 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22e5 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2124 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 dd ef 5c 48 a1 a1 88 |..\H...| +peer0.org1.example.com | [226d 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\035\363]]~JQ\2165\341r\n\002 6{E?\334\274V\314\013r\302\226\211q\266\202\3337\031\221\241\325\200\317\332\315\030\203\250ufv" > +peer0.org2.example.com | [22e6 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2125 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2631 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [226e 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [22e7 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2126 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2632 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [226f 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e8 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2127 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2633 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2270 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [22e9 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2128 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2634 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2271 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [22ea 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21400 gate 1574140951868540900 evaluation starts +peer1.org1.example.com | [2129 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2635 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2272 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22eb 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [212a 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2636 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2273 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ec 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21400 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [212b 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2637 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2274 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22ed 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [212c 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2638 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2275 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [22ee 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21400 principal evaluation fails +peer1.org1.example.com | [212d 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [2639 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [2276 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [22ef 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21400 gate 1574140951868540900 evaluation fails +peer1.org1.example.com | [212e 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [263a 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2277 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [22f0 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [212f 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [263b 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2278 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [22f1 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2130 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [263c 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2279 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f2 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2131 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [263d 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [227a 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [22f3 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21970 gate 1574140951869328300 evaluation starts +peer1.org1.example.com | [2132 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [263e 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [22f4 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21970 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [227b 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2133 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [263f 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f5 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21970 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [227c 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2134 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2640 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22f6 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21970 principal matched by identity 0 +peer0.org1.example.com | [227d 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org1.example.com | [2135 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2641 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22f7 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +peer0.org1.example.com | [227e 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2136 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2642 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +peer0.org1.example.com | [227f 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2137 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [2643 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22f8 11-19 05:22:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +peer0.org1.example.com | [2280 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2138 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2644 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | 00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +peer0.org1.example.com | [2281 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2645 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 dc b0 74 49 6b 26 d8 5b 9b c3 0b f4 44 b4 dd |Y..tIk&.[....D..| +peer1.org1.example.com | [2139 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +peer0.org1.example.com | [2282 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 34 b4 c8 2b 4f 4b 9e 23 a3 d3 f0 98 8f 3b 3f 59 |4..+OK.#.....;?Y| +peer1.org1.example.com | [213a 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2283 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [213b 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2646 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 19 20 40 f1 2d de 88 a3 58 6c 35 |0D. /. @.-...Xl5| +peer0.org1.example.com | [2284 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +peer1.org1.example.com | [213c 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 4d ad 1d 91 1b 51 39 d3 1d 23 ef 51 8d e4 e5 20 |M....Q9..#.Q... | +peer0.org1.example.com | [2285 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +peer1.org1.example.com | [213d 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000020 ac 8f d5 90 02 20 41 5a 4e 90 6a 30 27 93 be f0 |..... AZN.j0'...| +peer0.org1.example.com | [2286 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22f9 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21970 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [213e 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000030 b1 59 41 bc 2e b0 68 b6 3f d9 3c 18 98 6b ab 9e |.YA...h.?.<..k..| +peer0.org1.example.com | [2287 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22fa 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a21970 gate 1574140951869328300 evaluation succeeds +peer1.org1.example.com | [213f 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eebfe0 gate 1574140955463463600 evaluation starts +peer1.org2.example.com | 00000040 8c a2 2d 94 69 55 |..-.iU| +peer0.org2.example.com | [22fb 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2140 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eebfe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2647 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2288 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [22fc 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2141 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eebfe0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2648 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" lastAliveTS: 1574140895837304100, 38 but got ts: inc_num:1574140895837304100 seq_num:37 +peer0.org1.example.com | [2289 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22fd 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2142 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eebfe0 principal matched by identity 0 +peer1.org2.example.com | [2649 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [228a 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [22fe 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2143 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer1.org2.example.com | [264a 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [228b 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [22ff 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer1.org2.example.com | [264b 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [228c 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2300 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2144 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer1.org2.example.com | [264c 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [228d 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2301 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer1.org2.example.com | [264d 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [228e 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2302 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer1.org1.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer1.org2.example.com | [264e 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [228f 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer1.org1.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer1.org2.example.com | [264f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2290 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2303 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer1.org1.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer1.org2.example.com | [2650 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2291 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer1.org1.example.com | [2145 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eebfe0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2651 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2292 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer1.org1.example.com | [2146 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eebfe0 gate 1574140955463463600 evaluation succeeds +peer1.org2.example.com | [2652 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2293 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer1.org1.example.com | [2147 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2653 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer1.org1.example.com | [2148 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2294 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2654 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2304 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2149 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2295 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2655 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2305 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [214a 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2296 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 gate 1574140951847762300 evaluation starts +peer1.org2.example.com | [2656 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2306 11-19 05:22:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [214b 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2297 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2657 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2307 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [214c 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2298 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2658 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2308 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [214d 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2299 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 principal matched by identity 0 +peer1.org2.example.com | [2659 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [214e 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2309 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [229a 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer1.org2.example.com | [265a 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [214f 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [230a 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer1.org2.example.com | [265b 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2150 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [230b 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [229b 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer1.org2.example.com | [265c 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2151 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [230c 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer1.org2.example.com | [265d 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2152 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [230d 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer1.org2.example.com | [265e 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2153 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [230e 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer1.org2.example.com | [265f 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2154 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [230f 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer1.org2.example.com | [2660 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2155 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2310 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [229c 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2661 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2156 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2311 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [229d 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 gate 1574140951847762300 evaluation succeeds +peer1.org2.example.com | [2662 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2157 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2312 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a0df20 gate 1574140951933678800 evaluation starts +peer0.org1.example.com | [229e 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2663 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2313 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a0df20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2158 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > alive: alive: alive: +peer0.org1.example.com | [229f 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2664 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba250 gate 1574140955935201600 evaluation starts +peer0.org2.example.com | [2314 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a0df20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2159 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [22a0 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2665 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2315 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a0df20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [215a 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22a1 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2666 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2316 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a0df20 principal evaluation fails +peer1.org1.example.com | [215b 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a2 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2667 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2317 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a0df20 gate 1574140951933678800 evaluation fails +peer1.org1.example.com | [215c 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a3 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2668 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba250 principal evaluation fails +peer0.org2.example.com | [2318 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [215d 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [22a4 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2669 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba250 gate 1574140955935201600 evaluation fails +peer0.org2.example.com | [2319 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [215e 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [22a5 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [266a 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [231a 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [215f 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22a6 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [266b 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [231b 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44490 gate 1574140951934871500 evaluation starts +peer1.org1.example.com | [2160 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [22a7 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [266c 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [231c 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44490 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2161 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22a8 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [266d 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba7c0 gate 1574140955935853000 evaluation starts +peer0.org2.example.com | [231d 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44490 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2162 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [22a9 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [266e 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba7c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [231e 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44490 principal matched by identity 0 +peer1.org1.example.com | [2163 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22aa 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [266f 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba7c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [231f 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer1.org1.example.com | [2164 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22ab 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2670 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba7c0 principal matched by identity 0 +peer0.org2.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer1.org1.example.com | [2166 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22ac 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2671 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org2.example.com | [2320 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer1.org1.example.com | [2167 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org1.example.com | [22ad 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org2.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer1.org1.example.com | [2165 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 753 bytes, Signature: 0 bytes +peer0.org1.example.com | [22ae 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2672 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org2.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer1.org1.example.com | [2168 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22af 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org2.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer1.org1.example.com | [2169 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [22b0 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org2.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer1.org1.example.com | [216a 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 753 bytes, Signature: 0 bytes +peer0.org1.example.com | [22b1 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > alive: alive:\035\363]]~JQ\2165\341r\n\002 6{E?\334\274V\314\013r\302\226\211q\266\202\3337\031\221\241\325\200\317\332\315\030\203\250ufv" > +peer1.org2.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org2.example.com | [2321 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44490 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [216c 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 751 bytes, Signature: 0 bytes +peer0.org1.example.com | [22b2 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org2.example.com | [2322 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44490 gate 1574140951934871500 evaluation succeeds +peer1.org1.example.com | [216d 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [22b3 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2673 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba7c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2323 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [216e 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22b4 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2674 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba7c0 gate 1574140955935853000 evaluation succeeds +peer0.org2.example.com | [2324 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [216f 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22b5 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2675 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2325 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [216b 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [22b6 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [2676 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2326 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2170 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22b7 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer1.org2.example.com | [2677 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2327 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2171 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer1.org2.example.com | [2678 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2328 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2172 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22b8 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer1.org2.example.com | [2679 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2329 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2173 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer1.org2.example.com | [267a 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [232a 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2174 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer1.org2.example.com | [267b 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [232b 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2175 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer1.org2.example.com | [267c 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [232c 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2176 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer1.org2.example.com | [267d 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [232d 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2177 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [22b9 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [267e 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [232e 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2178 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [267f 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [232f 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [2179 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22ba 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 60 ac ca e2 93 21 13 13 c3 c4 e1 |0D. 5`....!.....| +peer1.org2.example.com | [2680 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2330 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [217a 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec49b0 gate 1574140955667670600 evaluation starts +peer0.org1.example.com | 00000010 00 c1 68 80 12 21 ac ea ae c6 bd 30 54 08 7a 16 |..h..!.....0T.z.| +peer1.org2.example.com | [2681 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [2331 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [217b 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec49b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 4b c1 f0 59 02 20 01 b9 15 2b 01 ff 43 58 45 b6 |K..Y. ...+..CXE.| +peer1.org2.example.com | [2682 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2332 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [217c 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec49b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000030 28 1a b2 fb ac 9b 7a bf e4 23 2f d5 55 6c 39 77 |(.....z..#/.Ul9w| +peer1.org2.example.com | [2683 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2333 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [217d 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec49b0 principal matched by identity 0 +peer0.org1.example.com | 00000040 6e 68 b9 a1 66 8f |nh..f.| +peer1.org2.example.com | [2684 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2334 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [217e 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [22bb 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2685 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2335 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [22bc 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [2686 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [2336 11-19 05:22:31.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [217f 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [22bd 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2687 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [2337 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [22be 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2688 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2338 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [22bf 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2689 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2339 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [22c0 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [268a 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [233a 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [22c1 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [268b 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [233c 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2180 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec49b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [22c2 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [268c 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [233b 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2181 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec49b0 gate 1574140955667670600 evaluation succeeds +peer0.org1.example.com | [22c3 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [268d 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [233d 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2182 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22c4 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [268e 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [233e 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2183 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22c5 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [268f 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [233f 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2184 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [22c6 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2690 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | [2340 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [2185 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [22c7 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\035\363]]~JQ\2165\341r\n\002 6{E?\334\274V\314\013r\302\226\211q\266\202\3337\031\221\241\325\200\317\332\315\030\203\250ufv" > +peer1.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org2.example.com | [2341 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2186 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org1.example.com | [22c8 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2691 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org2.example.com | [2342 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org1.example.com | [22c9 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org2.example.com | [2343 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2187 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | [22ca 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer0.org2.example.com | [2344 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | [22cb 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer0.org2.example.com | [2345 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [22cc 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer0.org2.example.com | [2346 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2692 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22cd 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer0.org2.example.com | [2347 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2693 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22ce 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2188 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2348 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2694 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [22cf 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2189 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2349 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2695 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [22d0 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [234a 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a706a0 gate 1574140951957988800 evaluation starts +peer1.org1.example.com | [218a 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2696 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22d1 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [234b 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a706a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [218b 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2697 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da2a0 gate 1574140955990065000 evaluation starts +peer0.org1.example.com | [22d2 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234c 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a706a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [218c 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2698 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [22d3 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234d 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a706a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [218d 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2699 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da2a0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [22d4 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234e 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a706a0 principal evaluation fails +peer1.org1.example.com | [218e 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [269a 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da2a0 principal matched by identity 0 +peer0.org1.example.com | [22d5 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [234f 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a706a0 gate 1574140951957988800 evaluation fails +peer1.org1.example.com | [218f 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [269b 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | [22d6 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2350 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2190 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032881c0 gate 1574140955669934700 evaluation starts +peer1.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [22d7 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2351 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2191 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032881c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [269c 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | [22d8 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [2352 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2192 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032881c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | [22d9 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2353 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a70c10 gate 1574140951959936600 evaluation starts +peer1.org1.example.com | [2193 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032881c0 principal matched by identity 0 +peer1.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | [22da 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [2354 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a70c10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2194 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer1.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | [22db 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2355 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a70c10 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer1.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [22dc 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [2356 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a70c10 principal matched by identity 0 +peer1.org1.example.com | [2195 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer1.org2.example.com | [269d 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da2a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [2357 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer1.org2.example.com | [269e 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da2a0 gate 1574140955990065000 evaluation succeeds +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer1.org2.example.com | [269f 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [2358 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer1.org2.example.com | [26a0 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer1.org2.example.com | [26a1 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [2196 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032881c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [26a2 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [2197 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032881c0 gate 1574140955669934700 evaluation succeeds +peer1.org2.example.com | [26a3 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [2198 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26a4 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | +Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org2.example.com | [2359 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a70c10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2199 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26a5 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org2.example.com | [235a 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a70c10 gate 1574140951959936600 evaluation succeeds +peer1.org1.example.com | [219a 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +peer1.org2.example.com | [26a6 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [235b 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [219b 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +peer1.org2.example.com | [26a7 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [235c 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [219c 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | rkc= +peer1.org2.example.com | [26a8 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [235d 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [219d 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [26a9 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [235e 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [219e 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22dd 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 gate 1574140952702965000 evaluation starts +peer1.org2.example.com | [26ab 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [235f 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [219f 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22de 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26aa 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [21a0 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [22df 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [26ac 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2360 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [21a1 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [22e0 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org2.example.com | [26ad 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [21a2 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22e1 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [26ae 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [21a3 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003288d00 gate 1574140955686303700 evaluation starts +peer0.org1.example.com | [22e2 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 principal matched by identity 0 +peer1.org2.example.com | [26af 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [21a4 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003288d00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [22e3 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d b0 62 ef 1e 31 f9 96 b2 bb 11 77 0d 77 07 1b |m.b..1.....w.w..| +peer1.org2.example.com | [26b0 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [21a5 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003288d00 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000010 df f7 7d cb 1d bf 8d 2c 66 5f f8 1e b3 54 9f 11 |..}....,f_...T..| +peer1.org2.example.com | [26b1 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2361 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org1.example.com | [21a6 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003288d00 principal matched by identity 0 +peer0.org1.example.com | [22e4 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 f0 74 c5 a5 31 5c 21 0c dc e3 79 |0D. @.t..1\!...y| +peer1.org2.example.com | [26b2 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org1.example.com | [21a7 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer0.org1.example.com | 00000010 17 f7 68 fd 8c eb 2a 10 c6 ac 70 4b f3 71 34 c2 |..h...*...pK.q4.| +peer1.org2.example.com | [26b3 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | [2362 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org1.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer0.org1.example.com | 00000020 63 f8 74 a1 02 20 10 32 ae 4b 4d e8 92 aa 09 77 |c.t.. .2.KM....w| +peer1.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org1.example.com | [21a8 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer0.org1.example.com | 00000030 c3 32 c2 a2 c5 ba 9d 0a 40 1d 58 71 96 ae 7d 05 |.2......@.Xq..}.| +peer1.org2.example.com | [26b4 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org1.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer0.org1.example.com | 00000040 6e 67 ab b1 5b 69 |ng..[i| +peer1.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org1.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer0.org1.example.com | [22e5 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer0.org1.example.com | [22e6 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 gate 1574140952702965000 evaluation succeeds +peer1.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org2.example.com | [2363 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer0.org1.example.com | [22e7 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org2.example.com | [2364 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21a9 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003288d00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [22e8 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [26b5 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2365 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [21aa 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003288d00 gate 1574140955686303700 evaluation succeeds +peer0.org1.example.com | [22e9 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [26b6 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2366 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21ab 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22ea 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [26b7 11-19 05:22:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2367 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21ac 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22eb 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org2.example.com | [26b8 11-19 05:22:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2368 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [21ad 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [22ec 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org2.example.com | [26b9 11-19 05:22:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2369 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [21ae 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [22ed 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer1.org2.example.com | [26ba 11-19 05:22:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [236a 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [21af 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org1.example.com | [22ee 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [26bb 11-19 05:22:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [236b 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a96aa0 gate 1574140951966992600 evaluation starts +peer1.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org1.example.com | [22ef 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org2.example.com | [26bc 11-19 05:22:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [236c 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a96aa0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [21b0 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org1.example.com | [22f0 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org2.example.com | [26bd 11-19 05:22:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [236d 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a96aa0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org1.example.com | [22f1 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer1.org2.example.com | [26be 11-19 05:22:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [236e 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a96aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org1.example.com | [22f2 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org2.example.com | [26bf 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [236f 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a96aa0 principal evaluation fails +peer1.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org1.example.com | [22f3 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [26c0 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [2370 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a96aa0 gate 1574140951966992600 evaluation fails +peer1.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org1.example.com | [22f4 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002950d40 env 0xc0037a1ae0 txn 0 +peer1.org2.example.com | [26c1 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [2371 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21b1 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22f5 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0037a1ae0 +peer1.org2.example.com | [26c2 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | [2372 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21b2 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 751 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [22f6 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +peer0.org2.example.com | [2373 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [21b3 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26c3 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | [22f7 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2374 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a97010 gate 1574140951968799700 evaluation starts +peer1.org1.example.com | [21b4 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | [22f8 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2375 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a97010 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | [22f9 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2376 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a97010 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [21b5 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | [22fa 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org2.example.com | [2377 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a97010 principal matched by identity 0 +peer1.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [22fb 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2378 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [26c4 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22fc 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [26c5 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +peer0.org2.example.com | [2379 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [26c6 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [22fd 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | [21b6 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26c7 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | [21b7 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26c8 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | [21b8 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [26c9 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | [21b9 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26ca 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR| +peer0.org2.example.com | [237a 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a97010 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [21ba 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26cb 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22fe 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [237b 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a97010 gate 1574140951968799700 evaluation succeeds +peer1.org1.example.com | [21bb 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [26cc 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22ff 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003b86a80, header channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +peer0.org2.example.com | [237c 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [21bc 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [26ce 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2300 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [237d 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [21bd 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [26cf 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [2301 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [237e 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [21be 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033aade0 gate 1574140955687706700 evaluation starts +peer1.org2.example.com | [26d0 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2302 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [237f 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [21bf 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033aade0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26d1 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2303 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [2380 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21c0 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033aade0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [26d2 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2304 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +peer0.org2.example.com | [2381 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c1 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033aade0 principal matched by identity 0 +peer1.org2.example.com | [26d4 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2305 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2382 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | [21c2 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [26d3 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2306 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0004b2000 +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [26d5 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2307 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [2383 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [21c3 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [26cd 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbfe0 gate 1574140956196085000 evaluation starts +peer0.org1.example.com | [2308 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [93a66447-9e34-4f4e-a076-e36aae14df10] +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [26d6 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbfe0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2309 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [93a66447-9e34-4f4e-a076-e36aae14df10] +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org2.example.com | [26d7 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [230a 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org2.example.com | [26d8 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbfe0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [230b 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org2.example.com | [26d9 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [2384 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21c4 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033aade0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [26da 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbfe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [2385 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21c5 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033aade0 gate 1574140955687706700 evaluation succeeds +peer1.org2.example.com | [26db 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbfe0 principal evaluation fails +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [2386 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [21c6 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26dc 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbfe0 gate 1574140956196085000 evaluation fails +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | [2387 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21c7 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26dd 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [2388 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21c8 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [26de 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org2.example.com | [2389 11-19 05:22:31.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [21c9 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [26df 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org2.example.com | [238a 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [21ca 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26e0 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e7b20 gate 1574140956202673300 evaluation starts +peer0.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org2.example.com | [238b 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [21cb 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26e1 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e7b20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | [238c 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab09c0 gate 1574140951972214200 evaluation starts +peer1.org2.example.com | [26e2 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e7b20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [21cc 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org2.example.com | [238d 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab09c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26e3 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e7b20 principal matched by identity 0 +peer1.org1.example.com | [21cd 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org2.example.com | [238e 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab09c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [26e4 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +peer1.org1.example.com | [21ce 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org2.example.com | [238f 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab09c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +peer1.org1.example.com | [21cf 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2390 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab09c0 principal evaluation fails +peer1.org2.example.com | [26e5 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +peer1.org1.example.com | [21d0 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [230c 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 gate 1574140952737570300 evaluation starts +peer0.org2.example.com | [2391 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab09c0 gate 1574140951972214200 evaluation fails +peer1.org2.example.com | 00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +peer1.org1.example.com | [21d1 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [230d 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2392 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21d2 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033abf70 gate 1574140955688456300 evaluation starts +peer1.org2.example.com | 00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +peer0.org1.example.com | [230e 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2393 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21d3 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033abf70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +peer0.org1.example.com | [230f 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [2394 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [21d4 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033abf70 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +peer0.org1.example.com | [2310 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2395 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0f30 gate 1574140951973474600 evaluation starts +peer1.org1.example.com | [21d5 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033abf70 principal matched by identity 0 +peer1.org2.example.com | [26e6 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e7b20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2311 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2396 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0f30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [21d6 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 07 1a 4d 44 90 90 66 f9 58 46 8f 08 f4 6b 0b |Y..MD..f.XF...k.| +peer1.org2.example.com | [26e7 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e7b20 gate 1574140956202673300 evaluation succeeds +peer0.org1.example.com | [2312 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 principal matched by identity 0 +peer0.org2.example.com | [2397 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0f30 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 f5 23 2e 44 8b 70 c4 db 4b ae 25 29 b0 89 94 61 |.#.D.p..K.%)...a| +peer1.org2.example.com | [26e8 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2313 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 68 1c ad b4 bb c1 55 d5 00 b1 31 73 81 e6 77 |.h.....U...1s..w| +peer0.org2.example.com | [2398 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0f30 principal matched by identity 0 +peer1.org1.example.com | [21d7 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 cb 20 aa f9 ea f8 b6 d2 04 b3 e7 |0D. `. .........| +peer1.org2.example.com | [26e9 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 13 bb 9b 26 85 b6 a1 2a 9b 2a 9e ae d6 7f 89 36 |...&...*.*.....6| +peer0.org2.example.com | [2399 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org1.example.com | 00000010 cd 8f 2a 41 f9 79 ed aa aa c8 9e 4d 52 0d f2 5a |..*A.y.....MR..Z| +peer1.org2.example.com | [26ea 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2314 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a9 11 75 e6 b6 d8 fc 3f dc e6 f1 |0D. $..u....?...| +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org1.example.com | 00000020 d5 93 58 29 02 20 14 ba a2 f7 e2 51 24 d3 11 8c |..X). .....Q$...| +peer1.org2.example.com | [26eb 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 05 18 53 bd 79 20 d0 5e 12 b1 96 67 4f 41 cc 77 |..S.y .^...gOA.w| +peer0.org2.example.com | [239a 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org1.example.com | 00000030 d2 36 19 fc e6 5c 52 e5 92 69 5f b7 bc 0a 74 f4 |.6...\R..i_...t.| +peer1.org2.example.com | [26ec 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 d2 c8 ab 9d 02 20 0f d1 40 05 e3 ff 8b ab b4 77 |..... ..@......w| +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org1.example.com | 00000040 34 bf 81 58 8d 6f |4..X.o| +peer1.org2.example.com | [26ed 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 0b 32 e1 20 48 7e 06 ea 74 97 31 23 a3 14 40 56 |.2. H~..t.1#..@V| +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org1.example.com | [21d8 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033abf70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [26ee 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 b8 2d a4 d4 aa 2c |.-...,| +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org1.example.com | [21d9 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033abf70 gate 1574140955688456300 evaluation succeeds +peer1.org2.example.com | [26ef 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2315 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [21da 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26f0 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [239b 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0f30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2316 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [21db 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26f1 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [239c 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0f30 gate 1574140951973474600 evaluation succeeds +peer0.org1.example.com | [2317 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 skipping identity 0 because it has already been used +peer1.org1.example.com | [21dc 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [26f2 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26660 gate 1574140956207478400 evaluation starts +peer0.org2.example.com | [239d 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2318 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 principal evaluation fails +peer1.org1.example.com | [21dd 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [26f3 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [239e 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2319 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 gate 1574140952737570300 evaluation succeeds +peer1.org1.example.com | [21de 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26f4 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26660 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [239f 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [231a 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer1.org1.example.com | [21df 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26f5 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [23a0 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [231b 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | [21e0 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26f6 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26660 principal evaluation fails +peer0.org2.example.com | [23a1 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org1.example.com | [231c 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | [21e1 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [26f7 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26660 gate 1574140956207478400 evaluation fails +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org1.example.com | [231d 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer1.org1.example.com | [21e2 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [26f8 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23a2 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org1.example.com | [231e 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer1.org1.example.com | [21e3 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [26f9 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org1.example.com | [231f 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ff7faade-d8af-4bf0-b21c-f4b33db00d0a] +peer1.org1.example.com | [21e4 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6ab0 gate 1574140955690992600 evaluation starts +peer1.org2.example.com | [26fa 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org1.example.com | [2320 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [21e5 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26fb 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26bd0 gate 1574140956208967300 evaluation starts +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org1.example.com | [2321 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ff7faade-d8af-4bf0-b21c-f4b33db00d0a] +peer1.org1.example.com | [21e7 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6ab0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [26fc 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org1.example.com | [2323 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer1.org1.example.com | [21e8 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6ab0 principal matched by identity 0 +peer1.org2.example.com | [26fd 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26bd0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [23a3 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2324 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [214eb03f-df7c-48c9-946c-54b179bea080] +peer1.org1.example.com | [21e9 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 07 1a 4d 44 90 90 66 f9 58 46 8f 08 f4 6b 0b |Y..MD..f.XF...k.| +peer1.org2.example.com | [26fe 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26bd0 principal matched by identity 0 +peer0.org2.example.com | [23a4 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2325 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | 00000010 f5 23 2e 44 8b 70 c4 db 4b ae 25 29 b0 89 94 61 |.#.D.p..K.%)...a| +peer1.org2.example.com | [26ff 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +peer0.org1.example.com | [2326 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [214eb03f-df7c-48c9-946c-54b179bea080] +peer0.org2.example.com | [23a5 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [21ea 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 cb 20 aa f9 ea f8 b6 d2 04 b3 e7 |0D. `. .........| +peer1.org2.example.com | 00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +peer0.org1.example.com | [2327 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 gate 1574140952749194900 evaluation starts +peer0.org2.example.com | [23a6 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 cd 8f 2a 41 f9 79 ed aa aa c8 9e 4d 52 0d f2 5a |..*A.y.....MR..Z| +peer1.org2.example.com | [2700 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +peer0.org1.example.com | [2328 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23a7 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 d5 93 58 29 02 20 14 ba a2 f7 e2 51 24 d3 11 8c |..X). .....Q$...| +peer1.org2.example.com | 00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +peer0.org1.example.com | [2329 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [23a8 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000030 d2 36 19 fc e6 5c 52 e5 92 69 5f b7 bc 0a 74 f4 |.6...\R..i_...t.| +peer1.org2.example.com | 00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +peer0.org1.example.com | [232a 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 principal matched by identity 0 +peer0.org2.example.com | [23a9 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000040 34 bf 81 58 8d 6f |4..X.o| +peer1.org2.example.com | 00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +peer0.org1.example.com | [232b 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +peer0.org2.example.com | [23aa 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [21e6 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +peer0.org1.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +peer0.org2.example.com | [23ab 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acc740 gate 1574140951978217400 evaluation starts +peer1.org1.example.com | [21eb 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2701 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26bd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [232c 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +peer0.org2.example.com | [23ac 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acc740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [21ec 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2702 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a26bd0 gate 1574140956208967300 evaluation succeeds +peer0.org2.example.com | [23ad 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acc740 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [21ed 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2703 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +peer0.org2.example.com | [23ae 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acc740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [21ee 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2704 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +peer0.org2.example.com | [23af 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acc740 principal evaluation fails +peer1.org1.example.com | [21ef 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2705 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +peer0.org2.example.com | [23b0 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acc740 gate 1574140951978217400 evaluation fails +peer1.org1.example.com | [21f0 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2706 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR| +peer0.org2.example.com | [23b1 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21f1 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2707 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org1.example.com | [232d 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [23b2 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21f2 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6ab0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org1.example.com | [232e 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [23b3 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [21f3 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6ab0 gate 1574140955690992600 evaluation succeeds +peer1.org2.example.com | [2708 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org1.example.com | [232f 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 skipping identity 0 because it has already been used +peer0.org2.example.com | [23b4 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acccb0 gate 1574140951979502000 evaluation starts +peer1.org1.example.com | [21f4 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org1.example.com | [2330 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 principal evaluation fails +peer0.org2.example.com | [23b5 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acccb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [21f5 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org1.example.com | [2331 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 gate 1574140952749194900 evaluation succeeds +peer0.org2.example.com | [23b6 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acccb0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [21f6 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org1.example.com | [2332 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org2.example.com | [23b7 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acccb0 principal matched by identity 0 +peer1.org2.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer1.org1.example.com | [21f7 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2333 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b appears to be valid +peer0.org2.example.com | [23b8 11-19 05:22:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [2709 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21f8 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org1.example.com | [2334 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0004b2000 +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [270a 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org1.example.com | [2335 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002950d40 env 0xc0037a1ae0 txn 0 +peer0.org2.example.com | [23b9 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [21f9 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org2.example.com | [270b 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2336 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org2.example.com | [270c 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2337 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 20ms +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org2.example.com | [270d 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2338 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org2.example.com | [270e 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2339 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org2.example.com | [270f 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [233a 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer0.org2.example.com | [23ba 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acccb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [21fa 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2710 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [233b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [23bb 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004acccb0 gate 1574140951979502000 evaluation succeeds +peer1.org1.example.com | [21fb 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes +peer1.org2.example.com | [2711 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a403e0 gate 1574140956219070200 evaluation starts +peer0.org1.example.com | [233c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [23bc 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [21fc 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2712 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a403e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [233d 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [23bd 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [21fd 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2713 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a403e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [233e 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer0.org2.example.com | [23be 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [21fe 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [2714 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a403e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [233f 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [23bf 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [21ff 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2715 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a403e0 principal evaluation fails +peer0.org1.example.com | [2340 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [23c0 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2200 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2716 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a403e0 gate 1574140956219070200 evaluation fails +peer0.org1.example.com | [2341 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [23c1 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org1.example.com | [2201 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c7da0 gate 1574140955703769000 evaluation starts +peer1.org2.example.com | [2717 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2342 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer0.org2.example.com | [23c2 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2202 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c7da0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2718 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2343 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] marked as valid by state validator +peer0.org2.example.com | [23c3 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2203 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c7da0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2719 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2344 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0028b22c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0028b2300), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc0028b2340)} +peer0.org2.example.com | [23c4 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2204 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c7da0 principal matched by identity 0 +peer1.org2.example.com | [271a 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a40950 gate 1574140956219863400 evaluation starts +peer0.org1.example.com | [2345 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [2205 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 4f 02 b1 dd 79 38 c3 d4 c0 7b 5a 1b 90 55 b2 |uO...y8...{Z..U.| +peer0.org2.example.com | [23c5 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [271b 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a40950 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2346 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | 00000010 b0 8d 58 f8 f2 44 de 1f dd 29 94 6d be eb 3d 54 |..X..D...).m..=T| +peer0.org2.example.com | [23c6 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [271c 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a40950 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2347 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [2206 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 74 64 2b 13 00 82 9a a8 f3 06 |0E.!..td+.......| +peer0.org2.example.com | [23c7 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [271d 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a40950 principal matched by identity 0 +peer0.org1.example.com | [2348 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0035131d0)}} +peer1.org1.example.com | 00000010 a1 1a fb 4a ba ca e8 d4 8d 30 21 2a b0 df 8b 51 |...J.....0!*...Q| +peer0.org2.example.com | [23c8 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [271e 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer0.org1.example.com | [2349 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer1.org1.example.com | 00000020 2e f9 74 ff 10 02 20 42 55 c1 91 45 24 2e 67 23 |..t... BU..E$.g#| +peer0.org2.example.com | [23c9 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer0.org1.example.com | [234a 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | 00000030 bd 0c 51 c0 22 7f f7 9f 26 0d 7d d0 bc 38 8a 2d |..Q."...&.}..8.-| +peer0.org2.example.com | [23ca 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [271f 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer0.org1.example.com | [234b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | 00000040 dd 1a 5c d7 7b 12 d6 |..\.{..| +peer0.org2.example.com | [23cb 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea090 gate 1574140951983484100 evaluation starts +peer1.org2.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer0.org1.example.com | [234c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | [2207 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c7da0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [23cc 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer0.org1.example.com | [234d 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org1.example.com | [2208 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c7da0 gate 1574140955703769000 evaluation succeeds +peer0.org2.example.com | [23cd 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea090 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer0.org1.example.com | [234e 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | [2209 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [23ce 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer0.org1.example.com | [234f 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org1.example.com | [220a 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [23cf 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea090 principal evaluation fails +peer1.org2.example.com | [2720 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a40950 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2350 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [220b 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [23d0 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea090 gate 1574140951983484100 evaluation fails +peer1.org2.example.com | [2721 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a40950 gate 1574140956219863400 evaluation succeeds +peer0.org1.example.com | [2351 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 74 53 85 89 111 88 108 49 90 120 79 106 50 69 54 54 74 87 67 107 49 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 80 49 117 51 118 74 69 71 113 89 89 50 10 54 103 47 56 112 84 98 57 48 122 77 71 56 56 83 47 67 85 121 71 106 74 102 43 80 65 68 82 48 112 111 111 107 51 74 79 85 119 98 118 111 113 82 115 87 67 85 107 79 103 69 113 112 101 78 116 113 67 120 80 110 72 77 81 10 80 98 118 73 71 112 55 90 65 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 98 112 65 97 110 108 101 122 111 51 121 119 49 113 113 76 48 50 122 102 105 114 107 87 108 47 89 101 84 100 81 120 101 114 56 77 52 121 105 98 72 98 107 67 73 66 57 73 71 85 85 79 10 100 111 71 54 121 81 110 66 88 102 121 97 67 116 102 78 89 100 112 101 105 51 69 76 43 116 50 97 78 113 43 106 68 104 110 79 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 61 108 250 203 94 232 89 127 6 108 198 114 165 148 190 58 43 216 54 96 61 77 103 22 10 9 219 159 217 18 207 205 2 32 54 136 234 228 71 153 30 119 84 154 25 200 146 161 37 82 251 34 104 43 90 180 96 243 135 128 12 17 34 227 177 142]} 0x152c9b0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00043bb30 0xc0002c0660 {{0 0} 0 0 0 0} {false}})]} +peer1.org1.example.com | [220c 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [23d1 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2722 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2352 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [220d 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [23d2 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2723 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2353 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00000ffa0})} +peer1.org1.example.com | [220e 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org2.example.com | [23d3 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2724 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2354 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org1.example.com | [220f 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [23d4 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea600 gate 1574140951984929200 evaluation starts +peer1.org2.example.com | [2725 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2355 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org1.example.com | [2210 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org2.example.com | [23d5 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2726 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2356 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org1.example.com | [2211 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [23d6 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea600 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2727 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2322 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +peer1.org1.example.com | [2212 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org2.example.com | [23d7 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea600 principal matched by identity 0 +peer1.org2.example.com | [2728 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2357 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4536 bytes, seq: 3}, Envelope: 4566 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [2213 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org2.example.com | [23d8 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [2729 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2358 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org1.example.com | [2214 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org2.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [272a 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2359 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org1.example.com | [2215 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org2.example.com | [23d9 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [272b 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [235a 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2216 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org2.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [272c 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41490 gate 1574140956221814700 evaluation starts +peer0.org1.example.com | [235b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2217 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [272d 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41490 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [235c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2218 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003207380 env 0xc003ebe4b0 txn 0 +peer0.org2.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [272e 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41490 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [235d 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2219 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003ebe4b0 +peer0.org2.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [272f 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [235e 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4536 bytes, seq: 3}, Envelope: 4566 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [221a 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +peer0.org2.example.com | [23da 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea600 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2730 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41490 principal evaluation fails +peer0.org1.example.com | [235f 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [221b 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [23db 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aea600 gate 1574140951984929200 evaluation succeeds +peer1.org2.example.com | [2731 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41490 gate 1574140956221814700 evaluation fails +peer0.org1.example.com | [2360 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [221c 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [23dc 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2732 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [221d 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2361 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4536 bytes, seq: 3}, Envelope: 4566 bytes, Signature: 0 bytes +peer0.org2.example.com | [23dd 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2733 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [221e 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [2362 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23de 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2734 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [221f 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2363 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xaf, 0xe8, 0x73, 0x33, 0x36, 0xd, 0xf9, 0x12, 0x19, 0x79, 0xd, 0x24, 0x42, 0x5b, 0x7d, 0xa9, 0x98, 0xab, 0xce, 0xdc, 0x98, 0x36, 0x45, 0x6e, 0x26, 0x2b, 0x86, 0x76, 0x6a, 0x37, 0x47, 0x75} txOffsets= +peer0.org2.example.com | [23df 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2735 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41a00 gate 1574140956222652400 evaluation starts +peer1.org1.example.com | [2220 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c0 b3 ab 85 aa 28 ac a0 48 cd eb e0 3f c0 10 |......(..H...?..| +peer0.org1.example.com | txId=afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b locPointer=offset=70, bytesLength=3516 +peer0.org2.example.com | [23e0 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2736 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41a00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 fa ba 63 4b 4c 70 86 bb ba 67 f9 8c 83 44 7d da |..cKLp...g...D}.| +peer0.org1.example.com | ] +peer0.org2.example.com | [23e1 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2737 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41a00 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2221 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ba 1f e0 56 b8 c9 8f 25 b9 ac a3 |0D. +...V...%...| +peer0.org1.example.com | [2364 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to txid-index +peer0.org2.example.com | [23e2 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2738 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41a00 principal matched by identity 0 +peer1.org1.example.com | 00000010 12 3b e9 8e 83 b7 ad 48 2a a8 cc bc a2 c1 8d f1 |.;.....H*.......| +peer0.org1.example.com | [2365 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx number:[0] ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to blockNumTranNum index +peer0.org2.example.com | [23e3 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2739 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer1.org1.example.com | 00000020 a6 e6 65 91 02 20 10 fb c7 3f ec 92 df 9d 88 d2 |..e.. ...?......| +peer0.org1.example.com | [2366 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81396], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org2.example.com | [23e4 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer1.org1.example.com | 00000030 a5 4a 4a 02 63 87 22 e8 5c dd d5 12 ce 57 f2 ab |.JJ.c.".\....W..| +peer0.org1.example.com | [2367 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org2.example.com | [23e5 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [273a 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer1.org1.example.com | 00000040 85 6b 5f 12 56 05 |.k_.V.| +peer0.org1.example.com | [2368 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org2.example.com | [23e6 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer1.org1.example.com | [2222 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2369 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org2.example.com | [23e7 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer1.org1.example.com | [2223 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003138800, header channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +peer0.org1.example.com | [236a 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [23e8 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aeb790 gate 1574140951988306100 evaluation starts +peer1.org2.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer1.org1.example.com | [2224 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [236b 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [23e9 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aeb790 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer1.org1.example.com | [2225 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [236c 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [23ea 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aeb790 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [273b 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41a00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2226 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [236d 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [23eb 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aeb790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [273c 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a41a00 gate 1574140956222652400 evaluation succeeds +peer1.org1.example.com | [2227 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [236e 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [23ec 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aeb790 principal evaluation fails +peer1.org2.example.com | [273d 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2228 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +peer0.org1.example.com | [236f 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [23ed 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aeb790 gate 1574140951988306100 evaluation fails +peer1.org2.example.com | [273e 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2229 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [2370 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org2.example.com | [23ee 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [273f 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [222a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00002ac00 +peer0.org1.example.com | [2371 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [23ef 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2740 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [222b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ac3b6ac8-e12d-4297-97d4-721c4de96d4d] +peer0.org1.example.com | [2372 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer0.org2.example.com | [23f0 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2741 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [222c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2373 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer0.org2.example.com | [23f1 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aebd00 gate 1574140951989473700 evaluation starts +peer1.org2.example.com | [2742 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [222d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ac3b6ac8-e12d-4297-97d4-721c4de96d4d] +peer0.org1.example.com | [2374 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer0.org2.example.com | [23f2 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aebd00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2743 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [222e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [2375 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [23f3 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aebd00 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2744 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [222f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [e4a85c85-6d02-4453-8f8f-5066cfa05f50] +peer0.org1.example.com | [2376 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4ac2512f-6564-412e-9ff2-64d2c4add1d0] +peer0.org2.example.com | [23f4 11-19 05:22:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aebd00 principal matched by identity 0 +peer1.org2.example.com | [2745 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2230 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e4a85c85-6d02-4453-8f8f-5066cfa05f50] +peer0.org1.example.com | [2377 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer0.org2.example.com | [23f5 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [2746 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2231 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 gate 1574140955743807300 evaluation starts +peer0.org1.example.com | [2378 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [2747 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2232 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2379 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer0.org2.example.com | [23f6 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [2748 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2233 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [237a 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4ac2512f-6564-412e-9ff2-64d2c4add1d0] +peer0.org2.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [2749 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2234 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 principal matched by identity 0 +peer0.org1.example.com | [237b 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer0.org2.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [274a 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2235 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f a3 74 46 04 ec 07 45 22 0e 52 a6 69 f1 d8 e9 |..tF...E".R.i...| +peer0.org1.example.com | [237c 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [274b 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 69 67 64 3d bd 51 5f 4e ea a4 d4 24 59 ab 96 c7 |igd=.Q_N...$Y...| +peer0.org1.example.com | [237d 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08031A0C0A0565787030321203312E30 +peer0.org2.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org2.example.com | [274c 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ade0 gate 1574140956226892100 evaluation starts +peer1.org1.example.com | [2236 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 83 48 62 d2 15 d8 8b 02 94 61 |0E.!...Hb......a| +peer0.org1.example.com | [237e 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 05A9254508971A2A7A4210353C12DA46266E8725689AAE2402E27115EB1F84C4 +peer0.org2.example.com | [23f7 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aebd00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [274d 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ade0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 a3 bc 7f a1 61 8c 6a 43 bb 2b c7 21 7f 34 7b b4 |....a.jC.+.!.4{.| +peer0.org1.example.com | [237f 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org2.example.com | [23f8 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aebd00 gate 1574140951989473700 evaluation succeeds +peer1.org2.example.com | [274e 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ade0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000020 16 d9 74 39 e5 02 20 29 7d 53 f0 81 0a 5f 5b ce |..t9.. )}S..._[.| +peer0.org1.example.com | [2380 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer0.org2.example.com | [23f9 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [274f 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ade0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000030 cc 8b 9f de 9b 11 47 a5 fe bd d1 5b bf c4 05 d9 |......G....[....| +peer0.org1.example.com | [2381 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer0.org2.example.com | [23fa 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2750 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ade0 principal evaluation fails +peer1.org1.example.com | 00000040 ac 19 ac 2b e3 a2 e5 |...+...| +peer0.org1.example.com | [2382 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer0.org2.example.com | [23fb 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2751 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ade0 gate 1574140956226892100 evaluation fails +peer1.org1.example.com | [2237 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2383 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 30ms (state_validation=1ms block_and_pvtdata_commit=16ms state_commit=6ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer0.org2.example.com | [23fc 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2752 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2238 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2384 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [23fd 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [2753 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2239 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 skipping identity 0 because it has already been used +peer0.org1.example.com | [2385 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08041A0C0A0565787030321203312E30 +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [2754 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [223a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 principal evaluation fails +peer0.org1.example.com | [2386 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7BFABFB704311033C2236C34CB57C970500115274BCE2C992BB9717AAD08B09E +peer0.org2.example.com | [23fe 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [2755 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b350 gate 1574140956227628900 evaluation starts +peer1.org1.example.com | [223b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9070 gate 1574140955743807300 evaluation succeeds +peer0.org1.example.com | [2387 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [2756 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b350 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [223c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [44279856-d3b3-416c-952a-6877a07c66eb] +peer0.org1.example.com | [2388 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45618 +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [2757 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b350 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [223d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [44279856-d3b3-416c-952a-6877a07c66eb] +peer0.org1.example.com | [2389 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00346e1e0 +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [2758 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b350 principal matched by identity 0 +peer1.org1.example.com | [223e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [238a 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [2759 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [223f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff appears to be valid +peer0.org1.example.com | [238b 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [23ff 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org2.example.com | [275a 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2240 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00002ac00 +peer0.org1.example.com | [238c 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org2.example.com | [275b 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2241 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003207380 env 0xc003ebe4b0 txn 0 +peer0.org1.example.com | [238d 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org2.example.com | [2400 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org2.example.com | [275c 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2242 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [238e 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org2.example.com | [275d 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2243 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 27ms +peer0.org1.example.com | [238f 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 94 90 09 62 ad c8 15 96 13 9a 06 76 82 03 62 |....b.......v..b| +peer0.org2.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [2244 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | 00000010 50 3c 6b d3 9f 6c cf ad 22 6a 3f ae b8 37 2e 9b |P DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [2245 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [275f 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2390 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 7a a7 04 8c fe b5 76 1e 3d b4 |0E.!..z.....v.=.| +peer0.org2.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [2246 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer1.org2.example.com | [2760 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 cc 76 3b 14 9f e3 60 4d 92 c3 65 98 12 da b2 0a |.v;...`M..e.....| +peer0.org2.example.com | [2401 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2247 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [2761 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 bb 0b 8e 9a 44 02 20 26 b3 f3 ba 82 19 c9 a2 62 |....D. &.......b| +peer0.org2.example.com | [2402 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2248 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [2762 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org1.example.com | 00000030 bd 59 65 61 dc 45 95 1c 01 80 e2 80 ed d9 03 e7 |.Yea.E..........| +peer0.org2.example.com | [2403 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2249 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org1.example.com | 00000040 98 07 20 92 39 64 1f |.. .9d.| +peer0.org2.example.com | [2404 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [224a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer1.org2.example.com | [2763 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org1.example.com | [2391 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [2405 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org1.example.com | [224b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [2392 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002527730, header 0xc00346e5f0 +peer0.org2.example.com | [2406 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org1.example.com | [224c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [2393 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org2.example.com | [2407 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org1.example.com | [224d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2394 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] processing txid: e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc +peer0.org2.example.com | [2408 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org1.example.com | [224e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2395 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc] +peer0.org2.example.com | [2409 11-19 05:22:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2764 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b350 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [224f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [2396 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org2.example.com | [240a 11-19 05:22:32.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2765 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b350 gate 1574140956227628900 evaluation succeeds +peer1.org1.example.com | [2250 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2397 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org2.example.com | [240b 11-19 05:22:32.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2766 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2251 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2398 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org2.example.com | [240c 11-19 05:22:32.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2767 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2252 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2399 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [240d 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2768 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2253 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] marked as valid by state validator +peer0.org1.example.com | [239a 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org2.example.com | [240e 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2769 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2254 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034ec480), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034ec4c0)} +peer0.org1.example.com | [239b 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 gate 1574140953348480200 evaluation starts +peer0.org2.example.com | [240f 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [276a 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer1.org1.example.com | [2255 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [239c 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2410 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer1.org1.example.com | [2256 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [239d 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [276b 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer0.org2.example.com | [2411 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2257 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [239e 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer0.org2.example.com | [2412 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2258 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org1.example.com | [239f 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 principal evaluation fails +peer1.org2.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer0.org2.example.com | [2413 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [2259 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org1.example.com | [23a0 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 gate 1574140953348480200 evaluation fails +peer1.org2.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer0.org2.example.com | [2414 11-19 05:22:32.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [225a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org1.example.com | [23a1 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer0.org2.example.com | [2415 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [225b 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a2 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [276c 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2416 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [225c 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org1.example.com | [23a3 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [23a4 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 gate 1574140953349755300 evaluation starts +peer1.org2.example.com | [276d 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2417 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [225d 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a5 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [276e 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2418 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [225e 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a6 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [276f 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2419 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [225f 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a7 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 principal matched by identity 0 +peer1.org2.example.com | [2770 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [241a 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2260 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a8 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 94 90 09 62 ad c8 15 96 13 9a 06 76 82 03 62 |....b.......v..b| +peer1.org2.example.com | [2771 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [241b 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [2261 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 50 3c 6b d3 9f 6c cf ad 22 6a 3f ae b8 37 2e 9b |P DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | MIICDjCCAbSgAwIBAgIRAN+s1O7GI0UOMZvmoXtLQ1YwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [2262 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23a9 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 7a a7 04 8c fe b5 76 1e 3d b4 |0E.!..z.....v.=.| +peer1.org2.example.com | [2773 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [2263 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 cc 76 3b 14 9f e3 60 4d 92 c3 65 98 12 da b2 0a |.v;...`M..e.....| +peer1.org2.example.com | [2774 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82b60 gate 1574140956234897400 evaluation starts +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [2264 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org1.example.com | 00000020 bb 0b 8e 9a 44 02 20 26 b3 f3 ba 82 19 c9 a2 62 |....D. &.......b| +peer1.org2.example.com | [2775 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82b60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +peer1.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org1.example.com | 00000030 bd 59 65 61 dc 45 95 1c 01 80 e2 80 ed d9 03 e7 |.Yea.E..........| +peer1.org2.example.com | [2776 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82b60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [2265 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org1.example.com | 00000040 98 07 20 92 39 64 1f |.. .9d.| +peer1.org2.example.com | [2777 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer1.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org1.example.com | [23aa 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2778 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82b60 principal evaluation fails +peer0.org2.example.com | CCqGSM49AwEHA0IABLwiaJeJ09sTdw1MBVFS4IREZVAH8wN2uMKkrIa8umfpr/In +peer1.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org1.example.com | [23ab 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 gate 1574140953349755300 evaluation succeeds +peer1.org2.example.com | [2779 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82b60 gate 1574140956234897400 evaluation fails +peer0.org2.example.com | RebO70d5f9RXjMamMvpVELq15f/FJggdIovxyjijTTBLMA4GA1UdDwEB/wQEAwIH +peer1.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org1.example.com | [23ac 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [277a 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org1.example.com | [23ad 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [277b 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQCaK9TwZhkZlKcM6m+SNiI0 +peer1.org1.example.com | [2266 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23ae 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org2.example.com | [277c 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | E0GWKJ8reffQGfFs/3HOTwIgagYUi0kZAQPl5hFBQns2vt2nCPA+hmOrUD0pfqND +peer1.org1.example.com | [2267 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23af 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer1.org2.example.com | [277d 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a830d0 gate 1574140956235774500 evaluation starts +peer0.org2.example.com | 93Q= +peer1.org1.example.com | [2268 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23b0 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [277e 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a830d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2269 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23b1 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc] +peer1.org2.example.com | [277f 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a830d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [241c 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d50 gate 1574140952688050000 evaluation starts +peer1.org1.example.com | [226a 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23b2 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] Entry chaincode: name:"exp02" +peer1.org2.example.com | [2780 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a830d0 principal matched by identity 0 +peer0.org2.example.com | [241d 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [226b 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23b3 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2781 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer0.org2.example.com | [241e 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [226c 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23b4 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer1.org2.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer0.org2.example.com | [241f 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org1.example.com | [226d 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23b5 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e0b5b90b] Entry chaincode: name:"exp02" +peer1.org2.example.com | [2782 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer0.org2.example.com | [2420 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [226e 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99d50 gate 1574140955765561200 evaluation starts +peer0.org1.example.com | [23b6 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer0.org2.example.com | [2421 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d50 principal matched by identity 0 +peer1.org1.example.com | [226f 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23b7 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org2.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer0.org2.example.com | [2422 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 0d 36 5c c2 99 17 5c 05 c5 bc 28 a1 0a dc 0e |..6\...\...(....| +peer1.org1.example.com | [2270 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99d50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [23b8 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] handling GET_STATE from chaincode +peer1.org2.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer0.org2.example.com | 00000010 a9 d9 9a 1d 15 76 b5 14 9a aa c7 7d a4 05 ce 06 |.....v.....}....| +peer1.org1.example.com | [2271 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99d50 principal matched by identity 0 +peer0.org1.example.com | [23b9 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] getting state for chaincode exp02, key a, channel businesschannel +peer1.org2.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer1.org1.example.com | [2272 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 07 1a 4d 44 90 90 66 f9 58 46 8f 08 f4 6b 0b |Y..MD..f.XF...k.| +peer0.org1.example.com | [23ba 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | [2783 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a830d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2423 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 89 09 0c 4c a8 6d 1e de 3e e6 |0E.!.....L.m..>.| +peer1.org1.example.com | 00000010 f5 23 2e 44 8b 70 c4 db 4b ae 25 29 b0 89 94 61 |.#.D.p..K.%)...a| +peer0.org1.example.com | [23bb 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] Completed GET_STATE. Sending RESPONSE +peer1.org2.example.com | [2784 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a830d0 gate 1574140956235774500 evaluation succeeds +peer0.org2.example.com | 00000010 e7 6f 22 2e 6f 80 73 b1 b4 c5 65 0e 30 cc a7 bc |.o".o.s...e.0...| +peer1.org1.example.com | [2273 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 cb 20 aa f9 ea f8 b6 d2 04 b3 e7 |0D. `. .........| +peer0.org1.example.com | [23bc 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [2785 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000020 2f 42 63 5f f7 02 20 0e ee b7 c2 40 91 2c 1a 49 |/Bc_.. ....@.,.I| +peer1.org1.example.com | 00000010 cd 8f 2a 41 f9 79 ed aa aa c8 9e 4d 52 0d f2 5a |..*A.y.....MR..Z| +peer0.org1.example.com | [23bd 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] notifying Txid:e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc, channelID:businesschannel +peer1.org2.example.com | [2786 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 c7 26 e6 15 a7 74 3b f4 9c eb d5 b9 c9 a9 1f 06 |.&...t;.........| +peer1.org1.example.com | 00000020 d5 93 58 29 02 20 14 ba a2 f7 e2 51 24 d3 11 8c |..X). .....Q$...| +peer0.org1.example.com | [23be 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [2787 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 a8 55 af 77 b4 6a dc |.U.w.j.| +peer1.org1.example.com | 00000030 d2 36 19 fc e6 5c 52 e5 92 69 5f b7 bc 0a 74 f4 |.6...\R..i_...t.| +peer0.org1.example.com | [23bf 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e0b5b90b] Exit chaincode: name:"exp02" (3ms) +peer1.org2.example.com | [2788 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2424 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 34 bf 81 58 8d 6f |4..X.o| +peer0.org1.example.com | [23c0 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [2789 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | [2425 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d50 gate 1574140952688050000 evaluation succeeds +peer1.org1.example.com | [2274 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99d50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [23c1 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc] +peer1.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org2.example.com | [2426 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2275 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99d50 gate 1574140955765561200 evaluation succeeds +peer0.org1.example.com | [23c2 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] Exit +peer1.org2.example.com | [278a 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org2.example.com | [2427 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2276 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23c3 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] Entry chaincode: name:"exp02" +peer1.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org2.example.com | [2428 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2277 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23c4 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] escc for chaincode name:"exp02" is escc +peer1.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org2.example.com | [2429 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2278 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [23c5 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc, chaincode: exp02} +peer1.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org2.example.com | [242a 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org1.example.com | [2279 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [23c6 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20FDE79C2AF97DCB662E4D420AC0AC...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org2.example.com | [242b 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org1.example.com | [227a 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org1.example.com | [23c7 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AEF743445051F1C7C5EF5471F23C547EC70AAACD2CD55B96AFFC0FC94241D963 +peer1.org2.example.com | [278b 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [242c 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org1.example.com | [23c8 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc, chaincode: exp02} +peer1.org2.example.com | [278c 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes +peer0.org2.example.com | [242d 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +peer1.org1.example.com | [227b 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org1.example.com | [23c9 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] Exit +peer1.org2.example.com | [278d 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [242e 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org1.example.com | [23ca 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc] +peer1.org2.example.com | [278e 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [242f 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org1.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer1.org1.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org1.example.com | [23cb 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45618 +peer0.org2.example.com | [2430 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer0.org2.example.com | [2431 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org2.example.com | [278f 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org2.example.com | [2432 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org1.example.com | [23cc 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45618 grpc.code=OK grpc.call_duration=14.4405ms +peer1.org1.example.com | [227c 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2790 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2433 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer0.org2.example.com | [2434 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org1.example.com | [227d 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2791 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2435 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [2436 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004a02540 env 0xc004ae4be0 txn 0 +peer1.org1.example.com | [227e 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23cd 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45618: read: connection reset by peer +peer0.org1.example.com | [23ce 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2437 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004ae4be0 +peer1.org1.example.com | [227f 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23cf 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2792 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2438 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +peer1.org1.example.com | [2280 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23d0 11-19 05:22:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45622 +peer1.org2.example.com | [2793 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2439 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [2281 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23d1 11-19 05:22:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00346f810 +peer1.org2.example.com | [2794 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [243a 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [2282 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23d2 11-19 05:22:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [2795 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [243b 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [2283 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23d3 11-19 05:22:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2796 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa4b30 gate 1574140956238652100 evaluation starts +peer0.org2.example.com | [243c 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2284 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e41560 gate 1574140955766771600 evaluation starts +peer0.org1.example.com | [23d4 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [2797 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa4b30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [243d 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [2285 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e41560 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23d5 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org2.example.com | [2798 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa4b30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [2286 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e41560 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [23d6 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [2799 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa4b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [2287 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e41560 principal matched by identity 0 +peer0.org1.example.com | [23d7 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 84 3b 87 dd 12 e7 47 8d 69 32 72 c9 d7 7f dd |%.;....G.i2r....| +peer1.org2.example.com | [279a 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa4b30 principal evaluation fails +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [2288 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer0.org1.example.com | 00000010 8d d5 66 93 18 61 1d f7 f9 6c d6 fa 7b 69 f4 a3 |..f..a...l..{i..| +peer1.org2.example.com | [279b 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa4b30 gate 1574140956238652100 evaluation fails +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer0.org1.example.com | [23d8 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 d5 3a 86 fe 8a e9 6e 46 05 7d |0E.!...:....nF.}| +peer1.org2.example.com | [279c 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [2289 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer0.org1.example.com | 00000010 4d 6a a2 3f 0d 9a 0b 19 4a f0 7b 7c 0f 4a d1 e4 |Mj.?....J.{|.J..| +peer1.org2.example.com | [279d 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer0.org1.example.com | 00000020 f0 b6 07 b1 58 02 20 49 35 36 66 ec 52 75 e8 62 |....X. I56f.Ru.b| +peer1.org2.example.com | [279e 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org1.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer0.org1.example.com | 00000030 c0 ca 58 cc b9 a1 7a ef fb ba a4 93 72 74 3c 59 |..X...z.....rt DEBU 0xc004aa50a0 gate 1574140956239350300 evaluation starts +peer0.org2.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer1.org1.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer0.org1.example.com | 00000040 b6 90 7f 19 7e 04 fd |....~..| +peer1.org2.example.com | [27a0 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa50a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer0.org1.example.com | [23d9 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [27a1 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa50a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer1.org1.example.com | [228a 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e41560 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [23da 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00015c310, header 0xc00346fc20 +peer1.org2.example.com | [27a2 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa50a0 principal matched by identity 0 +peer0.org2.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer1.org1.example.com | [228b 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e41560 gate 1574140955766771600 evaluation succeeds +peer0.org1.example.com | [23db 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer1.org2.example.com | [27a3 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org2.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer1.org1.example.com | [228c 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23dc 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] processing txid: e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff +peer1.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [228d 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23dd 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +peer1.org2.example.com | [27a4 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org2.example.com | [243e 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [23de 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer1.org1.example.com | [228e 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org2.example.com | [243f 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [23df 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer1.org1.example.com | [228f 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org2.example.com | [2440 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [23e0 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer1.org1.example.com | [2290 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org2.example.com | [2441 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [23e1 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2291 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org2.example.com | [2442 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +peer0.org1.example.com | [23e2 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer1.org1.example.com | [2292 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer1.org2.example.com | [27a5 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa50a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +peer0.org1.example.com | [23e3 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 gate 1574140953583015600 evaluation starts +peer1.org1.example.com | [2293 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a6 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa50a0 gate 1574140956239350300 evaluation succeeds +peer0.org2.example.com | [2443 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +peer0.org1.example.com | [23e4 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2294 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x4, 0xe7, 0xc, 0x85, 0x3a, 0x49, 0x30, 0x52, 0x72, 0xab, 0xdb, 0xa8, 0x7b, 0x33, 0xba, 0x1c, 0xf9, 0x58, 0x99, 0xbf, 0x89, 0xa6, 0x5d, 0x1d, 0xca, 0x40, 0x6d, 0xa0, 0xbc, 0x4d, 0x3d, 0x62} txOffsets= +peer1.org2.example.com | [27a7 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +peer0.org1.example.com | [23e5 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | txId=e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff locPointer=offset=70, bytesLength=2977 +peer1.org2.example.com | [27a8 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +peer0.org1.example.com | [23e6 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | ] +peer1.org2.example.com | [27a9 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +peer0.org1.example.com | [23e7 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 principal evaluation fails +peer1.org1.example.com | [2295 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81466, bytesLength=2977] for tx ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to txid-index +peer1.org2.example.com | [27aa 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR| +peer0.org1.example.com | [23e8 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 gate 1574140953583015600 evaluation fails +peer1.org1.example.com | [2296 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81466, bytesLength=2977] for tx number:[0] ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to blockNumTranNum index +peer1.org2.example.com | [27ab 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer0.org2.example.com | [2444 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [23e9 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [2297 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85416], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org2.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer0.org2.example.com | [2445 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00046ea80, header channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +peer0.org1.example.com | [23ea 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [2298 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org2.example.com | [27ac 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer0.org2.example.com | [2446 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [23eb 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer1.org1.example.com | [2299 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer0.org2.example.com | [2447 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [23ec 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 gate 1574140953585362600 evaluation starts +peer1.org1.example.com | [229a 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151028 +peer1.org2.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer0.org2.example.com | [2448 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [23ed 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [229b 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4ACC2783B1E7FF4AB4A49E4FDE82DEE9B21A640036A820A942C726BB6FD178FB +peer1.org2.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer0.org2.example.com | [2449 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [23ee 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [229c 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer0.org2.example.com | [244a 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +peer0.org1.example.com | [23ef 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 principal matched by identity 0 +peer1.org1.example.com | [229d 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [27ad 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [244b 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [23f0 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 84 3b 87 dd 12 e7 47 8d 69 32 72 c9 d7 7f dd |%.;....G.i2r....| +peer1.org1.example.com | [229e 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [27ae 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [244c 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00017f000 +peer0.org1.example.com | 00000010 8d d5 66 93 18 61 1d f7 f9 6c d6 fa 7b 69 f4 a3 |..f..a...l..{i..| +peer1.org1.example.com | [229f 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [27af 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [244d 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [23f1 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 d5 3a 86 fe 8a e9 6e 46 05 7d |0E.!...:....nF.}| +peer1.org1.example.com | [22a0 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer1.org2.example.com | [27b0 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [244e 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [bbe8c1a4-bfec-46a2-a8cf-6152f6d3351c] +peer0.org1.example.com | 00000010 4d 6a a2 3f 0d 9a 0b 19 4a f0 7b 7c 0f 4a d1 e4 |Mj.?....J.{|.J..| +peer1.org1.example.com | [22a1 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer1.org2.example.com | [27b1 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [244f 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [bbe8c1a4-bfec-46a2-a8cf-6152f6d3351c] +peer0.org1.example.com | 00000020 f0 b6 07 b1 58 02 20 49 35 36 66 ec 52 75 e8 62 |....X. I56f.Ru.b| +peer1.org1.example.com | [22a2 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [27b2 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2450 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 gate 1574140952697888100 evaluation starts +peer0.org1.example.com | 00000030 c0 ca 58 cc b9 a1 7a ef fb ba a4 93 72 74 3c 59 |..X...z.....rt DEBU Committing updates to state database +peer1.org2.example.com | [27b3 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2451 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 b6 90 7f 19 7e 04 fd |....~..| +peer1.org1.example.com | [22a4 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [27b4 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2452 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [22a5 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [23f2 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [27b5 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac48b0 gate 1574140956242798000 evaluation starts +peer0.org2.example.com | [2453 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 principal matched by identity 0 +peer1.org1.example.com | [22a6 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [23f3 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 gate 1574140953585362600 evaluation succeeds +peer1.org2.example.com | [27b6 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac48b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2454 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 68 1c ad b4 bb c1 55 d5 00 b1 31 73 81 e6 77 |.h.....U...1s..w| +peer1.org1.example.com | [22a7 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [23f4 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [27b7 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac48b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 13 bb 9b 26 85 b6 a1 2a 9b 2a 9e ae d6 7f 89 36 |...&...*.*.....6| +peer1.org1.example.com | [22a8 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [23f5 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [27b8 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac48b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2455 11-19 05:22:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a9 11 75 e6 b6 d8 fc 3f dc e6 f1 |0D. $..u....?...| +peer1.org1.example.com | [22a9 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org1.example.com | [23f6 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org2.example.com | [27b9 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac48b0 principal evaluation fails +peer0.org2.example.com | 00000010 05 18 53 bd 79 20 d0 5e 12 b1 96 67 4f 41 cc 77 |..S.y .^...gOA.w| +peer1.org1.example.com | [22aa 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org1.example.com | [23f7 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer1.org2.example.com | [27ba 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac48b0 gate 1574140956242798000 evaluation fails +peer0.org2.example.com | 00000020 d2 c8 ab 9d 02 20 0f d1 40 05 e3 ff 8b ab b4 77 |..... ..@......w| +peer1.org1.example.com | [22ab 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [23f8 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [27bb 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 0b 32 e1 20 48 7e 06 ea 74 97 31 23 a3 14 40 56 |.2. H~..t.1#..@V| +peer1.org1.example.com | [22ad 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org1.example.com | [23f9 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +peer1.org2.example.com | [27bc 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 b8 2d a4 d4 aa 2c |.-...,| +peer1.org1.example.com | [22ae 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org1.example.com | [23fa 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] Entry chaincode: name:"exp02" +peer1.org2.example.com | [27bd 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2456 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22ac 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org1.example.com | [23fb 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [27be 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4e20 gate 1574140956243976100 evaluation starts +peer0.org2.example.com | [2457 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22af 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23fc 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org2.example.com | [2458 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27bf 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4e20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [22b0 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23fd 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e3312465] Entry chaincode: name:"exp02" +peer0.org2.example.com | [2459 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27c0 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4e20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [22b1 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [23fe 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [245a 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27c1 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4e20 principal matched by identity 0 +peer1.org1.example.com | [22b2 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23ff 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org2.example.com | [245b 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27c2 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +peer1.org1.example.com | [22b3 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2400 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] handling GET_STATE from chaincode +peer0.org2.example.com | [245c 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +peer1.org1.example.com | [22b4 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2401 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] getting state for chaincode exp02, key a, channel businesschannel +peer0.org2.example.com | [245d 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c3 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +peer1.org1.example.com | [22b5 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2402 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | 00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +peer0.org2.example.com | [245e 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22b6 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2403 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Completed GET_STATE. Sending RESPONSE +peer1.org2.example.com | 00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +peer0.org2.example.com | [245f 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22b7 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2404 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org2.example.com | 00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +peer0.org2.example.com | [2460 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [22b8 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org1.example.com | [2405 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] handling GET_STATE from chaincode +peer1.org2.example.com | 00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +peer0.org2.example.com | [2461 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 skipping identity 0 because it has already been used +peer0.org1.example.com | [2406 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] getting state for chaincode exp02, key b, channel businesschannel +peer1.org1.example.com | [22b9 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 30ms (state_validation=0ms block_and_pvtdata_commit=24ms state_commit=3ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer1.org2.example.com | [27c4 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4e20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2462 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 principal evaluation fails +peer0.org1.example.com | [2407 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer1.org1.example.com | [22ba 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [27c5 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4e20 gate 1574140956243976100 evaluation succeeds +peer0.org2.example.com | [2463 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212520 gate 1574140952697888100 evaluation succeeds +peer0.org1.example.com | [2408 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Completed GET_STATE. Sending RESPONSE +peer1.org1.example.com | [22bb 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F0B3D5E6FC999EEC15...08051A0C0A0565787030321203312E30 +peer1.org2.example.com | [27c6 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2464 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org1.example.com | [2409 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer1.org1.example.com | [22bc 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1850588CCB1322A005DE885E376F95247BA8B72286113EC4A357EAF199156BD2 +peer1.org2.example.com | [27c7 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2465 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org1.example.com | [240a 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] handling PUT_STATE from chaincode +peer1.org1.example.com | [22bd 11-19 05:22:35.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer1.org2.example.com | [27c8 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2466 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org1.example.com | [240b 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Completed PUT_STATE. Sending RESPONSE +peer1.org1.example.com | [22be 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [27c9 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2467 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer0.org1.example.com | [240c 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer1.org1.example.com | [22bf 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27ca 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | [2468 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer0.org1.example.com | [240d 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] handling PUT_STATE from chaincode +peer1.org1.example.com | [22c0 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org2.example.com | [2469 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [10c47e73-8842-4651-818c-15c095d491f0] +peer0.org1.example.com | [240e 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Completed PUT_STATE. Sending RESPONSE +peer1.org1.example.com | [22c1 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27cb 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org2.example.com | [246a 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [240f 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [22c2 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org2.example.com | [246b 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [10c47e73-8842-4651-818c-15c095d491f0] +peer0.org1.example.com | [2410 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] notifying Txid:e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, channelID:businesschannel +peer1.org1.example.com | [22c3 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org2.example.com | [246c 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer0.org1.example.com | [2411 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [22c4 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org2.example.com | [246d 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5921078b-3de3-44e9-9e2b-ed48a4b2b024] +peer0.org1.example.com | [2412 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e3312465] Exit chaincode: name:"exp02" (8ms) +peer1.org1.example.com | [22c5 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org2.example.com | [246e 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [2413 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [22c6 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [27cc 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [246f 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5921078b-3de3-44e9-9e2b-ed48a4b2b024] +peer0.org1.example.com | [2414 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +peer1.org1.example.com | [22c7 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27cd 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer0.org2.example.com | [2470 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 gate 1574140952735189700 evaluation starts +peer0.org1.example.com | [2415 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] Exit +peer1.org1.example.com | [22c8 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [27ce 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer0.org2.example.com | [2471 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2416 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] Entry chaincode: name:"exp02" +peer1.org1.example.com | [22c9 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27cf 11-19 05:22:36.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2472 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2417 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] escc for chaincode name:"exp02" is escc +peer1.org1.example.com | [22ca 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [27d0 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 5}, Envelope: 4028 bytes, Signature: 0 bytes +peer0.org2.example.com | [2473 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [2418 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, chaincode: exp02} +peer1.org1.example.com | [22cb 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27d1 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 5}, Envelope: 4028 bytes, Signature: 0 bytes +peer0.org2.example.com | [2474 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [2419 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20CA1CAD5967D43FA79DE0C281BD3E...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [22cc 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [27d2 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2475 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [241a 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FA3744604EC0745220E52A669F1D8E96967643DBD515F4EEAA4D42459AB96C7 +peer1.org1.example.com | [22cd 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27d3 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2476 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [241b 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, chaincode: exp02} +peer1.org1.example.com | [22cf 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [27d4 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [2477 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [241c 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] Exit +peer1.org1.example.com | [22ce 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [27d5 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2478 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [241d 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +peer1.org1.example.com | [22d0 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [27d6 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [2479 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 principal matched by identity 0 +peer0.org1.example.com | [241e 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45622 +peer1.org1.example.com | [22d1 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27d7 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ade460 gate 1574140958471070100 evaluation starts +peer0.org2.example.com | [247a 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +peer0.org1.example.com | [241f 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45622 grpc.code=OK grpc.call_duration=20.3083ms +peer1.org1.example.com | [22d2 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [27d8 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ade460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +peer0.org1.example.com | [2420 11-19 05:22:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45622: read: connection reset by peer +peer1.org1.example.com | [22d3 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [27d9 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ade460 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [247b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +peer0.org1.example.com | [2421 11-19 05:22:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [22d4 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27da 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ade460 principal matched by identity 0 +peer0.org2.example.com | 00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +peer0.org1.example.com | [2422 11-19 05:22:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [22d5 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [27db 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 31 22 3a ac 79 aa aa 5e 72 e5 fe 8e ee 41 d3 |.1":.y..^r....A.| +peer0.org2.example.com | 00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +peer0.org1.example.com | [2423 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45628 +peer1.org1.example.com | [22d6 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 bc bf 9f 3b 2e 88 89 dd 4b 6c 6d ee d5 1a 21 c3 |...;....Klm...!.| +peer0.org2.example.com | 00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +peer0.org1.example.com | [2424 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00339a410 +peer1.org2.example.com | [27dc 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc a2 79 ae 6f af 95 1d 2e 49 b0 |0E.!...y.o....I.| +peer1.org1.example.com | [22d7 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 28 97 fa fc 24 78 52 |(...$xR| +peer0.org1.example.com | [2425 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | 00000010 4b ac 22 ae e5 7d 96 b1 eb 23 7b bb 1c 5e 00 3d |K."..}...#{..^.=| +peer1.org1.example.com | [22d8 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [247c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2426 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | 00000020 00 cb 52 cd f0 02 20 07 0d f9 3c 2a ef b7 96 33 |..R... ...<*...3| +peer1.org1.example.com | [22d9 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [247d 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2427 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | 00000030 12 6b 7d 27 37 42 1f ef 0a 7f ba 73 8b c8 ad 9e |.k}'7B.....s....| +peer1.org1.example.com | [22da 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [247e 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 skipping identity 0 because it has already been used +peer0.org1.example.com | [2428 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 8e 56 d2 0d b3 fc f5 |.V.....| +peer1.org1.example.com | [22db 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [247f 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 principal evaluation fails +peer0.org1.example.com | [2429 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [27dd 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ade460 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22dc 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2480 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213640 gate 1574140952735189700 evaluation succeeds +peer0.org1.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | [27de 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ade460 gate 1574140958471070100 evaluation succeeds +peer1.org1.example.com | [22dd 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2481 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [27df 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [22de 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2482 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b appears to be valid +peer1.org2.example.com | [27e0 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | [22df 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2483 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00017f000 +peer1.org2.example.com | [27e1 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org1.example.com | [22e0 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2484 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004a02540 env 0xc004ae4be0 txn 0 +peer1.org2.example.com | [27e2 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | [22e1 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2485 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [27e3 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 5}, Envelope: 4028 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org1.example.com | [22e2 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [2486 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 61ms +peer1.org2.example.com | [27e4 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer1.org1.example.com | [22e3 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2487 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [27e5 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer1.org1.example.com | [22e4 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2488 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [27e6 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org1.example.com | [22e5 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2489 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org2.example.com | [27e7 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org1.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer1.org1.example.com | [22e6 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [248a 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [27e8 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer1.org1.example.com | [22e7 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [248b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [27e9 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org1.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer1.org1.example.com | [22e8 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [248c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [27ea 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer1.org1.example.com | [22e9 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [248d 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer0.org1.example.com | [242a 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer1.org2.example.com | [27eb 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org1.example.com | [22ea 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [248e 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [242b 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [27ec 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer1.org1.example.com | [22eb 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [248f 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [242c 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [27ed 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer1.org1.example.com | [22ec 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2490 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [242d 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [27ee 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [2491 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer1.org1.example.com | [22ed 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [242e 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e ec 4b 18 e9 04 c6 e7 a9 dc f3 c2 32 96 1e 0e |>.K.........2...| +peer1.org2.example.com | [27ef 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004929680 env 0xc004aab5e0 txn 0 +peer0.org2.example.com | [2492 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] marked as valid by state validator +peer1.org1.example.com | [22ee 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 83 15 9e 19 a3 46 64 7b ed 16 6f 92 bc 0d ad f2 |.....Fd{..o.....| +peer1.org2.example.com | [27f0 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004aab5e0 +peer0.org2.example.com | [2493 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004a039c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004a03a00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc004a03a40)} +peer1.org1.example.com | [22ef 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [242f 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 06 61 bd ab eb 5b 98 94 fb 6a c8 |0D. ..a...[...j.| +peer1.org2.example.com | [27f1 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo\n8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ\nnvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO\nPQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +peer0.org2.example.com | [2494 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [22f0 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f641f0 gate 1574140955863342100 evaluation starts +peer0.org1.example.com | 00000010 b4 e1 2b e9 cd 44 64 62 d0 b4 3e 79 1b 86 1d ad |..+..Ddb..>y....| +peer1.org2.example.com | [27f2 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2495 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [22f1 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f641f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 f8 3d 3a 30 02 20 0f 95 1b 01 8f 19 62 bb ff 18 |.=:0. ......b...| +peer1.org2.example.com | [27f3 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2496 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [22f2 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f641f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000030 7a 90 5d 8e 8b ac 50 3d 06 a6 16 f4 28 f1 4f 59 |z.]...P=....(.OY| +peer1.org2.example.com | [27f4 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2497 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0033ae410)}} +peer1.org1.example.com | [22f3 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f641f0 principal matched by identity 0 +peer0.org1.example.com | 00000040 f6 91 94 28 2f be |...(/.| +peer1.org2.example.com | [27f5 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2498 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer1.org1.example.com | [22f4 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org1.example.com | [2430 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [27f6 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [2499 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org1.example.com | [2431 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001ac1c0, header 0xc00339a820 +peer1.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | [249a 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | [22f5 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org1.example.com | [2432 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [249b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org1.example.com | [2433 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] processing txid: 0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427 +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | [249c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org1.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org1.example.com | [2434 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427] +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org2.example.com | [249d 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org1.example.com | [2435 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | [249e 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org1.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org1.example.com | [2436 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | [249f 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [22f6 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f641f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2437 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer0.org2.example.com | [24a0 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 102 105 102 67 76 119 72 51 110 66 114 75 72 80 115 121 82 75 78 70 68 122 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 114 77 122 71 105 79 121 106 104 83 43 10 86 87 101 43 84 47 56 79 89 105 102 75 110 75 84 118 102 73 102 51 105 119 75 89 106 75 104 108 49 103 67 101 87 86 90 110 72 89 75 79 80 98 85 117 73 80 116 55 97 77 54 120 76 57 51 121 117 118 120 111 77 100 51 105 10 65 74 107 80 83 55 111 100 50 54 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 106 109 117 86 48 72 47 102 89 48 51 75 88 52 104 118 122 110 110 104 81 90 85 73 78 119 100 100 52 48 48 105 100 73 71 100 100 99 76 77 116 78 81 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 99 113 85 43 110 112 50 85 104 57 119 109 103 79 55 54 88 69 50 107 121 71 49 110 56 111 112 114 102 82 106 68 51 66 119 53 49 103 87 74 118 116 65 105 66 114 85 71 57 103 10 70 114 97 73 49 57 49 78 114 113 122 53 108 98 99 65 98 112 107 84 43 74 83 116 84 80 113 55 54 79 120 69 111 43 81 56 110 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 254 155 156 91 63 171 171 145 194 12 13 139 229 225 243 241 189 23 236 117 97 198 14 157 160 9 73 33 115 74 134 11 2 32 39 0 123 113 60 124 248 162 41 198 118 166 92 62 151 85 203 85 101 11 158 93 121 193 115 118 32 70 199 97 154 70]} 0x152c9b0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0027e40c0 0xc0026e3680 {{0 0} 0 0 0 0} {false}})]} +peer1.org1.example.com | [22f7 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f641f0 gate 1574140955863342100 evaluation succeeds +peer0.org1.example.com | [2438 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer0.org2.example.com | [24a1 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [22f8 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2439 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer1.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | [24a2 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0000b00c0})} +peer1.org1.example.com | [22f9 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [243a 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 gate 1574140953780305400 evaluation starts +peer1.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer0.org2.example.com | [24a3 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org1.example.com | [22fa 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [243b 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer0.org2.example.com | [24a4 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org1.example.com | [22fb 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [243c 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer0.org2.example.com | [24a5 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org1.example.com | [22fc 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [243d 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [24a6 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org1.example.com | [22fd 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [243e 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [27f7 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org2.example.com | [24a7 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xaf, 0xe8, 0x73, 0x33, 0x36, 0xd, 0xf9, 0x12, 0x19, 0x79, 0xd, 0x24, 0x42, 0x5b, 0x7d, 0xa9, 0x98, 0xab, 0xce, 0xdc, 0x98, 0x36, 0x45, 0x6e, 0x26, 0x2b, 0x86, 0x76, 0x6a, 0x37, 0x47, 0x75} txOffsets= +peer1.org1.example.com | [22fe 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [243f 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [27f8 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | txId=afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b locPointer=offset=70, bytesLength=3516 +peer1.org1.example.com | [22ff 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2440 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 principal matched by identity 0 +peer1.org2.example.com | [27f9 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | ] +peer1.org1.example.com | [2300 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2441 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e ec 4b 18 e9 04 c6 e7 a9 dc f3 c2 32 96 1e 0e |>.K.........2...| +peer1.org2.example.com | [27fa 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [24a8 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to txid-index +peer1.org1.example.com | [2301 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 83 15 9e 19 a3 46 64 7b ed 16 6f 92 bc 0d ad f2 |.....Fd{..o.....| +peer1.org2.example.com | [27fb 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24a9 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx number:[0] ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to blockNumTranNum index +peer1.org1.example.com | [2302 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2442 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 06 61 bd ab eb 5b 98 94 fb 6a c8 |0D. ..a...[...j.| +peer1.org2.example.com | [27fc 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24aa 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81397], isChainEmpty=[false], lastBlockNumber=[3] +peer1.org1.example.com | [2303 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 b4 e1 2b e9 cd 44 64 62 d0 b4 3e 79 1b 86 1d ad |..+..Ddb..>y....| +peer1.org2.example.com | [27fd 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24ab 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer1.org1.example.com | [2304 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | 00000020 f8 3d 3a 30 02 20 0f 95 1b 01 8f 19 62 bb ff 18 |.=:0. ......b...| +peer1.org2.example.com | [27ff 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24ac 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer1.org1.example.com | [2305 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 7a 90 5d 8e 8b ac 50 3d 06 a6 16 f4 28 f1 4f 59 |z.]...P=....(.OY| +peer1.org2.example.com | [27fe 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 26 b8 08 96 42 20 b0 93 90 db 47 bf fd 5f 64 |.&...B ....G.._d| +peer0.org2.example.com | [24ad 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer1.org1.example.com | [2306 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 f6 91 94 28 2f be |...(/.| +peer1.org2.example.com | 00000010 20 57 2e 37 e4 32 9f 5f 80 0a 2f a1 39 a6 64 68 | W.7.2._../.9.dh| +peer0.org2.example.com | [24ae 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [2307 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2443 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2801 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 8d 3f de 4b 30 dd 90 ff 5a ac b4 |0D. '.?.K0...Z..| +peer0.org2.example.com | [24af 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [2308 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2444 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 gate 1574140953780305400 evaluation succeeds +peer1.org2.example.com | 00000010 19 80 38 1a bd c5 6c 25 03 c3 a8 82 3a b5 ca de |..8...l%....:...| +peer0.org2.example.com | [24b0 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [2309 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2445 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | 00000020 5a 99 a0 c1 02 20 06 0a 45 ed 9e bd e8 83 cb ea |Z.... ..E.......| +peer0.org2.example.com | [24b1 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [230a 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2446 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | 00000030 86 34 5d 26 b1 55 76 12 05 30 94 60 26 6d b2 47 |.4]&.Uv..0.`&m.G| +peer0.org2.example.com | [24b2 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer1.org1.example.com | [230b 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2447 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org2.example.com | 00000040 52 6c 09 15 27 0e |Rl..'.| +peer0.org2.example.com | [24b3 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [230c 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2448 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer1.org2.example.com | [2800 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24b4 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [230d 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2449 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [2802 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [24b5 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [230e 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [244a 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427] +peer1.org2.example.com | [2803 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004927000, header channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +peer0.org2.example.com | [24b6 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [c6737a09-b6e1-4833-a031-354a8c2a0b9d] +peer1.org1.example.com | [230f 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [244b 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] Entry chaincode: name:"exp02" +peer1.org2.example.com | [2804 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24b7 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer1.org1.example.com | [2310 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [244c 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2805 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [24b8 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2311 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [244d 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer1.org2.example.com | [2806 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [24b9 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer1.org1.example.com | [2312 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [244e 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0726a01d] Entry chaincode: name:"exp02" +peer1.org2.example.com | [2807 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [24ba 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c6737a09-b6e1-4833-a031-354a8c2a0b9d] +peer1.org1.example.com | [2313 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [244f 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [2808 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [24bb 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org1.example.com | [2314 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2450 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org2.example.com | [2809 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +peer0.org2.example.com | [24bc 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2315 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2451 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] handling GET_STATE from chaincode +peer1.org2.example.com | [280a 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [24bd 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C12140898B48782FE999EEC15...08031A0C0A0565787030321203312E30 +peer1.org1.example.com | [2316 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2452 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] getting state for chaincode exp02, key a, channel businesschannel +peer1.org2.example.com | [280b 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004ae0c00 +peer0.org2.example.com | [24be 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9196032140DEA7DF991CDB0E93CD7E6E75978F8DB016A889440C92B97CEBA360 +peer1.org1.example.com | [2317 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2453 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | [280c 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3b993617-b3c7-4e43-aab1-e5a563d7136e] +peer0.org2.example.com | [24bf 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org1.example.com | [2318 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035effa0 gate 1574140955878220000 evaluation starts +peer0.org1.example.com | [2454 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] Completed GET_STATE. Sending RESPONSE +peer1.org2.example.com | [280d 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [24c0 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [2319 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035effa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2455 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [24c1 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer1.org2.example.com | [280e 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3b993617-b3c7-4e43-aab1-e5a563d7136e] +peer1.org1.example.com | [231a 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035effa0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2456 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] notifying Txid:0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427, channelID:businesschannel +peer0.org2.example.com | [24c2 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer1.org2.example.com | [280f 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer1.org1.example.com | [231b 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035effa0 principal matched by identity 0 +peer0.org1.example.com | [2457 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [24c3 11-19 05:22:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer1.org2.example.com | [2810 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [e47f8647-19f9-4324-8612-d0ca52f09836] +peer1.org1.example.com | [231c 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 dc b0 74 49 6b 26 d8 5b 9b c3 0b f4 44 b4 dd |Y..tIk&.[....D..| +peer0.org1.example.com | [2458 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0726a01d] Exit chaincode: name:"exp02" (3ms) +peer0.org2.example.com | [24c4 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer1.org2.example.com | [2811 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e47f8647-19f9-4324-8612-d0ca52f09836] +peer1.org1.example.com | 00000010 34 b4 c8 2b 4f 4b 9e 23 a3 d3 f0 98 8f 3b 3f 59 |4..+OK.#.....;?Y| +peer0.org1.example.com | [2459 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [24c5 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org2.example.com | [2812 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 gate 1574140958478665900 evaluation starts +peer1.org1.example.com | [231d 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 19 20 40 f1 2d de 88 a3 58 6c 35 |0D. /. @.-...Xl5| +peer0.org1.example.com | [245a 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427] +peer0.org2.example.com | [24c6 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer1.org2.example.com | [2813 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 4d ad 1d 91 1b 51 39 d3 1d 23 ef 51 8d e4 e5 20 |M....Q9..#.Q... | +peer0.org1.example.com | [245b 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] Exit +peer0.org2.example.com | [24c7 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 48ms (state_validation=20ms block_and_pvtdata_commit=20ms state_commit=5ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer1.org2.example.com | [2814 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000020 ac 8f d5 90 02 20 41 5a 4e 90 6a 30 27 93 be f0 |..... AZN.j0'...| +peer0.org1.example.com | [245c 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] Entry chaincode: name:"exp02" +peer0.org2.example.com | [24c8 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2815 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 principal matched by identity 0 +peer1.org1.example.com | 00000030 b1 59 41 bc 2e b0 68 b6 3f d9 3c 18 98 6b ab 9e |.YA...h.?.<..k..| +peer0.org1.example.com | [245d 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] escc for chaincode name:"exp02" is escc +peer0.org2.example.com | [24c9 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C12140898B48782FE999EEC15...08041A0C0A0565787030321203312E30 +peer1.org2.example.com | [2816 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 be ae 07 1c 25 52 16 a5 6e 0d 58 88 b9 2f 55 | ....%R..n.X../U| +peer1.org1.example.com | 00000040 8c a2 2d 94 69 55 |..-.iU| +peer0.org1.example.com | [245e 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427, chaincode: exp02} +peer0.org2.example.com | [24ca 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 59071A4D44909066F958468F08F46B0BF5232E448B70C4DB4BAE2529B0899461 +peer1.org2.example.com | 00000010 1f 93 c0 ac 4e b2 c1 e8 61 44 8c d9 66 16 28 87 |....N...aD..f.(.| +peer1.org1.example.com | [231e 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035effa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [245f 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A1FB8DB453C15DA913223B22B20C...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [24cb 11-19 05:22:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer1.org2.example.com | [2817 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 96 6b 27 fb ec 50 7b c1 37 96 |0E.!...k'..P{.7.| +peer1.org1.example.com | [231f 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035effa0 gate 1574140955878220000 evaluation succeeds +peer0.org1.example.com | [2460 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CD4303E1B4487465E0026DF179A9D4CBB83FB5AABF73C49BEBAF1DAC81FE7A10 +peer0.org2.example.com | [24cc 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 a2 1c 2b 6f 05 74 f5 be a6 59 38 e1 56 2a 99 d7 |..+o.t...Y8.V*..| +peer1.org1.example.com | [2320 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2461 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427, chaincode: exp02} +peer0.org2.example.com | [24cd 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 c2 4d 07 4b 70 02 20 2a 40 08 55 be 83 07 fe e1 |.M.Kp. *@.U.....| +peer1.org1.example.com | [2321 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2462 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] Exit +peer0.org2.example.com | [24ce 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 4e a8 b3 2e 63 64 88 da 52 85 bb 6f b2 cb 1e 2f |N...cd..R..o.../| +peer1.org1.example.com | [2322 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2463 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427] +peer0.org2.example.com | [24cf 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | 00000040 99 8b 06 57 f7 ed a4 |...W...| +peer1.org1.example.com | [2323 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2464 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45628 +peer0.org2.example.com | [24d0 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2818 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2324 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2465 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45628 grpc.code=OK grpc.call_duration=10.0232ms +peer1.org2.example.com | [2819 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [24d1 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2325 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" lastAliveTS: 1574140895837304100, 38 but got ts: inc_num:1574140895837304100 seq_num:37 +peer0.org1.example.com | [2467 11-19 05:22:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [281a 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 skipping identity 0 because it has already been used +peer0.org2.example.com | [24d2 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2326 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2466 11-19 05:22:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [281b 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 principal evaluation fails +peer0.org2.example.com | [24d3 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2327 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2468 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer1.org2.example.com | [281c 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a11720 gate 1574140958478665900 evaluation succeeds +peer0.org2.example.com | [24d4 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2328 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2469 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer1.org2.example.com | [281d 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b321f582-f6c3-4e93-833f-5a52a92d4574] +peer0.org2.example.com | [24d5 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [246a 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2329 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [281e 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b321f582-f6c3-4e93-833f-5a52a92d4574] +peer0.org2.example.com | [24d6 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [246b 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100B1801 +peer1.org1.example.com | [232a 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [281f 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | [24d7 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c78d0 gate 1574140954769905900 evaluation starts +peer0.org1.example.com | [246c 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E51D29A451EBBC3912A566C5B5ECACCF1F74C0B4CBCC12145F92D10B1440578 +peer1.org1.example.com | [232b 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2820 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 appears to be valid +peer0.org2.example.com | [24d8 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c78d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [246d 11-19 05:22:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer1.org1.example.com | [232c 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [2821 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004ae0c00 +peer0.org2.example.com | [24d9 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c78d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [246e 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [232d 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a cc 27 83 b1 e7 ff 4a b4 a4 9e 4f de 82 de e9 |J.'....J...O....| +peer1.org2.example.com | [2822 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004929680 env 0xc004aab5e0 txn 0 +peer0.org2.example.com | [24da 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c78d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [246f 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 b2 1a 64 00 36 a8 20 a9 42 c7 26 bb 6f d1 78 fb |..d.6. .B.&.o.x.| +peer1.org2.example.com | [2823 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [24db 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c78d0 principal evaluation fails +peer0.org1.example.com | [2470 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [232e 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 24 ee 38 6d 7d 75 4e ba db 1d de |0D. .$.8m}uN....| +peer1.org2.example.com | [2824 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 10ms +peer0.org2.example.com | [24dc 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c78d0 gate 1574140954769905900 evaluation fails +peer0.org1.example.com | [2471 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 82 fe d5 e1 0a 39 11 9d 73 73 1e 41 8a 7f a4 08 |.....9..ss.A....| +peer1.org2.example.com | [2825 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [24dd 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2472 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000020 18 9e 0d c9 02 20 43 82 73 95 f0 88 8e 61 1f 36 |..... C.s....a.6| +peer1.org2.example.com | [2826 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [24de 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2473 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 69 29 0f bb 93 16 ee e3 e7 c1 29 22 79 b1 09 4c |i)........)"y..L| +peer1.org2.example.com | [2827 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org2.example.com | [24df 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2474 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 5b 67 24 b0 a4 ed |[g$...| +peer1.org2.example.com | [2828 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [24e0 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7e40 gate 1574140954776140200 evaluation starts +peer0.org1.example.com | [2475 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [232f 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2829 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [24e1 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7e40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2476 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2330 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [282a 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [24e2 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7e40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2477 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2331 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [282b 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org2.example.com | [24e3 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7e40 principal matched by identity 0 +peer0.org1.example.com | [2478 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151023 +peer1.org1.example.com | [2332 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [282c 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [24e4 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 f0 c4 7c 3e 88 17 f1 a3 8e 02 c3 b4 36 af 7c |...|>........6.|| +peer0.org1.example.com | [2479 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 88F0C47C3E8817F1A38E02C3B436AF7CDDA4E4B8DDD8F7596BF294752B473E33 +peer1.org1.example.com | [2333 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [282d 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | 00000010 dd a4 e4 b8 dd d8 f7 59 6b f2 94 75 2b 47 3e 33 |.......Yk..u+G>3| +peer0.org1.example.com | [247a 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2334 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [282e 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [24e5 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 74 6d 61 d7 92 d0 37 5c d1 7f 37 |0D. .tma...7\..7| +peer0.org1.example.com | [247b 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2335 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [282f 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | 00000010 80 ea ae 9e 58 af 59 33 01 05 07 28 d5 45 ec 8e |....X.Y3...(.E..| +peer0.org1.example.com | [247c 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [2336 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2830 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | 00000020 43 bb 26 11 02 20 55 94 b5 d2 83 b2 30 e8 0c 9d |C.&.. U.....0...| +peer0.org1.example.com | [247d 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2337 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2831 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | 00000030 e8 26 0a ef 92 8f 74 4a bd 3b 42 ab 65 15 26 aa |.&....tJ.;B.e.&.| +peer0.org1.example.com | [247e 11-19 05:22:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2338 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2832 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | 00000040 4e 3a cb a4 63 be |N:..c.| +peer0.org1.example.com | [247f 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2339 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2833 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [24e6 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7e40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2480 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [233a 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2834 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] marked as valid by state validator +peer0.org2.example.com | [24e7 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7e40 gate 1574140954776140200 evaluation succeeds +peer0.org1.example.com | [2481 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [233b 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2835 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0048cfe40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0048cfe80)} +peer0.org2.example.com | [24e8 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2482 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [233c 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2836 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [24e9 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2483 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [233d 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2837 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [24ea 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2484 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [233e 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2838 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [24eb 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2485 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [233f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2839 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org2.example.com | [24ec 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2486 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2340 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [283a 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org2.example.com | [24ed 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2487 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2341 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [283b 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org2.example.com | [24ee 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2342 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2488 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [283c 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org2.example.com | [24ef 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2343 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2489 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [283d 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x44, 0xdf, 0xb3, 0x3, 0x50, 0x9, 0x8b, 0x23, 0x1f, 0xc8, 0xd4, 0xb0, 0xc3, 0x60, 0xd3, 0x21, 0x24, 0x37, 0xaf, 0x67, 0x75, 0x46, 0xbe, 0x57, 0x44, 0x26, 0x16, 0x7c, 0x26, 0x99, 0x8e, 0xa7} txOffsets= +peer0.org2.example.com | [24f0 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2344 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [248a 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | txId=2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 locPointer=offset=70, bytesLength=2977 +peer0.org2.example.com | [24f1 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2345 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2346 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [248b 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [2347 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24f2 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [248c 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | ] +peer1.org1.example.com | [2348 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2349 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151029 +peer0.org1.example.com | [248d 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [283e 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85487, bytesLength=2977] for tx ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to txid-index +peer1.org1.example.com | [234a 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 58A4E3B9198DF449F5391A767BEB1DD489A6E84BF2756FDCDC156BF9738DF9FC +peer0.org2.example.com | [24f3 11-19 05:22:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [248e 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [234b 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [283f 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85487, bytesLength=2977] for tx number:[0] ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to blockNumTranNum index +peer0.org2.example.com | [24f4 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [248f 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [234c 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2840 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89437], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org2.example.com | [24f5 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2490 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [234d 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [2841 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org2.example.com | [24f6 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2491 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [234e 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2842 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org2.example.com | [24f7 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2492 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2843 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer1.org1.example.com | [234f 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [24f8 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2493 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2844 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [2350 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [24f9 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2494 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2845 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [2351 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24fa 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2495 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2846 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [2352 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [24fb 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2496 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2847 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [2353 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [24fc 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2497 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2848 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [2354 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24fd 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2498 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2849 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [2355 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [24fe 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2499 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [284a 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [2356 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24ff 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [249a 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 f0 c4 7c 3e 88 17 f1 a3 8e 02 c3 b4 36 af 7c |...|>........6.|| +peer1.org2.example.com | [284b 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer1.org1.example.com | [2357 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2500 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 dd a4 e4 b8 dd d8 f7 59 6b f2 94 75 2b 47 3e 33 |.......Yk..u+G>3| +peer1.org2.example.com | [284c 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer1.org1.example.com | [2358 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2501 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [249b 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 74 6d 61 d7 92 d0 37 5c d1 7f 37 |0D. .tma...7\..7| +peer1.org2.example.com | [284d 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer1.org1.example.com | [2359 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [2502 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 80 ea ae 9e 58 af 59 33 01 05 07 28 d5 45 ec 8e |....X.Y3...(.E..| +peer1.org2.example.com | [284e 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [235a 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [2503 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 43 bb 26 11 02 20 55 94 b5 d2 83 b2 30 e8 0c 9d |C.&.. U.....0...| +peer1.org2.example.com | [284f 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer1.org1.example.com | [235b 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2504 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 e8 26 0a ef 92 8f 74 4a bd 3b 42 ab 65 15 26 aa |.&....tJ.;B.e.&.| +peer1.org2.example.com | [2850 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer1.org1.example.com | [235c 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [2505 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 4e 3a cb a4 63 be |N:..c.| +peer1.org2.example.com | [2851 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer1.org1.example.com | [235d 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2506 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [249c 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2852 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 19ms (state_validation=3ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer1.org1.example.com | [235e 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2507 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [249d 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2853 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [235f 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2508 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [249e 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2854 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E49FD3F4FE999EEC15...08061A0C0A0565787030321203312E30 +peer0.org2.example.com | [2509 11-19 05:22:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [249f 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2360 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2855 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA1A5C41FA88C144B09F0C14C4F317D1983E7E676E5DBEC72CE20FC389FC501D +peer0.org2.example.com | [250a 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24a0 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2361 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2856 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org2.example.com | [250b 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24a1 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2362 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2857 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [250c 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24a2 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2363 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2858 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [250d 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24a3 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2364 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2859 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [250e 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [24a4 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2365 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f5f90 gate 1574140955940376300 evaluation starts +peer1.org2.example.com | [285a 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [250f 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24a5 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2366 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f5f90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [285b 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2510 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24a6 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2367 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f5f90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [285c 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2511 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24a7 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2368 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f5f90 principal matched by identity 0 +peer1.org2.example.com | [285d 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2512 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24a8 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2369 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer1.org2.example.com | [285e 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2513 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24a9 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer1.org2.example.com | [285f 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [2514 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [24aa 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [236a 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer1.org2.example.com | [2860 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2515 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ab 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer1.org2.example.com | [2861 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2516 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [24ac 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer1.org2.example.com | [2862 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2517 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [24ad 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151024 +peer1.org1.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer1.org2.example.com | [2863 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2518 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24ae 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7534DDCF4DE7142C5E0B4BD3227F205D65B4AF75B7B92342291D82B1BA4B609B +peer1.org1.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer1.org2.example.com | [2864 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2519 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [24af 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [236b 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f5f90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2865 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [251a 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [24b0 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [236c 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f5f90 gate 1574140955940376300 evaluation succeeds +peer0.org2.example.com | [251b 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2866 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [24b1 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [236d 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [251c 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2867 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [24b2 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [236e 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [251d 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2868 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [24b3 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [236f 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [251e 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2869 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [24b4 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2370 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [251f 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183a90 gate 1574140954872698000 evaluation starts +peer1.org2.example.com | [286a 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [24b5 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2371 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2520 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183a90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [286b 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [24b6 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2372 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2521 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183a90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [286c 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b593b0 gate 1574140958863088100 evaluation starts +peer1.org1.example.com | [2373 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [24b7 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2522 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [286d 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b593b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2374 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org1.example.com | [24b8 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2523 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183a90 principal evaluation fails +peer0.org2.example.com | [2524 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003183a90 gate 1574140954872698000 evaluation fails +peer0.org2.example.com | [2525 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2526 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2527 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2528 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118000 gate 1574140954875589700 evaluation starts +peer0.org2.example.com | [2529 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [252a 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118000 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [252b 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118000 principal matched by identity 0 +peer0.org2.example.com | [252c 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer0.org2.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer0.org2.example.com | [252d 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer0.org2.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer0.org2.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer0.org2.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer1.org2.example.com | [286e 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b593b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer1.org1.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org1.example.com | [24b9 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [286f 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b593b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [252e 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118000 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2375 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org1.example.com | [24ba 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2870 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b593b0 principal evaluation fails +peer0.org2.example.com | [252f 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118000 gate 1574140954875589700 evaluation succeeds +peer1.org1.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org1.example.com | [24bb 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2871 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b593b0 gate 1574140958863088100 evaluation fails +peer0.org2.example.com | [2530 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org1.example.com | [24bc 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2872 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2531 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org1.example.com | [24bd 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2873 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2532 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org1.example.com | [24be 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2874 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2533 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2376 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24c0 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2875 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b59920 gate 1574140958863903000 evaluation starts +peer0.org2.example.com | [2534 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2377 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24bf 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2876 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b59920 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2535 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2378 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24c1 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2877 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b59920 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2536 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2379 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [24c2 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2878 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b59920 principal matched by identity 0 +peer0.org2.example.com | [2537 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [237a 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer0.org1.example.com | [24c3 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer1.org2.example.com | [2879 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +peer1.org1.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer0.org1.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer0.org2.example.com | [2538 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +peer1.org1.example.com | [237b 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer0.org1.example.com | [24c4 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer0.org2.example.com | [2539 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [287a 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +peer1.org1.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer0.org1.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer0.org2.example.com | [253a 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +peer1.org1.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer0.org1.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer0.org2.example.com | [253b 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | 00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +peer1.org1.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer0.org1.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer0.org2.example.com | [253c 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +peer1.org1.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer0.org1.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer0.org2.example.com | [253d 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 5a 99 ec 14 07 5d |Z....]| +peer1.org1.example.com | [237c 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24c5 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [253e 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [287b 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b59920 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [237d 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24c6 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [253f 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [287c 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b59920 gate 1574140958863903000 evaluation succeeds +peer1.org1.example.com | [237e 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [2540 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [287d 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [237f 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [24c7 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 db 9e 6e 26 0c b2 72 69 24 c8 2e |0D. &..n&..ri$..| +peer0.org2.example.com | [2541 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [287e 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2380 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 6c 99 97 b0 50 e5 19 62 5d df 77 11 30 9a ac c5 |l...P..b].w.0...| +peer0.org2.example.com | [2542 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [287f 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2381 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 23 b8 6d 93 02 20 5b 6e d4 1e 04 f2 cb 61 de 97 |#.m.. [n.....a..| +peer0.org2.example.com | [2543 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2880 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2382 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000030 36 05 80 48 c4 11 b2 82 b9 f1 f6 c9 2e 84 67 14 |6..H..........g.| +peer0.org2.example.com | [2544 11-19 05:22:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer1.org2.example.com | [2881 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2383 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org1.example.com | 00000040 60 c9 fa b3 d6 41 |`....A| +peer0.org2.example.com | [2545 11-19 05:22:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer1.org2.example.com | [2882 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org1.example.com | [24c8 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2546 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2883 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2384 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org1.example.com | [24c9 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2547 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC15100B1801 +peer1.org2.example.com | [2884 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [24ca 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org2.example.com | [2548 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E38D962D8524612590A176BBA3BFD14DA9B3A5E8FA2F646CB99BBA5FE458FA3D +peer1.org2.example.com | [2885 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [24cb 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org2.example.com | [2549 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer1.org2.example.com | [2886 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24cc 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org2.example.com | [254a 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2887 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24cd 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org2.example.com | [254b 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2888 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ce 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer1.org1.example.com | [2385 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [254c 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2889 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [254d 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [288a 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24d0 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer1.org1.example.com | [2386 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f f1 35 b3 39 58 6f d9 26 57 8f d1 |0D. ..5.9Xo.&W..| +peer0.org2.example.com | [254e 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [288b 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer1.org1.example.com | 00000010 aa a6 eb 4f 50 60 bc 2d ba 7b fb ac 75 93 55 d8 |...OP`.-.{..u.U.| +peer0.org2.example.com | [254f 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [288c 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer1.org1.example.com | 00000020 4c 07 91 85 02 20 5c e0 ce ab eb c2 12 14 27 55 |L.... \.......'U| +peer0.org2.example.com | [2550 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [288d 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer1.org1.example.com | 00000030 b8 1a 12 54 ae 7f 0e a2 9a 23 a8 92 5a b0 58 51 |...T.....#..Z.XQ| +peer0.org2.example.com | [2551 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [288e 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer1.org1.example.com | 00000040 48 74 a9 08 7f 27 |Ht...'| +peer0.org2.example.com | [2552 11-19 05:22:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [288f 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24d1 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2387 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2553 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2890 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > alive: alive: alive: +peer1.org1.example.com | [2388 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [24d2 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2554 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2891 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2389 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24d3 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2555 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2892 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [238a 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24d4 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2556 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2893 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [238b 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [24d5 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2557 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2894 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [238c 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [24d6 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2558 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2895 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [238d 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24d7 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2559 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2896 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [238e 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [24d8 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2897 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [255a 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [238f 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [24d9 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2898 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [255b 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2390 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org1.example.com | [24da 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2899 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [255c 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org1.example.com | [24cf 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [289a 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [255d 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2391 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org1.example.com | [24db 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [289b 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [255e 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org1.example.com | [24dc 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 gate 1574140954897933400 evaluation starts +peer1.org2.example.com | [289c 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [255f 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org1.example.com | [24dd 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [289d 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2560 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110a70 gate 1574140955338884800 evaluation starts +peer1.org1.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org1.example.com | [24de 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [289e 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77810 gate 1574140959327124900 evaluation starts +peer0.org2.example.com | [2561 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110a70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org1.example.com | [24df 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 principal matched by identity 0 +peer1.org2.example.com | [289f 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2562 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110a70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2392 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24e0 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +peer1.org2.example.com | [28a0 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77810 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2563 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2393 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +peer0.org2.example.com | [2564 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110a70 principal evaluation fails +peer1.org2.example.com | [28a1 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2394 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24e1 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +peer0.org2.example.com | [2565 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110a70 gate 1574140955338884800 evaluation fails +peer1.org2.example.com | [28a2 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77810 principal evaluation fails +peer1.org1.example.com | [2395 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | 00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +peer0.org2.example.com | [2566 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28a3 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77810 gate 1574140959327124900 evaluation fails +peer1.org1.example.com | [2396 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer0.org1.example.com | 00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +peer0.org2.example.com | [2567 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28a4 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer0.org1.example.com | 00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +peer0.org2.example.com | [2568 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [28a5 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2397 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer0.org1.example.com | 00000040 40 28 a8 8d b6 bd |@(....| +peer0.org2.example.com | [2569 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110fe0 gate 1574140955339139200 evaluation starts +peer1.org2.example.com | [28a6 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer0.org1.example.com | [24e2 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [256a 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28a7 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77d80 gate 1574140959327564100 evaluation starts +peer1.org1.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer0.org1.example.com | [24e3 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 gate 1574140954897933400 evaluation succeeds +peer0.org2.example.com | [256b 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110fe0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [28a8 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77d80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer0.org1.example.com | [24e4 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [256c 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110fe0 principal matched by identity 0 +peer1.org2.example.com | [28a9 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77d80 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer0.org1.example.com | [24e5 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [256d 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer1.org2.example.com | [28aa 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77d80 principal matched by identity 0 +peer1.org1.example.com | [2398 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24e6 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer1.org2.example.com | [28ab 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | [2399 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24e7 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [256e 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [239a 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [24e8 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org2.example.com | [28ac 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | [239b 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24e9 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | [24ea 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [239c 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | [24eb 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer1.org1.example.com | [239d 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer1.org1.example.com | [239e 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [256f 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110fe0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [24ec 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer1.org1.example.com | [239f 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2570 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003110fe0 gate 1574140955339139200 evaluation succeeds +peer1.org2.example.com | [28ad 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77d80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer1.org1.example.com | [23a0 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2571 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28ae 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77d80 gate 1574140959327564100 evaluation succeeds +peer0.org1.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer1.org1.example.com | [23a1 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2572 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28af 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer1.org1.example.com | [23a2 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334b510 gate 1574140955967032700 evaluation starts +peer0.org2.example.com | [2573 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [28b0 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer1.org1.example.com | [23a3 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334b510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2574 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [28b1 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [24ed 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23a4 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334b510 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2575 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28b2 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23a5 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334b510 principal matched by identity 0 +peer0.org1.example.com | [24ee 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2576 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28b3 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a6 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer0.org1.example.com | [24ef 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2577 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28b4 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org1.example.com | [24f0 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2578 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28b5 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23a7 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org1.example.com | [24f1 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2579 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [28b6 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer0.org1.example.com | [24f2 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [257a 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28b7 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer0.org1.example.com | [24f3 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [257b 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [28b8 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer0.org1.example.com | [24f4 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [257c 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111be0 gate 1574140955339842300 evaluation starts +peer1.org2.example.com | [28b9 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer0.org1.example.com | [24f5 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +peer0.org2.example.com | [257d 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111be0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28ba 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4970 gate 1574140959328561900 evaluation starts +peer1.org1.example.com | [23a8 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334b510 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +peer0.org2.example.com | [257e 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111be0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [28bb 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4970 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23a9 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334b510 gate 1574140955967032700 evaluation succeeds +peer0.org1.example.com | [24f6 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +peer0.org2.example.com | [257f 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [28bc 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4970 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [23aa 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +peer0.org2.example.com | [2580 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111be0 principal evaluation fails +peer1.org2.example.com | [28bd 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [23ab 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +peer0.org2.example.com | [2581 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003111be0 gate 1574140955339842300 evaluation fails +peer1.org2.example.com | [28be 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4970 principal evaluation fails +peer1.org1.example.com | [23ac 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +peer0.org2.example.com | [2582 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28bf 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4970 gate 1574140959328561900 evaluation fails +peer1.org1.example.com | [23ad 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 ee 6f fc 7d f3 ae |.o.}..| +peer1.org2.example.com | [28c0 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2583 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23ae 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24f7 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [28c1 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2584 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [23af 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24f8 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28c2 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2585 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c150 gate 1574140955340081500 evaluation starts +peer1.org1.example.com | [23b0 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24f9 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [28c3 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4ee0 gate 1574140959336471600 evaluation starts +peer0.org2.example.com | [2586 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c150 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23b1 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [24fa 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer1.org2.example.com | [28c4 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4ee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2587 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c150 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [23b2 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer1.org2.example.com | [28c5 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4ee0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2588 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c150 principal matched by identity 0 +peer1.org1.example.com | [23b3 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24fb 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer1.org2.example.com | [28c6 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4ee0 principal matched by identity 0 +peer0.org2.example.com | [2589 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer1.org1.example.com | [23b4 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer1.org2.example.com | [28c7 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer1.org1.example.com | [23b5 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [258a 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org1.example.com | [23b6 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer1.org2.example.com | [28c8 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org1.example.com | [23b7 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org1.example.com | [23b8 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [24fc 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org1.example.com | [23b9 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [24fd 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org1.example.com | [23ba 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dc960 gate 1574140956000038600 evaluation starts +peer0.org1.example.com | [24fe 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [258b 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c150 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [23bb 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dc960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [24ff 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [28c9 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4ee0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [258c 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308c150 gate 1574140955340081500 evaluation succeeds +peer1.org1.example.com | [23bc 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dc960 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2500 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ca 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba4ee0 gate 1574140959336471600 evaluation succeeds +peer0.org2.example.com | [258d 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [23bd 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dc960 principal matched by identity 0 +peer0.org1.example.com | [2501 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [28cb 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [258e 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [23be 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | [2502 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28cc 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [258f 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [2503 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28cd 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2590 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23bf 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | [2504 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [28ce 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2591 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | [2505 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28cf 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2592 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | [2506 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2593 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28d0 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | [2507 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 gate 1574140954914363500 evaluation starts +peer0.org2.example.com | [2594 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [28d1 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org2.example.com | [2595 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2508 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28d2 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [23c0 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dc960 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2596 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2509 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [28d3 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23c1 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dc960 gate 1574140956000038600 evaluation succeeds +peer0.org2.example.com | [2597 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [250a 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 principal matched by identity 0 +peer1.org2.example.com | [28d4 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23c2 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2598 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [250b 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +peer1.org2.example.com | [28d5 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [23c3 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2599 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +peer1.org2.example.com | [28d6 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [23c4 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [259a 11-19 05:22:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [250c 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +peer1.org2.example.com | [28d7 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [23c5 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [259b 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +peer1.org2.example.com | [28d8 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe140 gate 1574140959342902400 evaluation starts +peer1.org1.example.com | [23c6 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [259c 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +peer1.org2.example.com | [28d9 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe140 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23c7 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [259d 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +peer1.org2.example.com | [28da 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe140 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [23c8 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [259e 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | 00000040 e5 5b e6 cd c1 ab |.[....| +peer1.org2.example.com | [28db 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [23c9 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [259f 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 3a 00 bc 69 6e f2 13 07 74 24 f5 45 d6 de aa |$:..in...t$.E...| +peer0.org1.example.com | [250d 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [28dc 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe140 principal evaluation fails +peer1.org1.example.com | [23ca 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 c8 2e fa ed 3e 0e 08 74 51 bb 9a f4 a4 27 56 e8 |....>..tQ....'V.| +peer0.org1.example.com | [250e 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 gate 1574140954914363500 evaluation succeeds +peer1.org2.example.com | [28dd 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe140 gate 1574140959342902400 evaluation fails +peer1.org1.example.com | [23cb 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25a0 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 87 8d e1 a2 9c bd 35 2b 82 00 |0E.!........5+..| +peer0.org1.example.com | [250f 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28de 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23cc 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 b5 85 be 42 91 7e 25 23 ee b5 0b d2 23 76 6d f5 |...B.~%#....#vm.| +peer0.org1.example.com | [2510 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28df 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23cd 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 gate 1574140956002690200 evaluation starts +peer0.org2.example.com | 00000020 ab e6 5e 75 42 02 20 08 f3 e3 7f f3 ea b1 91 6b |..^uB. ........k| +peer0.org1.example.com | [2511 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [28e0 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [23ce 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 bb aa 34 d7 eb c2 78 5e 41 d6 60 1b ff f5 bb 3f |..4...x^A.`....?| +peer0.org1.example.com | [2512 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [28e1 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe6b0 gate 1574140959343503100 evaluation starts +peer1.org1.example.com | [23d0 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000040 c7 da 72 ab d1 8c c8 |..r....| +peer0.org1.example.com | [2513 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [28e2 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe6b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23d1 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 principal matched by identity 0 +peer0.org2.example.com | [25a1 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2514 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28e3 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe6b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [23cf 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [25a2 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2515 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28e4 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe6b0 principal matched by identity 0 +peer1.org1.example.com | [23d2 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [25a3 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2516 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28e5 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | [23d3 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | [25a4 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2517 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [2518 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [25a5 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [28e6 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | [23d4 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | [2519 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [25a6 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | [251c 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a7 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | [251a 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [25a8 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | [251e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a9 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [251b 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [25aa 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28e7 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe6b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [23d5 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [251f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25ab 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28e8 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbe6b0 gate 1574140959343503100 evaluation succeeds +peer1.org1.example.com | [23d6 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 gate 1574140956002690200 evaluation succeeds +peer0.org1.example.com | [251d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 738 bytes, Signature: 0 bytes +peer0.org2.example.com | [25ac 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [28e9 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [23d7 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2520 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 738 bytes, Signature: 0 bytes +peer0.org2.example.com | [25ad 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ea 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [23d8 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2521 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25ae 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [28eb 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [23d9 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2522 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [25af 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [28ec 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23da 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [25b0 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28ed 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23db 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2523 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [25b1 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [28ee 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23dc 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [25b2 11-19 05:22:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28ef 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23dd 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [25b3 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [28f0 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [23de 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [25b4 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [23df 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28f1 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [25b5 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [23e0 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28f2 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2524 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer0.org2.example.com | [25b6 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28f3 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [23e1 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer0.org2.example.com | [25b7 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2525 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org1.example.com | [23e2 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25b8 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [28f4 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23e3 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25b9 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | [28f5 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23e4 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25ba 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [28f6 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [23e5 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25bb 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | [28f7 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23e6 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org1.example.com | [2526 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28f8 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [23e7 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25bc 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org1.example.com | [2527 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28f9 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23e8 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer1.org2.example.com | [28fa 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2528 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [23e9 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f8b40 gate 1574140956012451800 evaluation starts +peer0.org2.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer1.org2.example.com | [28fb 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2529 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23ea 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f8b40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer1.org2.example.com | [28fc 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [252a 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23eb 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f8b40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer1.org2.example.com | [28fd 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [252b 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [23ec 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f8b40 principal matched by identity 0 +peer0.org2.example.com | [25bd 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | [28fe 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [252c 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [23ed 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [28ff 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [252d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org2.example.com | [25be 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 72 08 7d db 7a 94 cf 59 ae e9 a3 |0D. &r.}.z..Y...| +peer1.org2.example.com | [2900 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [252e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 gate 1574140955315424200 evaluation starts +peer1.org1.example.com | [23ee 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org2.example.com | 00000010 8e 6c ad ea 36 87 75 a3 ae d1 7c d6 c9 e4 c6 06 |.l..6.u...|.....| +peer1.org2.example.com | [2901 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbfa50 gate 1574140959368278200 evaluation starts +peer0.org1.example.com | [252f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org2.example.com | 00000020 b0 29 7a 32 02 20 12 3a e4 b8 3b 44 a7 1c a2 fa |.)z2. .:..;D....| +peer1.org2.example.com | [2902 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbfa50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2530 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org2.example.com | 00000030 a5 90 70 1a 4e c2 f0 29 ce ee b9 76 a2 fd 17 18 |..p.N..)...v....| +peer1.org2.example.com | [2903 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbfa50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2531 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 principal matched by identity 0 +peer1.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org2.example.com | 00000040 7d aa d3 8b f8 b8 |}.....| +peer1.org2.example.com | [2904 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbfa50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2532 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer1.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org2.example.com | [25bf 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2905 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbfa50 principal evaluation fails +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer1.org1.example.com | [23ef 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f8b40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25c0 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [2906 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbfa50 gate 1574140959368278200 evaluation fails +peer0.org1.example.com | [2533 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer1.org1.example.com | [23f0 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f8b40 gate 1574140956012451800 evaluation succeeds +peer0.org2.example.com | [25c1 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2907 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer1.org1.example.com | [23f1 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [25c2 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2908 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer1.org1.example.com | [23f2 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [25c3 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2909 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer1.org1.example.com | [23f3 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25c4 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [290a 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbffc0 gate 1574140959374452800 evaluation starts +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer1.org1.example.com | [23f4 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25c5 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [290b 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbffc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2534 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [23f5 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25c6 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [290c 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbffc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2535 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 gate 1574140955315424200 evaluation succeeds +peer1.org1.example.com | [23f6 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [25c7 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org2.example.com | [290d 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbffc0 principal matched by identity 0 +peer0.org1.example.com | [2536 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23f7 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25c8 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [290e 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | [2537 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23f8 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25c9 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [2538 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [23f9 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [25ca 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2539 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23fa 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [290f 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | [25cb 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [253a 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23fb 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | [25cc 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [253b 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23fc 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | [25cd 11-19 05:22:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [253c 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [23fd 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | [25ce 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [253d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23fe 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [25cf 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [253e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23ff 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2910 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbffc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25d0 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [253f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2400 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2911 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbffc0 gate 1574140959374452800 evaluation succeeds +peer0.org2.example.com | [25d1 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2540 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2401 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2912 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25d2 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [2541 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2402 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2913 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25d3 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029610 gate 1574140955634747400 evaluation starts +peer0.org1.example.com | [2542 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 gate 1574140955317103400 evaluation starts +peer1.org1.example.com | [2403 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2914 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25d4 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2543 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2404 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2915 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [25d5 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029610 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2544 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2405 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2916 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25d6 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029610 principal matched by identity 0 +peer1.org1.example.com | [2406 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2545 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 principal matched by identity 0 +peer1.org2.example.com | [2917 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [25d7 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 ed f2 59 b7 75 b6 39 ba 3e 28 99 8b 0d 78 e8 |...Y.u.9.>(...x.| +peer1.org1.example.com | [2407 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2546 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 07 1a 4d 44 90 90 66 f9 58 46 8f 08 f4 6b 0b |Y..MD..f.XF...k.| +peer1.org2.example.com | [2918 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 20 58 38 ef 5e 0b 8e da 58 bf 65 c1 01 dc 5a f0 | X8.^...X.e...Z.| +peer1.org1.example.com | [2408 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9e20 gate 1574140956022793400 evaluation starts +peer0.org1.example.com | 00000010 f5 23 2e 44 8b 70 c4 db 4b ae 25 29 b0 89 94 61 |.#.D.p..K.%)...a| +peer1.org2.example.com | [2919 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [25d8 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 5c 0d 87 a4 70 1b 10 6c d4 f0 |0E.!..\...p..l..| +peer1.org1.example.com | [2409 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9e20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2547 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 cb 20 aa f9 ea f8 b6 d2 04 b3 e7 |0D. `. .........| +peer1.org2.example.com | [291a 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 3c 50 1f 94 e5 d4 40 42 51 be 8d d2 1a 63 6d 26 | DEBU 0xc0026f9e20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000010 cd 8f 2a 41 f9 79 ed aa aa c8 9e 4d 52 0d f2 5a |..*A.y.....MR..Z| +peer0.org1.example.com | 00000020 d5 93 58 29 02 20 14 ba a2 f7 e2 51 24 d3 11 8c |..X). .....Q$...| +peer0.org2.example.com | 00000020 56 71 0a 97 0d 02 20 1f 32 11 be bc fa fa b1 0d |Vq.... .2.......| +peer1.org1.example.com | [240b 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9e20 principal matched by identity 0 +peer0.org1.example.com | 00000030 d2 36 19 fc e6 5c 52 e5 92 69 5f b7 bc 0a 74 f4 |.6...\R..i_...t.| +peer1.org2.example.com | [291b 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 ee 8c 6b 2e 31 ba 5d 40 af 6d 64 20 bc b4 1a e9 |..k.1.]@.md ....| +peer1.org1.example.com | [240c 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | 00000040 34 bf 81 58 8d 6f |4..X.o| +peer1.org2.example.com | [291c 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 eb 94 b6 38 ae 9e 3b |...8..;| +peer1.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [2548 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [291d 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [25d9 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029610 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [240d 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | [2549 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 gate 1574140955317103400 evaluation succeeds +peer1.org2.example.com | [291e 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [25da 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003029610 gate 1574140955634747400 evaluation succeeds +peer1.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | [254a 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [291f 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [25db 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | [254b 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2920 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [25dc 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | [254c 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2922 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25dd 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [254d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2921 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25de 11-19 05:22:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [240e 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9e20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [254e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2923 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [25df 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org1.example.com | [240f 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9e20 gate 1574140956022793400 evaluation succeeds +peer0.org1.example.com | [254f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2924 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [25e0 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org1.example.com | [2410 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2550 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2925 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [25e1 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer1.org1.example.com | [2411 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2551 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2926 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25e2 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2412 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2552 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2927 11-19 05:22:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [25e3 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2413 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2553 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2928 11-19 05:22:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [25e4 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2414 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2554 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 gate 1574140955318302800 evaluation starts +peer1.org2.example.com | [2929 11-19 05:22:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25e5 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2415 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2555 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [292a 11-19 05:22:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [25e6 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2416 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2556 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [292b 11-19 05:22:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [25e7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer1.org1.example.com | [2417 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2557 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 principal matched by identity 0 +peer1.org2.example.com | [292c 11-19 05:22:39.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2418 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25e8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org1.example.com | [2558 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 07 1a 4d 44 90 90 66 f9 58 46 8f 08 f4 6b 0b |Y..MD..f.XF...k.| +peer1.org2.example.com | [292d 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2419 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25e9 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org1.example.com | 00000010 f5 23 2e 44 8b 70 c4 db 4b ae 25 29 b0 89 94 61 |.#.D.p..K.%)...a| +peer1.org2.example.com | [292e 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151029 +peer1.org1.example.com | [241a 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25ea 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org1.example.com | [2559 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 cb 20 aa f9 ea f8 b6 d2 04 b3 e7 |0D. `. .........| +peer1.org2.example.com | [292f 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F0FF2D0F55F2220CFF6F82250B0262FB5F06FA47E14651E643DD57D28D0C4B9D +peer1.org1.example.com | [241b 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [25eb 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | 00000010 cd 8f 2a 41 f9 79 ed aa aa c8 9e 4d 52 0d f2 5a |..*A.y.....MR..Z| +peer1.org2.example.com | [2930 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [241c 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [25ec 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003074b00 env 0xc0031bc2d0 txn 0 +peer0.org1.example.com | 00000020 d5 93 58 29 02 20 14 ba a2 f7 e2 51 24 d3 11 8c |..X). .....Q$...| +peer1.org2.example.com | [2931 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [241d 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25ed 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0031bc2d0 +peer0.org1.example.com | 00000030 d2 36 19 fc e6 5c 52 e5 92 69 5f b7 bc 0a 74 f4 |.6...\R..i_...t.| +peer1.org2.example.com | [2932 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [241e 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25ee 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +peer0.org1.example.com | 00000040 34 bf 81 58 8d 6f |4..X.o| +peer1.org2.example.com | [2933 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [241f 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25ef 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [255a 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2934 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2420 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25f0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [255b 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 gate 1574140955318302800 evaluation succeeds +peer1.org2.example.com | [2935 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2421 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25f1 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [255c 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2936 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2422 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25f2 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [255d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2937 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2423 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [25f3 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [255e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2938 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2424 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a0d0 gate 1574140956205267100 evaluation starts +peer0.org2.example.com | [25f4 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c0 b3 ab 85 aa 28 ac a0 48 cd eb e0 3f c0 10 |......(..H...?..| +peer0.org1.example.com | [255f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2939 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2425 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 fa ba 63 4b 4c 70 86 bb ba 67 f9 8c 83 44 7d da |..cKLp...g...D}.| +peer0.org1.example.com | [2560 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [293a 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2426 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a0d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [25f5 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ba 1f e0 56 b8 c9 8f 25 b9 ac a3 |0D. +...V...%...| +peer0.org1.example.com | [2561 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes +peer1.org2.example.com | [293c 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2427 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a0d0 principal matched by identity 0 +peer0.org2.example.com | 00000010 12 3b e9 8e 83 b7 ad 48 2a a8 cc bc a2 c1 8d f1 |.;.....H*.......| +peer0.org1.example.com | [2562 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes +peer1.org2.example.com | [293b 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2428 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org2.example.com | 00000020 a6 e6 65 91 02 20 10 fb c7 3f ec 92 df 9d 88 d2 |..e.. ...?......| +peer0.org1.example.com | [2563 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer1.org2.example.com | [293d 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org2.example.com | 00000030 a5 4a 4a 02 63 87 22 e8 5c dd d5 12 ce 57 f2 ab |.JJ.c.".\....W..| +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer1.org2.example.com | [293e 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2429 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org2.example.com | 00000040 85 6b 5f 12 56 05 |.k_.V.| +peer0.org1.example.com | [2564 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer1.org2.example.com | [293f 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org2.example.com | [25f6 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer1.org2.example.com | [2940 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org2.example.com | [25f7 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00016e800, header channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer1.org2.example.com | [2941 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org2.example.com | [25f8 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer1.org2.example.com | [2942 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org2.example.com | [25f9 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer1.org1.example.com | [242a 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a0d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2943 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25fa 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [2565 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [242b 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7a0d0 gate 1574140956205267100 evaluation succeeds +peer1.org2.example.com | [2944 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25fb 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [2566 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [242c 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2945 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25fc 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +peer1.org1.example.com | [242d 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2567 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2946 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25fd 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org1.example.com | [242e 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2568 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2947 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25fe 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0004e6400 +peer1.org1.example.com | [242f 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2569 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2948 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [25ff 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2920c25d-3c6d-4e47-9738-473074caf0e0] +peer1.org1.example.com | [2430 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [256a 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2949 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e040 gate 1574140959482652600 evaluation starts +peer0.org2.example.com | [2600 11-19 05:22:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2431 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [256b 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [294a 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2601 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2920c25d-3c6d-4e47-9738-473074caf0e0] +peer1.org1.example.com | [2432 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [256c 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [294b 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e040 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2602 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer1.org1.example.com | [2433 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [256d 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 gate 1574140955320491400 evaluation starts +peer1.org2.example.com | [294c 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2603 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d7bf9b19-0f57-4c5e-9a6a-9b0bdebab033] +peer1.org1.example.com | [2434 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [256e 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [294d 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e040 principal evaluation fails +peer0.org2.example.com | [2604 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d7bf9b19-0f57-4c5e-9a6a-9b0bdebab033] +peer1.org1.example.com | [2435 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [256f 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [294e 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e040 gate 1574140959482652600 evaluation fails +peer0.org2.example.com | [2605 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 gate 1574140955672685200 evaluation starts +peer1.org1.example.com | [2436 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2570 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 principal matched by identity 0 +peer1.org2.example.com | [294f 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2606 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2437 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7acc0 gate 1574140956206292000 evaluation starts +peer0.org1.example.com | [2571 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [2950 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2607 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2438 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7acc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [2951 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2608 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 principal matched by identity 0 +peer1.org1.example.com | [2439 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7acc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2572 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [2952 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e5b0 gate 1574140959484489500 evaluation starts +peer0.org2.example.com | [2609 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f a3 74 46 04 ec 07 45 22 0e 52 a6 69 f1 d8 e9 |..tF...E".R.i...| +peer1.org1.example.com | [243a 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7acc0 principal matched by identity 0 +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [2953 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e5b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 69 67 64 3d bd 51 5f 4e ea a4 d4 24 59 ab 96 c7 |igd=.Q_N...$Y...| +peer1.org1.example.com | [243b 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [2954 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e5b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [260a 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 83 48 62 d2 15 d8 8b 02 94 61 |0E.!...Hb......a| +peer1.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [2955 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e5b0 principal matched by identity 0 +peer0.org2.example.com | 00000010 a3 bc 7f a1 61 8c 6a 43 bb 2b c7 21 7f 34 7b b4 |....a.jC.+.!.4{.| +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org1.example.com | [243c 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer1.org2.example.com | [2956 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +peer0.org2.example.com | 00000020 16 d9 74 39 e5 02 20 29 7d 53 f0 81 0a 5f 5b ce |..t9.. )}S..._[.| +peer0.org1.example.com | [2573 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer1.org2.example.com | 00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +peer0.org2.example.com | 00000030 cc 8b 9f de 9b 11 47 a5 fe bd d1 5b bf c4 05 d9 |......G....[....| +peer0.org1.example.com | [2574 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 gate 1574140955320491400 evaluation succeeds +peer1.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer1.org2.example.com | [2957 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +peer0.org2.example.com | 00000040 ac 19 ac 2b e3 a2 e5 |...+...| +peer0.org1.example.com | [2575 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer1.org2.example.com | 00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +peer0.org1.example.com | [2576 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [260b 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer1.org2.example.com | 00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +peer0.org1.example.com | [2577 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [260c 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [243d 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7acc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +peer0.org1.example.com | [2578 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [260d 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 skipping identity 0 because it has already been used +peer1.org1.example.com | [243e 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7acc0 gate 1574140956206292000 evaluation succeeds +peer1.org2.example.com | 00000040 5a 99 ec 14 07 5d |Z....]| +peer0.org1.example.com | [2579 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [260e 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 principal evaluation fails +peer1.org1.example.com | [243f 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2958 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e5b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [257a 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [260f 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9e050 gate 1574140955672685200 evaluation succeeds +peer1.org1.example.com | [2440 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2959 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e5b0 gate 1574140959484489500 evaluation succeeds +peer0.org1.example.com | [257b 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2610 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [bb3dd66c-a7bf-4d09-903a-155f9d978cb5] +peer1.org1.example.com | [2441 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [295a 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [257c 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2611 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [bb3dd66c-a7bf-4d09-903a-155f9d978cb5] +peer1.org1.example.com | [2442 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [295b 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [257d 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2612 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer1.org1.example.com | [2443 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [295c 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [257e 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2613 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff appears to be valid +peer1.org1.example.com | [2444 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [295d 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [257f 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2614 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0004e6400 +peer1.org1.example.com | [2445 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [295e 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2580 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2615 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003074b00 env 0xc0031bc2d0 txn 0 +peer1.org1.example.com | [2446 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [295f 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2581 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 gate 1574140955321435600 evaluation starts +peer0.org2.example.com | [2616 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [2447 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2960 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [2582 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2617 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 34ms +peer1.org1.example.com | [2448 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2961 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer0.org1.example.com | [2583 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2618 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [2449 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer0.org1.example.com | [2584 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 principal matched by identity 0 +peer0.org2.example.com | [2619 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [244a 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2962 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer0.org1.example.com | [2585 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +peer0.org2.example.com | [261a 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer1.org1.example.com | [244b 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer0.org1.example.com | 00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +peer0.org2.example.com | [261b 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [244c 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer0.org1.example.com | [2586 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +peer0.org2.example.com | [261c 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [244d 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer0.org1.example.com | 00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +peer0.org2.example.com | [261d 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [244e 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer0.org1.example.com | 00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +peer0.org2.example.com | [261e 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer1.org1.example.com | [244f 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2963 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +peer0.org2.example.com | [261f 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [2450 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2964 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 45 b0 db 39 19 bd |E..9..| +peer0.org2.example.com | [2620 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org1.example.com | [2451 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2966 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2587 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2621 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org1.example.com | [2452 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2967 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [2588 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 gate 1574140955321435600 evaluation succeeds +peer0.org2.example.com | [2622 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org1.example.com | [2453 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2589 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2965 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [2623 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer1.org1.example.com | [2454 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [258a 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2968 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org2.example.com | [2624 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org1.example.com | [2455 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e634f0 gate 1574140956224522100 evaluation starts +peer0.org1.example.com | [258b 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org2.example.com | [2625 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2456 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e634f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [258c 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [296a 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org2.example.com | [2626 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org1.example.com | [2457 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e634f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [258d 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer1.org2.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org2.example.com | [2627 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] marked as valid by state validator +peer0.org1.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer1.org1.example.com | [2458 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e634f0 principal matched by identity 0 +peer1.org2.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org2.example.com | [2628 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003075f80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003075fc0)} +peer0.org1.example.com | [258e 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer1.org1.example.com | [2459 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer1.org2.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org2.example.com | [2629 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer1.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer1.org2.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org2.example.com | [262a 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer1.org1.example.com | [245a 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer1.org2.example.com | [2969 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [262b 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer1.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer1.org2.example.com | [296b 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [262c 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org1.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer1.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer1.org2.example.com | [296c 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [262d 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org1.example.com | [258f 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer1.org2.example.com | [296d 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [262e 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org1.example.com | [2590 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer1.org2.example.com | [296e 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [262f 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 0 blocks +peer0.org1.example.com | [2591 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [245b 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e634f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [296f 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2630 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +peer0.org1.example.com | [2592 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [245c 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e634f0 gate 1574140956224522100 evaluation succeeds +peer1.org2.example.com | [2970 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2631 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [2593 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [245d 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2971 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer0.org2.example.com | [2632 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org1.example.com | [2594 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 gate 1574140955322331700 evaluation starts +peer1.org1.example.com | [245e 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer0.org2.example.com | [2633 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2595 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [245f 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2973 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer0.org2.example.com | [2634 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2596 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2460 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer0.org2.example.com | [2635 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2597 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2461 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer0.org2.example.com | [2636 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2598 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 principal evaluation fails +peer1.org1.example.com | [2462 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 5}, Envelope: 4027 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer0.org2.example.com | [2637 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2599 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 gate 1574140955322331700 evaluation fails +peer1.org1.example.com | [2463 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer0.org2.example.com | [2638 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [259a 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2464 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2974 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [259b 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2639 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2465 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [259c 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [263b 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer1.org1.example.com | [2466 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2975 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 be a2 a8 8f 07 1a 1e d6 10 1f f6 |0D. S...........| +peer0.org1.example.com | [259d 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 gate 1574140955322611500 evaluation starts +peer0.org2.example.com | [263c 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2467 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | 00000010 e9 86 f7 da 99 b2 36 9e 6e 83 02 20 7e e2 67 97 |......6.n.. ~.g.| +peer0.org1.example.com | [259e 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [263e 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2468 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068180 gate 1574140958443734600 evaluation starts +peer1.org2.example.com | 00000020 7d 40 12 1e 02 20 77 17 0a cc da 73 14 bc 97 90 |}@... w....s....| +peer0.org1.example.com | [259f 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [263a 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2469 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 72 9c b2 71 2e d7 ee 83 b7 14 2f e1 76 75 ab f8 |r..q....../.vu..| +peer0.org1.example.com | [25a0 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 principal matched by identity 0 +peer0.org2.example.com | [263d 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x4, 0xe7, 0xc, 0x85, 0x3a, 0x49, 0x30, 0x52, 0x72, 0xab, 0xdb, 0xa8, 0x7b, 0x33, 0xba, 0x1c, 0xf9, 0x58, 0x99, 0xbf, 0x89, 0xa6, 0x5d, 0x1d, 0xca, 0x40, 0x6d, 0xa0, 0xbc, 0x4d, 0x3d, 0x62} txOffsets= +peer1.org1.example.com | [246a 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068180 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 48 44 79 2f 4e dd |HDy/N.| +peer0.org1.example.com | [25a1 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org2.example.com | txId=e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff locPointer=offset=70, bytesLength=2977 +peer1.org1.example.com | [246b 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068180 principal matched by identity 0 +peer1.org2.example.com | [2972 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org2.example.com | ] +peer1.org1.example.com | [246c 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 59 67 40 3b dd e5 e6 6b 6e bf 61 f4 62 0f 32 |.Yg@;...kn.a.b.2| +peer1.org2.example.com | [2976 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [25a2 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org2.example.com | [2640 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e7 58 e3 3f b7 6c 75 4c e5 d4 a1 6a 97 30 96 01 |.X.?.luL...j.0..| +peer1.org2.example.com | [2977 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org2.example.com | [2641 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes +peer1.org1.example.com | [246d 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 d4 2c eb aa 33 82 3d d8 4c 9a b7 |0D. ..,..3.=.L..| +peer1.org2.example.com | [2978 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org2.example.com | [263f 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 77 b9 41 a2 2d 7a d0 7f df c2 df 9b fe 95 54 34 |w.A.-z........T4| +peer1.org2.example.com | [2979 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org2.example.com | [2642 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81467, bytesLength=2977] for tx ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to txid-index +peer1.org1.example.com | 00000020 36 91 38 90 02 20 12 49 cc e5 34 9c b4 5a 0c e6 |6.8.. .I..4..Z..| +peer1.org2.example.com | [297a 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org2.example.com | [2643 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 7c 01 8a 23 41 e2 e9 3e 32 3e 4f d8 83 be 0d 05 ||..#A..>2>O.....| +peer1.org2.example.com | [297b 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25a3 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2644 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 3b 38 cd 96 14 39 |;8...9| +peer1.org2.example.com | [297c 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [25a4 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 gate 1574140955322611500 evaluation succeeds +peer0.org2.example.com | [2645 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [246e 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068180 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [297d 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25a5 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2646 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81467, bytesLength=2977] for tx number:[0] ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to blockNumTranNum index +peer1.org1.example.com | [246f 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068180 gate 1574140958443734600 evaluation succeeds +peer1.org2.example.com | [297e 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [25a6 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2647 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2470 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [297f 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25a7 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2648 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f44de0 gate 1574140955728186400 evaluation starts +peer1.org1.example.com | [2471 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2980 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25a8 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2649 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f44de0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2472 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2981 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25a9 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [264a 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f44de0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2473 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2982 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25aa 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes +peer0.org2.example.com | [264b 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f44de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2474 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 5}, Envelope: 4027 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [2983 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25ab 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes +peer0.org2.example.com | [264c 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f44de0 principal evaluation fails +peer1.org1.example.com | [2475 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer1.org2.example.com | [2984 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c435f0 gate 1574140959513369000 evaluation starts +peer0.org1.example.com | [25ac 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264d 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f44de0 gate 1574140955728186400 evaluation fails +peer1.org1.example.com | [2476 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2985 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c435f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25ad 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264e 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2477 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org2.example.com | [2986 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c435f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [25af 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264f 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2478 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer1.org2.example.com | [2987 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c435f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [25ae 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +peer0.org2.example.com | [2650 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2479 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2988 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c435f0 principal evaluation fails +peer0.org1.example.com | 00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +peer0.org2.example.com | [2651 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85417], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org1.example.com | [247a 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer1.org2.example.com | [2989 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c435f0 gate 1574140959513369000 evaluation fails +peer0.org1.example.com | [25b0 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +peer0.org2.example.com | [2652 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f45350 gate 1574140955730002600 evaluation starts +peer1.org1.example.com | [247b 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer1.org2.example.com | [298a 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +peer0.org2.example.com | [2653 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org1.example.com | [247c 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org2.example.com | [298b 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +peer0.org2.example.com | [2654 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f45350 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [247d 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer1.org2.example.com | [298c 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +peer0.org2.example.com | [2655 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f45350 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [247e 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer1.org2.example.com | [298d 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43b60 gate 1574140959515584900 evaluation starts +peer0.org1.example.com | 00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +peer0.org2.example.com | [2656 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f45350 principal matched by identity 0 +peer1.org1.example.com | [247f 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0034ed680 env 0xc0026ef040 txn 0 +peer1.org2.example.com | [298e 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25b1 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2657 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer1.org1.example.com | [2480 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0026ef040 +peer1.org2.example.com | [298f 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43b60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [25b2 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer1.org2.example.com | [2990 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43b60 principal matched by identity 0 +peer1.org1.example.com | [2481 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +peer0.org1.example.com | [25b3 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2658 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer1.org2.example.com | [2991 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer1.org1.example.com | [2482 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [25b4 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2659 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer1.org2.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer1.org1.example.com | [2483 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [25b5 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [265a 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [2992 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer1.org1.example.com | [2484 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [25b6 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [265b 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer1.org1.example.com | [2485 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25b7 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [265c 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer1.org1.example.com | [2486 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [25b8 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [265d 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer1.org1.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | [25b9 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 gate 1574140955330728500 evaluation starts +peer0.org2.example.com | [265e 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [25ba 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [265f 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [2993 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43b60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | [25bb 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2660 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [2994 11-19 05:22:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43b60 gate 1574140959515584900 evaluation succeeds +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org1.example.com | [25bc 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 principal matched by identity 0 +peer0.org2.example.com | [2661 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [2995 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | [25bd 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer1.org2.example.com | [2996 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2662 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer1.org2.example.com | [2997 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2665 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer1.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer0.org1.example.com | [25be 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer1.org2.example.com | [2998 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2666 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer1.org1.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer0.org1.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer1.org2.example.com | [2999 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2663 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer1.org1.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer1.org2.example.com | [299a 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer1.org1.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer0.org1.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer1.org2.example.com | [299b 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer1.org1.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer0.org1.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer1.org2.example.com | [299c 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer1.org1.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer0.org1.example.com | [25bf 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [25c0 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 gate 1574140955330728500 evaluation succeeds +peer1.org2.example.com | [299d 11-19 05:22:39.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org2.example.com | [2667 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f45350 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2487 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org1.example.com | [25c1 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org2.example.com | [2668 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f45350 gate 1574140955730002600 evaluation succeeds +peer1.org1.example.com | [2488 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [25c2 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org2.example.com | [2669 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2489 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [25c3 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org2.example.com | [266a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [248a 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [25c4 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org2.example.com | [266b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [248b 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 26 b8 08 96 42 20 b0 93 90 db 47 bf fd 5f 64 |.&...B ....G.._d| +peer0.org1.example.com | [25c5 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +peer1.org2.example.com | [299e 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2664 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer1.org1.example.com | 00000010 20 57 2e 37 e4 32 9f 5f 80 0a 2f a1 39 a6 64 68 | W.7.2._../.9.dh| +peer0.org1.example.com | 00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +peer1.org2.example.com | [299f 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [266c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [248c 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 8d 3f de 4b 30 dd 90 ff 5a ac b4 |0D. '.?.K0...Z..| +peer0.org1.example.com | [25c6 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +peer1.org2.example.com | [29a0 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [266e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 19 80 38 1a bd c5 6c 25 03 c3 a8 82 3a b5 ca de |..8...l%....:...| +peer0.org1.example.com | 00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +peer1.org2.example.com | [29a1 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer0.org2.example.com | [266f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 5a 99 a0 c1 02 20 06 0a 45 ed 9e bd e8 83 cb ea |Z.... ..E.......| +peer0.org1.example.com | 00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +peer1.org2.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer0.org2.example.com | [2670 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 86 34 5d 26 b1 55 76 12 05 30 94 60 26 6d b2 47 |.4]&.Uv..0.`&m.G| +peer0.org1.example.com | 00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +peer1.org2.example.com | [29a2 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer0.org2.example.com | [2671 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 52 6c 09 15 27 0e |Rl..'.| +peer0.org1.example.com | 00000040 fc 5f 40 3d d0 ca |._@=..| +peer1.org2.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer0.org2.example.com | [2672 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [248d 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [25c7 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer0.org2.example.com | [2673 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [248e 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003e93800, header channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo\n8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ\nnvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO\nPQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +peer0.org1.example.com | [25c8 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer0.org2.example.com | [2674 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [248f 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer0.org1.example.com | [25c9 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2675 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec100 gate 1574140955746210700 evaluation starts +peer1.org1.example.com | [2490 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [29a3 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [25ca 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2676 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2491 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [25cb 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29a4 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2677 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec100 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2492 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [25cc 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [29a5 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2678 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2493 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +peer0.org1.example.com | [25cd 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [29a6 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2679 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec100 principal evaluation fails +peer1.org1.example.com | [2494 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [25ce 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [29a7 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [267a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec100 gate 1574140955746210700 evaluation fails +peer1.org1.example.com | [2495 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004060c00 +peer0.org1.example.com | [25cf 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 gate 1574140955333571700 evaluation starts +peer1.org2.example.com | [29a8 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [267b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2496 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [799578e7-c37c-4635-b490-40774a7052cb] +peer0.org1.example.com | [25d0 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29a9 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [267c 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2497 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [25d1 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [29aa 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [267d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2498 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [25d2 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 principal matched by identity 0 +peer1.org2.example.com | [29ab 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [267e 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec760 gate 1574140955747304900 evaluation starts +peer1.org1.example.com | [2499 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [799578e7-c37c-4635-b490-40774a7052cb] +peer0.org1.example.com | [25d3 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer1.org2.example.com | [29ac 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [267f 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec760 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [249a 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer1.org2.example.com | [29ad 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2680 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec760 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [249b 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [08e821e7-e552-48bd-80c8-13dd2ac2c2be] +peer0.org1.example.com | [25d4 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer1.org2.example.com | [29ae 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2681 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec760 principal matched by identity 0 +peer1.org1.example.com | [249c 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [08e821e7-e552-48bd-80c8-13dd2ac2c2be] +peer0.org1.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer1.org2.example.com | [29af 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2682 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer1.org1.example.com | [249d 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer1.org2.example.com | [29b0 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer1.org1.example.com | [249e 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer1.org2.example.com | [29b1 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [266d 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer1.org1.example.com | [249f 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 gate 1574140958467062900 evaluation starts +peer0.org1.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer1.org2.example.com | [29b2 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2683 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer1.org1.example.com | [24a0 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25d5 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29b3 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer1.org1.example.com | [24a1 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [25d6 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 gate 1574140955333571700 evaluation succeeds +peer1.org2.example.com | [29b4 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c84470 gate 1574140959653266000 evaluation starts +peer0.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer1.org1.example.com | [24a2 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25d7 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29b5 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c84470 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer1.org1.example.com | [24a3 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 principal matched by identity 0 +peer0.org1.example.com | [25d8 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29b6 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c84470 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer1.org1.example.com | [24a4 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25d9 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29b7 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c84470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2684 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec760 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [24a5 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 be ae 07 1c 25 52 16 a5 6e 0d 58 88 b9 2f 55 | ....%R..n.X../U| +peer0.org1.example.com | [25da 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [29b8 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c84470 principal evaluation fails +peer0.org2.example.com | [2685 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eec760 gate 1574140955747304900 evaluation succeeds +peer1.org1.example.com | 00000010 1f 93 c0 ac 4e b2 c1 e8 61 44 8c d9 66 16 28 87 |....N...aD..f.(.| +peer0.org1.example.com | [25db 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29b9 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c84470 gate 1574140959653266000 evaluation fails +peer0.org2.example.com | [2686 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [24a6 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 96 6b 27 fb ec 50 7b c1 37 96 |0E.!...k'..P{.7.| +peer0.org1.example.com | [25dc 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29ba 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2687 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 a2 1c 2b 6f 05 74 f5 be a6 59 38 e1 56 2a 99 d7 |..+o.t...Y8.V*..| +peer0.org1.example.com | [25dd 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29bb 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2688 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 c2 4d 07 4b 70 02 20 2a 40 08 55 be 83 07 fe e1 |.M.Kp. *@.U.....| +peer0.org1.example.com | [25de 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [29bc 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2689 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 4e a8 b3 2e 63 64 88 da 52 85 bb 6f b2 cb 1e 2f |N...cd..R..o.../| +peer0.org1.example.com | [25df 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [29bd 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c849e0 gate 1574140959655507600 evaluation starts +peer0.org2.example.com | [268a 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 99 8b 06 57 f7 ed a4 |...W...| +peer0.org1.example.com | [25e0 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [29be 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c849e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [268b 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [24a7 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25e1 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 gate 1574140955334160200 evaluation starts +peer1.org2.example.com | [29bf 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c849e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [268c 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25e2 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29c0 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c849e0 principal matched by identity 0 +peer0.org1.example.com | [25e3 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [25e4 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 principal matched by identity 0 +peer0.org2.example.com | [268d 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [29c1 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | [25e5 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer0.org2.example.com | [268e 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24a8 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer0.org2.example.com | [268f 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24a9 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29c2 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | [25e6 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer0.org2.example.com | [2690 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [24aa 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer0.org2.example.com | [2691 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [24ab 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 skipping identity 0 because it has already been used +peer0.org2.example.com | [2692 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer1.org1.example.com | [24ac 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 principal evaluation fails +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | [2693 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer1.org1.example.com | [24ad 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004073720 gate 1574140958467062900 evaluation succeeds +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | [2694 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer1.org1.example.com | [24ae 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [fecef5f5-2920-48cd-979f-1e3fa468c057] +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [2695 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [25e7 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [24af 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fecef5f5-2920-48cd-979f-1e3fa468c057] +peer1.org2.example.com | [29c3 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c849e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2696 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25e8 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 gate 1574140955334160200 evaluation succeeds +peer1.org1.example.com | [24b0 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | [29c4 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c849e0 gate 1574140959655507600 evaluation succeeds +peer0.org2.example.com | [2697 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25e9 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24b1 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 appears to be valid +peer1.org2.example.com | [29c5 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2698 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [25ea 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24b2 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004060c00 +peer0.org2.example.com | [2699 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25eb 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29c6 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [24b3 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0034ed680 env 0xc0026ef040 txn 0 +peer0.org2.example.com | [269a 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [25ec 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [29c7 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [24b4 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [269b 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25ed 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29c8 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [24b5 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 33ms +peer0.org2.example.com | [269c 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org1.example.com | [25ee 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org2.example.com | [29c9 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b6 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [269d 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 64ms (state_validation=0ms block_and_pvtdata_commit=41ms state_commit=5ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org1.example.com | [25ef 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29ca 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b7 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [269e 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [25f0 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29cb 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24b8 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org2.example.com | [269f 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C12140898B48782FE999EEC15...08051A0C0A0565787030321203312E30 +peer1.org2.example.com | [29cc 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25f1 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [24b9 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [26a0 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA4EE99E90610836AABB5A0EB6F95F0E4B46720FFDFF631FBE72383DDE30DF48 +peer1.org2.example.com | [29cd 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25f2 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24ba 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [26a1 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer1.org2.example.com | [29ce 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25f3 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [24bb 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [26a2 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eed9b0 gate 1574140955753217300 evaluation starts +peer1.org2.example.com | [29cf 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25f4 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24bc 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org2.example.com | [26a3 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eed9b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29d0 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c855d0 gate 1574140959658764700 evaluation starts +peer0.org1.example.com | [25f5 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [24bd 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [26a4 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eed9b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [29d1 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c855d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25f6 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24be 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [26a5 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eed9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [29d2 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c855d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [25f7 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [24bf 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [26a6 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eed9b0 principal evaluation fails +peer1.org2.example.com | [29d3 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c855d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [25f8 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [24c0 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [26a7 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eed9b0 gate 1574140955753217300 evaluation fails +peer1.org2.example.com | [29d4 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c855d0 principal evaluation fails +peer0.org1.example.com | [25f9 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer1.org1.example.com | [24c1 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [26a8 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29d5 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c855d0 gate 1574140959658764700 evaluation fails +peer0.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer1.org1.example.com | [24c2 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [26a9 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29d6 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25fa 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org1.example.com | [24c3 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [26aa 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [29d7 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org1.example.com | [24c4 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [26ab 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eedf40 gate 1574140955758397800 evaluation starts +peer1.org2.example.com | [29d8 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org1.example.com | [24c5 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] marked as valid by state validator +peer0.org2.example.com | [26ac 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eedf40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29d9 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c85b40 gate 1574140959659016100 evaluation starts +peer0.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org1.example.com | [24c6 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003786ac0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003786b00)} +peer0.org2.example.com | [26ad 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eedf40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [29da 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c85b40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org1.example.com | [24c7 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [26ae 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eedf40 principal matched by identity 0 +peer1.org2.example.com | [29db 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c85b40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [25fb 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24c8 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [26af 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer1.org2.example.com | [29dc 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c85b40 principal matched by identity 0 +peer0.org1.example.com | [25fc 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [24c9 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer1.org2.example.com | [29dd 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | [25fd 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [24ca 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [26b0 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org1.example.com | [25fe 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer1.org1.example.com | [24cb 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer1.org2.example.com | [29de 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer1.org1.example.com | [24cc 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org1.example.com | [25ff 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer1.org1.example.com | [24cd 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer1.org1.example.com | [24ce 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x44, 0xdf, 0xb3, 0x3, 0x50, 0x9, 0x8b, 0x23, 0x1f, 0xc8, 0xd4, 0xb0, 0xc3, 0x60, 0xd3, 0x21, 0x24, 0x37, 0xaf, 0x67, 0x75, 0x46, 0xbe, 0x57, 0x44, 0x26, 0x16, 0x7c, 0x26, 0x99, 0x8e, 0xa7} txOffsets= +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer1.org1.example.com | txId=2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 locPointer=offset=70, bytesLength=2977 +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [26b1 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eedf40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer1.org1.example.com | ] +peer1.org2.example.com | [29df 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c85b40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [26b2 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eedf40 gate 1574140955758397800 evaluation succeeds +peer0.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer1.org1.example.com | [24cf 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85486, bytesLength=2977] for tx ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to txid-index +peer1.org2.example.com | [29e0 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c85b40 gate 1574140959659016100 evaluation succeeds +peer0.org2.example.com | [26b3 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2600 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24d0 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85486, bytesLength=2977] for tx number:[0] ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to blockNumTranNum index +peer1.org2.example.com | [29e1 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26b4 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2601 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d1 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89435], isChainEmpty=[false], lastBlockNumber=[5] +peer1.org2.example.com | [29e2 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26b5 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2602 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [24d2 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer1.org2.example.com | [29e3 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [26b6 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2603 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [24d3 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer1.org2.example.com | [29e4 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [26b7 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2604 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [24d4 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer1.org2.example.com | [29e5 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26b8 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2605 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d5 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [29e6 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [26b9 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2606 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [24d6 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [29e7 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [26ba 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2607 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [29e8 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26bb 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [2608 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24d7 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [26bc 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29e9 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2609 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [24d8 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [26bd 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [29ea 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [260a 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [24d9 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [26be 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29eb 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [260c 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24da 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [26bf 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29ec 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [260d 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24db 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [26c0 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [29ed 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [260e 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [26c1 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [24dc 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer1.org2.example.com | [29ee 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [260f 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [26c2 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [24de 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer1.org2.example.com | [29ef 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ee40 gate 1574140959672016900 evaluation starts +peer0.org1.example.com | [2610 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [26c3 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f380 gate 1574140955792374200 evaluation starts +peer1.org1.example.com | [24df 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer1.org2.example.com | [29f0 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ee40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2611 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 gate 1574140955394668000 evaluation starts +peer0.org2.example.com | [26c4 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f380 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [24dd 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [29f1 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ee40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2612 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26c5 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f380 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [24e0 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer1.org2.example.com | [29f2 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ee40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2613 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [26c6 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [24e1 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer1.org2.example.com | [29f3 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2614 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 principal matched by identity 0 +peer0.org2.example.com | [26c7 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f380 principal evaluation fails +peer1.org1.example.com | [24e2 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer1.org2.example.com | [29f4 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ee40 principal evaluation fails +peer0.org1.example.com | [2615 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 3a 00 bc 69 6e f2 13 07 74 24 f5 45 d6 de aa |$:..in...t$.E...| +peer0.org2.example.com | [26c8 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f380 gate 1574140955792374200 evaluation fails +peer1.org1.example.com | [24e3 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 38ms (state_validation=0ms block_and_pvtdata_commit=28ms state_commit=6ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer1.org2.example.com | [29f5 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ee40 gate 1574140959672016900 evaluation fails +peer0.org1.example.com | 00000010 c8 2e fa ed 3e 0e 08 74 51 bb 9a f4 a4 27 56 e8 |....>..tQ....'V.| +peer0.org2.example.com | [26c9 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24e4 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [29f7 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2616 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 87 8d e1 a2 9c bd 35 2b 82 00 |0E.!........5+..| +peer0.org2.example.com | [26ca 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24e5 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F0B3D5E6FC999EEC15...08061A0C0A0565787030321203312E30 +peer1.org2.example.com | [29f6 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 b5 85 be 42 91 7e 25 23 ee b5 0b d2 23 76 6d f5 |...B.~%#....#vm.| +peer0.org2.example.com | [26cb 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [24e6 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EB21ECC7F374C5F14DAE9784C939F3F89353C4775A3D01F14FDFB7E95206125E +peer1.org2.example.com | [29f8 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | 00000020 ab e6 5e 75 42 02 20 08 f3 e3 7f f3 ea b1 91 6b |..^uB. ........k| +peer0.org2.example.com | [26cc 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f8f0 gate 1574140955793787500 evaluation starts +peer1.org1.example.com | [24e7 11-19 05:22:38.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer1.org2.example.com | [29f9 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 bb aa 34 d7 eb c2 78 5e 41 d6 60 1b ff f5 bb 3f |..4...x^A.`....?| +peer0.org2.example.com | [26cd 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f8f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [24e8 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [29fa 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 c7 da 72 ab d1 8c c8 |..r....| +peer0.org2.example.com | [26ce 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f8f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [24e9 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [29fb 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2617 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [26cf 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f8f0 principal matched by identity 0 +peer1.org1.example.com | [24ea 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [29fc 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2618 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 gate 1574140955394668000 evaluation succeeds +peer0.org2.example.com | [26d0 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a cc 27 83 b1 e7 ff 4a b4 a4 9e 4f de 82 de e9 |J.'....J...O....| +peer1.org1.example.com | [24eb 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29fd 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2619 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24ec 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" secret_envelope:\252\323\023,\336\017D\"\313\265K91\327(D\004\237\010\330D\213\r\\\002 \010\362\010\217x\004\200\277Ew\035fyw\262\373\266\357\201D\275\203S\021\376\366\257y\202V\254R" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [29fe 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000010 b2 1a 64 00 36 a8 20 a9 42 c7 26 bb 6f d1 78 fb |..d.6. .B.&.o.x.| +peer0.org1.example.com | [261a 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24ed 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29ff 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [26d1 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 24 ee 38 6d 7d 75 4e ba db 1d de |0D. .$.8m}uN....| +peer0.org1.example.com | [261b 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [24ee 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" secret_envelope:\252\323\023,\336\017D\"\313\265K91\327(D\004\237\010\330D\213\r\\\002 \010\362\010\217x\004\200\277Ew\035fyw\262\373\266\357\201D\275\203S\021\376\366\257y\202V\254R" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a01 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 82 fe d5 e1 0a 39 11 9d 73 73 1e 41 8a 7f a4 08 |.....9..ss.A....| +peer0.org1.example.com | [261c 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [24ef 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2a00 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c01890 gate 1574140959674843900 evaluation starts +peer0.org2.example.com | 00000020 18 9e 0d c9 02 20 43 82 73 95 f0 88 8e 61 1f 36 |..... C.s....a.6| +peer0.org1.example.com | [261d 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [24f0 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +peer1.org2.example.com | [2a02 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c01890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 69 29 0f bb 93 16 ee e3 e7 c1 29 22 79 b1 09 4c |i)........)"y..L| +peer0.org1.example.com | [261e 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +peer1.org2.example.com | [2a03 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c01890 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000040 5b 67 24 b0 a4 ed |[g$...| +peer0.org1.example.com | [261f 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [24f1 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +peer1.org2.example.com | [2a04 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c01890 principal matched by identity 0 +peer0.org2.example.com | [26d2 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f8f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2620 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +peer1.org2.example.com | [2a05 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | [26d3 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e2f8f0 gate 1574140955793787500 evaluation succeeds +peer0.org1.example.com | [2621 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [26d4 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2622 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +peer1.org2.example.com | [2a06 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | [26d5 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2623 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 5a 99 ec 14 07 5d |Z....]| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | [26d6 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2624 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24f2 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | [26d7 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [2625 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | [26d8 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24f3 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 1b 5a ff 1a 77 f2 3e aa d3 13 |0E.!...Z..w.>...| +peer0.org1.example.com | [2626 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [26d9 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000010 2c de 0f 44 22 cb b5 4b 39 31 d7 28 44 04 9f 08 |,..D"..K91.(D...| +peer0.org1.example.com | [2627 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a07 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c01890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [26da 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000020 d8 44 8b 0d 5c 02 20 08 f2 08 8f 78 04 80 bf 45 |.D..\. ....x...E| +peer0.org1.example.com | [260b 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a08 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c01890 gate 1574140959674843900 evaluation succeeds +peer0.org2.example.com | [26db 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000030 77 1d 66 79 77 b2 fb b6 ef 81 44 bd 83 53 11 fe |w.fyw.....D..S..| +peer0.org1.example.com | [2628 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a09 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26dc 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000040 f6 af 79 82 56 ac 52 |..y.V.R| +peer0.org1.example.com | [2629 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0a 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26dd 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24f4 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [262a 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a0b 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [26de 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24f5 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [262b 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0c 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [26df 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24f6 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [262c 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a0d 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e0 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [262d 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24f7 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a0e 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26e1 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [262e 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24f8 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2a0f 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e2 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [262f 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24f9 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e3 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151025 +peer1.org2.example.com | [2a10 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2630 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24fa 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e4 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 59DCB074496B26D85B9BC30BF444B4DD34B4C82B4F4B9E23A3D3F0988F3B3F59 +peer1.org2.example.com | [2a11 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2631 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24fb 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [26e5 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2a12 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2632 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [24fc 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26e6 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2a13 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2633 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24fd 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26e7 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [2a14 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2635 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24fe 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [26e8 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a15 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2636 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [24ff 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" secret_envelope:\252\323\023,\336\017D\"\313\265K91\327(D\004\237\010\330D\213\r\\\002 \010\362\010\217x\004\200\277Ew\035fyw\262\373\266\357\201D\275\203S\021\376\366\257y\202V\254R" > > alive: +peer0.org2.example.com | [26e9 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2a16 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2637 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2500 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [26ea 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a17 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2634 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2501 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26ec 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a19 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2638 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2502 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26ed 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a1a 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbcc20 gate 1574140959771845100 evaluation starts +peer0.org1.example.com | [2639 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2503 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [26ee 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1b 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbcc20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [263a 11-19 05:22:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2504 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26ef 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1c 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbcc20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [263b 11-19 05:22:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2505 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f0 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1d 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbcc20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [263c 11-19 05:22:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [2506 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26f1 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1e 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbcc20 principal evaluation fails +peer0.org1.example.com | [263d 11-19 05:22:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2507 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [26f2 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1f 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbcc20 gate 1574140959771845100 evaluation fails +peer0.org1.example.com | [263e 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2508 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | [26f3 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a20 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [263f 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [26f4 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [2a21 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2641 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2509 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | [26f5 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a22 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2642 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | [26f6 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a23 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbd190 gate 1574140959772114800 evaluation starts +peer0.org1.example.com | [2640 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | [26f7 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a24 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbd190 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2644 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | [26f8 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a25 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbd190 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2643 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [26f9 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a26 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbd190 principal matched by identity 0 +peer0.org1.example.com | [2646 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer1.org1.example.com | [250a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [26eb 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2a27 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 ef df 88 81 15 55 57 a6 f1 06 57 d2 c3 70 28 |......UW...W..p(| +peer0.org1.example.com | [2645 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [250b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [26fa 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 7e 4c bf 70 cf 29 97 71 1e d6 67 7d c8 51 90 f7 |~L.p.).q..g}.Q..| +peer0.org1.example.com | [2647 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [250c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [26fb 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2a28 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 7f 82 14 e5 de 04 f7 70 ee 32 a4 |0D. W.......p.2.| +peer0.org1.example.com | [2648 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [250d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [26fc 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 0f be db 4f 64 97 8e f4 10 c4 e6 51 84 6a f3 84 |...Od......Q.j..| +peer0.org1.example.com | [2649 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [250e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [26fd 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000020 9a 4a fa e8 02 20 2c 5b 42 d0 e5 07 68 76 c9 7c |.J... ,[B...hv.|| +peer0.org1.example.com | [264a 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [250f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e910 gate 1574140959319242300 evaluation starts +peer0.org2.example.com | [26fe 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 b6 a4 5c 9d bd 29 18 3e 2f 30 a8 06 32 4d a1 83 |..\..).>/0..2M..| +peer0.org1.example.com | [264b 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2510 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26ff 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 c5 93 93 a6 61 2e |....a.| +peer0.org1.example.com | [264c 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [2511 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e910 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2700 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a29 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbd190 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [264d 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2512 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2701 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a2a 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbd190 gate 1574140959772114800 evaluation succeeds +peer0.org1.example.com | [264e 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer0.org2.example.com | [2702 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2513 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e910 principal evaluation fails +peer1.org2.example.com | [2a2b 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [264f 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer0.org2.example.com | [2703 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2514 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7e910 gate 1574140959319242300 evaluation fails +peer1.org2.example.com | [2a2c 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2704 11-19 05:22:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2650 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2515 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a2d 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2705 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2651 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2516 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a2e 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2706 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2652 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2517 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2a2f 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2707 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2653 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2518 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ee80 gate 1574140959320057800 evaluation starts +peer1.org2.example.com | [2a30 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2708 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2654 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2519 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ee80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2709 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a31 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2655 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [251a 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ee80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2656 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [251b 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ee80 principal matched by identity 0 +peer1.org2.example.com | [2a32 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2657 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [270a 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [251c 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | [2a33 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2658 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [270b 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [2a34 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2659 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [270c 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [251d 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | [2a35 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a36 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a18 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [270d 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [270e 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [270f 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2710 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151026 +peer0.org2.example.com | [2712 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8178A13151552E88A459724C696B270B9D5BA982ED1E2AD0B14E2623836BED16 +peer0.org2.example.com | [2713 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2714 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2715 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2716 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2717 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2718 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2719 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2711 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [271b 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [271c 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [271d 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [271f 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2720 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2721 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2722 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [271a 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2723 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2724 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2725 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2726 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [271e 11-19 05:22:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2727 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2728 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2729 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [272a 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [272b 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [272c 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [272d 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [272e 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [272f 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2730 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2736 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2737 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [2738 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [265a 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [265b 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [265c 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [265d 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 gate 1574140955482954600 evaluation starts +peer0.org1.example.com | [265e 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [265f 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2660 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 principal matched by identity 0 +peer0.org1.example.com | [2661 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer0.org1.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org1.example.com | [2662 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org1.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer0.org1.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer0.org1.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer0.org1.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer0.org1.example.com | [2663 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2664 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 gate 1574140955482954600 evaluation succeeds +peer0.org1.example.com | [2665 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2666 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2667 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2668 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2669 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [266a 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [266b 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [266c 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [266d 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [266e 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [266f 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2670 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2671 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [2672 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2673 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2674 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2675 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2676 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > alive: +peer0.org1.example.com | [2677 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2678 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2679 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [267a 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [267b 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [267c 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [267d 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [267e 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 gate 1574140955645881200 evaluation starts +peer0.org1.example.com | [267f 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2680 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2681 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 principal matched by identity 0 +peer0.org1.example.com | [2682 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 4f 02 b1 dd 79 38 c3 d4 c0 7b 5a 1b 90 55 b2 |uO...y8...{Z..U.| +peer0.org1.example.com | 00000010 b0 8d 58 f8 f2 44 de 1f dd 29 94 6d be eb 3d 54 |..X..D...).m..=T| +peer0.org1.example.com | [2683 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 74 64 2b 13 00 82 9a a8 f3 06 |0E.!..td+.......| +peer0.org1.example.com | 00000010 a1 1a fb 4a ba ca e8 d4 8d 30 21 2a b0 df 8b 51 |...J.....0!*...Q| +peer0.org1.example.com | 00000020 2e f9 74 ff 10 02 20 42 55 c1 91 45 24 2e 67 23 |..t... BU..E$.g#| +peer0.org1.example.com | 00000030 bd 0c 51 c0 22 7f f7 9f 26 0d 7d d0 bc 38 8a 2d |..Q."...&.}..8.-| +peer0.org1.example.com | 00000040 dd 1a 5c d7 7b 12 d6 |..\.{..| +peer0.org1.example.com | [2684 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2685 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 gate 1574140955645881200 evaluation succeeds +peer0.org1.example.com | [2686 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2687 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2688 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2689 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [268a 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org1.example.com | [268b 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org1.example.com | [268c 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2a37 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a38 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a39 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a3a 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a3b 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a3c 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a3d 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a3e 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a3f 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a40 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a41 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a42 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2a43 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a44 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2a45 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a46 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a47 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a48 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a49 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a4a 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a4b 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a4c 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a4d 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a4e 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a4f 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a50 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a51 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a52 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a53 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a54 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a55 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [2a56 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a57 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [251e 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ee80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [251f 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ee80 gate 1574140959320057800 evaluation succeeds +peer1.org1.example.com | [2520 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2521 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2522 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2523 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2524 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2525 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2526 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2527 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [2528 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [252a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [252c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [252b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2529 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [252d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [252e 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [252f 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2530 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2531 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2532 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2533 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2534 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [268d 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +peer0.org1.example.com | [268e 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [268f 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org1.example.com | [2690 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org1.example.com | [2691 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org1.example.com | [2692 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org1.example.com | [2693 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org1.example.com | [2694 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org1.example.com | [2695 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [2696 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0026f19c0 env 0xc002f41130 txn 0 +peer0.org1.example.com | [2697 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002f41130 +peer0.org1.example.com | [2698 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +peer0.org1.example.com | [2699 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [269a 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [269b 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [269c 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [269d 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [269e 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c0 b3 ab 85 aa 28 ac a0 48 cd eb e0 3f c0 10 |......(..H...?..| +peer0.org1.example.com | 00000010 fa ba 63 4b 4c 70 86 bb ba 67 f9 8c 83 44 7d da |..cKLp...g...D}.| +peer0.org1.example.com | [269f 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ba 1f e0 56 b8 c9 8f 25 b9 ac a3 |0D. +...V...%...| +peer0.org1.example.com | 00000010 12 3b e9 8e 83 b7 ad 48 2a a8 cc bc a2 c1 8d f1 |.;.....H*.......| +peer0.org1.example.com | 00000020 a6 e6 65 91 02 20 10 fb c7 3f ec 92 df 9d 88 d2 |..e.. ...?......| +peer0.org1.example.com | 00000030 a5 4a 4a 02 63 87 22 e8 5c dd d5 12 ce 57 f2 ab |.JJ.c.".\....W..| +peer0.org1.example.com | 00000040 85 6b 5f 12 56 05 |.k_.V.| +peer0.org1.example.com | [26a0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [26a1 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0033b1800, header channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +peer0.org1.example.com | [26a2 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [26a3 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [26a4 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [26a5 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [26a6 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +peer0.org1.example.com | [26a7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [26a8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0002b2800 +peer0.org1.example.com | [26a9 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [92fb203f-242c-4db7-a1dc-7eab9a54f7a9] +peer0.org1.example.com | [26aa 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [26ab 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [92fb203f-242c-4db7-a1dc-7eab9a54f7a9] +peer0.org1.example.com | [26ac 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [26ad 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8cfb92f2-80b4-4ddc-b933-325abf199acf] +peer0.org1.example.com | [26ae 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8cfb92f2-80b4-4ddc-b933-325abf199acf] +peer0.org1.example.com | [26af 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 gate 1574140955652694900 evaluation starts +peer0.org1.example.com | [26b0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [26b1 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [26b2 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 principal matched by identity 0 +peer0.org1.example.com | [26b3 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f a3 74 46 04 ec 07 45 22 0e 52 a6 69 f1 d8 e9 |..tF...E".R.i...| +peer0.org1.example.com | 00000010 69 67 64 3d bd 51 5f 4e ea a4 d4 24 59 ab 96 c7 |igd=.Q_N...$Y...| +peer0.org1.example.com | [26b4 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 83 48 62 d2 15 d8 8b 02 94 61 |0E.!...Hb......a| +peer0.org1.example.com | 00000010 a3 bc 7f a1 61 8c 6a 43 bb 2b c7 21 7f 34 7b b4 |....a.jC.+.!.4{.| +peer0.org1.example.com | 00000020 16 d9 74 39 e5 02 20 29 7d 53 f0 81 0a 5f 5b ce |..t9.. )}S..._[.| +peer0.org1.example.com | 00000030 cc 8b 9f de 9b 11 47 a5 fe bd d1 5b bf c4 05 d9 |......G....[....| +peer0.org1.example.com | 00000040 ac 19 ac 2b e3 a2 e5 |...+...| +peer0.org1.example.com | [26b5 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [26b6 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [26b7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 skipping identity 0 because it has already been used +peer0.org1.example.com | [26b8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 principal evaluation fails +peer0.org1.example.com | [26b9 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 gate 1574140955652694900 evaluation succeeds +peer0.org1.example.com | [26ba 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5c4240cb-d90e-46b3-bdb3-dab94a1ea567] +peer0.org1.example.com | [26bb 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5c4240cb-d90e-46b3-bdb3-dab94a1ea567] +peer0.org1.example.com | [26bc 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [26bd 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff appears to be valid +peer0.org1.example.com | [26be 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0002b2800 +peer0.org1.example.com | [26bf 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0026f19c0 env 0xc002f41130 txn 0 +peer0.org1.example.com | [26c0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [26c1 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 1ms +peer0.org1.example.com | [26c2 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [26c3 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [26c4 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer0.org1.example.com | [26c5 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [26c6 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [26c7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [26c8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer0.org1.example.com | [26c9 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [26ca 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [26cb 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [26cc 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [26cd 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [26ce 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [26cf 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [26d0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [26d1 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] marked as valid by state validator +peer0.org1.example.com | [26d2 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0003cebc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0003cec00)} +peer0.org1.example.com | [26d3 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [26d4 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [26d5 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [26d6 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org1.example.com | [26d7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org1.example.com | [26d8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org1.example.com | [26d9 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [26db 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [26da 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26dc 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26dd 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26de 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [26df 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e0 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e1 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [26e2 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e3 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2535 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2536 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2537 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2538 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2539 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [253a 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [253b 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 28 7b 81 06 d2 a8 3a ec ab 32 6e 31 a4 71 cc |.({....:..2n1.q.| +peer1.org1.example.com | 00000010 1c 8f ec b2 38 3b 1f e0 c0 89 b5 9c 4f 77 8a 0a |....8;......Ow..| +peer1.org1.example.com | [253c 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 1e 5c 34 55 0a a8 45 7e 89 d3 8c |0D. ~.\4U..E~...| +peer1.org1.example.com | 00000010 56 8f 18 a8 17 28 93 d5 a8 7e cb 1e 0c 94 77 26 |V....(...~....w&| +peer1.org1.example.com | 00000020 5a 23 cf a8 02 20 7a ec 19 b2 19 4b 0e d5 4f a9 |Z#... z....K..O.| +peer1.org1.example.com | 00000030 4c d8 1a b6 11 97 a7 3b 78 98 26 89 f1 73 18 53 |L......;x.&..s.S| +peer1.org1.example.com | 00000040 ae 4f ad 3b 88 1a |.O.;..| +peer1.org1.example.com | [253d 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [253e 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [253f 11-19 05:22:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer1.org1.example.com | [2540 11-19 05:22:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer1.org1.example.com | [2541 11-19 05:22:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer1.org1.example.com | [2542 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2543 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2544 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2545 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2546 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2547 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2548 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2549 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [254a 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [254b 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [254c 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [254d 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [254e 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [254f 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [2550 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2551 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2552 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2553 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2554 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2555 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2556 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2557 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2558 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2559 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [255a 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [255b 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [255c 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [255d 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a460 gate 1574140959467772000 evaluation starts +peer1.org1.example.com | [255e 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a460 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [255f 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a460 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2560 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a460 principal matched by identity 0 +peer1.org1.example.com | [2561 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer1.org1.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer1.org1.example.com | [2562 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer1.org1.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer1.org1.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer1.org1.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer1.org1.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer1.org1.example.com | [2563 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a460 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2564 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a460 gate 1574140959467772000 evaluation succeeds +peer1.org1.example.com | [2565 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2566 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2567 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2568 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2569 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [256a 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [256b 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [256c 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [256d 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [256e 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [256f 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2731 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a58 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [26e4 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes +peer1.org1.example.com | [2570 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2732 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a59 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [26e5 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2571 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [2733 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a5a 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [26e6 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2572 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2734 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a5b 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26e7 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2573 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2735 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a5c 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [26e9 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [26e8 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2739 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [2a5d 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [26ea 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer1.org1.example.com | [2574 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [273a 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a5e 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [273b 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2575 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2a5f 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [273c 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26eb 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2576 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > alive: alive: alive: +peer1.org2.example.com | [2a60 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [273d 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org1.example.com | [26ec 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer1.org1.example.com | [2577 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a61 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 4f 58 c8 cd 2b 73 96 ae 18 00 4a ef 90 8a c4 |ROX..+s....J....| +peer0.org2.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org1.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer1.org1.example.com | [2578 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 51 3c 45 54 43 ae a4 51 c0 b9 91 91 98 14 db 0c |Q DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org1.example.com | [26ed 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer1.org1.example.com | [2579 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a62 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d 61 44 dc e3 5e 99 b8 d7 a0 |0E.!..]aD..^....| +peer0.org2.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org1.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer1.org1.example.com | [257a 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [257b 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [257c 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [257d 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [257e 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [257f 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2580 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2581 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2582 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2583 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2584 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org1.example.com | [2585 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2587 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2588 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2589 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [258a 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 90 d6 7a 38 b7 57 ce f5 58 f5 cb 97 26 e4 77 1f |..z8.W..X...&.w.| +peer1.org2.example.com | 00000020 9a 11 46 83 38 02 20 58 83 7b 51 65 27 c5 c8 b2 |..F.8. X.{Qe'...| +peer1.org2.example.com | 00000030 2e aa 5b e1 cb f7 6c 34 62 a8 ad 82 a1 e9 fb 20 |..[...l4b...... | +peer1.org2.example.com | 00000040 df 2e 7e e5 7b 9d 4a |..~.{.J| +peer1.org2.example.com | [2a63 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2a64 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 34 23 e3 2f d1 78 f4 46 15 b4 |0E.!..4#./.x.F..| +peer1.org2.example.com | 00000010 35 99 21 4d 0b 3d af fd 23 9f 41 30 df 88 cf 28 |5.!M.=..#.A0...(| +peer1.org2.example.com | 00000020 d6 dd 9b 3b ae 02 20 66 7b 51 48 a2 33 09 d8 f2 |...;.. f{QH.3...| +peer1.org2.example.com | 00000030 b4 14 1d e3 ed 77 6e f3 24 12 01 7b da 39 2b a3 |.....wn.$..{.9+.| +peer1.org2.example.com | 00000040 69 df 54 ca 7b 48 4d |i.T.{HM| +peer1.org2.example.com | [2a65 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2a66 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [2a67 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2a68 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a69 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2a6a 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a6b 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a6c 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [2a6d 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a6e 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a6f 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org2.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org2.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org2.example.com | [273f 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2740 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2741 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2742 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2743 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2744 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2745 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2746 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2747 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2748 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2749 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [274a 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c1d10 gate 1574140955884323900 evaluation starts +peer0.org2.example.com | [274b 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c1d10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [274c 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c1d10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [274d 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c1d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [258b 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [258c 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [258d 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [258e 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [258f 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2590 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2591 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2592 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2593 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba64c0 gate 1574140959634637000 evaluation starts +peer1.org1.example.com | [2595 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba64c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2596 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba64c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2598 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba64c0 principal matched by identity 0 +peer1.org1.example.com | [2599 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer1.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer1.org1.example.com | [259a 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer1.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer1.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer1.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer1.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer1.org1.example.com | [259b 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba64c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [259c 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba64c0 gate 1574140959634637000 evaluation succeeds +peer1.org1.example.com | [259d 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [259e 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [259f 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [25a0 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2586 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a1 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer1.org1.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer1.org1.example.com | [25a2 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer1.org1.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer1.org1.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer1.org1.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer1.org1.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer1.org1.example.com | [25a3 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a4 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2594 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2597 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [25a6 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25a5 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a7 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org1.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org1.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org1.example.com | [26ee 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x4, 0xe7, 0xc, 0x85, 0x3a, 0x49, 0x30, 0x52, 0x72, 0xab, 0xdb, 0xa8, 0x7b, 0x33, 0xba, 0x1c, 0xf9, 0x58, 0x99, 0xbf, 0x89, 0xa6, 0x5d, 0x1d, 0xca, 0x40, 0x6d, 0xa0, 0xbc, 0x4d, 0x3d, 0x62} txOffsets= +peer0.org1.example.com | txId=e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff locPointer=offset=70, bytesLength=2977 +peer0.org1.example.com | ] +peer0.org1.example.com | [26ef 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f0 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [26f1 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81466, bytesLength=2977] for tx ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to txid-index +peer0.org1.example.com | [26f3 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org1.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org1.example.com | [26f4 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org1.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org1.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org1.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org1.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org1.example.com | [26f5 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26f2 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81466, bytesLength=2977] for tx number:[0] ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to blockNumTranNum index +peer0.org1.example.com | [26f6 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f7 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [26f8 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [26f9 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [26fa 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26fb 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85416], isChainEmpty=[false], lastBlockNumber=[4] +peer0.org1.example.com | [26fc 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer0.org1.example.com | [26fd 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org1.example.com | [26fe 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org1.example.com | [26ff 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [2700 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [2701 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [2702 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [2703 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [2704 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [2705 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [2706 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [2a70 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2a71 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a72 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a73 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a74 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a75 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a76 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a77 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [2a78 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a79 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2a7a 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a7b 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a7c 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2a7d 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2a7e 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2a7f 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07e20 gate 1574140959954092100 evaluation starts +peer1.org2.example.com | [2a80 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07e20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a81 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07e20 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2a82 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2a83 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07e20 principal evaluation fails +peer1.org2.example.com | [2a84 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07e20 gate 1574140959954092100 evaluation fails +peer1.org2.example.com | [2a85 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a86 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a87 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2a88 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26390 gate 1574140959955950000 evaluation starts +peer1.org1.example.com | [25a8 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [25a9 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25aa 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25ab 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [25ac 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [25ad 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [25ae 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba7db0 gate 1574140959653032300 evaluation starts +peer1.org1.example.com | [25af 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba7db0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [25b0 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba7db0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [25b1 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba7db0 principal matched by identity 0 +peer1.org1.example.com | [25b2 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [25b3 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [25b4 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [25b5 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba7db0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [25b6 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba7db0 gate 1574140959653032300 evaluation succeeds +peer1.org1.example.com | [25b7 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25b8 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25b9 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [25ba 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [25bb 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25bc 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25bd 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25be 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [25bf 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [25c0 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [25c1 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce8f0 gate 1574140959660529600 evaluation starts +peer1.org1.example.com | [25c2 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce8f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [25c3 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce8f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [25c4 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce8f0 principal matched by identity 0 +peer1.org1.example.com | [25c5 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [25c6 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [25c7 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce8f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [25c8 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce8f0 gate 1574140959660529600 evaluation succeeds +peer1.org1.example.com | [25c9 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25ca 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25cb 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [25cc 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [25cd 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [2707 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org1.example.com | [2708 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org1.example.com | [2709 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org1.example.com | [270a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org1.example.com | [270b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org1.example.com | [270c 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org1.example.com | [270d 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 100ms (state_validation=0ms block_and_pvtdata_commit=64ms state_commit=23ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org1.example.com | [270e 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [270f 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08051A0C0A0565787030321203312E30 +peer0.org1.example.com | [2710 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 73543614597B3F6ACBC89C1C8626F558304D8E14B0F9BE74ACF13EC65C4602EF +peer0.org1.example.com | [2711 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer0.org1.example.com | [2712 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2713 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2714 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org1.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org1.example.com | [2715 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org1.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org1.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org1.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org1.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org1.example.com | [2716 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2717 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2718 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2719 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [271a 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [271b 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [271c 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [271d 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a cc 27 83 b1 e7 ff 4a b4 a4 9e 4f de 82 de e9 |J.'....J...O....| +peer0.org1.example.com | 00000010 b2 1a 64 00 36 a8 20 a9 42 c7 26 bb 6f d1 78 fb |..d.6. .B.&.o.x.| +peer0.org1.example.com | [271e 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 24 ee 38 6d 7d 75 4e ba db 1d de |0D. .$.8m}uN....| +peer0.org1.example.com | 00000010 82 fe d5 e1 0a 39 11 9d 73 73 1e 41 8a 7f a4 08 |.....9..ss.A....| +peer0.org1.example.com | 00000020 18 9e 0d c9 02 20 43 82 73 95 f0 88 8e 61 1f 36 |..... C.s....a.6| +peer0.org1.example.com | 00000030 69 29 0f bb 93 16 ee e3 e7 c1 29 22 79 b1 09 4c |i)........)"y..L| +peer0.org1.example.com | 00000040 5b 67 24 b0 a4 ed |[g$...| +peer0.org1.example.com | [271f 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2720 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2721 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2722 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2723 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2a89 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26390 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a8a 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26390 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2a8b 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26390 principal matched by identity 0 +peer1.org2.example.com | [2a8c 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 57 f7 09 74 93 35 a4 81 07 99 14 aa 26 89 ad |.W..t.5......&..| +peer1.org2.example.com | 00000010 b4 e4 10 e7 e1 9e e8 26 50 4c ba 88 af 3e 9a 98 |.......&PL...>..| +peer1.org2.example.com | [2a8d 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 e6 fd cf 74 45 bd 4f 6d 1e cc 72 |0D. !...tE.Om..r| +peer1.org2.example.com | 00000010 e2 7e c2 ff 2c 57 3f a7 6d 14 47 f2 20 6f 53 01 |.~..,W?.m.G. oS.| +peer1.org2.example.com | 00000020 22 c7 49 40 02 20 24 c1 91 9f 37 a6 a8 83 e2 36 |".I@. $...7....6| +peer1.org2.example.com | 00000030 8f 52 b3 be 3d 2f 5d 6e d7 8c 44 ae 82 08 c2 b4 |.R..=/]n..D.....| +peer1.org2.example.com | 00000040 07 be c5 a0 06 c3 |......| +peer1.org2.example.com | [2a8e 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26390 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a8f 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26390 gate 1574140959955950000 evaluation succeeds +peer1.org2.example.com | [2a90 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2a91 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2a92 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2a93 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2a94 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a95 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2a96 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2a97 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a98 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2a99 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a9a 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a9b 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [2a9c 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a9d 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a9e 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a9f 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aa0 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2aa1 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:/0\250\0062M\241\203\305\223\223\246a." > alive: alive: alive: +peer1.org2.example.com | [2aa2 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2aa3 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2aa4 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2aa5 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2aa6 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aa7 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aa8 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [274e 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c1d10 principal evaluation fails +peer0.org2.example.com | [274f 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c1d10 gate 1574140955884323900 evaluation fails +peer0.org2.example.com | [2750 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2751 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2752 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2753 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00298e280 gate 1574140955884789400 evaluation starts +peer0.org2.example.com | [2754 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00298e280 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2755 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00298e280 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2756 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00298e280 principal matched by identity 0 +peer0.org2.example.com | [2757 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +peer0.org2.example.com | 00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +peer0.org2.example.com | [2758 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +peer0.org2.example.com | 00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +peer0.org2.example.com | 00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +peer0.org2.example.com | 00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +peer0.org2.example.com | 00000040 e2 b3 a6 20 70 d3 80 |... p..| +peer0.org2.example.com | [2759 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00298e280 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [275a 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00298e280 gate 1574140955884789400 evaluation succeeds +peer0.org2.example.com | [275b 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [275c 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [275d 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [275e 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [275f 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2760 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2761 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2762 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer0.org2.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org2.example.com | [2763 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org2.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer0.org2.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer0.org2.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer0.org2.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer0.org2.example.com | [2764 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2765 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2766 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2767 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [2768 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2769 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org2.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org2.example.com | [276a 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org2.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org2.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org2.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org2.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org2.example.com | [276b 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [276c 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 e4 9a 98 db 3d cf 13 15 ad c0 |0E.!......=.....| +peer0.org2.example.com | 00000010 79 a3 2b 83 51 88 12 6c b4 47 ec b8 3f 13 89 1c |y.+.Q..l.G..?...| +peer0.org2.example.com | 00000020 0a 5d 2c a2 3b 02 20 25 7a ad 6a c7 89 19 e9 f6 |.],.;. %z.j.....| +peer0.org2.example.com | 00000030 82 2e b6 11 e6 15 2b 96 73 83 28 dd 56 34 c0 d2 |......+.s.(.V4..| +peer0.org2.example.com | 00000040 dd ef 5c 48 a1 a1 88 |..\H...| +peer0.org2.example.com | [276d 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [276e 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [276f 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2770 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2771 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2772 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2773 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2774 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2775 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2776 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org2.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org2.example.com | [2777 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org2.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org2.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org2.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org2.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org2.example.com | [2778 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2779 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [277a 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [277b 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [277c 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer0.org2.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org2.example.com | [277d 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org2.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer0.org2.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer0.org2.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer0.org2.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer0.org2.example.com | [277e 11-19 05:22:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [277f 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2780 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2781 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2782 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2783 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2784 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2785 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2786 11-19 05:22:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 dc b0 74 49 6b 26 d8 5b 9b c3 0b f4 44 b4 dd |Y..tIk&.[....D..| +peer0.org2.example.com | 00000010 34 b4 c8 2b 4f 4b 9e 23 a3 d3 f0 98 8f 3b 3f 59 |4..+OK.#.....;?Y| +peer0.org2.example.com | [2787 11-19 05:22:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 19 20 40 f1 2d de 88 a3 58 6c 35 |0D. /. @.-...Xl5| +peer0.org2.example.com | 00000010 4d ad 1d 91 1b 51 39 d3 1d 23 ef 51 8d e4 e5 20 |M....Q9..#.Q... | +peer0.org2.example.com | 00000020 ac 8f d5 90 02 20 41 5a 4e 90 6a 30 27 93 be f0 |..... AZN.j0'...| +peer0.org2.example.com | 00000030 b1 59 41 bc 2e b0 68 b6 3f d9 3c 18 98 6b ab 9e |.YA...h.?.<..k..| +peer0.org2.example.com | 00000040 8c a2 2d 94 69 55 |..-.iU| +peer0.org2.example.com | [2788 11-19 05:22:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2789 11-19 05:22:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [278a 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [278b 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [278c 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [278d 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [278e 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [278f 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2790 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2791 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2792 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2793 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2794 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2795 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933260 gate 1574140955945562500 evaluation starts +peer0.org2.example.com | [2796 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933260 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2797 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933260 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2798 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2799 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933260 principal evaluation fails +peer0.org2.example.com | [279a 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933260 gate 1574140955945562500 evaluation fails +peer0.org2.example.com | [279b 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [279c 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [279d 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [279e 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933800 gate 1574140955947906100 evaluation starts +peer0.org2.example.com | [279f 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27a0 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933800 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [27a1 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933800 principal matched by identity 0 +peer0.org2.example.com | [27a2 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org2.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org2.example.com | [27a3 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org2.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org2.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org2.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org2.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org2.example.com | [27a4 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933800 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [27a5 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002933800 gate 1574140955947906100 evaluation succeeds +peer0.org2.example.com | [27a6 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27a7 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27a8 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [27a9 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [27aa 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [27ab 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [27ac 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [27ad 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [27ae 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [27af 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27b0 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27b1 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27b2 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [27b3 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27b4 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27b5 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27b6 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27b7 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27b8 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27b9 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [27ba 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [27bb 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27bc 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [27bd 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27be 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [27bf 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [27c0 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27c1 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [27c2 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27c3 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 07 1a 4d 44 90 90 66 f9 58 46 8f 08 f4 6b 0b |Y..MD..f.XF...k.| +peer0.org2.example.com | 00000010 f5 23 2e 44 8b 70 c4 db 4b ae 25 29 b0 89 94 61 |.#.D.p..K.%)...a| +peer0.org2.example.com | [27c4 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 cb 20 aa f9 ea f8 b6 d2 04 b3 e7 |0D. `. .........| +peer0.org2.example.com | 00000010 cd 8f 2a 41 f9 79 ed aa aa c8 9e 4d 52 0d f2 5a |..*A.y.....MR..Z| +peer0.org2.example.com | 00000020 d5 93 58 29 02 20 14 ba a2 f7 e2 51 24 d3 11 8c |..X). .....Q$...| +peer0.org2.example.com | 00000030 d2 36 19 fc e6 5c 52 e5 92 69 5f b7 bc 0a 74 f4 |.6...\R..i_...t.| +peer0.org2.example.com | 00000040 34 bf 81 58 8d 6f |4..X.o| +peer0.org2.example.com | [27c5 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27c6 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27c7 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27c8 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27c9 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27ca 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [27cb 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27cc 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [27cd 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c9e90 gate 1574140955971909400 evaluation starts +peer0.org2.example.com | [27ce 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c9e90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27cf 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c9e90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [27d0 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c9e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [27d1 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c9e90 principal evaluation fails +peer0.org2.example.com | [27d2 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c9e90 gate 1574140955971909400 evaluation fails +peer0.org2.example.com | [27d3 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [27d4 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [27d5 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [27d6 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028384b0 gate 1574140955975086400 evaluation starts +peer0.org2.example.com | [27d7 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028384b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27d8 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028384b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [27d9 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028384b0 principal matched by identity 0 +peer0.org2.example.com | [27da 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org2.example.com | [27db 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org2.example.com | [27dc 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028384b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [27dd 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028384b0 gate 1574140955975086400 evaluation succeeds +peer0.org2.example.com | [27de 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27df 11-19 05:22:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27e0 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [27e1 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [27e2 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer0.org2.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer0.org2.example.com | [27e3 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer0.org2.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer0.org2.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer0.org2.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer0.org2.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer0.org2.example.com | [27e4 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27e5 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27e6 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [27e7 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27e8 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [27e9 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002839610 gate 1574140955982272400 evaluation starts +peer0.org2.example.com | [27ea 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002839610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27eb 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002839610 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [27ec 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002839610 principal matched by identity 0 +peer0.org2.example.com | [27ed 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer0.org2.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer0.org2.example.com | [27ee 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer0.org2.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer0.org2.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer0.org2.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer0.org2.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer0.org2.example.com | [27ef 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002839610 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [27f0 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002839610 gate 1574140955982272400 evaluation succeeds +peer0.org2.example.com | [27f1 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [27f2 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [27f3 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [27f4 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [27f5 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27f6 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27f7 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27fa 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27f8 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [27fb 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27fc 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [27f9 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27fd 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27fe 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27ff 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2800 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2801 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2802 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2803 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2804 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1a40 gate 1574140955988791700 evaluation starts +peer0.org2.example.com | [2805 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1a40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2806 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2807 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1a40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2809 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [280a 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1a40 principal evaluation fails +peer0.org2.example.com | [280b 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [280c 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [280d 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1a40 gate 1574140955988791700 evaluation fails +peer0.org2.example.com | [280e 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [280f 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2810 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2811 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2812 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2813 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1fb0 gate 1574140955989320100 evaluation starts +peer0.org2.example.com | [2814 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1fb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2815 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1fb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2816 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1fb0 principal matched by identity 0 +peer0.org2.example.com | [2817 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +peer0.org2.example.com | 00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +peer0.org2.example.com | [2808 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2818 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2819 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [281a 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [281b 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [281c 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [281d 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [281e 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [281f 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2820 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +peer0.org2.example.com | 00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +peer0.org2.example.com | 00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +peer0.org2.example.com | 00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +peer0.org2.example.com | 00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +peer0.org2.example.com | [2821 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1fb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2822 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1fb0 gate 1574140955989320100 evaluation succeeds +peer0.org2.example.com | [2823 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2824 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2825 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2826 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2827 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2828 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2829 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [282a 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [282b 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [282c 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [282d 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274eb60 gate 1574140956016110300 evaluation starts +peer0.org2.example.com | [282e 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274eb60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [282f 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274eb60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2830 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274eb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2831 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274eb60 principal evaluation fails +peer0.org2.example.com | [2832 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274eb60 gate 1574140956016110300 evaluation fails +peer0.org2.example.com | [2833 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2834 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2835 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2836 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f0e0 gate 1574140956031171000 evaluation starts +peer0.org2.example.com | [2837 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f0e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2838 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f0e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2839 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f0e0 principal matched by identity 0 +peer0.org2.example.com | [283a 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +peer0.org2.example.com | 00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +peer0.org2.example.com | [283b 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +peer0.org2.example.com | 00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +peer0.org2.example.com | 00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +peer0.org2.example.com | 00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +peer0.org2.example.com | 00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +peer0.org2.example.com | [283c 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f0e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2724 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2725 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2726 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2727 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2728 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2729 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [272a 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [272b 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [272c 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [272d 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [272e 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [272f 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2730 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2731 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [2732 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2733 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2734 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2735 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2736 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2738 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2737 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2739 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [273a 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [273b 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [273c 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [273d 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [273e 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [273f 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2740 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2741 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2742 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2743 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2744 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [2745 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2746 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2747 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2748 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2749 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [274a 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [274b 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [274c 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [274d 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [274e 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [274f 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2750 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2751 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2752 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 gate 1574140955869985700 evaluation starts +peer0.org1.example.com | [2753 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2754 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2755 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 principal matched by identity 0 +peer0.org1.example.com | [2756 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org1.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org1.example.com | [2757 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org1.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org1.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org1.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org1.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org1.example.com | [2758 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2759 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 gate 1574140955869985700 evaluation succeeds +peer0.org1.example.com | [275a 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [275b 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [275c 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [275d 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [275e 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [275f 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2760 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2761 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2762 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2763 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2764 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2765 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2766 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [2767 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2768 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2769 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [276a 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [276b 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [276c 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [276d 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [276e 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [276f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2770 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2771 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2772 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2773 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2774 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2775 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [2776 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2777 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2778 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2779 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [277a 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [277b 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [277c 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [277d 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 gate 1574140955893412800 evaluation starts +peer0.org1.example.com | [277e 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [277f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2780 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 principal matched by identity 0 +peer0.org1.example.com | [2781 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 dc b0 74 49 6b 26 d8 5b 9b c3 0b f4 44 b4 dd |Y..tIk&.[....D..| +peer0.org1.example.com | 00000010 34 b4 c8 2b 4f 4b 9e 23 a3 d3 f0 98 8f 3b 3f 59 |4..+OK.#.....;?Y| +peer0.org1.example.com | [2782 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 19 20 40 f1 2d de 88 a3 58 6c 35 |0D. /. @.-...Xl5| +peer0.org1.example.com | 00000010 4d ad 1d 91 1b 51 39 d3 1d 23 ef 51 8d e4 e5 20 |M....Q9..#.Q... | +peer0.org1.example.com | 00000020 ac 8f d5 90 02 20 41 5a 4e 90 6a 30 27 93 be f0 |..... AZN.j0'...| +peer0.org1.example.com | 00000030 b1 59 41 bc 2e b0 68 b6 3f d9 3c 18 98 6b ab 9e |.YA...h.?.<..k..| +peer0.org1.example.com | 00000040 8c a2 2d 94 69 55 |..-.iU| +peer0.org1.example.com | [2783 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2784 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 gate 1574140955893412800 evaluation succeeds +peer0.org1.example.com | [2785 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2786 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2787 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2788 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2789 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [278a 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" lastAliveTS: 1574140895837304100, 38 but got ts: inc_num:1574140895837304100 seq_num:37 +peer0.org1.example.com | [278b 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [278c 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [278d 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [278e 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [278f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2790 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2791 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2792 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2793 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2794 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2795 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2796 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2797 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2798 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2799 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [279a 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [279b 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [279c 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [279d 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [279e 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [279f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27a0 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [27a1 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27a2 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [27a3 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [27a4 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27a5 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [27a6 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27a7 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [27a8 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [27a9 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27aa 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [27ab 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [27ac 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org1.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org1.example.com | [27ad 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org1.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org1.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org1.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org1.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org1.example.com | [27ae 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [27af 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f f1 35 b3 39 58 6f d9 26 57 8f d1 |0D. ..5.9Xo.&W..| +peer0.org1.example.com | 00000010 aa a6 eb 4f 50 60 bc 2d ba 7b fb ac 75 93 55 d8 |...OP`.-.{..u.U.| +peer0.org1.example.com | 00000020 4c 07 91 85 02 20 5c e0 ce ab eb c2 12 14 27 55 |L.... \.......'U| +peer0.org1.example.com | 00000030 b8 1a 12 54 ae 7f 0e a2 9a 23 a8 92 5a b0 58 51 |...T.....#..Z.XQ| +peer0.org1.example.com | 00000040 48 74 a9 08 7f 27 |Ht...'| +peer0.org1.example.com | [27b0 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [27b1 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [27b2 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [27b3 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [27b4 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [27b5 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2aa9 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2aaa 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2aab 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2aac 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2aad 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2aae 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2aaf 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ab0 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ab1 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ab2 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d27b40 gate 1574140960014653500 evaluation starts +peer1.org2.example.com | [2ab3 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d27b40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ab4 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d27b40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2ab5 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d27b40 principal matched by identity 0 +peer1.org2.example.com | [2ab6 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2ab7 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2ab8 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d27b40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ab9 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d27b40 gate 1574140960014653500 evaluation succeeds +peer1.org2.example.com | [2aba 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2abb 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2abc 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2abd 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2abe 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2abf 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac0 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac1 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [2ac2 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ac3 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ac4 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac5 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ac6 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ac7 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac8 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ac9 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [2aca 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2acb 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2acc 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [2acd 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ace 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [2acf 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 5a c1 5b 65 2d 9b c7 a8 a4 68 82 48 5a 5b ae |.Z.[e-....h.HZ[.| +peer1.org2.example.com | 00000010 f8 72 4b d9 05 b7 a7 a9 4c 08 7f e2 fe 9d a8 10 |.rK.....L.......| +peer1.org2.example.com | [2ad0 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc ac e1 ce 2d 16 ce 18 52 1c 71 |0E.!.....-...R.q| +peer1.org2.example.com | 00000010 c0 26 07 bb 3f 4b 0b 97 e8 59 ed ba ce 43 22 61 |.&..?K...Y...C"a| +peer1.org2.example.com | 00000020 79 8c 92 9c 43 02 20 46 99 c8 a5 c0 c6 e8 79 3c |y...C. F......y<| +peer1.org2.example.com | 00000030 5b 8f cb 5c a0 f5 35 2d 7b a6 d4 fb e0 8d 87 f3 |[..\..5-{.......| +peer1.org2.example.com | 00000040 57 bd 0e 6d 5a 49 d6 |W..mZI.| +peer1.org2.example.com | [2ad1 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ad2 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [2ad3 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [2ad4 11-19 05:22:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad5 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad6 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2ad7 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2adb 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad8 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2adc 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ad9 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2add 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org2.example.com | [2ade 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2adf 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ada 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ae0 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ae1 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ae2 11-19 05:22:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ae3 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ae4 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ae5 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ae6 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ae7 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ae8 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ae9 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aea 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aeb 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aec 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2aed 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2aee 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2aef 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2af0 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2af1 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2af2 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d140 gate 1574140960220640900 evaluation starts +peer1.org2.example.com | [2af3 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d140 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2af4 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d140 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2af5 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2af6 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d140 principal evaluation fails +peer1.org2.example.com | [2af7 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d140 gate 1574140960220640900 evaluation fails +peer1.org2.example.com | [2af8 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2af9 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2afa 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2afb 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d6b0 gate 1574140960222722100 evaluation starts +peer1.org2.example.com | [2afc 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d6b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2afd 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d6b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2afe 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d6b0 principal matched by identity 0 +peer1.org2.example.com | [2aff 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [2b00 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [2b01 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d6b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b02 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3d6b0 gate 1574140960222722100 evaluation succeeds +peer1.org2.example.com | [2b03 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b05 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b06 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b07 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b08 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b09 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b0a 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b0b 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b0c 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b0d 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b0e 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b0f 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b10 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602940 gate 1574140960234798800 evaluation starts +peer1.org2.example.com | [2b11 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b12 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602940 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b13 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2b14 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602940 principal evaluation fails +peer1.org2.example.com | [2b15 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602940 gate 1574140960234798800 evaluation fails +peer1.org2.example.com | [2b16 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b17 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b18 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2b19 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602eb0 gate 1574140960235763000 evaluation starts +peer1.org2.example.com | [2b1a 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b1b 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602eb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b1c 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602eb0 principal matched by identity 0 +peer1.org2.example.com | [2b1d 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [2b1e 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [2b1f 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602eb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b20 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602eb0 gate 1574140960235763000 evaluation succeeds +peer1.org2.example.com | [2b21 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b22 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b23 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b24 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b25 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [2b26 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [2b27 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2b28 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2b29 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b2a 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b2b 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b2c 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b2d 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b2e 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b2f 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b30 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b31 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b32 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b33 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b34 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f0b0 gate 1574140960239833100 evaluation starts +peer1.org2.example.com | [2b35 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f0b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b36 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f0b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b37 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2b38 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f0b0 principal evaluation fails +peer1.org2.example.com | [2b39 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f0b0 gate 1574140960239833100 evaluation fails +peer1.org2.example.com | [2b3a 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b3b 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b3c 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2b3d 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f620 gate 1574140960240771300 evaluation starts +peer1.org2.example.com | [2b3e 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b3f 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f620 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b40 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f620 principal matched by identity 0 +peer1.org2.example.com | [2b41 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [2b42 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [2b43 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f620 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b44 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463f620 gate 1574140960240771300 evaluation succeeds +peer1.org2.example.com | [2b45 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b46 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b04 11-19 05:22:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b47 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b49 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b4a 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2b4b 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b4c 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b4d 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2b4e 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b4f 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b48 11-19 05:22:40.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b50 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b51 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b52 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b53 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b54 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b55 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b56 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b57 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b58 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b59 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b5a 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c530 gate 1574140960257500600 evaluation starts +peer1.org2.example.com | [2b5b 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b5c 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c530 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b5d 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2b5e 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c530 principal evaluation fails +peer1.org2.example.com | [2b5f 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c530 gate 1574140960257500600 evaluation fails +peer1.org2.example.com | [2b60 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b61 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b62 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2b63 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cac0 gate 1574140960259463600 evaluation starts +peer1.org2.example.com | [2b64 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b65 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cac0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b66 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cac0 principal matched by identity 0 +peer1.org2.example.com | [2b67 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [2b68 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [2b69 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cac0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b6a 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465cac0 gate 1574140960259463600 evaluation succeeds +peer1.org2.example.com | [2b6b 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b6c 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b6d 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b6e 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b6f 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2b70 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2b71 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [2b72 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | [27b6 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27b7 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27b8 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [27b9 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27ba 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27bb 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [27bc 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [27bd 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27be 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [27bf 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [27c0 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [27c1 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27c2 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27c3 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27c4 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27c5 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [27c6 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [27c7 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27c8 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27c9 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27ca 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27cb 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27cc 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27cd 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27ce 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 gate 1574140955994211700 evaluation starts +peer1.org1.example.com | [25ce 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [25cf 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25d0 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [25d1 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [25d2 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [25d3 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [25d4 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [25d5 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25d6 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25d7 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [25d8 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25d9 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25da 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [25db 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [25dc 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [25dd 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beafa0 gate 1574140959666584100 evaluation starts +peer1.org1.example.com | [25de 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beafa0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [25df 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beafa0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [25e0 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beafa0 principal matched by identity 0 +peer1.org1.example.com | [25e1 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [25e2 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [25e3 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beafa0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [25e4 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beafa0 gate 1574140959666584100 evaluation succeeds +peer1.org1.example.com | [25e5 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25e6 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25e7 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [25e8 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [25e9 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25ea 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25eb 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25ec 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [25ed 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [25ee 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [25ef 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bebae0 gate 1574140959685057900 evaluation starts +peer1.org1.example.com | [25f0 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bebae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [25f1 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bebae0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [25f2 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bebae0 principal matched by identity 0 +peer1.org1.example.com | [25f3 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [25f4 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [25f5 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bebae0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [25f6 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bebae0 gate 1574140959685057900 evaluation succeeds +peer1.org1.example.com | [25f7 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25f8 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25f9 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [25fa 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [25fb 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25fc 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25fd 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [25fe 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25ff 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2600 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2601 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2602 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2603 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318cc70 gate 1574140959690116900 evaluation starts +peer1.org1.example.com | [2604 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318cc70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2605 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318cc70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2606 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318cc70 principal matched by identity 0 +peer1.org1.example.com | [2607 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2608 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2609 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318cc70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [2b73 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27cf 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27d1 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [27d0 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [27d2 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 principal matched by identity 0 +peer0.org1.example.com | [27d3 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [27d4 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [27d5 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27d6 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 gate 1574140955994211700 evaluation succeeds +peer0.org1.example.com | [27d7 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27d8 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27d9 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [27da 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27db 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27dc 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27dd 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27de 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27df 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27e0 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27e1 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27e2 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 gate 1574140956001095700 evaluation starts +peer0.org1.example.com | [27e3 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27e4 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [27e5 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 principal matched by identity 0 +peer0.org1.example.com | [27e6 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [27e7 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [27e8 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27e9 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 gate 1574140956001095700 evaluation succeeds +peer0.org1.example.com | [27ea 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27eb 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27ec 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [27ed 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27ee 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27ef 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [27f0 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [283d 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f0e0 gate 1574140956031171000 evaluation succeeds +peer0.org2.example.com | [283e 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [283f 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [260a 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318cc70 gate 1574140959690116900 evaluation succeeds +peer1.org1.example.com | [260b 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [260c 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [260d 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [260e 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [260f 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2610 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2611 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2612 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2613 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2614 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2615 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2616 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2617 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2618 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2619 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [261a 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a6050 gate 1574140959690965000 evaluation starts +peer1.org1.example.com | [261b 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a6050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [261c 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a6050 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [261d 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a6050 principal matched by identity 0 +peer1.org1.example.com | [261e 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer1.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer1.org1.example.com | [261f 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer1.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer1.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer1.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer1.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer1.org1.example.com | [2620 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a6050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2621 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a6050 gate 1574140959690965000 evaluation succeeds +peer1.org1.example.com | [2622 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2623 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2624 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2625 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2626 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer1.org1.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer1.org1.example.com | [2627 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer1.org1.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer1.org1.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer1.org1.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer1.org1.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer1.org1.example.com | [2628 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2629 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [262a 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [262b 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [262c 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [262d 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [262e 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [262f 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2630 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a7860 gate 1574140959693766300 evaluation starts +peer1.org1.example.com | [2631 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a7860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2632 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a7860 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2633 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a7860 principal matched by identity 0 +peer1.org1.example.com | [2634 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2635 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2636 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2637 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2638 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2639 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [263a 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [263b 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [263c 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [263d 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [263e 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a7860 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [263f 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a7860 gate 1574140959693766300 evaluation succeeds +peer1.org1.example.com | [2640 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2641 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2642 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2643 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2644 11-19 05:22:39.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2645 11-19 05:22:39.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2646 11-19 05:22:39.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2647 11-19 05:22:39.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2648 11-19 05:22:39.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2649 11-19 05:22:39.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [264a 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [264b 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [264c 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [264d 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [264e 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 ef df 88 81 15 55 57 a6 f1 06 57 d2 c3 70 28 |......UW...W..p(| +peer1.org1.example.com | 00000010 7e 4c bf 70 cf 29 97 71 1e d6 67 7d c8 51 90 f7 |~L.p.).q..g}.Q..| +peer1.org1.example.com | [264f 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 7f 82 14 e5 de 04 f7 70 ee 32 a4 |0D. W.......p.2.| +peer1.org1.example.com | 00000010 0f be db 4f 64 97 8e f4 10 c4 e6 51 84 6a f3 84 |...Od......Q.j..| +peer1.org1.example.com | 00000020 9a 4a fa e8 02 20 2c 5b 42 d0 e5 07 68 76 c9 7c |.J... ,[B...hv.|| +peer1.org1.example.com | 00000030 b6 a4 5c 9d bd 29 18 3e 2f 30 a8 06 32 4d a1 83 |..\..).>/0..2M..| +peer1.org1.example.com | 00000040 c5 93 93 a6 61 2e |....a.| +peer1.org1.example.com | [2650 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2651 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2652 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2653 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2654 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2655 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2656 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2658 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2657 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2659 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [265a 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [265b 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [265c 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [265d 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [265e 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [265f 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2660 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2661 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2662 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2663 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2664 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2665 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2666 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2667 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2840 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2841 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2842 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2843 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 767 bytes, Signature: 0 bytes +peer0.org2.example.com | [2844 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +peer0.org2.example.com | 00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +peer0.org2.example.com | [2845 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +peer0.org2.example.com | 00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +peer0.org2.example.com | 00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +peer0.org2.example.com | 00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +peer0.org2.example.com | 00000040 96 fe c8 1a b0 f6 ee |.......| +peer0.org2.example.com | [2846 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2847 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2848 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2849 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [284a 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [284b 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [284c 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [284d 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [284e 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 gate 1574140956038563700 evaluation starts +peer0.org2.example.com | [284f 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2850 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2851 11-19 05:22:36.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2852 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 principal evaluation fails +peer0.org2.example.com | [2853 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd550 gate 1574140956038563700 evaluation fails +peer0.org2.example.com | [2854 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2855 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2856 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2857 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ddbb0 gate 1574140956042010900 evaluation starts +peer0.org2.example.com | [2858 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ddbb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2859 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ddbb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [285a 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ddbb0 principal matched by identity 0 +peer0.org2.example.com | [285b 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org2.example.com | [285c 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org2.example.com | [285d 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ddbb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [285e 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ddbb0 gate 1574140956042010900 evaluation succeeds +peer0.org2.example.com | [285f 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [27f1 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27f2 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27f3 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27f4 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27f5 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27f6 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27f7 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 gate 1574140956004086700 evaluation starts +peer0.org1.example.com | [27f8 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27f9 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [27fa 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 principal matched by identity 0 +peer0.org1.example.com | [27fb 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [27fc 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [27fd 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27fe 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 gate 1574140956004086700 evaluation succeeds +peer0.org1.example.com | [27ff 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2800 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2801 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2802 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2803 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2804 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2805 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2806 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2807 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [2808 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2809 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [280a 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [280b 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [280c 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [280d 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [280e 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [280f 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2810 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2668 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2669 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [266a 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [266b 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [266c 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [266d 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [266e 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [266f 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2670 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2672 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2674 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2671 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2675 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2676 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2677 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2673 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2678 11-19 05:22:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2679 11-19 05:22:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [267a 11-19 05:22:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [267b 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [267c 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [267d 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [267e 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [267f 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2680 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2681 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2682 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b74 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b75 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2b76 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2b77 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b78 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b79 11-19 05:22:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b7a 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b7b 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b7c 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b7d 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b7e 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b7f 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd180 gate 1574140960282256200 evaluation starts +peer1.org2.example.com | [2b80 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b81 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd180 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b82 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2b83 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd180 principal evaluation fails +peer1.org2.example.com | [2b84 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd180 gate 1574140960282256200 evaluation fails +peer1.org2.example.com | [2b85 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b86 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b87 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2b88 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd6f0 gate 1574140960283902300 evaluation starts +peer1.org2.example.com | [2b89 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd6f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b8a 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd6f0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b8b 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd6f0 principal matched by identity 0 +peer1.org2.example.com | [2b8c 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [2b8d 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [2b8e 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd6f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b8f 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bd6f0 gate 1574140960283902300 evaluation succeeds +peer1.org2.example.com | [2b90 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b91 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b92 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b93 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b94 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b95 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2811 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2812 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2813 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2814 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2815 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2816 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2817 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 gate 1574140956021918600 evaluation starts +peer0.org1.example.com | [2818 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2819 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [281a 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 principal matched by identity 0 +peer0.org1.example.com | [281b 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [281c 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [281d 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [281e 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 gate 1574140956021918600 evaluation succeeds +peer0.org1.example.com | [281f 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2820 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2821 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2822 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2823 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2824 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45632 +peer0.org1.example.com | [2825 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0029560f0 +peer0.org1.example.com | [2826 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2827 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2828 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2829 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org1.example.com | [282a 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [282b 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 20 a6 c2 c8 23 97 0f 05 f6 02 6b d9 33 e1 59 |o ...#.....k.3.Y| +peer0.org1.example.com | 00000010 6d 5d e1 9d b7 c7 18 4b 7a c4 7d 2f 9e f7 17 c0 |m].....Kz.}/....| +peer0.org1.example.com | [282c 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 e0 a1 34 fe 9e f4 ab c9 e3 78 |0E.!....4......x| +peer0.org1.example.com | 00000010 9a 7c 89 40 17 8a 29 ff 17 ad 58 d0 23 5d 7d 5e |.|.@..)...X.#]}^| +peer0.org1.example.com | 00000020 4f 11 cd 8e 8d 02 20 12 65 9b a0 91 4a 26 dc 1c |O..... .e...J&..| +peer0.org1.example.com | 00000030 ff 69 97 50 ff e3 2a bd 15 ec d3 95 3d 64 68 a1 |.i.P..*.....=dh.| +peer0.org1.example.com | 00000040 df 4e 2f bc 7b 3b 79 |.N/.{;y| +peer0.org1.example.com | [282d 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [282e 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002bb420, header 0xc002956550 +peer0.org1.example.com | [282f 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2830 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] processing txid: 596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936 +peer0.org1.example.com | [2831 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936] +peer0.org1.example.com | [2832 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2833 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2834 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2835 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2683 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2684 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2685 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2686 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2687 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2688 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2689 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [268a 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [268b 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [268c 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [268d 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [268e 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [268f 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2690 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2691 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2692 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [2693 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2694 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2695 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2696 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2697 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2698 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2699 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [269a 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb0b20 gate 1574140959865555200 evaluation starts +peer1.org1.example.com | [269b 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb0b20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [269c 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb0b20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [269d 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb0b20 principal matched by identity 0 +peer1.org1.example.com | [269e 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 4f 58 c8 cd 2b 73 96 ae 18 00 4a ef 90 8a c4 |ROX..+s....J....| +peer1.org1.example.com | 00000010 51 3c 45 54 43 ae a4 51 c0 b9 91 91 98 14 db 0c |Q DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d 61 44 dc e3 5e 99 b8 d7 a0 |0E.!..]aD..^....| +peer1.org1.example.com | 00000010 90 d6 7a 38 b7 57 ce f5 58 f5 cb 97 26 e4 77 1f |..z8.W..X...&.w.| +peer1.org1.example.com | 00000020 9a 11 46 83 38 02 20 58 83 7b 51 65 27 c5 c8 b2 |..F.8. X.{Qe'...| +peer1.org1.example.com | 00000030 2e aa 5b e1 cb f7 6c 34 62 a8 ad 82 a1 e9 fb 20 |..[...l4b...... | +peer1.org1.example.com | 00000040 df 2e 7e e5 7b 9d 4a |..~.{.J| +peer1.org1.example.com | [26a0 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb0b20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [26a1 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb0b20 gate 1574140959865555200 evaluation succeeds +peer1.org1.example.com | [26a2 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26a3 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26a4 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [26a5 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [26a6 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [26a7 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [26a8 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [26a9 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [26aa 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [26ab 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ac 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ad 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ae 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [26af 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26b0 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26b1 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26b2 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26b3 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:/0\250\0062M\241\203\305\223\223\246a." > alive: +peer1.org1.example.com | [26b4 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [26b5 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26b6 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [26b7 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15102A +peer1.org1.example.com | [26b8 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E857F709749335A481079914AA2689ADB4E410E7E19EE826504CBA88AF3E9A98 +peer1.org1.example.com | [26b9 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [26ba 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [26bb 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [26bc 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26bd 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2836 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [2837 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 gate 1574140956135937900 evaluation starts +peer0.org1.example.com | [2838 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2839 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [283a 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 principal matched by identity 0 +peer0.org1.example.com | [283b 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 20 a6 c2 c8 23 97 0f 05 f6 02 6b d9 33 e1 59 |o ...#.....k.3.Y| +peer0.org1.example.com | 00000010 6d 5d e1 9d b7 c7 18 4b 7a c4 7d 2f 9e f7 17 c0 |m].....Kz.}/....| +peer0.org1.example.com | [283c 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 e0 a1 34 fe 9e f4 ab c9 e3 78 |0E.!....4......x| +peer0.org1.example.com | 00000010 9a 7c 89 40 17 8a 29 ff 17 ad 58 d0 23 5d 7d 5e |.|.@..)...X.#]}^| +peer0.org1.example.com | 00000020 4f 11 cd 8e 8d 02 20 12 65 9b a0 91 4a 26 dc 1c |O..... .e...J&..| +peer0.org1.example.com | 00000030 ff 69 97 50 ff e3 2a bd 15 ec d3 95 3d 64 68 a1 |.i.P..*.....=dh.| +peer0.org1.example.com | 00000040 df 4e 2f bc 7b 3b 79 |.N/.{;y| +peer0.org1.example.com | [283d 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [283e 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 gate 1574140956135937900 evaluation succeeds +peer0.org1.example.com | [283f 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2840 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2841 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2842 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2843 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2844 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936] +peer0.org1.example.com | [2845 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2846 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2847 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2848 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][596b201f] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2849 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [284a 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [284b 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] handling GET_STATE from chaincode +peer0.org1.example.com | [284c 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [284d 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [284e 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [284f 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2850 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] notifying Txid:596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936, channelID:businesschannel +peer0.org1.example.com | [2851 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2852 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][596b201f] Exit chaincode: name:"exp02" (4ms) +peer0.org1.example.com | [2853 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2854 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936] +peer0.org1.example.com | [2855 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] Exit +peer0.org1.example.com | [2856 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2857 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2858 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936, chaincode: exp02} +peer0.org1.example.com | [2859 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20B3675A164ED3C0332F68DD93B59F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [285a 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BB80426DB5A2F8F5B59EDB9927868BAD56DAA486970AE2D0CFEB78C0C3038A87 +peer0.org1.example.com | [285b 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936, chaincode: exp02} +peer0.org1.example.com | [285c 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] Exit +peer0.org1.example.com | [285d 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936] +peer0.org1.example.com | [285e 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45632 +peer0.org1.example.com | [285f 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45632 grpc.code=OK grpc.call_duration=13.2942ms +peer0.org1.example.com | [2860 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45632: read: connection reset by peer +peer0.org1.example.com | [2861 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2862 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2863 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2864 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2865 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2866 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2867 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2860 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2861 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2862 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2863 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2864 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2865 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2866 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2867 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2868 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2869 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [286a 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [286b 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267cdc0 gate 1574140956047483800 evaluation starts +peer0.org2.example.com | [286c 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267cdc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [286d 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267cdc0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [286e 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267cdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [286f 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267cdc0 principal evaluation fails +peer0.org2.example.com | [2870 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267cdc0 gate 1574140956047483800 evaluation fails +peer0.org2.example.com | [2871 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2872 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2873 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2874 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267d350 gate 1574140956049514500 evaluation starts +peer0.org2.example.com | [2875 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267d350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2876 11-19 05:22:36.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267d350 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2877 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267d350 principal matched by identity 0 +peer0.org2.example.com | [2878 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +peer0.org2.example.com | 00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +peer0.org2.example.com | [2879 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +peer0.org2.example.com | 00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +peer0.org2.example.com | 00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +peer0.org2.example.com | 00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +peer0.org2.example.com | 00000040 ce 49 35 84 96 6c f3 |.I5..l.| +peer0.org2.example.com | [287a 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267d350 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [287b 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00267d350 gate 1574140956049514500 evaluation succeeds +peer0.org2.example.com | [287c 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [287d 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [287e 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [287f 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2880 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org2.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org2.example.com | [2881 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org2.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org2.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org2.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer1.org1.example.com | [26be 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [26bf 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c0 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26c2 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [26c3 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c1 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26c4 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26c5 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [26c6 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c7 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [26c9 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c8 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [26ca 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [26cb 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [26cc 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [26cd 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 57 f7 09 74 93 35 a4 81 07 99 14 aa 26 89 ad |.W..t.5......&..| +peer1.org1.example.com | 00000010 b4 e4 10 e7 e1 9e e8 26 50 4c ba 88 af 3e 9a 98 |.......&PL...>..| +peer1.org1.example.com | [26ce 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 e6 fd cf 74 45 bd 4f 6d 1e cc 72 |0D. !...tE.Om..r| +peer1.org1.example.com | 00000010 e2 7e c2 ff 2c 57 3f a7 6d 14 47 f2 20 6f 53 01 |.~..,W?.m.G. oS.| +peer1.org1.example.com | 00000020 22 c7 49 40 02 20 24 c1 91 9f 37 a6 a8 83 e2 36 |".I@. $...7....6| +peer1.org1.example.com | 00000030 8f 52 b3 be 3d 2f 5d 6e d7 8c 44 ae 82 08 c2 b4 |.R..=/]n..D.....| +peer1.org1.example.com | 00000040 07 be c5 a0 06 c3 |......| +peer1.org1.example.com | [26cf 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [26d0 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 48 c1 da 77 89 df 49 95 81 42 59 |0D. .H..w..I..BY| +peer1.org1.example.com | 00000010 40 f6 f4 58 2a 93 8e fd c8 3f 2d ce 71 5d 92 34 |@..X*....?-.q].4| +peer1.org1.example.com | 00000020 2c e7 4b f5 02 20 57 33 7a 65 bf a2 49 36 2c a9 |,.K.. W3ze..I6,.| +peer1.org1.example.com | 00000030 6f 13 f6 8e 65 cf 9e 2c 66 16 0f 2f 8f f7 f4 64 |o...e..,f../...d| +peer1.org1.example.com | 00000040 05 b5 1f c6 ac 2f |...../| +peer1.org1.example.com | [26d1 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [26d2 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [26d3 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26d4 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26d5 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2868 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2869 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [286a 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [286b 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [286c 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [286d 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [286e 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [286f 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2870 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2871 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2872 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 gate 1574140956201900200 evaluation starts +peer0.org1.example.com | [2873 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2874 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2875 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 principal matched by identity 0 +peer0.org1.example.com | [2876 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org1.example.com | [2877 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org1.example.com | [2878 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2879 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 gate 1574140956201900200 evaluation succeeds +peer0.org1.example.com | [287a 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [287b 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [287c 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [287d 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [287e 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [287f 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2880 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2881 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2882 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2883 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2884 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2885 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 gate 1574140956210656100 evaluation starts +peer0.org1.example.com | [2886 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b96 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b97 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b98 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b99 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b9a 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b9b 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b9c 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003786af0 gate 1574140960288741500 evaluation starts +peer1.org2.example.com | [2b9d 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003786af0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b9e 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003786af0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2b9f 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003786af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ba0 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003786af0 principal evaluation fails +peer1.org2.example.com | [2ba1 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003786af0 gate 1574140960288741500 evaluation fails +peer1.org2.example.com | [2ba2 11-19 05:22:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ba3 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ba4 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2ba5 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003787090 gate 1574140960290513900 evaluation starts +peer1.org2.example.com | [2ba6 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003787090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ba7 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003787090 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2ba8 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003787090 principal matched by identity 0 +peer1.org2.example.com | [2ba9 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [2baa 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [2bab 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003787090 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2bac 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003787090 gate 1574140960290513900 evaluation succeeds +peer1.org2.example.com | [2bad 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2bae 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2baf 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2bb0 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2bb1 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [2bb2 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [2bb3 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bb4 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [26d6 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [26d7 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d8 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26d9 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [26da 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26db 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26dc 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [26dd 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [26de 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [26df 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff46a0 gate 1574140959974296900 evaluation starts +peer1.org1.example.com | [26e0 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff46a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [26e1 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff46a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [26e2 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff46a0 principal matched by identity 0 +peer1.org1.example.com | [26e3 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 4f 58 c8 cd 2b 73 96 ae 18 00 4a ef 90 8a c4 |ROX..+s....J....| +peer1.org1.example.com | 00000010 51 3c 45 54 43 ae a4 51 c0 b9 91 91 98 14 db 0c |Q DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d 61 44 dc e3 5e 99 b8 d7 a0 |0E.!..]aD..^....| +peer1.org1.example.com | 00000010 90 d6 7a 38 b7 57 ce f5 58 f5 cb 97 26 e4 77 1f |..z8.W..X...&.w.| +peer1.org1.example.com | 00000020 9a 11 46 83 38 02 20 58 83 7b 51 65 27 c5 c8 b2 |..F.8. X.{Qe'...| +peer1.org1.example.com | 00000030 2e aa 5b e1 cb f7 6c 34 62 a8 ad 82 a1 e9 fb 20 |..[...l4b...... | +peer1.org1.example.com | 00000040 df 2e 7e e5 7b 9d 4a |..~.{.J| +peer1.org1.example.com | [26e5 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff46a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [26e6 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff46a0 gate 1574140959974296900 evaluation succeeds +peer1.org1.example.com | [26e7 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26e8 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26e9 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [26ea 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [26eb 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [26ec 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ed 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [26ee 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 57 f7 09 74 93 35 a4 81 07 99 14 aa 26 89 ad |.W..t.5......&..| +peer1.org1.example.com | 00000010 b4 e4 10 e7 e1 9e e8 26 50 4c ba 88 af 3e 9a 98 |.......&PL...>..| +peer1.org1.example.com | [26ef 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 e6 fd cf 74 45 bd 4f 6d 1e cc 72 |0D. !...tE.Om..r| +peer1.org1.example.com | 00000010 e2 7e c2 ff 2c 57 3f a7 6d 14 47 f2 20 6f 53 01 |.~..,W?.m.G. oS.| +peer1.org1.example.com | 00000020 22 c7 49 40 02 20 24 c1 91 9f 37 a6 a8 83 e2 36 |".I@. $...7....6| +peer1.org1.example.com | 00000030 8f 52 b3 be 3d 2f 5d 6e d7 8c 44 ae 82 08 c2 b4 |.R..=/]n..D.....| +peer1.org1.example.com | 00000040 07 be c5 a0 06 c3 |......| +peer1.org1.example.com | [26f0 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26f1 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26f2 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26f3 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2887 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2888 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 principal matched by identity 0 +peer0.org1.example.com | [2889 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org1.example.com | [288a 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org1.example.com | [288b 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [288c 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 gate 1574140956210656100 evaluation succeeds +peer0.org1.example.com | [288d 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [288e 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [288f 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2890 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2891 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2892 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2893 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2894 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [2895 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2896 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2897 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2898 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2899 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [289a 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [289b 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [289c 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [289d 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [289e 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [289f 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org2.example.com | [2882 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2883 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2884 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2885 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2886 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2887 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672470 gate 1574140956055315700 evaluation starts +peer0.org2.example.com | [2888 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672470 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2889 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672470 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [288a 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672470 principal matched by identity 0 +peer0.org2.example.com | [288b 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org2.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org2.example.com | [288c 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org2.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org2.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org2.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org2.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org2.example.com | [288d 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672470 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [288e 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672470 gate 1574140956055315700 evaluation succeeds +peer0.org2.example.com | [288f 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2890 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2891 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2892 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2893 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2894 11-19 05:22:36.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer0.org2.example.com | [2895 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer0.org2.example.com | [2896 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2897 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [2898 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2899 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [289a 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [289b 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [289c 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [289d 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [289e 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [289f 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [28a0 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [28a1 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002673aa0 gate 1574140956063613600 evaluation starts +peer0.org2.example.com | [28a2 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002673aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28a3 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002673aa0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [28a4 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002673aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [28a5 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002673aa0 principal evaluation fails +peer0.org2.example.com | [28a6 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002673aa0 gate 1574140956063613600 evaluation fails +peer0.org2.example.com | [28a7 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28a8 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28a9 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28aa 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002666030 gate 1574140956065668800 evaluation starts +peer0.org2.example.com | [28ab 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002666030 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28ac 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002666030 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [28ad 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002666030 principal matched by identity 0 +peer0.org2.example.com | [28ae 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org2.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org2.example.com | [28af 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org2.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org2.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org2.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org2.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org2.example.com | [28b0 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002666030 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28b1 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002666030 gate 1574140956065668800 evaluation succeeds +peer0.org2.example.com | [28b2 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28b3 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28b4 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28b5 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28b6 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +peer0.org2.example.com | 00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +peer0.org2.example.com | [28b7 11-19 05:22:36.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +peer0.org2.example.com | 00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +peer0.org2.example.com | 00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +peer0.org2.example.com | 00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +peer0.org2.example.com | 00000040 e8 ee cb dc 9d d1 31 |......1| +peer0.org2.example.com | [28b8 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28b9 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28ba 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [28bb 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28bc 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28bd 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [28be 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [28bf 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [28c0 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667880 gate 1574140956073524500 evaluation starts +peer0.org2.example.com | [28c1 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667880 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28c2 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667880 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [28c3 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [28a0 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28a1 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [28a2 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [28a3 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [28a4 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 gate 1574140956231514900 evaluation starts +peer0.org1.example.com | [28a5 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28a6 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [28a7 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 principal matched by identity 0 +peer0.org1.example.com | [28a8 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org1.example.com | [28a9 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org1.example.com | [28aa 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [28ab 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 gate 1574140956231514900 evaluation succeeds +peer0.org1.example.com | [28ac 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28ad 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28ae 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [28af 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [28b0 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28b1 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45636 +peer0.org1.example.com | [28b2 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002913270 +peer0.org1.example.com | [28b3 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [28b4 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [28b5 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [28b6 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org1.example.com | [28b7 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [28b8 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 30 7b 3c a3 61 a9 9a b4 b3 ae 4d 22 d8 eb 14 |.0{<.a.....M"...| +peer0.org1.example.com | 00000010 bb 61 b1 be f4 e7 39 71 dd ba 94 be f4 3b 46 44 |.a....9q.....;FD| +peer0.org1.example.com | [28b9 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd c0 7d c7 ea ac 30 cd c3 37 98 |0E.!...}...0..7.| +peer0.org1.example.com | 00000010 61 e6 20 0e 1f dd 7b 27 b1 53 51 66 45 1a bd 85 |a. ...{'.SQfE...| +peer0.org1.example.com | 00000020 3b 53 43 8d e3 02 20 3f 51 a4 95 be 40 35 fc e7 |;SC... ?Q...@5..| +peer0.org1.example.com | 00000030 45 b8 3c 00 73 1b a5 9b 5b f1 12 ca b3 6c d3 4e |E.<.s...[....l.N| +peer0.org1.example.com | 00000040 dd 05 69 23 ae 83 eb |..i#...| +peer0.org1.example.com | [28ba 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [28bb 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001d98f0, header 0xc002913680 +peer0.org1.example.com | [28bc 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [28bd 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] processing txid: 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 +peer0.org1.example.com | [28be 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +peer0.org1.example.com | [28bf 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [28c0 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [28c1 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [28c2 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [28c3 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [28c4 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 gate 1574140956371443600 evaluation starts +peer0.org1.example.com | [28c5 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28c6 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [28c7 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 principal matched by identity 0 +peer0.org1.example.com | [28c8 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 30 7b 3c a3 61 a9 9a b4 b3 ae 4d 22 d8 eb 14 |.0{<.a.....M"...| +peer0.org1.example.com | 00000010 bb 61 b1 be f4 e7 39 71 dd ba 94 be f4 3b 46 44 |.a....9q.....;FD| +peer0.org1.example.com | [28c9 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd c0 7d c7 ea ac 30 cd c3 37 98 |0E.!...}...0..7.| +peer0.org1.example.com | 00000010 61 e6 20 0e 1f dd 7b 27 b1 53 51 66 45 1a bd 85 |a. ...{'.SQfE...| +peer0.org1.example.com | 00000020 3b 53 43 8d e3 02 20 3f 51 a4 95 be 40 35 fc e7 |;SC... ?Q...@5..| +peer0.org1.example.com | 00000030 45 b8 3c 00 73 1b a5 9b 5b f1 12 ca b3 6c d3 4e |E.<.s...[....l.N| +peer0.org1.example.com | 00000040 dd 05 69 23 ae 83 eb |..i#...| +peer0.org1.example.com | [28ca 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [28cb 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 gate 1574140956371443600 evaluation succeeds +peer0.org1.example.com | [28cc 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [28cd 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [28ce 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org1.example.com | [26f4 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [26f5 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [26f6 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [26f7 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26f8 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26f9 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26fa 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26fb 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [26fc 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26fd 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [26fe 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [26ff 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 57 f7 09 74 93 35 a4 81 07 99 14 aa 26 89 ad |.W..t.5......&..| +peer1.org1.example.com | 00000010 b4 e4 10 e7 e1 9e e8 26 50 4c ba 88 af 3e 9a 98 |.......&PL...>..| +peer1.org1.example.com | [2700 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 e6 fd cf 74 45 bd 4f 6d 1e cc 72 |0D. !...tE.Om..r| +peer1.org1.example.com | 00000010 e2 7e c2 ff 2c 57 3f a7 6d 14 47 f2 20 6f 53 01 |.~..,W?.m.G. oS.| +peer1.org1.example.com | 00000020 22 c7 49 40 02 20 24 c1 91 9f 37 a6 a8 83 e2 36 |".I@. $...7....6| +peer1.org1.example.com | 00000030 8f 52 b3 be 3d 2f 5d 6e d7 8c 44 ae 82 08 c2 b4 |.R..=/]n..D.....| +peer1.org1.example.com | 00000040 07 be c5 a0 06 c3 |......| +peer1.org1.example.com | [2701 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2702 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2703 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2704 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2705 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2706 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2707 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2708 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2709 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [270a 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [270b 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [270c 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c164a0 gate 1574140959983342000 evaluation starts +peer1.org1.example.com | [270d 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c164a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [270e 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c164a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [270f 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c164a0 principal matched by identity 0 +peer1.org1.example.com | [2710 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer1.org2.example.com | [2bb5 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bb6 11-19 05:22:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bb7 11-19 05:22:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2bb8 11-19 05:22:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15102A +peer1.org2.example.com | [2bb9 11-19 05:22:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F8B5E048A1F7C1A864D912DB88DE324EB887FD057EAFEFB5C40A4A6FD7655605 +peer1.org2.example.com | [2bba 11-19 05:22:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2bbb 11-19 05:22:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2bbc 11-19 05:22:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2bbd 11-19 05:22:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2bbe 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bbf 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bc0 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bc1 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2bc2 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bc3 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2bc4 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2bc5 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bc6 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bc7 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bc8 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bc9 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bca 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bcb 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bcc 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bcd 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bce 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [2bcf 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28cf 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [28d0 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [28d1 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +peer0.org1.example.com | [28d2 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] Entry chaincode: name:"exp02" +peer0.org1.example.com | [28d3 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [28d4 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [28d5 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][2a9916eb] Entry chaincode: name:"exp02" +peer0.org1.example.com | [28d6 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [28d7 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [28d8 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] handling GET_STATE from chaincode +peer0.org1.example.com | [28d9 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [28da 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [28db 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [28dc 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [28dd 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] handling GET_STATE from chaincode +peer0.org1.example.com | [28de 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] getting state for chaincode exp02, key b, channel businesschannel +peer0.org1.example.com | [28df 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [28e0 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [28e1 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [28e2 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] handling PUT_STATE from chaincode +peer0.org1.example.com | [28e3 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [28e4 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [28e5 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] handling PUT_STATE from chaincode +peer0.org1.example.com | [28e6 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [28e7 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [28e8 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] notifying Txid:2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, channelID:businesschannel +peer0.org1.example.com | [28e9 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [28ea 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][2a9916eb] Exit chaincode: name:"exp02" (11ms) +peer0.org1.example.com | [28eb 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [28ec 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +peer0.org1.example.com | [28ed 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] Exit +peer0.org1.example.com | [28ee 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] Entry chaincode: name:"exp02" +peer0.org1.example.com | [28ef 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [28f0 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, chaincode: exp02} +peer0.org1.example.com | [28f1 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20FC63539DB4B766330420FF33BCB0...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [28f2 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 20BEAE071C255216A56E0D5888B92F551F93C0AC4EB2C1E861448CD966162887 +peer0.org1.example.com | [28f3 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, chaincode: exp02} +peer0.org1.example.com | [28f4 11-19 05:22:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] Exit +peer0.org1.example.com | [28f5 11-19 05:22:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +peer0.org1.example.com | [28f6 11-19 05:22:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45636 +peer0.org1.example.com | [28f7 11-19 05:22:36.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45636 grpc.code=OK grpc.call_duration=24.1975ms +peer0.org1.example.com | [28f8 11-19 05:22:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [28f9 11-19 05:22:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [28fa 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45642 +peer0.org1.example.com | [28fb 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0000df770 +peer0.org1.example.com | [28fc 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [28fd 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [28fe 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [28ff 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [2900 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2901 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 99 aa 51 5a 6d 15 2c 23 d0 12 c1 b7 2d 69 3b |...QZm.,#....-i;| +peer0.org1.example.com | 00000010 77 9d 62 dc 77 3f aa 4d 69 dd 16 e7 82 21 07 43 |w.b.w?.Mi....!.C| +peer0.org1.example.com | [2902 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 5d c1 fc 38 e0 1e c4 23 56 75 |0E.!..]..8...#Vu| +peer0.org1.example.com | 00000010 e0 79 42 c5 73 a5 30 30 d5 f5 5f 6a af a7 71 1e |.yB.s.00.._j..q.| +peer0.org1.example.com | 00000020 8d 7e 2a 35 d0 02 20 5c fd bf a1 6a 1b 8b 40 28 |.~*5.. \...j..@(| +peer0.org1.example.com | 00000030 0e 07 31 d3 8c bb fa 6b f9 b9 1b 45 d2 65 dc bd |..1....k...E.e..| +peer0.org1.example.com | 00000040 33 ac aa 77 95 40 61 |3..w.@a| +peer0.org1.example.com | [2903 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2904 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001d9ce0, header 0xc00038c5a0 +peer0.org2.example.com | [28c4 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667880 principal evaluation fails +peer0.org2.example.com | [28c5 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667880 gate 1574140956073524500 evaluation fails +peer0.org2.example.com | [28c6 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28c7 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28c8 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28c9 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667f60 gate 1574140956075891300 evaluation starts +peer0.org2.example.com | [28ca 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667f60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28cb 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667f60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [28cc 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667f60 principal matched by identity 0 +peer0.org2.example.com | [28cd 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer0.org2.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer0.org2.example.com | [28ce 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer0.org2.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer0.org2.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer0.org2.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer0.org2.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer0.org2.example.com | [28cf 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667f60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28d0 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002667f60 gate 1574140956075891300 evaluation succeeds +peer0.org2.example.com | [28d1 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28d2 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28d3 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28d4 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28d5 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28d6 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28d7 11-19 05:22:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28d8 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [28d9 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [28da 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [28db 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ead0 gate 1574140956080356000 evaluation starts +peer0.org2.example.com | [28dc 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ead0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28dd 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ead0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [28de 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ead0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [28df 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ead0 principal evaluation fails +peer0.org2.example.com | [28e0 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ead0 gate 1574140956080356000 evaluation fails +peer0.org2.example.com | [28e1 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28e2 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28e3 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28e4 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f040 gate 1574140956082364100 evaluation starts +peer0.org2.example.com | [28e5 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28e6 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f040 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [28e7 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f040 principal matched by identity 0 +peer0.org2.example.com | [28e8 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer0.org2.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer0.org2.example.com | [28e9 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer0.org2.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer0.org2.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer0.org2.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer0.org2.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer0.org2.example.com | [28ea 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f040 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28eb 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f040 gate 1574140956082364100 evaluation succeeds +peer0.org2.example.com | [28ec 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28ed 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28ee 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28ef 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28f0 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org2.example.com | [28f1 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org2.example.com | [28f2 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2905 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2906 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] processing txid: 68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3 +peer0.org1.example.com | [2907 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3] +peer0.org1.example.com | [2908 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2909 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [290a 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [290b 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [290c 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [290d 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 gate 1574140956555612300 evaluation starts +peer0.org1.example.com | [290e 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [290f 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2910 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2911 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 principal evaluation fails +peer0.org1.example.com | [2912 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 gate 1574140956555612300 evaluation fails +peer0.org1.example.com | [2913 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2914 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2915 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [2916 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 gate 1574140956556367400 evaluation starts +peer0.org1.example.com | [2917 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2918 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2919 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 principal matched by identity 0 +peer0.org1.example.com | [291a 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 99 aa 51 5a 6d 15 2c 23 d0 12 c1 b7 2d 69 3b |...QZm.,#....-i;| +peer0.org1.example.com | 00000010 77 9d 62 dc 77 3f aa 4d 69 dd 16 e7 82 21 07 43 |w.b.w?.Mi....!.C| +peer0.org1.example.com | [291b 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 5d c1 fc 38 e0 1e c4 23 56 75 |0E.!..]..8...#Vu| +peer0.org1.example.com | 00000010 e0 79 42 c5 73 a5 30 30 d5 f5 5f 6a af a7 71 1e |.yB.s.00.._j..q.| +peer0.org1.example.com | 00000020 8d 7e 2a 35 d0 02 20 5c fd bf a1 6a 1b 8b 40 28 |.~*5.. \...j..@(| +peer0.org1.example.com | 00000030 0e 07 31 d3 8c bb fa 6b f9 b9 1b 45 d2 65 dc bd |..1....k...E.e..| +peer0.org1.example.com | 00000040 33 ac aa 77 95 40 61 |3..w.@a| +peer0.org1.example.com | [291c 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [291d 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 gate 1574140956556367400 evaluation succeeds +peer0.org1.example.com | [291e 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [291f 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2920 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2921 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2922 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2923 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3] +peer0.org1.example.com | [2924 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2925 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2926 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2927 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][68c959c4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2928 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2929 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [292a 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] handling GET_STATE from chaincode +peer0.org1.example.com | [292b 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [292c 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [292d 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [292e 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [292f 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] notifying Txid:68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3, channelID:businesschannel +peer0.org1.example.com | [2930 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2931 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][68c959c4] Exit chaincode: name:"exp02" (3ms) +peer0.org1.example.com | [2932 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2933 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3] +peer0.org1.example.com | [2934 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] Exit +peer0.org1.example.com | [2935 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2936 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2937 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3, chaincode: exp02} +peer0.org1.example.com | [2938 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20508B0111C8625A2D00056CE6989F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer1.org1.example.com | [2711 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer1.org1.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer1.org1.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer1.org1.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer1.org1.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer1.org1.example.com | [2712 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c164a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2713 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c164a0 gate 1574140959983342000 evaluation succeeds +peer1.org1.example.com | [2714 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2715 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2716 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2717 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2718 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2719 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [271a 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [271b 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [271c 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [271d 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [271e 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [271f 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2720 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2721 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2722 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2723 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2724 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c17900 gate 1574140960000355600 evaluation starts +peer1.org1.example.com | [2725 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c17900 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2726 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c17900 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2727 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c17900 principal matched by identity 0 +peer1.org1.example.com | [2728 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2729 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [272a 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c17900 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2bd0 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2bd1 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bd2 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bd3 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2bd4 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2bd5 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2bd6 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c2e0 gate 1574140960788853900 evaluation starts +peer1.org2.example.com | [2bd7 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c2e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2bd8 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c2e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2bd9 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2bda 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c2e0 principal evaluation fails +peer1.org2.example.com | [2bdb 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c2e0 gate 1574140960788853900 evaluation fails +peer1.org2.example.com | [2bdc 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bdd 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bde 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2bdf 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c850 gate 1574140960791870000 evaluation starts +peer1.org2.example.com | [2be0 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2be1 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c850 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2be2 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c850 principal matched by identity 0 +peer1.org2.example.com | [2be3 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c c1 4d d7 e6 df 6b b7 75 1c fb 12 f1 82 4f 03 |..M...k.u.....O.| +peer1.org2.example.com | 00000010 12 ea 04 1e ed 5a 04 93 07 d5 6a 3c 63 9b c6 f7 |.....Z....j DEBU Verify: sig = 00000000 30 45 02 21 00 94 1e 66 e6 8e 3a 6d 96 d1 8d a2 |0E.!...f..:m....| +peer1.org2.example.com | 00000010 f5 22 2e 67 9d 04 e7 18 ef 8f 0d c0 1f 10 50 04 |.".g..........P.| +peer1.org2.example.com | 00000020 f6 eb 29 ad d7 02 20 08 2f 47 cf 46 56 55 e6 d2 |..)... ./G.FVU..| +peer1.org2.example.com | 00000030 87 9b 0a 23 b1 1a 0b 30 d8 ec 55 3c bb 9d 09 03 |...#...0..U<....| +peer1.org2.example.com | 00000040 f8 7c bf 2e 13 28 53 |.|...(S| +peer1.org2.example.com | [2be5 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c850 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2be6 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c850 gate 1574140960791870000 evaluation succeeds +peer1.org2.example.com | [2be7 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2be8 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2be9 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2bea 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2beb 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bec 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2bed 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2bee 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2bef 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2bf0 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf1 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf2 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf3 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bf4 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf5 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bf6 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf7 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2939 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 76D8EECA70F1E49570B62D17B7BA9C2A1E17283BFFF8879FA4377972940ADE6B +peer0.org1.example.com | [293a 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3, chaincode: exp02} +peer0.org1.example.com | [293b 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] Exit +peer0.org1.example.com | [293c 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3] +peer0.org1.example.com | [293d 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45642 +peer0.org1.example.com | [293e 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45642 grpc.code=OK grpc.call_duration=10.749ms +peer0.org1.example.com | [293f 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2940 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2941 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2942 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2943 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [2944 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2945 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [2946 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 gate 1574140958426111700 evaluation starts +peer0.org1.example.com | [2947 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2948 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2949 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 principal matched by identity 0 +peer0.org1.example.com | [294a 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 59 67 40 3b dd e5 e6 6b 6e bf 61 f4 62 0f 32 |.Yg@;...kn.a.b.2| +peer0.org1.example.com | 00000010 e7 58 e3 3f b7 6c 75 4c e5 d4 a1 6a 97 30 96 01 |.X.?.luL...j.0..| +peer0.org1.example.com | [294b 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 d4 2c eb aa 33 82 3d d8 4c 9a b7 |0D. ..,..3.=.L..| +peer0.org1.example.com | 00000010 77 b9 41 a2 2d 7a d0 7f df c2 df 9b fe 95 54 34 |w.A.-z........T4| +peer0.org1.example.com | 00000020 36 91 38 90 02 20 12 49 cc e5 34 9c b4 5a 0c e6 |6.8.. .I..4..Z..| +peer0.org1.example.com | 00000030 7c 01 8a 23 41 e2 e9 3e 32 3e 4f d8 83 be 0d 05 ||..#A..>2>O.....| +peer0.org1.example.com | 00000040 3b 38 cd 96 14 39 |;8...9| +peer0.org1.example.com | [294c 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [294d 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 gate 1574140958426111700 evaluation succeeds +peer0.org1.example.com | [294e 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [294f 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2950 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2951 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2952 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org1.example.com | [2953 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org1.example.com | [2954 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [2955 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +peer0.org1.example.com | [2956 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 5}, Envelope: 4027 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [2957 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org1.example.com | [2958 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org1.example.com | [2959 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org1.example.com | [295a 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org1.example.com | [295b 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org1.example.com | [295c 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org1.example.com | [295d 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [295e 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00314acc0 env 0xc0028d09b0 txn 0 +peer0.org1.example.com | [295f 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0028d09b0 +peer0.org1.example.com | [2960 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +peer0.org1.example.com | [2961 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2962 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2963 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2964 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org1.example.com | [2965 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [272b 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c17900 gate 1574140960000355600 evaluation succeeds +peer1.org1.example.com | [272c 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [272d 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [272e 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [272f 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2730 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2731 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2732 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2733 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2734 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2735 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2736 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2737 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2738 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2739 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [273a 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [273b 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3a400 gate 1574140960031830400 evaluation starts +peer1.org1.example.com | [273c 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3a400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [273d 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3a400 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [273e 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3a400 principal matched by identity 0 +peer1.org1.example.com | [273f 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2740 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2741 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3a400 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2742 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3a400 gate 1574140960031830400 evaluation succeeds +peer1.org1.example.com | [2743 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2744 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2745 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2746 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2747 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2748 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2749 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [28f3 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [28f4 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org2.example.com | [28f5 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org2.example.com | [28f6 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28f7 11-19 05:22:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28f8 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [28f9 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28fa 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28fb 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28fc 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [28fd 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org2.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org2.example.com | [28fe 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org2.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org2.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org2.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org2.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org2.example.com | [28ff 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2900 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2901 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org2.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org2.example.com | [2902 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org2.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org2.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org2.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org2.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org2.example.com | [2903 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2904 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2905 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2906 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org2.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org2.example.com | [2907 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org2.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org2.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org2.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org2.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org2.example.com | [2908 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2909 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [290a 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [290b 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [290c 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 1 2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [290d 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [290e 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [290f 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2910 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [2911 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2912 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [2913 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002626ad0 gate 1574140958432844000 evaluation starts +peer0.org2.example.com | [2914 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002626ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2915 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002626ad0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2916 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002626ad0 principal matched by identity 0 +peer0.org2.example.com | [2917 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 31 22 3a ac 79 aa aa 5e 72 e5 fe 8e ee 41 d3 |.1":.y..^r....A.| +peer0.org2.example.com | 00000010 bc bf 9f 3b 2e 88 89 dd 4b 6c 6d ee d5 1a 21 c3 |...;....Klm...!.| +peer0.org2.example.com | [2918 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc a2 79 ae 6f af 95 1d 2e 49 b0 |0E.!...y.o....I.| +peer0.org2.example.com | 00000010 4b ac 22 ae e5 7d 96 b1 eb 23 7b bb 1c 5e 00 3d |K."..}...#{..^.=| +peer0.org2.example.com | 00000020 00 cb 52 cd f0 02 20 07 0d f9 3c 2a ef b7 96 33 |..R... ...<*...3| +peer0.org2.example.com | 00000030 12 6b 7d 27 37 42 1f ef 0a 7f ba 73 8b c8 ad 9e |.k}'7B.....s....| +peer0.org2.example.com | 00000040 8e 56 d2 0d b3 fc f5 |.V.....| +peer0.org2.example.com | [2919 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002626ad0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [291a 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002626ad0 gate 1574140958432844000 evaluation succeeds +peer0.org2.example.com | [291b 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [291c 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [291d 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [291e 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [291f 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org2.example.com | [2920 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org2.example.com | [2921 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [2922 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +peer0.org2.example.com | [2923 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org2.example.com | [2924 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org2.example.com | [2925 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org2.example.com | [2926 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org2.example.com | [2927 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org2.example.com | [2928 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [2929 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003008240 env 0xc002eb9f90 txn 0 +peer0.org2.example.com | [292a 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002eb9f90 +peer0.org2.example.com | [292b 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +peer0.org2.example.com | [292c 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [292d 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [292e 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [292f 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2930 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer0.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer0.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer0.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer0.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2931 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org2.example.com | [2932 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [2933 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [2934 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2935 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 26 b8 08 96 42 20 b0 93 90 db 47 bf fd 5f 64 |.&...B ....G.._d| +peer0.org2.example.com | 00000010 20 57 2e 37 e4 32 9f 5f 80 0a 2f a1 39 a6 64 68 | W.7.2._../.9.dh| +peer0.org2.example.com | [2936 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 8d 3f de 4b 30 dd 90 ff 5a ac b4 |0D. '.?.K0...Z..| +peer0.org2.example.com | 00000010 19 80 38 1a bd c5 6c 25 03 c3 a8 82 3a b5 ca de |..8...l%....:...| +peer0.org2.example.com | 00000020 5a 99 a0 c1 02 20 06 0a 45 ed 9e bd e8 83 cb ea |Z.... ..E.......| +peer0.org2.example.com | 00000030 86 34 5d 26 b1 55 76 12 05 30 94 60 26 6d b2 47 |.4]&.Uv..0.`&m.G| +peer0.org2.example.com | 00000040 52 6c 09 15 27 0e |Rl..'.| +peer1.org1.example.com | [274a 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [274b 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [274c 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [274d 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [274e 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [274f 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2750 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2751 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2752 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2753 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2754 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2755 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2756 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2757 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2758 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bc20 gate 1574140960217919000 evaluation starts +peer1.org1.example.com | [2759 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bc20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [275a 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bc20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [275b 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bc20 principal matched by identity 0 +peer1.org1.example.com | [275c 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [275d 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [275e 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bc20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [275f 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bc20 gate 1574140960217919000 evaluation succeeds +peer1.org1.example.com | [2760 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2761 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2762 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2763 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2764 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2765 11-19 05:22:40.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2766 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bf8 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bf9 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bfa 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bfb 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bfc 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bfd 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bfe 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bff 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c00 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c01 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c02 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2c03 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c04 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c05 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2c06 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c07 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c08 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c09 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c0a 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c0b 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c0c 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c0d 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c0e 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [2c0f 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 e7 c6 6e 91 eb 72 f8 78 fd a3 d9 b4 90 3b 2e |&..n..r.x.....;.| +peer1.org2.example.com | 00000010 32 15 e2 f9 48 3d f8 f6 b1 03 d5 cb ad f6 d8 06 |2...H=..........| +peer1.org2.example.com | [2c10 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 4e a3 69 12 83 9c 3b 7f e2 6d d5 |0D. >N.i...;..m.| +peer1.org2.example.com | 00000010 1e 16 87 0a 59 15 ad 5f 0b 6d c7 f4 8a b9 84 d5 |....Y.._.m......| +peer1.org2.example.com | 00000020 3f c8 cd a8 02 20 49 6d 62 ed 0c 74 c3 ff 2b 66 |?.... Imb..t..+f| +peer1.org2.example.com | 00000030 c6 94 64 84 00 18 4d d6 82 c6 7b e1 71 ee 90 72 |..d...M...{.q..r| +peer1.org2.example.com | 00000040 6b 71 46 17 41 4a |kqF.AJ| +peer1.org2.example.com | [2c11 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c12 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2c13 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2c14 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2c15 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2c16 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c17 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c18 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c19 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c1a 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c1b 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2937 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 5}, Envelope: 4028 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [2938 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org2.example.com | [2939 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [293a 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002a0c000, header channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +peer0.org2.example.com | [293b 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [293c 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [293d 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [293e 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [293f 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +peer0.org2.example.com | [2940 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2941 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002570800 +peer0.org2.example.com | [2942 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a76dc8cb-703b-4df1-a1bf-7acfa7c2b5d4] +peer0.org2.example.com | [2943 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2944 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a76dc8cb-703b-4df1-a1bf-7acfa7c2b5d4] +peer0.org2.example.com | [2945 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [2946 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [cc188a53-9038-4fd3-bb6b-8a8b0f31790a] +peer0.org2.example.com | [2948 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cc188a53-9038-4fd3-bb6b-8a8b0f31790a] +peer0.org2.example.com | [2947 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2949 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [294a 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [294b 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [294c 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 5}, Envelope: 4028 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [294d 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [294e 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [294f 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 gate 1574140958464204600 evaluation starts +peer0.org2.example.com | [2950 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2951 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 5}, Envelope: 4028 bytes, Signature: 0 bytes +peer0.org2.example.com | [2952 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2953 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2954 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 principal matched by identity 0 +peer0.org2.example.com | [2955 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 be ae 07 1c 25 52 16 a5 6e 0d 58 88 b9 2f 55 | ....%R..n.X../U| +peer0.org2.example.com | 00000010 1f 93 c0 ac 4e b2 c1 e8 61 44 8c d9 66 16 28 87 |....N...aD..f.(.| +peer0.org2.example.com | [2956 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 96 6b 27 fb ec 50 7b c1 37 96 |0E.!...k'..P{.7.| +peer0.org2.example.com | 00000010 a2 1c 2b 6f 05 74 f5 be a6 59 38 e1 56 2a 99 d7 |..+o.t...Y8.V*..| +peer0.org2.example.com | 00000020 c2 4d 07 4b 70 02 20 2a 40 08 55 be 83 07 fe e1 |.M.Kp. *@.U.....| +peer0.org2.example.com | 00000030 4e a8 b3 2e 63 64 88 da 52 85 bb 6f b2 cb 1e 2f |N...cd..R..o.../| +peer0.org2.example.com | 00000040 99 8b 06 57 f7 ed a4 |...W...| +peer0.org2.example.com | [2957 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2958 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [2959 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 skipping identity 0 because it has already been used +peer0.org2.example.com | [295a 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 principal evaluation fails +peer0.org2.example.com | [295b 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c1740 gate 1574140958464204600 evaluation succeeds +peer0.org2.example.com | [295c 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f4e8a027-81ff-4a61-bc6e-f788aec73e05] +peer0.org2.example.com | [295d 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f4e8a027-81ff-4a61-bc6e-f788aec73e05] +peer0.org2.example.com | [295e 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | [295f 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 appears to be valid +peer0.org2.example.com | [2960 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002570800 +peer0.org2.example.com | [2961 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003008240 env 0xc002eb9f90 txn 0 +peer0.org2.example.com | [2962 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [2963 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 45ms +peer0.org1.example.com | [2966 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 26 b8 08 96 42 20 b0 93 90 db 47 bf fd 5f 64 |.&...B ....G.._d| +peer0.org1.example.com | 00000010 20 57 2e 37 e4 32 9f 5f 80 0a 2f a1 39 a6 64 68 | W.7.2._../.9.dh| +peer0.org1.example.com | [2967 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 8d 3f de 4b 30 dd 90 ff 5a ac b4 |0D. '.?.K0...Z..| +peer0.org1.example.com | 00000010 19 80 38 1a bd c5 6c 25 03 c3 a8 82 3a b5 ca de |..8...l%....:...| +peer0.org1.example.com | 00000020 5a 99 a0 c1 02 20 06 0a 45 ed 9e bd e8 83 cb ea |Z.... ..E.......| +peer0.org1.example.com | 00000030 86 34 5d 26 b1 55 76 12 05 30 94 60 26 6d b2 47 |.4]&.Uv..0.`&m.G| +peer0.org1.example.com | 00000040 52 6c 09 15 27 0e |Rl..'.| +peer0.org1.example.com | [2968 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2969 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00419d000, header channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +peer0.org1.example.com | [296a 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [296b 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [296c 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [296d 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [296e 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +peer0.org1.example.com | [296f 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [2970 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00312ac00 +peer0.org1.example.com | [2971 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [90688045-c4c3-4128-b389-0632dac20ba8] +peer0.org1.example.com | [2972 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2973 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [90688045-c4c3-4128-b389-0632dac20ba8] +peer0.org1.example.com | [2974 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [2975 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [03020f87-3b43-4e00-ad72-f2b0065b4795] +peer0.org1.example.com | [2976 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [03020f87-3b43-4e00-ad72-f2b0065b4795] +peer0.org1.example.com | [2977 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 gate 1574140958431827900 evaluation starts +peer0.org1.example.com | [2978 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2979 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [297a 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [297c 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [297d 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [297b 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 principal matched by identity 0 +peer0.org1.example.com | [297e 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2980 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 5}, Envelope: 4027 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [297f 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 be ae 07 1c 25 52 16 a5 6e 0d 58 88 b9 2f 55 | ....%R..n.X../U| +peer0.org1.example.com | 00000010 1f 93 c0 ac 4e b2 c1 e8 61 44 8c d9 66 16 28 87 |....N...aD..f.(.| +peer0.org1.example.com | [2981 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 96 6b 27 fb ec 50 7b c1 37 96 |0E.!...k'..P{.7.| +peer0.org1.example.com | 00000010 a2 1c 2b 6f 05 74 f5 be a6 59 38 e1 56 2a 99 d7 |..+o.t...Y8.V*..| +peer0.org1.example.com | 00000020 c2 4d 07 4b 70 02 20 2a 40 08 55 be 83 07 fe e1 |.M.Kp. *@.U.....| +peer0.org1.example.com | 00000030 4e a8 b3 2e 63 64 88 da 52 85 bb 6f b2 cb 1e 2f |N...cd..R..o.../| +peer0.org1.example.com | 00000040 99 8b 06 57 f7 ed a4 |...W...| +peer0.org1.example.com | [2982 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2983 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2984 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 skipping identity 0 because it has already been used +peer0.org1.example.com | [2985 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 principal evaluation fails +peer0.org1.example.com | [2986 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 gate 1574140958431827900 evaluation succeeds +peer0.org1.example.com | [2987 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [add5dd07-3568-4684-b3b9-58dd76612b25] +peer0.org1.example.com | [2988 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [298b 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 5}, Envelope: 4027 bytes, Signature: 0 bytes +peer0.org1.example.com | [298a 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [298c 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2989 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [add5dd07-3568-4684-b3b9-58dd76612b25] +peer0.org1.example.com | [298d 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [298e 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 appears to be valid +peer0.org1.example.com | [298f 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00312ac00 +peer1.org1.example.com | [2767 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2768 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2769 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [276a 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [276b 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [276c 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [276d 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [276e 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [276f 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2770 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2771 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2772 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5b1a0 gate 1574140960395638300 evaluation starts +peer1.org1.example.com | [2773 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5b1a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2774 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5b1a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2775 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5b1a0 principal matched by identity 0 +peer1.org1.example.com | [2776 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 b5 e0 48 a1 f7 c1 a8 64 d9 12 db 88 de 32 4e |...H....d.....2N| +peer1.org1.example.com | 00000010 b8 87 fd 05 7e af ef b5 c4 0a 4a 6f d7 65 56 05 |....~.....Jo.eV.| +peer1.org1.example.com | [2777 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 f6 f1 ca 45 13 05 b5 2a 04 b0 |0E.!.....E...*..| +peer1.org1.example.com | 00000010 73 98 5d 7b 85 99 52 cd fe 34 3d 7a 39 68 71 bf |s.]{..R..4=z9hq.| +peer1.org1.example.com | 00000020 6d f9 cc 82 51 02 20 24 4c 87 6a f6 d3 b8 45 25 |m...Q. $L.j...E%| +peer1.org1.example.com | 00000030 94 3e ed 4e 6c 1a a2 09 b6 5e 61 01 d7 53 45 5e |.>.Nl....^a..SE^| +peer1.org1.example.com | 00000040 a9 64 78 c5 e3 a5 4d |.dx...M| +peer1.org1.example.com | [2778 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5b1a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2779 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5b1a0 gate 1574140960395638300 evaluation succeeds +peer1.org1.example.com | [277a 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [277b 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [277c 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [277d 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [277e 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [277f 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2780 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2781 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2964 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [2965 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [2966 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org2.example.com | [2967 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [2968 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [2969 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [296a 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org2.example.com | [296b 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [296c 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [296d 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [296e 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [296f 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [2970 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [2971 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2972 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [2973 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] marked as valid by state validator +peer0.org2.example.com | [2974 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0030096c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003009700)} +peer0.org2.example.com | [2975 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [2976 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [2977 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [2978 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org2.example.com | [2979 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org2.example.com | [297a 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org2.example.com | [297b 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org2.example.com | [297c 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x44, 0xdf, 0xb3, 0x3, 0x50, 0x9, 0x8b, 0x23, 0x1f, 0xc8, 0xd4, 0xb0, 0xc3, 0x60, 0xd3, 0x21, 0x24, 0x37, 0xaf, 0x67, 0x75, 0x46, 0xbe, 0x57, 0x44, 0x26, 0x16, 0x7c, 0x26, 0x99, 0x8e, 0xa7} txOffsets= +peer0.org2.example.com | txId=2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 locPointer=offset=70, bytesLength=2977 +peer0.org2.example.com | ] +peer0.org2.example.com | [297d 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85487, bytesLength=2977] for tx ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to txid-index +peer0.org2.example.com | [297e 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85487, bytesLength=2977] for tx number:[0] ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to blockNumTranNum index +peer0.org2.example.com | [297f 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89437], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org2.example.com | [2980 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org2.example.com | [2981 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org2.example.com | [2982 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org2.example.com | [2983 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [2984 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [2985 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [2986 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [2987 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [2988 11-19 05:22:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [2989 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [298a 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org2.example.com | [298b 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [298c 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org2.example.com | [298e 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org2.example.com | [298d 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org2.example.com | [298f 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org2.example.com | [2990 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org2.example.com | [2991 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 30ms (state_validation=0ms block_and_pvtdata_commit=20ms state_commit=4ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org2.example.com | [2992 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2993 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C12140898B48782FE999EEC15...08061A0C0A0565787030321203312E30 +peer0.org2.example.com | [2994 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3EB68891CEFC70EA7EB97BC2520C0517C22B871950E790A47C70328DAE8CD144 +peer1.org2.example.com | [2c1c 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2c1d 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c1e 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2c1f 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c20 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c21 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c22 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c23 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c24 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c25 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c26 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c27 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c28 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c29 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c2a 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c2b 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c2c 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c2d 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c2e 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c2f 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c30 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c31 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c32 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c33 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [2c34 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c35 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c36 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c37 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c38 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2c39 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2990 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00314acc0 env 0xc0028d09b0 txn 0 +peer0.org1.example.com | [2991 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2992 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 19ms +peer0.org1.example.com | [2993 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [2994 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [2995 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org1.example.com | [2996 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [2997 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [2998 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [2999 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org1.example.com | [299a 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [299b 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [299c 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [299d 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [299e 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [299f 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [29a0 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [29a1 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [29a2 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] marked as valid by state validator +peer0.org1.example.com | [29a3 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003349e40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003349e80)} +peer0.org1.example.com | [29a4 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [29a5 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [29a6 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [29a7 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org1.example.com | [29a8 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org1.example.com | [29a9 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org1.example.com | [29aa 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org1.example.com | [29ab 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x44, 0xdf, 0xb3, 0x3, 0x50, 0x9, 0x8b, 0x23, 0x1f, 0xc8, 0xd4, 0xb0, 0xc3, 0x60, 0xd3, 0x21, 0x24, 0x37, 0xaf, 0x67, 0x75, 0x46, 0xbe, 0x57, 0x44, 0x26, 0x16, 0x7c, 0x26, 0x99, 0x8e, 0xa7} txOffsets= +peer0.org1.example.com | txId=2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 locPointer=offset=70, bytesLength=2977 +peer0.org1.example.com | ] +peer0.org1.example.com | [29ac 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85486, bytesLength=2977] for tx ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to txid-index +peer0.org1.example.com | [29ad 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85486, bytesLength=2977] for tx number:[0] ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to blockNumTranNum index +peer0.org1.example.com | [29ae 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89435], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org1.example.com | [29af 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org1.example.com | [29b0 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org1.example.com | [29b1 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org1.example.com | [29b2 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [29b3 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [29b4 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [29b5 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [29b6 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [29b7 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [29b8 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [29b9 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org1.example.com | [29ba 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [29bb 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org1.example.com | [29bc 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org1.example.com | [29bd 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org1.example.com | [29be 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org1.example.com | [29bf 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org1.example.com | [29c0 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 43ms (state_validation=9ms block_and_pvtdata_commit=18ms state_commit=14ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org2.example.com | [2995 11-19 05:22:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org2.example.com | [2996 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2997 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2998 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2999 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299a 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299b 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299c 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299d 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299e 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [299f 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a0 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [29a1 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a2 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [29a3 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [29a4 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29a5 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [29a6 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29a7 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29a8 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29a9 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29aa 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [29ab 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587ed0 gate 1574140958874865400 evaluation starts +peer0.org2.example.com | [29ac 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29ad 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587ed0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [29ae 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [29af 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587ed0 principal evaluation fails +peer0.org2.example.com | [29b0 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587ed0 gate 1574140958874865400 evaluation fails +peer0.org2.example.com | [29b1 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29b2 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29b3 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29b4 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e04f0 gate 1574140958875243800 evaluation starts +peer0.org2.example.com | [29b5 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e04f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29b6 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e04f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [29b7 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e04f0 principal matched by identity 0 +peer0.org2.example.com | [29b8 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +peer0.org2.example.com | 00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +peer0.org2.example.com | [29b9 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +peer0.org2.example.com | 00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +peer0.org2.example.com | 00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +peer0.org2.example.com | 00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +peer0.org2.example.com | 00000040 5a 99 ec 14 07 5d |Z....]| +peer0.org2.example.com | [29ba 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e04f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29bb 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e04f0 gate 1574140958875243800 evaluation succeeds +peer0.org2.example.com | [29bc 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29bd 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29be 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29bf 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29c0 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [29c1 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [29c2 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [29c3 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [29c4 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [29c5 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29c6 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29c7 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29c8 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [29c9 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29ca 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29cb 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29cc 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [29cd 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > alive: alive: +peer0.org2.example.com | [29ce 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [29cf 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29d0 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [29d1 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29d2 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29d3 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29d4 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29d5 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [29d6 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29d7 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [29d8 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29d9 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29da 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29db 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29dc 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [29dd 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257d560 gate 1574140959322694200 evaluation starts +peer0.org2.example.com | [29de 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257d560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29df 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257d560 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [29e0 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257d560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [29e1 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257d560 principal evaluation fails +peer0.org2.example.com | [29e2 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257d560 gate 1574140959322694200 evaluation fails +peer0.org2.example.com | [29e3 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29e4 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29e5 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29e6 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257dae0 gate 1574140959322978800 evaluation starts +peer0.org2.example.com | [29e7 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257dae0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29e8 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257dae0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [29e9 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257dae0 principal matched by identity 0 +peer0.org2.example.com | [29ea 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [29eb 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [29ec 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257dae0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29ed 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257dae0 gate 1574140959322978800 evaluation succeeds +peer0.org2.example.com | [29ee 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29ef 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29f0 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29f1 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29f2 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29f3 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29f4 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29f5 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29f6 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29f7 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [29c1 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [29c2 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08061A0C0A0565787030321203312E30 +peer0.org1.example.com | [29c3 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 099824033A40DA161588A65BC87044ADB00561512F06066C4CCCB0B08CA54BBC +peer0.org1.example.com | [29c4 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org1.example.com | [29c5 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45646 +peer0.org1.example.com | [29c6 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0002842d0 +peer0.org1.example.com | [29c7 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [29c8 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [29c9 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [29ca 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [29cb 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [29cc 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b f9 18 65 3f 5b 13 88 a6 1a c4 99 7f b9 ac 6f |...e?[.........o| +peer0.org1.example.com | 00000010 27 38 b6 ca b0 26 4b 63 ce 8b 13 1b 52 94 26 f6 |'8...&Kc....R.&.| +peer0.org1.example.com | [29cd 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 8e bf 27 fa fa 59 0d 4c 5f 49 |0E.!....'..Y.L_I| +peer0.org1.example.com | 00000010 d6 09 6a c6 06 3c db 49 ff 3d ff bf 8f 5c 17 e3 |..j..<.I.=...\..| +peer0.org1.example.com | 00000020 01 50 1c 05 c7 02 20 3f cb 6a e5 e1 8b d4 43 58 |.P.... ?.j....CX| +peer0.org1.example.com | 00000030 ce f6 f2 c0 20 63 a5 21 83 58 65 4d a6 d4 2d d6 |.... c.!.XeM..-.| +peer0.org1.example.com | 00000040 a9 c7 ad 0a 5a b6 0e |....Z..| +peer0.org1.example.com | [29ce 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [29cf 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002bbea0, header 0xc0002846e0 +peer0.org1.example.com | [29d0 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [29d1 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] processing txid: 5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6 +peer0.org1.example.com | [29d2 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6] +peer0.org1.example.com | [29d3 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [29d4 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [29d5 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [29d6 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [29d7 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [29d8 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 gate 1574140958755953100 evaluation starts +peer0.org1.example.com | [29d9 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29da 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [29db 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [29dc 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 principal evaluation fails +peer0.org1.example.com | [29dd 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 gate 1574140958755953100 evaluation fails +peer0.org1.example.com | [29de 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [29df 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [29e0 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [29e1 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 gate 1574140958758342200 evaluation starts +peer0.org1.example.com | [29e2 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29e3 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [29e4 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 principal matched by identity 0 +peer0.org1.example.com | [29e5 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b f9 18 65 3f 5b 13 88 a6 1a c4 99 7f b9 ac 6f |...e?[.........o| +peer0.org1.example.com | 00000010 27 38 b6 ca b0 26 4b 63 ce 8b 13 1b 52 94 26 f6 |'8...&Kc....R.&.| +peer0.org1.example.com | [29e6 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 8e bf 27 fa fa 59 0d 4c 5f 49 |0E.!....'..Y.L_I| +peer0.org1.example.com | 00000010 d6 09 6a c6 06 3c db 49 ff 3d ff bf 8f 5c 17 e3 |..j..<.I.=...\..| +peer0.org1.example.com | 00000020 01 50 1c 05 c7 02 20 3f cb 6a e5 e1 8b d4 43 58 |.P.... ?.j....CX| +peer0.org1.example.com | 00000030 ce f6 f2 c0 20 63 a5 21 83 58 65 4d a6 d4 2d d6 |.... c.!.XeM..-.| +peer0.org1.example.com | 00000040 a9 c7 ad 0a 5a b6 0e |....Z..| +peer0.org1.example.com | [29e7 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29e8 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 gate 1574140958758342200 evaluation succeeds +peer0.org1.example.com | [29e9 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [29ea 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [29eb 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [29ec 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [29ed 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [29ee 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6] +peer0.org1.example.com | [29ef 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] Entry chaincode: name:"exp02" +peer0.org1.example.com | [29f0 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [29f1 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [29f2 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5d1ddfed] Entry chaincode: name:"exp02" +peer0.org1.example.com | [29f3 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [2782 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2783 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2784 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2785 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2786 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2787 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2788 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2789 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [278a 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [278b 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [278c 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [278d 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [278e 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [278f 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2790 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2791 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2792 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2793 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2794 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2795 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2796 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2797 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2798 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2799 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [279a 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [279b 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [279c 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [279d 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [279e 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15102B +peer1.org1.example.com | [279f 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8CC14DD7E6DF6BB7751CFB12F1824F0312EA041EED5A049307D56A3C639BC6F7 +peer1.org1.example.com | [27a0 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [27a1 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [27a2 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [27a3 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [27a4 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27a5 11-19 05:22:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27a6 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27a7 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [27a8 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [27a9 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27aa 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [29f8 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [29f9 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d07f0 gate 1574140959323719000 evaluation starts +peer0.org2.example.com | [29fa 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d07f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29fb 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d07f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [29fc 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d07f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [29fd 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d07f0 principal evaluation fails +peer0.org2.example.com | [29fe 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d07f0 gate 1574140959323719000 evaluation fails +peer0.org2.example.com | [29ff 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a00 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a01 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a02 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0da0 gate 1574140959324031900 evaluation starts +peer0.org2.example.com | [2a03 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0da0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a04 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0da0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2a05 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0da0 principal matched by identity 0 +peer0.org2.example.com | [2a06 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [2a07 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [2a08 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0da0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a09 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0da0 gate 1574140959324031900 evaluation succeeds +peer0.org2.example.com | [2a0a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a0b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a0c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a0d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a0e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a0f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a10 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a11 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a12 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a13 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a14 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a15 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a16 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a17 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a18 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c3a 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c3b 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c3c 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c3d 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c3e 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c3f 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2c40 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d360 gate 1574140962851694200 evaluation starts +peer1.org2.example.com | [2c41 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d360 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c42 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d360 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2c43 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2c44 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d360 principal evaluation fails +peer1.org2.example.com | [2c45 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d360 gate 1574140962851694200 evaluation fails +peer1.org2.example.com | [2c46 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c47 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c48 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2c49 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d8f0 gate 1574140962852339600 evaluation starts +peer1.org2.example.com | [2c4a 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d8f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c4b 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d8f0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2c4c 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d8f0 principal matched by identity 0 +peer1.org2.example.com | [2c4d 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer1.org2.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer1.org2.example.com | [2c4e 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer1.org2.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer1.org2.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer1.org2.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer1.org2.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer1.org2.example.com | [2c4f 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d8f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c50 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d8f0 gate 1574140962852339600 evaluation succeeds +peer1.org2.example.com | [2c51 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c52 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c53 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2c54 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2c55 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c56 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2c57 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2c58 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2c59 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2c5a 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c5b 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c5c 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c5d 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [2c5e 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c5f 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c60 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27ab 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [27ac 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ad 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [27ae 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27af 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [27b0 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27b1 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27b2 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27b3 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27b4 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27b5 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [27b6 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27b7 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [27b8 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27b9 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27ba 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [27bb 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [27bc 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [27bd 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33820 gate 1574140960847953200 evaluation starts +peer1.org1.example.com | [27be 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27bf 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27c0 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33820 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27c1 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33820 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [27c2 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33820 principal matched by identity 0 +peer1.org1.example.com | [27c3 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 e7 c6 6e 91 eb 72 f8 78 fd a3 d9 b4 90 3b 2e |&..n..r.x.....;.| +peer1.org1.example.com | 00000010 32 15 e2 f9 48 3d f8 f6 b1 03 d5 cb ad f6 d8 06 |2...H=..........| +peer0.org2.example.com | [2a19 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [2a1a 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a1b 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a1c 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a1d 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a1e 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a1f 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a20 11-19 05:22:39.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e2a0 gate 1574140959345800600 evaluation starts +peer0.org2.example.com | [2a21 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a22 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e2a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2a23 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a24 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e2a0 principal evaluation fails +peer0.org2.example.com | [2a25 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e2a0 gate 1574140959345800600 evaluation fails +peer0.org2.example.com | [2a26 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a27 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a28 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a29 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e810 gate 1574140959354478400 evaluation starts +peer0.org2.example.com | [2a2a 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a2b 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e810 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2a2c 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e810 principal matched by identity 0 +peer0.org2.example.com | [2a2d 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [2a2e 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [2a2f 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a30 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043e810 gate 1574140959354478400 evaluation succeeds +peer0.org2.example.com | [2a31 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a32 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a33 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a34 11-19 05:22:39.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a35 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a36 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a37 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a38 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29f4 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [29f5 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] handling GET_STATE from chaincode +peer0.org1.example.com | [29f6 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [29f7 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [29f8 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [29f9 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [29fa 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] notifying Txid:5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6, channelID:businesschannel +peer0.org1.example.com | [29fb 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [29fc 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5d1ddfed] Exit chaincode: name:"exp02" (3ms) +peer0.org1.example.com | [29fd 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [29fe 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6] +peer0.org1.example.com | [29ff 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] Exit +peer0.org1.example.com | [2a00 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2a01 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2a02 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6, chaincode: exp02} +peer0.org1.example.com | [2a03 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A07CAFA1722325F15D9E4EAC420F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2a04 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AE4DA5B40AFCD0BBAB526A06DC37E8C12728EDC5FF759A5B7C5769758E51C4E6 +peer0.org1.example.com | [2a05 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6, chaincode: exp02} +peer0.org1.example.com | [2a06 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] Exit +peer0.org1.example.com | [2a07 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6] +peer0.org1.example.com | [2a08 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45646 +peer0.org1.example.com | [2a09 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45646 grpc.code=OK grpc.call_duration=18.0852ms +peer0.org1.example.com | [2a0a 11-19 05:22:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2a0b 11-19 05:22:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2a0c 11-19 05:22:38.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2a0d 11-19 05:22:38.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a0e 11-19 05:22:38.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2a0f 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a10 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2a11 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a12 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a13 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a14 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a15 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a16 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a17 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a18 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a19 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a1a 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a1b 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27c4 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 4e a3 69 12 83 9c 3b 7f e2 6d d5 |0D. >N.i...;..m.| +peer1.org1.example.com | 00000010 1e 16 87 0a 59 15 ad 5f 0b 6d c7 f4 8a b9 84 d5 |....Y.._.m......| +peer1.org1.example.com | 00000020 3f c8 cd a8 02 20 49 6d 62 ed 0c 74 c3 ff 2b 66 |?.... Imb..t..+f| +peer1.org1.example.com | 00000030 c6 94 64 84 00 18 4d d6 82 c6 7b e1 71 ee 90 72 |..d...M...{.q..r| +peer1.org1.example.com | 00000040 6b 71 46 17 41 4a |kqF.AJ| +peer1.org1.example.com | [27c5 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33820 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [27c6 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33820 gate 1574140960847953200 evaluation succeeds +peer1.org1.example.com | [27c7 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27c8 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27c9 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [27ca 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [27cb 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27cc 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [27cd 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [27ce 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [27cf 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [27d0 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d1 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d2 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d3 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d4 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d5 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d6 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d7 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d8 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d9 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27da 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27db 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27dc 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27dd 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27de 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27df 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27e0 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [27e1 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27e2 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27e3 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [27e4 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27e5 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27e6 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27e7 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27e8 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [27e9 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a39 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a3a 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a3b 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a3c 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a3d 11-19 05:22:39.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a3e 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a3f 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043faf0 gate 1574140959371134900 evaluation starts +peer0.org2.example.com | [2a40 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043faf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a41 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043faf0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2a42 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043faf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a43 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043faf0 principal evaluation fails +peer0.org2.example.com | [2a44 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043faf0 gate 1574140959371134900 evaluation fails +peer0.org2.example.com | [2a45 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a46 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a47 11-19 05:22:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a48 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025c060 gate 1574140959381283900 evaluation starts +peer0.org2.example.com | [2a49 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025c060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a4a 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025c060 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2a4b 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025c060 principal matched by identity 0 +peer0.org2.example.com | [2a4c 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [2a4d 11-19 05:22:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [2a4e 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025c060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a4f 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025c060 gate 1574140959381283900 evaluation succeeds +peer0.org2.example.com | [2a50 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a51 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a52 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a53 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a54 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a55 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a56 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a57 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [2a58 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a59 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a5a 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a5b 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c61 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c62 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:N\243i\022\203\234;\177\342m\325\036\026\207\nY\025\255_\013m\307\364\212\271\204\325?\310\315\250\002 Imb\355\014t\303\377+f\306\224d\204\000\030M\326\202\306{\341q\356\220rkqF\027AJ" > alive: alive:\355Nl\032\242\t\266^a\001\327SE^\251dx\305\343\245M" > +peer1.org2.example.com | [2c63 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c64 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c65 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c66 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c67 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c68 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c69 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c6a 11-19 05:22:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2c6b 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c6c 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2c6d 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c6e 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2c70 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c72 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c71 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c73 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c74 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c6f 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c75 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c76 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c77 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c78 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c79 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c7a 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a1c 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a1d 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a1e 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a1f 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a20 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a21 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a22 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a23 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a24 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2a25 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151025 +peer0.org1.example.com | [2a26 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 707ADC7B7B5B84918CBD98C2FF6BCF13B1313DC2553CA6B02C3241C17E25308F +peer0.org1.example.com | [2a27 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2a28 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2a29 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2a2a 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" secret_envelope:\252\323\023,\336\017D\"\313\265K91\327(D\004\237\010\330D\213\r\\\002 \010\362\010\217x\004\200\277Ew\035fyw\262\373\266\357\201D\275\203S\021\376\366\257y\202V\254R" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a2b 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a2c 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a2d 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a2e 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a2f 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a30 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ea 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [27eb 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ec 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [27ed 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ee 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [27ef 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [27f0 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer1.org1.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer1.org1.example.com | [27f1 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer1.org1.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer1.org1.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer1.org1.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer1.org1.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer1.org1.example.com | [27f2 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [27f3 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 02 e4 ea 29 c7 5b b9 ab 2c 55 |0E.!.....).[..,U| +peer1.org1.example.com | 00000010 f5 b5 1b ca 01 a3 b0 1e 37 ab b0 26 fd 83 40 6d |........7..&..@m| +peer1.org1.example.com | 00000020 ad 51 f3 df 4f 02 20 48 1c ce 40 10 45 22 b5 a9 |.Q..O. H..@.E"..| +peer1.org1.example.com | 00000030 c2 df 94 dc a5 b6 9e ed 71 47 54 76 b7 57 71 f3 |........qGTv.Wq.| +peer1.org1.example.com | 00000040 e7 fa f1 14 df 30 8e |.....0.| +peer1.org1.example.com | [27f4 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [27f5 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [27f6 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [27f7 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [27f8 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [27f9 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27fa 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27fb 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [27fc 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27fd 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27fe 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [27ff 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [2a5c 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2a5d 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer0.org2.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer0.org2.example.com | [2a5e 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer0.org2.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer0.org2.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer0.org2.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer0.org2.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer0.org2.example.com | [2a5f 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2a60 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 be a2 a8 8f 07 1a 1e d6 10 1f f6 |0D. S...........| +peer0.org2.example.com | 00000010 e9 86 f7 da 99 b2 36 9e 6e 83 02 20 7e e2 67 97 |......6.n.. ~.g.| +peer0.org2.example.com | 00000020 7d 40 12 1e 02 20 77 17 0a cc da 73 14 bc 97 90 |}@... w....s....| +peer0.org2.example.com | 00000030 72 9c b2 71 2e d7 ee 83 b7 14 2f e1 76 75 ab f8 |r..q....../.vu..| +peer0.org2.example.com | 00000040 48 44 79 2f 4e dd |HDy/N.| +peer0.org2.example.com | [2a61 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2a62 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2a63 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2a64 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2a65 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2a66 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a67 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a68 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a69 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [2a6a 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a6b 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a6c 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2a6d 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a6e 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a6f 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [2a70 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a71 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a72 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a73 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a74 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a75 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a76 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c7b 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c7c 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c7d 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c7e 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c7f 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c80 11-19 05:22:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c81 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15102B +peer1.org2.example.com | [2c82 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3E4BA073A0E619176214A0F9646F25B695086C0D6362711871A3663E1C62C8D1 +peer1.org2.example.com | [2c83 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c84 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2c85 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2c86 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c87 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c88 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c89 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c8a 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c8b 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c8c 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c8d 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c8e 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c8f 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c90 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c91 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c92 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a31 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" secret_envelope:\252\323\023,\336\017D\"\313\265K91\327(D\004\237\010\330D\213\r\\\002 \010\362\010\217x\004\200\277Ew\035fyw\262\373\266\357\201D\275\203S\021\376\366\257y\202V\254R" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a32 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a33 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a34 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a35 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a36 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a37 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a38 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a39 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2a3a 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +peer0.org1.example.com | 00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +peer0.org1.example.com | [2a3b 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +peer0.org1.example.com | 00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +peer0.org1.example.com | 00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +peer0.org1.example.com | 00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +peer0.org1.example.com | 00000040 5a 99 ec 14 07 5d |Z....]| +peer0.org1.example.com | [2a3c 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a3d 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a3e 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a3f 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [2a40 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a41 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a42 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a43 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a44 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a45 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2a46 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2a47 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 gate 1574140958878302000 evaluation starts +peer0.org1.example.com | [2a48 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a49 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2a4a 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 principal matched by identity 0 +peer0.org1.example.com | [2a4b 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +peer0.org1.example.com | 00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +peer0.org1.example.com | [2a4c 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +peer0.org1.example.com | 00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +peer0.org1.example.com | 00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +peer0.org1.example.com | 00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +peer0.org1.example.com | 00000040 a6 8d b8 3d 10 d6 5d |...=..]| +peer0.org1.example.com | [2a4d 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a4e 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 gate 1574140958878302000 evaluation succeeds +peer0.org1.example.com | [2a4f 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a50 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a51 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a52 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a53 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a54 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a55 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [2a56 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org1.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org1.example.com | [2a57 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org1.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org1.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org1.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org1.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org1.example.com | [2a58 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a59 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a5a 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a5b 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a5c 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a5d 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a5e 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a5f 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2a60 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +peer0.org1.example.com | 00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +peer0.org1.example.com | [2a61 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +peer0.org1.example.com | 00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +peer0.org1.example.com | 00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +peer0.org1.example.com | 00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +peer0.org1.example.com | 00000040 5a 99 ec 14 07 5d |Z....]| +peer0.org1.example.com | [2a62 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [2a63 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 1b 5a ff 1a 77 f2 3e aa d3 13 |0E.!...Z..w.>...| +peer0.org1.example.com | 00000010 2c de 0f 44 22 cb b5 4b 39 31 d7 28 44 04 9f 08 |,..D"..K91.(D...| +peer0.org1.example.com | 00000020 d8 44 8b 0d 5c 02 20 08 f2 08 8f 78 04 80 bf 45 |.D..\. ....x...E| +peer0.org1.example.com | 00000030 77 1d 66 79 77 b2 fb b6 ef 81 44 bd 83 53 11 fe |w.fyw.....D..S..| +peer0.org1.example.com | 00000040 f6 af 79 82 56 ac 52 |..y.V.R| +peer0.org1.example.com | [2a64 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2a65 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2a66 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a67 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a68 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a69 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a6a 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a6b 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a77 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a78 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a79 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a7a 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a7b 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a7c 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a7d 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f8c40 gate 1574140959638456800 evaluation starts +peer0.org2.example.com | [2a7e 11-19 05:22:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f8c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a7f 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f8c40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2a80 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f8c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a81 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f8c40 principal evaluation fails +peer0.org2.example.com | [2a82 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f8c40 gate 1574140959638456800 evaluation fails +peer0.org2.example.com | [2a83 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a84 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a85 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a86 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f91b0 gate 1574140959643153600 evaluation starts +peer0.org2.example.com | [2a87 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f91b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a88 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f91b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2a89 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f91b0 principal matched by identity 0 +peer0.org2.example.com | [2a8a 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [2a8b 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [2a8c 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f91b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a8d 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f91b0 gate 1574140959643153600 evaluation succeeds +peer0.org2.example.com | [2a8e 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a8f 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a90 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a91 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a92 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a93 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a94 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a95 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a96 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a97 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a98 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a99 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9da0 gate 1574140959654899700 evaluation starts +peer0.org2.example.com | [2a9a 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9da0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a9b 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9da0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2a9c 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a9d 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9da0 principal evaluation fails +peer0.org2.example.com | [2a9e 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9da0 gate 1574140959654899700 evaluation fails +peer0.org2.example.com | [2a9f 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2aa0 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2aa1 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2aa2 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f2320 gate 1574140959658695200 evaluation starts +peer0.org2.example.com | [2aa3 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f2320 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2aa4 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f2320 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2aa5 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f2320 principal matched by identity 0 +peer0.org2.example.com | [2aa6 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [2aa7 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [2aa8 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f2320 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2aa9 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f2320 gate 1574140959658695200 evaluation succeeds +peer0.org2.example.com | [2aaa 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2aab 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2aac 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2aad 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2aae 11-19 05:22:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aaf 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ab0 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ab1 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [2ab2 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ab3 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ab4 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ab5 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab6 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ab7 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab8 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ab9 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6c 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [2a6d 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org1.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org1.example.com | [2a6e 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org1.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org1.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org1.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org1.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org1.example.com | [2a6f 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a70 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a71 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2a72 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +peer0.org1.example.com | 00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +peer0.org1.example.com | [2a73 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +peer0.org1.example.com | 00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +peer0.org1.example.com | 00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +peer0.org1.example.com | 00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +peer0.org1.example.com | 00000040 5a 99 ec 14 07 5d |Z....]| +peer0.org1.example.com | [2a74 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a75 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a76 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a77 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [2a78 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a79 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a7a 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a7b 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a7c 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a7d 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2a7e 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2a7f 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 gate 1574140958888403800 evaluation starts +peer0.org1.example.com | [2a80 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a81 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2a82 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 principal matched by identity 0 +peer0.org1.example.com | [2a83 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +peer0.org1.example.com | 00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +peer0.org1.example.com | [2a84 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +peer0.org1.example.com | 00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +peer0.org1.example.com | 00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +peer0.org1.example.com | 00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +peer0.org1.example.com | 00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +peer0.org1.example.com | [2a85 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a86 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 gate 1574140958888403800 evaluation succeeds +peer0.org1.example.com | [2a87 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a88 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a89 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a8a 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a8b 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a8c 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a8d 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a8e 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45650 +peer0.org1.example.com | [2a8f 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000285ae0 +peer0.org1.example.com | [2a90 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2a91 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2a92 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2a93 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [2a94 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2a95 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b eb bf 2d 2d c1 2f 24 94 61 87 1e f6 ed 9f 87 |...--./$.a......| +peer0.org1.example.com | 00000010 03 94 a3 d2 48 91 16 ec 83 2f f4 68 fc 3c b1 02 |....H..../.h.<..| +peer0.org1.example.com | [2a96 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 d1 44 c3 04 4e 12 f3 06 e7 42 d5 |0D. ..D..N....B.| +peer0.org1.example.com | 00000010 5d b3 01 3f 43 7d fb 29 be bf 2b 68 7b 4f 7e be |]..?C}.)..+h{O~.| +peer0.org1.example.com | 00000020 bb 24 8d 4c 02 20 17 56 c6 ca b1 be a6 f3 d6 4e |.$.L. .V.......N| +peer0.org1.example.com | 00000030 50 90 7b a0 ff 78 3b ca 34 45 18 25 35 ba 97 0e |P.{..x;.4E.%5...| +peer0.org1.example.com | 00000040 21 8c bd 06 d6 d2 |!.....| +peer0.org1.example.com | [2a97 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2a98 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00302c310, header 0xc000285f40 +peer0.org1.example.com | [2a99 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [2a9a 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] processing txid: cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971 +peer0.org1.example.com | [2a9b 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971] +peer0.org1.example.com | [2a9c 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2a9d 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971] +peer0.org1.example.com | [2a9e 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2a9f 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cb322783] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2aa0 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2aa1 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists +peer0.org1.example.com | [2aa2 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2aa3 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2aa4 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2aa5 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2aa6 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 gate 1574140959218782100 evaluation starts +peer0.org1.example.com | [2aa7 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2aa8 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2aa9 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2aaa 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 principal evaluation fails +peer0.org1.example.com | [2aab 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 gate 1574140959218782100 evaluation fails +peer0.org1.example.com | [2aac 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2aad 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2aae 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2aaf 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 gate 1574140959222245400 evaluation starts +peer0.org1.example.com | [2ab0 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ab1 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2ab2 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 principal matched by identity 0 +peer0.org1.example.com | [2ab3 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b eb bf 2d 2d c1 2f 24 94 61 87 1e f6 ed 9f 87 |...--./$.a......| +peer0.org1.example.com | 00000010 03 94 a3 d2 48 91 16 ec 83 2f f4 68 fc 3c b1 02 |....H..../.h.<..| +peer0.org1.example.com | [2ab4 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 d1 44 c3 04 4e 12 f3 06 e7 42 d5 |0D. ..D..N....B.| +peer0.org1.example.com | 00000010 5d b3 01 3f 43 7d fb 29 be bf 2b 68 7b 4f 7e be |]..?C}.)..+h{O~.| +peer0.org1.example.com | 00000020 bb 24 8d 4c 02 20 17 56 c6 ca b1 be a6 f3 d6 4e |.$.L. .V.......N| +peer0.org1.example.com | 00000030 50 90 7b a0 ff 78 3b ca 34 45 18 25 35 ba 97 0e |P.{..x;.4E.%5...| +peer0.org1.example.com | 00000040 21 8c bd 06 d6 d2 |!.....| +peer0.org1.example.com | [2ab5 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ab6 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 gate 1574140959222245400 evaluation succeeds +peer0.org1.example.com | [2ab7 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ab8 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ab9 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2aba 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2abb 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2abc 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] handling GET_STATE from chaincode +peer0.org1.example.com | [2abd 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [2abe 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2abf 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2ac0 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2ac1 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] notifying Txid:cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971, channelID:businesschannel +peer0.org1.example.com | [2ac2 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2ac3 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cb322783] Exit chaincode: name:"lscc" (7ms) +peer0.org1.example.com | [2ac4 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2ac5 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971] +peer0.org1.example.com | [2ac6 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] Exit +peer0.org1.example.com | [2ac7 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2ac8 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [2ac9 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971, chaincode: lscc} +peer0.org1.example.com | [2aca 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2021684D4DEE4A46031785816A52DE...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2acb 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 828EA4A8E1C50D3661D29F6922005C7C6CDFA321CB6F87C2E668694B0751D6B6 +peer0.org1.example.com | [2acc 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971, chaincode: lscc} +peer0.org1.example.com | [2acd 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] Exit +peer0.org1.example.com | [2ace 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971] +peer0.org1.example.com | [2acf 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45650 +peer0.org1.example.com | [2ad0 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45650 grpc.code=OK grpc.call_duration=14.0527ms +peer0.org1.example.com | [2ad1 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2ad2 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2ad3 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ad4 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ad5 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2ad6 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ad7 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ad8 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ad9 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ada 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2adb 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2adc 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [2add 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ade 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +peer0.org1.example.com | 00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +peer0.org1.example.com | [2adf 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +peer0.org1.example.com | 00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +peer0.org1.example.com | 00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +peer0.org1.example.com | 00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +peer0.org1.example.com | 00000040 6c a7 69 f0 df 61 |l.i..a| +peer0.org1.example.com | [2ae0 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ae1 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c93 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c94 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [2c95 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer1.org2.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer1.org2.example.com | [2c96 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer1.org2.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer1.org2.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer1.org2.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer1.org2.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer1.org2.example.com | [2c97 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c98 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c99 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c9a 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c9b 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c9c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c9d 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c9e 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c9f 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [2ca0 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer1.org2.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer1.org2.example.com | [2ca1 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer1.org2.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer1.org2.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer1.org2.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer1.org2.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer1.org2.example.com | [2ca2 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ca3 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [2ca4 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 cd de 18 6f fc c1 7f 35 2d c0 |0E.!.....o...5-.| +peer1.org2.example.com | 00000010 43 18 dd 18 65 e8 1d 52 5e 8d fa 49 23 6f 0a 3a |C...e..R^..I#o.:| +peer1.org2.example.com | 00000020 28 8c 23 2f 04 02 20 75 72 2f 51 ff 4a fd 44 28 |(.#/.. ur/Q.J.D(| +peer1.org2.example.com | 00000030 a5 7a bc 80 d7 4c 66 5f 77 ca 03 a1 7c 6c a2 6e |.z...Lf_w...|l.n| +peer1.org2.example.com | 00000040 2c 4d 6d 3b 2d 55 99 |,Mm;-U.| +peer1.org2.example.com | [2ca5 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2ca6 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2ca7 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ca8 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ca9 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2caa 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2cab 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cac 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cad 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2cae 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2caf 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cb0 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2cb1 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2cb2 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2cb3 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f360 gate 1574140963458386300 evaluation starts +peer1.org2.example.com | [2cb4 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f360 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2cb5 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f360 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2cb6 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2cb7 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f360 principal evaluation fails +peer1.org2.example.com | [2cb8 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f360 gate 1574140963458386300 evaluation fails +peer1.org2.example.com | [2cb9 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2cba 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2cbb 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2cbc 11-19 05:22:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f960 gate 1574140963459937600 evaluation starts +peer1.org2.example.com | [2cbd 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2cbe 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f960 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2cbf 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f960 principal matched by identity 0 +peer1.org2.example.com | [2cc0 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer1.org2.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer1.org2.example.com | [2cc1 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer1.org2.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer1.org2.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer1.org2.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer1.org2.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer1.org2.example.com | [2cc2 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f960 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2cc3 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353f960 gate 1574140963459937600 evaluation succeeds +peer1.org2.example.com | [2cc4 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2cc5 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2cc6 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2cc7 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2cc8 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2cc9 11-19 05:22:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cca 11-19 05:22:43.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [2ccb 11-19 05:22:43.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer1.org2.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer1.org2.example.com | [2ccc 11-19 05:22:43.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer1.org2.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer1.org2.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer1.org2.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer1.org2.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer1.org2.example.com | [2ccd 11-19 05:22:43.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2cce 11-19 05:22:43.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ccf 11-19 05:22:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd0 11-19 05:22:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd1 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cd2 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cd3 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cd4 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cd5 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd6 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cd7 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cd8 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cd9 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cda 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cdb 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cdc 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cdd 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cde 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [2cdf 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ce0 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ce1 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ce2 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ce3 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [2ce4 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ce5 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" secret_envelope:\024\313\252_\224M\201\276\215)ys\310\355\003J=%" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ce6 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" secret_envelope:\024\313\252_\224M\201\276\215)ys\310\355\003J=%" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ce7 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" secret_envelope:\024\313\252_\224M\201\276\215)ys\310\355\003J=%" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ce8 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [2ce9 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cea 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce f3 4a 28 6f fd 2d 1f 68 b3 0d a5 3c 84 9f |...J(o.-.h...<..| +peer1.org2.example.com | 00000010 00 0c 01 ff e8 95 3e 30 8e 78 0b b5 f5 2d e9 55 |......>0.x...-.U| +peer1.org2.example.com | [2ceb 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 05 50 ab 44 93 6e 30 0d 5d 66 29 |0D. D.P.D.n0.]f)| +peer1.org2.example.com | 00000010 b1 44 9b 2b c2 a1 67 90 e8 2d b2 b0 46 7d 74 f5 |.D.+..g..-..F}t.| +peer1.org2.example.com | 00000020 ba 49 78 df 02 20 49 09 7f 48 bd e9 c5 10 bf 91 |.Ix.. I..H......| +peer1.org2.example.com | 00000030 73 1b 45 93 d4 cb 59 37 d9 fc fc bb b2 3e b9 1b |s.E...Y7.....>..| +peer1.org2.example.com | 00000040 77 f5 b9 1a 48 ae |w...H.| +peer1.org2.example.com | [2cec 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2ced 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 73 58 45 6d db 9b 19 88 4c e4 |0E.!..sXEm....L.| +peer1.org2.example.com | 00000010 81 52 05 88 14 ff bf ea d2 40 7a 8e 3c b3 a7 1a |.R.......@z.<...| +peer1.org2.example.com | 00000020 5f 84 f3 fd bd 02 20 2a c5 d0 9d a2 36 ac 75 8d |_..... *....6.u.| +peer1.org2.example.com | 00000030 8d 26 d2 f0 3e 14 cb aa 5f 94 4d 81 be 8d 29 79 |.&..>..._.M...)y| +peer1.org2.example.com | 00000040 73 c8 ed 03 4a 3d 25 |s...J=%| +peer1.org2.example.com | [2cee 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2cef 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [2cf0 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2cf1 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2cf2 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2cf3 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cf4 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cf5 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cf6 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [2cf7 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cf8 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cf9 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2cfa 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\271\033w\365\271\032H\256" secret_envelope:\024\313\252_\224M\201\276\215)ys\310\355\003J=%" > > alive:\355Nl\032\242\t\266^a\001\327SE^\251dx\305\343\245M" > +peer1.org2.example.com | [2cfb 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cfc 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cfd 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cfe 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cff 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d00 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [2d01 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2800 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [2801 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2802 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2803 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2804 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2805 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2806 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2807 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2808 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2809 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [280a 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [280b 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [280c 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [280d 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [280e 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [280f 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2810 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [2811 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2812 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2813 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2814 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [2815 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2816 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2817 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2818 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2819 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [281a 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [281b 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [281c 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [281d 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [281e 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [281f 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2820 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2821 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2822 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d54ce0 gate 1574140963438777800 evaluation starts +peer1.org1.example.com | [2823 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d54ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2824 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d54ce0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2825 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d54ce0 principal matched by identity 0 +peer1.org1.example.com | [2826 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer1.org1.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer1.org1.example.com | [2827 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer1.org1.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer1.org1.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer1.org1.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer1.org1.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer1.org1.example.com | [2828 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d54ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2829 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d54ce0 gate 1574140963438777800 evaluation succeeds +peer1.org1.example.com | [282a 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [282b 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [282c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [282d 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [282e 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [282f 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2830 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2831 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2832 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2833 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2834 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2835 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2836 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [2837 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2838 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2839 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [283a 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [283b 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:N\243i\022\203\234;\177\342m\325\036\026\207\nY\025\255_\013m\307\364\212\271\204\325?\310\315\250\002 Imb\355\014t\303\377+f\306\224d\204\000\030M\326\202\306{\341q\356\220rkqF\027AJ" > alive: alive:\314\033N\tp\206\241\033\254\341 \3637\245" > alive: +peer0.org1.example.com | [2ae2 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2ae3 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ae4 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ae5 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ae6 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ae7 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ae8 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 gate 1574140959311333300 evaluation starts +peer0.org1.example.com | [2ae9 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2aea 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2aeb 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 principal matched by identity 0 +peer0.org1.example.com | [2aec 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [2aed 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [2aee 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2aef 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 gate 1574140959311333300 evaluation succeeds +peer0.org1.example.com | [2af0 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2af1 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2af2 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2af3 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2af4 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af5 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af6 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2af7 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2aba 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2abb 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2abc 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2abd 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2abe 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2abf 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ac0 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f35a0 gate 1574140959679522500 evaluation starts +peer0.org2.example.com | [2ac1 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f35a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ac2 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f35a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2ac3 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f35a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ac4 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f35a0 principal evaluation fails +peer0.org2.example.com | [2ac5 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f35a0 gate 1574140959679522500 evaluation fails +peer0.org2.example.com | [2ac6 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ac7 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ac8 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ac9 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f3b10 gate 1574140959683010800 evaluation starts +peer0.org2.example.com | [2aca 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f3b10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2acb 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f3b10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2acc 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f3b10 principal matched by identity 0 +peer0.org2.example.com | [2acd 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [2ace 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [2acf 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f3b10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ad0 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f3b10 gate 1574140959683010800 evaluation succeeds +peer0.org2.example.com | [2ad1 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ad2 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ad3 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ad4 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ad5 11-19 05:22:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ad6 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ad7 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ad8 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ad9 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2ada 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [283c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [283d 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [283e 11-19 05:22:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [283f 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2840 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2841 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2842 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2843 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2844 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2845 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2846 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2847 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2848 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2849 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [284a 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [284b 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [284c 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [284d 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [284e 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [284f 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2850 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2851 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2852 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d80940 gate 1574140963599674900 evaluation starts +peer1.org1.example.com | [2853 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d80940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2854 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d80940 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2855 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d80940 principal matched by identity 0 +peer1.org1.example.com | [2856 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | [2d02 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d03 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d04 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d05 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d06 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d07 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d08 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003531bb0 gate 1574140963931144300 evaluation starts +peer1.org2.example.com | [2d09 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003531bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d0a 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003531bb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d0b 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003531bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d0c 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003531bb0 principal evaluation fails +peer1.org2.example.com | [2d0d 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d0e 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d0f 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d10 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d11 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d12 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003531bb0 gate 1574140963931144300 evaluation fails +peer1.org2.example.com | [2d13 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d14 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d15 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d16 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d0120 gate 1574140963946891600 evaluation starts +peer1.org2.example.com | [2d17 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d0120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d18 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d0120 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d19 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d0120 principal matched by identity 0 +peer1.org2.example.com | [2d1a 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 69 dd c5 b2 89 f8 8f ee 1f 88 02 62 38 e8 9a |.i..........b8..| +peer1.org2.example.com | 00000010 a1 ff 8b c1 7a b7 0e a4 bb 7a e8 05 96 58 06 32 |....z....z...X.2| +peer1.org2.example.com | [2d1b 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 29 f2 69 10 00 49 78 70 30 0c 12 |0D. .).i..Ixp0..| +peer1.org2.example.com | 00000010 22 65 4f 43 c5 c1 dd a8 a4 f0 3a df cc 57 30 74 |"eOC......:..W0t| +peer1.org2.example.com | 00000020 ac a1 0e 4a 02 20 02 a7 df 04 15 59 cb de 65 99 |...J. .....Y..e.| +peer1.org2.example.com | 00000030 0f 4b 84 6f 1d b6 c3 8a 24 9d 1d 16 bb c4 c7 2c |.K.o....$......,| +peer1.org2.example.com | 00000040 f2 96 94 d2 36 f5 |....6.| +peer1.org2.example.com | [2d1c 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d0120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d1d 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d0120 gate 1574140963946891600 evaluation succeeds +peer1.org2.example.com | [2d1e 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d1f 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d20 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d21 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d22 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d23 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2d24 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2d25 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2d26 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2d27 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d28 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d29 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d2a 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [2d2b 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d2c 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d2d 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d2e 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2adb 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2adc 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2add 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ade 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2adf 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ae0 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ae1 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7060 gate 1574140959762280000 evaluation starts +peer0.org2.example.com | [2ae2 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ae3 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7060 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2ae4 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ae5 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7060 principal evaluation fails +peer0.org2.example.com | [2ae6 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7060 gate 1574140959762280000 evaluation fails +peer0.org2.example.com | [2ae7 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ae8 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ae9 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2aea 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7810 gate 1574140959763483600 evaluation starts +peer0.org2.example.com | [2aeb 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2aec 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7810 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2aed 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7810 principal matched by identity 0 +peer0.org2.example.com | [2aee 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 ef df 88 81 15 55 57 a6 f1 06 57 d2 c3 70 28 |......UW...W..p(| +peer0.org2.example.com | 00000010 7e 4c bf 70 cf 29 97 71 1e d6 67 7d c8 51 90 f7 |~L.p.).q..g}.Q..| +peer0.org2.example.com | [2aef 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 7f 82 14 e5 de 04 f7 70 ee 32 a4 |0D. W.......p.2.| +peer0.org2.example.com | 00000010 0f be db 4f 64 97 8e f4 10 c4 e6 51 84 6a f3 84 |...Od......Q.j..| +peer0.org2.example.com | 00000020 9a 4a fa e8 02 20 2c 5b 42 d0 e5 07 68 76 c9 7c |.J... ,[B...hv.|| +peer0.org2.example.com | 00000030 b6 a4 5c 9d bd 29 18 3e 2f 30 a8 06 32 4d a1 83 |..\..).>/0..2M..| +peer0.org2.example.com | 00000040 c5 93 93 a6 61 2e |....a.| +peer0.org2.example.com | [2af0 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2af1 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a7810 gate 1574140959763483600 evaluation succeeds +peer0.org2.example.com | [2af2 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2af3 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2af4 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2af5 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2af6 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2af7 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2af8 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2af9 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2afa 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2afb 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2afc 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2afd 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2afe 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aff 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b00 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b01 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b02 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b03 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b04 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b05 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2b06 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b07 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2af8 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2af9 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2afa 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2afb 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2afc 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 gate 1574140959312275400 evaluation starts +peer0.org1.example.com | [2afd 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2afe 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2aff 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 principal matched by identity 0 +peer0.org1.example.com | [2b00 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org1.example.com | [2b01 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org1.example.com | [2b02 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b03 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 gate 1574140959312275400 evaluation succeeds +peer0.org1.example.com | [2b04 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b05 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b06 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b07 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b08 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [2b09 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [2b0a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b0b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b0c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b0d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b0e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b0f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 gate 1574140959313311100 evaluation starts +peer0.org1.example.com | [2b10 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b11 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2b12 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2b13 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 principal evaluation fails +peer0.org1.example.com | [2b14 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 gate 1574140959313311100 evaluation fails +peer0.org1.example.com | [2b15 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b16 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b17 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2b18 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 gate 1574140959315045000 evaluation starts +peer0.org1.example.com | [2b19 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b1a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2b1b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 principal matched by identity 0 +peer0.org1.example.com | [2b1c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [2b1d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [2b1e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b1f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 gate 1574140959315045000 evaluation succeeds +peer0.org1.example.com | [2b20 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2b21 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2b22 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b23 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b24 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b25 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2857 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2858 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d80940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2859 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d80940 gate 1574140963599674900 evaluation succeeds +peer1.org1.example.com | [285a 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [285b 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [285c 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [285d 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [285e 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [285f 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2860 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [2861 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [2862 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2863 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2864 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2865 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2866 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2867 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2868 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2869 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [286a 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da87d0 gate 1574140963604687600 evaluation starts +peer1.org1.example.com | [286b 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da87d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [286c 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da87d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [286d 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da87d0 principal matched by identity 0 +peer1.org1.example.com | [286e 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [286f 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2870 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [2b08 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b09 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b0a 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b0b 11-19 05:22:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b0c 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b0d 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b0e 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b0f 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b10 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b11 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b12 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b13 11-19 05:22:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b14 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b15 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b16 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b17 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b18 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b19 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b1a 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b1b 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b1c 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [2b1d 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b1e 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2b1f 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b20 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2b21 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b22 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2b23 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b24 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b25 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b26 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b27 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b28 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b29 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b2a 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b2b 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b2c 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b26 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b27 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b28 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b29 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org1.example.com | [2b2d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b2e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b30 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b31 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b32 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b33 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b34 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b35 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b36 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b37 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 gate 1574140959317418600 evaluation starts +peer0.org1.example.com | [2b38 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b39 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b3a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2b3b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 principal matched by identity 0 +peer0.org1.example.com | [2b3c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b3d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org1.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org1.example.com | [2b3e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org1.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org1.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org1.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org1.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org1.example.com | [2b3f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b40 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2871 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da87d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2872 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da87d0 gate 1574140963604687600 evaluation succeeds +peer1.org1.example.com | [2873 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2874 11-19 05:22:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2875 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2876 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2877 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2878 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2879 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [287a 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [287b 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [287c 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [287d 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [287e 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [287f 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2880 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2881 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2882 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2883 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2884 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2885 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2800 gate 1574140963618220100 evaluation starts +peer1.org1.example.com | [2886 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2800 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2887 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2800 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2888 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2800 principal matched by identity 0 +peer1.org1.example.com | [2889 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [288a 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [288b 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2800 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [288c 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2800 gate 1574140963618220100 evaluation succeeds +peer1.org1.example.com | [288d 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d2f 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\271\033w\365\271\032H\256" > alive: alive:\355Nl\032\242\t\266^a\001\327SE^\251dx\305\343\245M" > +peer1.org2.example.com | [2d30 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d31 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d32 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d33 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d34 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d35 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [2d36 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d37 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d38 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d39 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2d3a 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d3c 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d3d 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d3e 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d3b 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d3f 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d40 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d41 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d42 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d43 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d44 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b2d 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b2e 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b2f 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b30 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b31 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b32 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b33 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2b34 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151027 +peer0.org2.example.com | [2b35 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 524F58C8CD2B7396AE18004AEF908AC4513C455443AEA451C0B991919814DB0C +peer0.org2.example.com | [2b36 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2b37 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2b38 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2b39 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b3a 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b3b 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b3c 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b3d 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b3e 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b3f 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b40 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b41 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b42 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b41 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b42 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b43 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 gate 1574140959317418600 evaluation succeeds +peer0.org1.example.com | [2b44 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b45 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b46 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b47 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b48 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +peer0.org1.example.com | 00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +peer0.org1.example.com | [2b49 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +peer0.org1.example.com | 00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +peer0.org1.example.com | 00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +peer0.org1.example.com | 00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +peer0.org1.example.com | 00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +peer0.org1.example.com | [2b4a 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer0.org1.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer0.org1.example.com | [2b4b 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer0.org1.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer0.org1.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer0.org1.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer0.org1.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer0.org1.example.com | [2b4c 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b4d 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b4e 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b4f 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b50 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b51 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b52 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b53 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b54 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 gate 1574140959327454700 evaluation starts +peer0.org1.example.com | [2b55 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b56 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2b57 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 principal matched by identity 0 +peer0.org1.example.com | [2b58 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [2b59 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [2b5a 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b5b 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 gate 1574140959327454700 evaluation succeeds +peer0.org1.example.com | [2b5c 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b5d 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [288e 11-19 05:22:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [288f 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2890 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org1.example.com | [2891 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org1.example.com | [2892 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer1.org1.example.com | [2893 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2894 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2895 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2896 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2897 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2898 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2899 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [289a 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [289b 11-19 05:22:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [289c 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3990 gate 1574140963630571000 evaluation starts +peer1.org1.example.com | [289d 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3990 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [289e 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3990 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [289f 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3990 principal matched by identity 0 +peer1.org1.example.com | [28a0 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [28a1 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [28a2 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3990 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [28a3 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3990 gate 1574140963630571000 evaluation succeeds +peer1.org1.example.com | [28a4 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28a5 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28a6 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [28a7 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [28a8 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28a9 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [28aa 11-19 05:22:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ab 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ac 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ad 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [28ae 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28af 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28b0 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [28b1 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [28b2 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [28b3 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddcd70 gate 1574140963644179000 evaluation starts +peer1.org1.example.com | [28b4 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddcd70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [28b5 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddcd70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [28b6 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddcd70 principal matched by identity 0 +peer1.org1.example.com | [28b7 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [28b8 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [28b9 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddcd70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [28ba 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddcd70 gate 1574140963644179000 evaluation succeeds +peer1.org1.example.com | [28bb 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28bc 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28bd 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [28be 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [28bf 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [28c0 11-19 05:22:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [28c1 11-19 05:22:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [28c2 11-19 05:22:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [28c3 11-19 05:22:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28c4 11-19 05:22:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b5e 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b5f 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b60 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b61 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b62 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b63 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b64 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b65 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b66 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 gate 1574140959329061900 evaluation starts +peer0.org1.example.com | [2b67 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b68 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2b69 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 principal matched by identity 0 +peer0.org1.example.com | [2b6a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [2b6b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [2b6c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b6d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 gate 1574140959329061900 evaluation succeeds +peer0.org1.example.com | [2b6e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b6f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b70 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b71 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b72 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b73 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b74 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b75 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +peer0.org1.example.com | 00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +peer0.org1.example.com | [2b76 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +peer0.org1.example.com | 00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +peer0.org1.example.com | 00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +peer0.org1.example.com | 00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +peer0.org1.example.com | 00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +peer0.org1.example.com | [2b77 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b78 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b79 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b7a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b7b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b7c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b7d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b7e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [28c5 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [28c6 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28c7 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28c8 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [28c9 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [28ca 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [28cb 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df8c00 gate 1574140963661284200 evaluation starts +peer1.org1.example.com | [28cc 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df8c00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [28cd 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df8c00 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [28ce 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28cf 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df8c00 principal matched by identity 0 +peer1.org1.example.com | [28d0 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28d1 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [28d2 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [28d3 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [28d4 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28d5 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28d6 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df8c00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [28d7 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df8c00 gate 1574140963661284200 evaluation succeeds +peer1.org1.example.com | [28d8 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [28d9 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28da 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28db 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [28dc 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [28dd 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [28de 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28df 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e0 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [28e1 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [28e2 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e3 11-19 05:22:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [28e4 11-19 05:22:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [28e5 11-19 05:22:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [28e6 11-19 05:22:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [28e7 11-19 05:22:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [28e8 11-19 05:22:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [28e9 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [28ea 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [28ec 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28eb 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28ed 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d45 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d46 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d47 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d48 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d49 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d4a 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d4b 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333e630 gate 1574140964167998900 evaluation starts +peer1.org2.example.com | [2d4c 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333e630 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d4d 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333e630 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d4e 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333e630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d4f 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333e630 principal evaluation fails +peer1.org2.example.com | [2d50 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333e630 gate 1574140964167998900 evaluation fails +peer1.org2.example.com | [2d51 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d52 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d53 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d54 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eba0 gate 1574140964169542600 evaluation starts +peer1.org2.example.com | [2d55 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eba0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d56 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eba0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d57 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eba0 principal matched by identity 0 +peer1.org2.example.com | [2d58 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [2d59 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [2d5a 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eba0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d5b 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333eba0 gate 1574140964169542600 evaluation succeeds +peer1.org2.example.com | [2d5c 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d5d 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d5e 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d5f 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d60 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d61 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d62 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d63 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d64 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d65 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d66 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d67 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d68 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333fd60 gate 1574140964175545700 evaluation starts +peer0.org2.example.com | [2b43 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b44 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b45 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b46 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b47 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2b48 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 4f 58 c8 cd 2b 73 96 ae 18 00 4a ef 90 8a c4 |ROX..+s....J....| +peer0.org2.example.com | 00000010 51 3c 45 54 43 ae a4 51 c0 b9 91 91 98 14 db 0c |Q DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d 61 44 dc e3 5e 99 b8 d7 a0 |0E.!..]aD..^....| +peer0.org2.example.com | 00000010 90 d6 7a 38 b7 57 ce f5 58 f5 cb 97 26 e4 77 1f |..z8.W..X...&.w.| +peer0.org2.example.com | 00000020 9a 11 46 83 38 02 20 58 83 7b 51 65 27 c5 c8 b2 |..F.8. X.{Qe'...| +peer0.org2.example.com | 00000030 2e aa 5b e1 cb f7 6c 34 62 a8 ad 82 a1 e9 fb 20 |..[...l4b...... | +peer0.org2.example.com | 00000040 df 2e 7e e5 7b 9d 4a |..~.{.J| +peer0.org2.example.com | [2b4a 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [2b4b 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 34 23 e3 2f d1 78 f4 46 15 b4 |0E.!..4#./.x.F..| +peer0.org2.example.com | 00000010 35 99 21 4d 0b 3d af fd 23 9f 41 30 df 88 cf 28 |5.!M.=..#.A0...(| +peer0.org2.example.com | 00000020 d6 dd 9b 3b ae 02 20 66 7b 51 48 a2 33 09 d8 f2 |...;.. f{QH.3...| +peer0.org2.example.com | 00000030 b4 14 1d e3 ed 77 6e f3 24 12 01 7b da 39 2b a3 |.....wn.$..{.9+.| +peer0.org2.example.com | 00000040 69 df 54 ca 7b 48 4d |i.T.{HM| +peer0.org2.example.com | [2b4c 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2b4d 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2b4e 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b4f 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b50 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b51 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b52 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b53 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [2b54 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b55 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b56 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b57 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b58 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b59 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b5a 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b5b 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022aff0 gate 1574140959876887000 evaluation starts +peer0.org2.example.com | [2b5c 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022aff0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b7f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 gate 1574140959331885600 evaluation starts +peer0.org1.example.com | [2b80 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b81 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2b82 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 principal matched by identity 0 +peer0.org1.example.com | [2b83 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +peer0.org1.example.com | 00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +peer0.org1.example.com | [2b84 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +peer0.org1.example.com | 00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +peer0.org1.example.com | 00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +peer0.org1.example.com | 00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +peer0.org1.example.com | 00000040 88 2a 2f cc b4 72 |.*/..r| +peer0.org1.example.com | [2b85 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b86 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 gate 1574140959331885600 evaluation succeeds +peer0.org1.example.com | [2b87 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b88 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b89 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b8a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b8b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +peer0.org1.example.com | 00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +peer0.org1.example.com | [2b8c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +peer0.org1.example.com | 00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +peer0.org1.example.com | 00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +peer0.org1.example.com | 00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +peer0.org1.example.com | 00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +peer0.org1.example.com | [2b8d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b8e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b8f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b90 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b91 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b92 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b93 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b94 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b95 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 gate 1574140959333665800 evaluation starts +peer0.org1.example.com | [2b96 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b97 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2b98 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 principal matched by identity 0 +peer0.org1.example.com | [2b99 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [2b9a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [2b9b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b9c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 gate 1574140959333665800 evaluation succeeds +peer1.org2.example.com | [2d69 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333fd60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d6a 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333fd60 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d6b 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333fd60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d6c 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333fd60 principal evaluation fails +peer1.org2.example.com | [2d6d 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333fd60 gate 1574140964175545700 evaluation fails +peer1.org2.example.com | [2d6e 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d6f 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d70 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d71 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de2d0 gate 1574140964177953400 evaluation starts +peer1.org2.example.com | [2d72 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de2d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d73 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de2d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d74 11-19 05:22:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de2d0 principal matched by identity 0 +peer1.org2.example.com | [2d75 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org2.example.com | [2d76 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org2.example.com | [2d77 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer1.org2.example.com | [2d78 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [2d79 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [2d7a 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de2d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d7b 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de2d0 gate 1574140964177953400 evaluation succeeds +peer1.org2.example.com | [2d7c 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d7d 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d7e 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d7f 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d80 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2d81 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2d82 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [2d83 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [2d84 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d85 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d86 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2d87 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | [2b5d 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022aff0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2b5e 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022aff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2b5f 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022aff0 principal evaluation fails +peer0.org2.example.com | [2b60 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022aff0 gate 1574140959876887000 evaluation fails +peer0.org2.example.com | [2b61 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b62 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b63 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2b64 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b580 gate 1574140959877481200 evaluation starts +peer0.org2.example.com | [2b65 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b66 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b580 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2b67 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b580 principal matched by identity 0 +peer0.org2.example.com | [2b68 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +peer0.org2.example.com | 00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +peer0.org2.example.com | [2b69 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +peer0.org2.example.com | 00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +peer0.org2.example.com | 00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +peer0.org2.example.com | 00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +peer0.org2.example.com | 00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +peer0.org2.example.com | [2b6a 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b580 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2b6b 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00022b580 gate 1574140959877481200 evaluation succeeds +peer0.org2.example.com | [2b6c 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b6d 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b6e 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b6f 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b70 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b71 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b72 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2b73 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 4f 58 c8 cd 2b 73 96 ae 18 00 4a ef 90 8a c4 |ROX..+s....J....| +peer0.org2.example.com | 00000010 51 3c 45 54 43 ae a4 51 c0 b9 91 91 98 14 db 0c |Q DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d 61 44 dc e3 5e 99 b8 d7 a0 |0E.!..]aD..^....| +peer0.org2.example.com | 00000010 90 d6 7a 38 b7 57 ce f5 58 f5 cb 97 26 e4 77 1f |..z8.W..X...&.w.| +peer0.org2.example.com | 00000020 9a 11 46 83 38 02 20 58 83 7b 51 65 27 c5 c8 b2 |..F.8. X.{Qe'...| +peer0.org2.example.com | 00000030 2e aa 5b e1 cb f7 6c 34 62 a8 ad 82 a1 e9 fb 20 |..[...l4b...... | +peer0.org2.example.com | 00000040 df 2e 7e e5 7b 9d 4a |..~.{.J| +peer0.org2.example.com | [2b75 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b76 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b77 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b78 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2b79 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer0.org2.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer0.org2.example.com | [2b7a 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer0.org2.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer0.org2.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer0.org2.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer0.org2.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer0.org2.example.com | [2b7b 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b7c 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b7d 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b7e 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b7f 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b80 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b81 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2b82 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer0.org2.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer1.org1.example.com | [28ee 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [28ef 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f0 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f1 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28f3 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f2 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28f4 11-19 05:22:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f5 11-19 05:22:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28f6 11-19 05:22:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f7 11-19 05:22:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f8 11-19 05:22:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f9 11-19 05:22:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28fa 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [28fb 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [28fc 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [28fd 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28fe 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ff 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2900 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2901 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2902 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2903 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [2904 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2905 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b9d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b9e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b9f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ba0 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ba1 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ba2 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ba3 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ba4 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ba5 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ba6 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ba7 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 gate 1574140959339150500 evaluation starts +peer0.org1.example.com | [2ba8 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ba9 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2baa 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 principal matched by identity 0 +peer0.org1.example.com | [2bab 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [2bac 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [2bad 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2bae 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 gate 1574140959339150500 evaluation succeeds +peer0.org1.example.com | [2baf 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2bb0 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2bb1 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2bb2 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2bb3 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bb4 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [2bb5 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [2bb6 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2bb7 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100C1801 +peer0.org1.example.com | [2bb8 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5287B8106D2A83AECAB326E31A471CC1C8FECB2383B1FE0C089B59C4F778A0A +peer0.org1.example.com | [2bb9 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [2bba 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bbb 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bbc 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bbd 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bbe 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2bbf 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc0 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bc1 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bc2 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc3 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bc4 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bc5 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bc6 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc7 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc8 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc9 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bca 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bcb 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bcc 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [2bcd 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bce 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bcf 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b83 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer0.org2.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer0.org2.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer0.org2.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer0.org2.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer0.org2.example.com | [2b84 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b85 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b86 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2b87 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 4f 58 c8 cd 2b 73 96 ae 18 00 4a ef 90 8a c4 |ROX..+s....J....| +peer0.org2.example.com | 00000010 51 3c 45 54 43 ae a4 51 c0 b9 91 91 98 14 db 0c |Q DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d 61 44 dc e3 5e 99 b8 d7 a0 |0E.!..]aD..^....| +peer0.org2.example.com | 00000010 90 d6 7a 38 b7 57 ce f5 58 f5 cb 97 26 e4 77 1f |..z8.W..X...&.w.| +peer0.org2.example.com | 00000020 9a 11 46 83 38 02 20 58 83 7b 51 65 27 c5 c8 b2 |..F.8. X.{Qe'...| +peer0.org2.example.com | 00000030 2e aa 5b e1 cb f7 6c 34 62 a8 ad 82 a1 e9 fb 20 |..[...l4b...... | +peer0.org2.example.com | 00000040 df 2e 7e e5 7b 9d 4a |..~.{.J| +peer0.org2.example.com | [2b89 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b8a 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b8b 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b8c 11-19 05:22:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b8d 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b8e 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b8f 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b90 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [2b91 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b92 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b93 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2906 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2907 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2908 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2909 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [290a 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [290b 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [290c 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [290d 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [290e 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [290f 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2910 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2911 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ed000 gate 1574140963836967700 evaluation starts +peer1.org1.example.com | [2912 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ed000 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2913 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ed000 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2914 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ed000 principal matched by identity 0 +peer1.org1.example.com | [2915 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce f3 4a 28 6f fd 2d 1f 68 b3 0d a5 3c 84 9f |...J(o.-.h...<..| +peer1.org1.example.com | 00000010 00 0c 01 ff e8 95 3e 30 8e 78 0b b5 f5 2d e9 55 |......>0.x...-.U| +peer1.org1.example.com | [2916 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 05 50 ab 44 93 6e 30 0d 5d 66 29 |0D. D.P.D.n0.]f)| +peer1.org1.example.com | 00000010 b1 44 9b 2b c2 a1 67 90 e8 2d b2 b0 46 7d 74 f5 |.D.+..g..-..F}t.| +peer1.org1.example.com | 00000020 ba 49 78 df 02 20 49 09 7f 48 bd e9 c5 10 bf 91 |.Ix.. I..H......| +peer1.org1.example.com | 00000030 73 1b 45 93 d4 cb 59 37 d9 fc fc bb b2 3e b9 1b |s.E...Y7.....>..| +peer1.org1.example.com | 00000040 77 f5 b9 1a 48 ae |w...H.| +peer1.org1.example.com | [2917 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ed000 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2918 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ed000 gate 1574140963836967700 evaluation succeeds +peer1.org1.example.com | [2919 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [291a 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [291b 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [291c 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [291d 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [291e 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [291f 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2920 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2921 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2922 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2923 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2924 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [2925 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2926 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2927 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2928 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2929 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\271\033w\365\271\032H\256" > alive: alive:\314\033N\tp\206\241\033\254\341 \3637\245" > alive: +peer1.org1.example.com | [292a 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [292b 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [292c 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [292d 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [292e 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15102C +peer1.org1.example.com | [292f 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FB69DDC5B289F88FEE1F88026238E89AA1FF8BC17AB70EA4BB7AE80596580632 +peer1.org1.example.com | [2930 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2931 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2932 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2933 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2934 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2935 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2936 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2937 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2938 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2939 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [293a 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [293b 11-19 05:22:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [293c 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [293d 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [293e 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [293f 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2940 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2941 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2942 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2944 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [2943 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2945 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer1.org1.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer1.org1.example.com | [2946 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer1.org1.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer1.org1.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer1.org1.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer1.org1.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer1.org1.example.com | [2947 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2948 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2949 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [294a 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [294b 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [294c 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [294e 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [294d 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [294f 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2950 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2951 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2952 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2953 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2954 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2955 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422d260 gate 1574140963966030600 evaluation starts +peer1.org1.example.com | [2956 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422d260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2957 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422d260 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2958 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422d260 principal matched by identity 0 +peer1.org1.example.com | [2959 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce f3 4a 28 6f fd 2d 1f 68 b3 0d a5 3c 84 9f |...J(o.-.h...<..| +peer1.org1.example.com | 00000010 00 0c 01 ff e8 95 3e 30 8e 78 0b b5 f5 2d e9 55 |......>0.x...-.U| +peer1.org1.example.com | [295a 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 05 50 ab 44 93 6e 30 0d 5d 66 29 |0D. D.P.D.n0.]f)| +peer1.org1.example.com | 00000010 b1 44 9b 2b c2 a1 67 90 e8 2d b2 b0 46 7d 74 f5 |.D.+..g..-..F}t.| +peer1.org1.example.com | 00000020 ba 49 78 df 02 20 49 09 7f 48 bd e9 c5 10 bf 91 |.Ix.. I..H......| +peer1.org1.example.com | 00000030 73 1b 45 93 d4 cb 59 37 d9 fc fc bb b2 3e b9 1b |s.E...Y7.....>..| +peer1.org1.example.com | 00000040 77 f5 b9 1a 48 ae |w...H.| +peer1.org1.example.com | [295b 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422d260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [295c 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422d260 gate 1574140963966030600 evaluation succeeds +peer1.org1.example.com | [295d 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [295e 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [295f 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2960 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2961 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2962 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2963 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2964 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 69 dd c5 b2 89 f8 8f ee 1f 88 02 62 38 e8 9a |.i..........b8..| +peer1.org1.example.com | 00000010 a1 ff 8b c1 7a b7 0e a4 bb 7a e8 05 96 58 06 32 |....z....z...X.2| +peer1.org1.example.com | [2965 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 29 f2 69 10 00 49 78 70 30 0c 12 |0D. .).i..Ixp0..| +peer1.org1.example.com | 00000010 22 65 4f 43 c5 c1 dd a8 a4 f0 3a df cc 57 30 74 |"eOC......:..W0t| +peer1.org1.example.com | 00000020 ac a1 0e 4a 02 20 02 a7 df 04 15 59 cb de 65 99 |...J. .....Y..e.| +peer1.org1.example.com | 00000030 0f 4b 84 6f 1d b6 c3 8a 24 9d 1d 16 bb c4 c7 2c |.K.o....$......,| +peer1.org1.example.com | 00000040 f2 96 94 d2 36 f5 |....6.| +peer1.org1.example.com | [2966 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2967 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2968 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2969 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [296a 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [296b 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [296c 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [296d 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [296e 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [296f 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2970 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 69 dd c5 b2 89 f8 8f ee 1f 88 02 62 38 e8 9a |.i..........b8..| +peer1.org1.example.com | 00000010 a1 ff 8b c1 7a b7 0e a4 bb 7a e8 05 96 58 06 32 |....z....z...X.2| +peer1.org1.example.com | [2971 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 29 f2 69 10 00 49 78 70 30 0c 12 |0D. .).i..Ixp0..| +peer1.org1.example.com | 00000010 22 65 4f 43 c5 c1 dd a8 a4 f0 3a df cc 57 30 74 |"eOC......:..W0t| +peer1.org1.example.com | 00000020 ac a1 0e 4a 02 20 02 a7 df 04 15 59 cb de 65 99 |...J. .....Y..e.| +peer1.org1.example.com | 00000030 0f 4b 84 6f 1d b6 c3 8a 24 9d 1d 16 bb c4 c7 2c |.K.o....$......,| +peer1.org1.example.com | 00000040 f2 96 94 d2 36 f5 |....6.| +peer1.org1.example.com | [2972 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2973 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 e6 b9 89 ba 77 5a 63 f6 fd 1f |0E.!......wZc...| +peer1.org1.example.com | 00000010 47 06 15 50 af ab 3c 8f 9f 52 b5 90 0c 73 43 3b |G..P..<..R...sC;| +peer1.org1.example.com | 00000020 99 18 c1 40 29 02 20 7c 14 13 74 11 2a b0 ad 49 |...@). |..t.*..I| +peer1.org1.example.com | 00000030 34 5d d5 5c f3 fa e6 c1 0a 4e db f3 8a f8 09 bc |4].\.....N......| +peer1.org1.example.com | 00000040 8b e6 ba e3 67 e9 ce |....g..| +peer1.org1.example.com | [2974 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2975 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2976 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2977 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2978 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2979 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [297a 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [297b 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 69 dd c5 b2 89 f8 8f ee 1f 88 02 62 38 e8 9a |.i..........b8..| +peer1.org1.example.com | 00000010 a1 ff 8b c1 7a b7 0e a4 bb 7a e8 05 96 58 06 32 |....z....z...X.2| +peer1.org1.example.com | [297c 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 29 f2 69 10 00 49 78 70 30 0c 12 |0D. .).i..Ixp0..| +peer1.org1.example.com | 00000010 22 65 4f 43 c5 c1 dd a8 a4 f0 3a df cc 57 30 74 |"eOC......:..W0t| +peer1.org1.example.com | 00000020 ac a1 0e 4a 02 20 02 a7 df 04 15 59 cb de 65 99 |...J. .....Y..e.| +peer1.org1.example.com | 00000030 0f 4b 84 6f 1d b6 c3 8a 24 9d 1d 16 bb c4 c7 2c |.K.o....$......,| +peer1.org1.example.com | 00000040 f2 96 94 d2 36 f5 |....6.| +peer1.org1.example.com | [297d 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [297e 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [297f 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2980 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [2981 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer1.org1.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer1.org1.example.com | [2982 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer1.org1.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer1.org1.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer1.org1.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer1.org1.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer1.org1.example.com | [2983 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2984 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2985 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2986 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2987 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2988 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2989 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [298a 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [298b 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [298c 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [298d 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265270 gate 1574140964008829900 evaluation starts +peer1.org1.example.com | [298e 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265270 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [298f 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265270 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2990 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265270 principal matched by identity 0 +peer1.org1.example.com | [2991 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer1.org1.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer1.org1.example.com | [2992 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer1.org1.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer1.org1.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer1.org1.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer1.org1.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer1.org1.example.com | [2993 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265270 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2994 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265270 gate 1574140964008829900 evaluation succeeds +peer1.org1.example.com | [2995 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2996 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2997 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2998 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2999 11-19 05:22:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [299a 11-19 05:22:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [299b 11-19 05:22:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [299c 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [299d 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [299e 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [299f 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29a0 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29a1 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29a2 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [29a3 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 2f 25 2e 3f 4c 14 36 02 c3 71 55 4a d5 10 91 |./%.?L.6..qUJ...| +peer1.org1.example.com | 00000010 d7 1b 92 0f 02 88 bf 55 8a 0d 11 fd 74 29 5e 0c |.......U....t)^.| +peer1.org1.example.com | [29a4 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 f0 0f fd e1 43 15 e7 cd 9d 34 |0E.!......C....4| +peer1.org1.example.com | 00000010 1f 97 84 a3 c4 bb 25 69 cd 4c 2a 96 e6 f9 fd e4 |......%i.L*.....| +peer1.org1.example.com | 00000020 4a 08 af e0 86 02 20 62 d6 a8 0e 7e 8c bf 47 09 |J..... b...~..G.| +peer1.org1.example.com | 00000030 98 9b 56 22 3c c6 12 fe 66 ad bd 21 8b b4 b6 d0 |..V"<...f..!....| +peer1.org1.example.com | 00000040 15 df 41 e9 53 81 99 |..A.S..| +peer1.org1.example.com | [29a5 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29a6 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [29a7 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29a8 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29a9 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29aa 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [29ab 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 fd 67 c9 e3 55 b6 4c 4b fa a0 b8 bb f8 85 14 |..g..U.LK.......| +peer1.org1.example.com | 00000010 36 97 99 a2 1f 8e 7f 8b 44 c0 e3 ab 37 7a 98 df |6.......D...7z..| +peer1.org1.example.com | [29ac 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 16 ae 30 2a 35 ec 39 1e d8 19 69 |0D. P..0*5.9...i| +peer1.org1.example.com | 00000010 81 bb fc c0 50 a1 61 8f 73 1f c8 f1 25 91 37 7d |....P.a.s...%.7}| +peer1.org1.example.com | 00000020 44 e2 32 6a 02 20 57 0a 1e 4d f7 92 6c c9 17 38 |D.2j. W..M..l..8| +peer1.org1.example.com | 00000030 6f b2 21 47 d0 33 9b e8 56 16 09 6e 77 29 1a e0 |o.!G.3..V..nw)..| +peer1.org1.example.com | 00000040 04 0c aa 34 74 c4 |...4t.| +peer1.org1.example.com | [29ad 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29ae 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [29af 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [29b0 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2d88 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d89 11-19 05:22:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d8a 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d8b 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d8c 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d8d 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d8e 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d8f 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d90 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cebb0 gate 1574140964192882400 evaluation starts +peer1.org2.example.com | [2d91 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cebb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d92 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cebb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d93 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cebb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d94 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cebb0 principal evaluation fails +peer1.org2.example.com | [2d95 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cebb0 gate 1574140964192882400 evaluation fails +peer1.org2.example.com | [2d96 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d97 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d98 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d99 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf120 gate 1574140964195720900 evaluation starts +peer1.org2.example.com | [2d9a 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d9b 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf120 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2d9c 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf120 principal matched by identity 0 +peer1.org2.example.com | [2d9d 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [2d9e 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [2d9f 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2da0 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf120 gate 1574140964195720900 evaluation succeeds +peer1.org2.example.com | [2da1 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2da2 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2da3 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2da4 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2da5 11-19 05:22:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2da6 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2da7 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2da8 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2da9 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2daa 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2dab 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2dac 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2dad 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032282c0 gate 1574140964202354600 evaluation starts +peer1.org2.example.com | [2dae 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032282c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2daf 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032282c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2db0 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032282c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2db1 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032282c0 principal evaluation fails +peer1.org2.example.com | [2db2 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032282c0 gate 1574140964202354600 evaluation fails +peer1.org2.example.com | [2db3 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2db4 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2db5 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2db6 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003228830 gate 1574140964205272200 evaluation starts +peer1.org2.example.com | [2db7 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003228830 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2db8 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003228830 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2db9 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003228830 principal matched by identity 0 +peer1.org2.example.com | [2dba 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [2dbb 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [2dbc 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003228830 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2dbd 11-19 05:22:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003228830 gate 1574140964205272200 evaluation succeeds +peer1.org2.example.com | [2dbe 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dbf 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dc0 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2dc1 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2dc2 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [2dc3 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [2dc4 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dc5 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2dc6 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc7 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc8 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc9 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dca 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dcb 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2dcc 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2dcd 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2dce 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2dcf 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2dd0 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dd1 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dd2 11-19 05:22:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2dd3 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2dd5 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ce2e0 gate 1574140964223342800 evaluation starts +peer1.org2.example.com | [2dd6 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ce2e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2dd4 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2dd7 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ce2e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2dd8 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2dda 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dd9 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ce2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ddb 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ce2e0 principal evaluation fails +peer1.org2.example.com | [2ddc 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ce2e0 gate 1574140964223342800 evaluation fails +peer1.org2.example.com | [2ddd 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2dde 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ddf 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2de0 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbbf0 gate 1574140964227599300 evaluation starts +peer1.org2.example.com | [2de1 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbbf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2de2 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbbf0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2de3 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbbf0 principal matched by identity 0 +peer1.org2.example.com | [2de4 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [2de5 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [2de6 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [2de7 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbbf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2de8 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbbf0 gate 1574140964227599300 evaluation succeeds +peer1.org2.example.com | [2de9 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dea 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2deb 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2dec 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ded 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dee 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2def 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2df0 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2df1 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2df2 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2df3 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2df4 11-19 05:22:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2df5 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082da0 gate 1574140964240739200 evaluation starts +peer1.org2.example.com | [2df6 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082da0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2df7 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082da0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2df8 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2df9 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082da0 principal evaluation fails +peer1.org2.example.com | [2dfa 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003082da0 gate 1574140964240739200 evaluation fails +peer1.org2.example.com | [2dfb 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2dfc 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2dfd 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2dfe 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083310 gate 1574140964246960500 evaluation starts +peer1.org2.example.com | [2dff 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083310 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e00 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083310 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2e01 11-19 05:22:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083310 principal matched by identity 0 +peer1.org2.example.com | [2e02 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [2e03 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [2e04 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083310 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e05 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003083310 gate 1574140964246960500 evaluation succeeds +peer1.org2.example.com | [2e06 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e07 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e08 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e09 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2e0a 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [2e0b 11-19 05:22:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [2e0c 11-19 05:22:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2e0d 11-19 05:22:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2e0e 11-19 05:22:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e0f 11-19 05:22:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e10 11-19 05:22:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e11 11-19 05:22:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e12 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e13 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29b1 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [29b2 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29b3 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29b4 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29b5 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29b6 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29b7 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29b8 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [29b9 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29ba 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29bb 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29bc 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [29bd 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29be 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29bf 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29c0 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29c1 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c2 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29c3 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c4 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29c5 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29c6 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c7 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [29c8 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c9 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29ca 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29cb 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29cc 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29cd 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [29ce 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29cf 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [29d0 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29d1 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29d2 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [29d3 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [29d4 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [29d5 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0c60 gate 1574140965355606200 evaluation starts +peer1.org1.example.com | [29d6 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0c60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [29d7 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0c60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [29d8 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0c60 principal matched by identity 0 +peer1.org1.example.com | [29d9 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c ff b9 3d 40 b7 b9 ce 1d e0 44 b2 0d cc 7a 8d |<..=@.....D...z.| +peer1.org1.example.com | 00000010 94 d4 5f fd cd 5a f8 07 5b 94 8b 44 2a 0f 91 62 |.._..Z..[..D*..b| +peer1.org1.example.com | [29da 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 36 2c f0 39 11 4c a6 14 c9 0f |0E.!..6,.9.L....| +peer1.org1.example.com | 00000010 a9 2c cd c9 ad c0 c5 d6 f2 b8 57 47 2d 16 a8 dd |.,........WG-...| +peer1.org1.example.com | 00000020 4f 50 f0 dc b7 02 20 0b 4e 4b b3 fe 7f 10 8a 45 |OP.... .NK.....E| +peer1.org1.example.com | 00000030 e7 1a e6 e7 0a df 3c 0d 3e 76 79 17 ea 46 aa 30 |......<.>vy..F.0| +peer1.org1.example.com | 00000040 84 c4 3d 83 16 70 fa |..=..p.| +peer1.org1.example.com | [29db 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0c60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [29dc 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0c60 gate 1574140965355606200 evaluation succeeds +peer1.org1.example.com | [29dd 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [29de 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [29df 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [29e0 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [29e1 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29e2 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [29e3 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [29e4 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [29e5 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [29e6 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29e7 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29e8 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29e9 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29ea 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29eb 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29ec 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29ed 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29ee 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29ef 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [29f0 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29f2 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29f1 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29f3 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [29f5 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29f6 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29f4 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29f7 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29f8 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29f9 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29fa 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29fb 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29fc 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29fd 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29fe 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29ff 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a00 11-19 05:22:45.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2a01 11-19 05:22:45.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15102D +peer1.org1.example.com | [2a02 11-19 05:22:45.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0DA50AAF4EB2EF5E59870E20573A0DC3BDDA3F70A1593BFC27DB094BFC672E21 +peer1.org1.example.com | [2a03 11-19 05:22:45.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2a04 11-19 05:22:45.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2a05 11-19 05:22:45.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2a06 11-19 05:22:45.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2a07 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a08 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a09 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2a0a 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a0b 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2a0c 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a0d 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2a0e 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a0f 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a10 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a11 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a12 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a13 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a14 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a15 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a16 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a17 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2a18 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d a5 0a af 4e b2 ef 5e 59 87 0e 20 57 3a 0d c3 |....N..^Y.. W:..| +peer1.org1.example.com | 00000010 bd da 3f 70 a1 59 3b fc 27 db 09 4b fc 67 2e 21 |..?p.Y;.'..K.g.!| +peer1.org1.example.com | [2a19 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 18 ce ea 32 59 59 8e 91 fd b7 87 |0D. t...2YY.....| +peer1.org1.example.com | 00000010 96 17 ea fa 15 59 46 0d ff 5d 4a e4 5b df 4a 14 |.....YF..]J.[.J.| +peer1.org1.example.com | 00000020 35 e8 94 a1 02 20 7d 66 cd 1c ac 2b a8 09 df e5 |5.... }f...+....| +peer1.org1.example.com | 00000030 9d 91 19 df da d9 92 b8 1e 56 57 50 31 12 c7 de |.........VWP1...| +peer1.org1.example.com | 00000040 81 c5 7e 2a 54 de |..~*T.| +peer1.org1.example.com | [2a1a 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a1b 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a1c 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a1d 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a1e 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a20 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a1f 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a21 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [2a22 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a23 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a24 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a25 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a26 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a27 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a28 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a29 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dde60 gate 1574140965810739600 evaluation starts +peer1.org1.example.com | [2a2a 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dde60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a2b 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dde60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2a2c 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dde60 principal matched by identity 0 +peer1.org1.example.com | [2a2d 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 ee 04 07 62 b0 a8 b7 bc 56 90 2a 9d 25 28 d8 |....b....V.*.%(.| +peer1.org1.example.com | 00000010 21 0a 01 9a 20 92 e9 a8 cf ab 41 aa a1 a4 b4 27 |!... .....A....'| +peer1.org1.example.com | [2a2e 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f5 16 6d 14 7e 2a bc 60 a9 57 93 |0D. X..m.~*.`.W.| +peer1.org1.example.com | 00000010 de 91 c2 0c f7 92 b1 73 33 23 36 5f 6c e9 4e 60 |.......s3#6_l.N`| +peer1.org1.example.com | 00000020 75 77 b1 95 02 20 43 8d d9 e0 c1 c7 3b cf 50 f0 |uw... C.....;.P.| +peer1.org1.example.com | 00000030 8a 72 9d ed 6f 5b e6 f2 89 3e a9 32 51 bb ed df |.r..o[...>.2Q...| +peer1.org1.example.com | 00000040 e0 a9 84 51 69 72 |...Qir| +peer1.org1.example.com | [2a2f 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dde60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a30 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dde60 gate 1574140965810739600 evaluation succeeds +peer1.org1.example.com | [2a31 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a32 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a33 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a34 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a35 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a36 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2a37 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2a38 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2a39 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2a3a 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a3b 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a3c 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a3d 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a3e 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a3f 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a40 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a42 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bd0 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2bd1 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd2 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd3 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2bd4 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bd5 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bd6 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bd7 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bd8 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bd9 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bda 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bdb 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bdc 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bdd 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bde 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [2bdf 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2be0 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2be1 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2be2 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2be3 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2be4 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2be5 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2be6 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 gate 1574140959479331800 evaluation starts +peer0.org1.example.com | [2be7 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2be8 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2b94 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b95 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b96 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b97 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b98 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403900 gate 1574140959937157900 evaluation starts +peer0.org2.example.com | [2b99 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403900 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b9a 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403900 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2b9b 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2b9c 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403900 principal evaluation fails +peer0.org2.example.com | [2b9d 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403900 gate 1574140959937157900 evaluation fails +peer0.org2.example.com | [2b9e 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b9f 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ba0 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ba1 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403e70 gate 1574140959939370200 evaluation starts +peer0.org2.example.com | [2ba2 11-19 05:22:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403e70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ba3 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403e70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2ba4 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403e70 principal matched by identity 0 +peer0.org2.example.com | [2ba5 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 57 f7 09 74 93 35 a4 81 07 99 14 aa 26 89 ad |.W..t.5......&..| +peer0.org2.example.com | 00000010 b4 e4 10 e7 e1 9e e8 26 50 4c ba 88 af 3e 9a 98 |.......&PL...>..| +peer0.org2.example.com | [2ba6 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 e6 fd cf 74 45 bd 4f 6d 1e cc 72 |0D. !...tE.Om..r| +peer0.org2.example.com | 00000010 e2 7e c2 ff 2c 57 3f a7 6d 14 47 f2 20 6f 53 01 |.~..,W?.m.G. oS.| +peer0.org2.example.com | 00000020 22 c7 49 40 02 20 24 c1 91 9f 37 a6 a8 83 e2 36 |".I@. $...7....6| +peer0.org2.example.com | 00000030 8f 52 b3 be 3d 2f 5d 6e d7 8c 44 ae 82 08 c2 b4 |.R..=/]n..D.....| +peer0.org2.example.com | 00000040 07 be c5 a0 06 c3 |......| +peer0.org2.example.com | [2ba7 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ba8 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ba9 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403e70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2baa 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403e70 gate 1574140959939370200 evaluation succeeds +peer0.org2.example.com | [2bab 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2bac 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2bad 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2bae 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2baf 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb0 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2bb1 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2bb2 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2bb3 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2bb4 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb5 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb6 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb7 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [2bb8 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2bb9 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bba 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bbb 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bbc 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e14 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e15 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [2e16 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e17 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2e18 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e19 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e1a 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2e1b 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2e1c 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2e1d 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe56c0 gate 1574140964742321700 evaluation starts +peer1.org2.example.com | [2e1e 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe56c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e1f 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe56c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2e20 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe56c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2e21 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe56c0 principal evaluation fails +peer1.org2.example.com | [2e22 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe56c0 gate 1574140964742321700 evaluation fails +peer1.org2.example.com | [2e23 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e24 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e25 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e26 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2e27 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5c40 gate 1574140964745276000 evaluation starts +peer1.org2.example.com | [2e28 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e29 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5c40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2e2a 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5c40 principal matched by identity 0 +peer1.org2.example.com | [2e2b 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 fd 67 c9 e3 55 b6 4c 4b fa a0 b8 bb f8 85 14 |..g..U.LK.......| +peer1.org2.example.com | 00000010 36 97 99 a2 1f 8e 7f 8b 44 c0 e3 ab 37 7a 98 df |6.......D...7z..| +peer1.org2.example.com | [2e2c 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 16 ae 30 2a 35 ec 39 1e d8 19 69 |0D. P..0*5.9...i| +peer1.org2.example.com | 00000010 81 bb fc c0 50 a1 61 8f 73 1f c8 f1 25 91 37 7d |....P.a.s...%.7}| +peer1.org2.example.com | 00000020 44 e2 32 6a 02 20 57 0a 1e 4d f7 92 6c c9 17 38 |D.2j. W..M..l..8| +peer1.org2.example.com | 00000030 6f b2 21 47 d0 33 9b e8 56 16 09 6e 77 29 1a e0 |o.!G.3..V..nw)..| +peer1.org2.example.com | 00000040 04 0c aa 34 74 c4 |...4t.| +peer1.org2.example.com | [2e2d 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5c40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e2e 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe5c40 gate 1574140964745276000 evaluation succeeds +peer1.org2.example.com | [2e2f 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e30 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e31 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e32 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a43 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a44 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a45 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a41 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a46 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a47 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a48 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a49 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a4a 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a4b 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a4c 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2a4d 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a4e 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a4f 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2a50 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a51 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a52 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a53 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2be9 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 principal matched by identity 0 +peer0.org1.example.com | [2bea 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +peer0.org1.example.com | 00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +peer0.org1.example.com | [2beb 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +peer0.org1.example.com | 00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +peer0.org1.example.com | 00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +peer0.org1.example.com | 00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +peer0.org1.example.com | 00000040 06 99 4d 88 e2 5c |..M..\| +peer0.org1.example.com | [2bec 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2bed 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 gate 1574140959479331800 evaluation succeeds +peer0.org1.example.com | [2bee 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2bef 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2bf0 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2bf1 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2bf2 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bf3 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2bf4 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2bf5 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2bf6 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2bf7 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bf8 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bf9 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bfa 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [2bfb 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bfc 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bfd 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bfe 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2bff 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c00 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c01 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2c02 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45654 +peer0.org1.example.com | [2c03 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025f7630 +peer0.org1.example.com | [2c04 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2c05 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2c06 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2c07 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [2c08 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2c09 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 81 62 73 3f 57 8e 41 e5 6e 4e 48 61 fb ee 2b |..bs?W.A.nNHa..+| +peer0.org1.example.com | 00000010 48 7e 2f e9 5f bc 6c 49 b2 ee 1d c6 9b 4a bb ae |H~/._.lI.....J..| +peer0.org1.example.com | [2c0a 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e e0 8d 86 30 d5 08 02 e0 c4 1b b3 |0D. N...0.......| +peer0.org1.example.com | 00000010 ea 1f 9f 23 5e d5 20 0b 72 9f 34 c9 f2 81 6f b1 |...#^. .r.4...o.| +peer0.org1.example.com | 00000020 6c f9 f2 61 02 20 27 8e b9 4e 10 5b 1a 09 45 00 |l..a. '..N.[..E.| +peer0.org2.example.com | [2bbd 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [2bbe 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bbf 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bc0 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bc1 11-19 05:22:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc2 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bc3 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bc4 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc5 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc6 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc7 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2bc8 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:/0\250\0062M\241\203\305\223\223\246a." > alive: alive: +peer0.org2.example.com | [2bc9 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bca 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bcb 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bcc 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bcd 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bce 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bcf 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2bd0 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bd1 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bd2 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2bd3 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2bd4 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2bd5 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b330 gate 1574140959984603500 evaluation starts +peer0.org2.example.com | [2bd6 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b330 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2bd7 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b330 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2bd8 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2bd9 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b330 principal evaluation fails +peer0.org2.example.com | [2bda 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b330 gate 1574140959984603500 evaluation fails +peer0.org2.example.com | [2bdb 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2bdc 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2bdd 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2bde 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b8a0 gate 1574140959984903300 evaluation starts +peer0.org2.example.com | [2bdf 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b8a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2be0 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b8a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2be1 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b8a0 principal matched by identity 0 +peer0.org2.example.com | [2be2 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [2be3 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [2be4 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b8a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2be5 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7b8a0 gate 1574140959984903300 evaluation succeeds +peer0.org2.example.com | [2be6 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2be7 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2be8 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2be9 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2bea 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2beb 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bec 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2bed 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bee 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bef 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2bf0 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2bf1 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2bf2 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6ca30 gate 1574140959985791100 evaluation starts +peer0.org2.example.com | [2bf3 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6ca30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2bf4 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6ca30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2bf5 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6ca30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2bf6 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6ca30 principal evaluation fails +peer0.org2.example.com | [2bf7 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6ca30 gate 1574140959985791100 evaluation fails +peer0.org2.example.com | [2bf8 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2bf9 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2bfa 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2bfb 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6cfa0 gate 1574140959986037600 evaluation starts +peer0.org2.example.com | [2bfc 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6cfa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2bfd 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6cfa0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2bfe 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6cfa0 principal matched by identity 0 +peer0.org2.example.com | [2bff 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [2c00 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [2c01 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6cfa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c02 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e6cfa0 gate 1574140959986037600 evaluation succeeds +peer0.org2.example.com | [2c03 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c04 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c05 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c06 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c07 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [2c08 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [2c09 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [2c0a 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [2c0b 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c0e 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c0c 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c0f 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c0d 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c10 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c11 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [2c12 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [2c13 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2c14 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC15100C1801 +peer0.org2.example.com | [2c15 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B95AC15B652D9BC7A8A46882485A5BAEF8724BD905B7A7A94C087FE2FE9DA810 +peer0.org2.example.com | [2c16 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [2c17 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c18 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c19 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2c1a 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c1b 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c1c 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2c1d 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c1e 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c1f 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c20 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c21 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c22 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c23 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2c24 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c25 11-19 05:22:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c26 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c27 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c28 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c29 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c2a 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c2b 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c2c 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c2d 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94750 gate 1574140960040578300 evaluation starts +peer0.org2.example.com | [2c2e 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c2f 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94750 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2c30 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94750 principal matched by identity 0 +peer0.org2.example.com | [2c31 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [2c32 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [2c33 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94750 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c34 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e94750 gate 1574140960040578300 evaluation succeeds +peer0.org2.example.com | [2c35 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c36 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c37 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c38 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c39 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c3a 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c3b 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c3c 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c3d 11-19 05:22:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c3e 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c3f 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c40 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c41 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c42 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c43 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c44 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95b30 gate 1574140960051716300 evaluation starts +peer0.org2.example.com | [2c45 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95b30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c46 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95b30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2c47 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c48 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95b30 principal evaluation fails +peer0.org2.example.com | [2c49 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e95b30 gate 1574140960051716300 evaluation fails +peer0.org2.example.com | [2c4a 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c4b 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c4c 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2c4d 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027be0b0 gate 1574140960053694800 evaluation starts +peer0.org2.example.com | [2c4e 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027be0b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c4f 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027be0b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2c50 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027be0b0 principal matched by identity 0 +peer0.org2.example.com | [2c51 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [2c52 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [2c53 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027be0b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c54 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027be0b0 gate 1574140960053694800 evaluation succeeds +peer0.org2.example.com | [2c55 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c56 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c57 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c58 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c59 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c5a 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c5b 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c5c 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c5d 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c5e 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c5f 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c60 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c61 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf250 gate 1574140960057228800 evaluation starts +peer0.org2.example.com | [2c62 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c63 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2c64 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c65 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf250 principal evaluation fails +peer0.org2.example.com | [2c66 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf250 gate 1574140960057228800 evaluation fails +peer0.org2.example.com | [2c67 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c68 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c69 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2c6a 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf7d0 gate 1574140960058359900 evaluation starts +peer0.org2.example.com | [2c6b 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf7d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c6c 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf7d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2c6d 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf7d0 principal matched by identity 0 +peer0.org2.example.com | [2c6e 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [2c6f 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [2c70 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf7d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c71 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027bf7d0 gate 1574140960058359900 evaluation succeeds +peer0.org2.example.com | [2c72 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c73 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 43 8e 60 d8 8b bd a2 50 13 c6 4b 02 a9 19 dd 30 |C.`....P..K....0| +peer0.org1.example.com | 00000040 e3 18 75 4d 2c 41 |..uM,A| +peer0.org1.example.com | [2c0b 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2c0c 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00308a460, header 0xc0025f7a40 +peer0.org1.example.com | [2c0d 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [2c0e 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] processing txid: 9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253 +peer0.org1.example.com | [2c0f 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253] +peer0.org1.example.com | [2c10 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2c11 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253] +peer0.org1.example.com | [2c12 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2c13 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9f7240e3] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2c14 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2c15 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec +peer0.org1.example.com | [2c16 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2c17 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c18 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c19 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c1a 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 gate 1574140959535733200 evaluation starts +peer0.org1.example.com | [2c1b 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c1c 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2c1d 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2c1e 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 principal evaluation fails +peer0.org1.example.com | [2c1f 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 gate 1574140959535733200 evaluation fails +peer0.org1.example.com | [2c20 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c21 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c22 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2c23 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 gate 1574140959536913400 evaluation starts +peer0.org1.example.com | [2c24 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c25 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2c26 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 principal matched by identity 0 +peer0.org1.example.com | [2c27 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 81 62 73 3f 57 8e 41 e5 6e 4e 48 61 fb ee 2b |..bs?W.A.nNHa..+| +peer0.org1.example.com | 00000010 48 7e 2f e9 5f bc 6c 49 b2 ee 1d c6 9b 4a bb ae |H~/._.lI.....J..| +peer0.org1.example.com | [2c28 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e e0 8d 86 30 d5 08 02 e0 c4 1b b3 |0D. N...0.......| +peer0.org1.example.com | 00000010 ea 1f 9f 23 5e d5 20 0b 72 9f 34 c9 f2 81 6f b1 |...#^. .r.4...o.| +peer0.org1.example.com | 00000020 6c f9 f2 61 02 20 27 8e b9 4e 10 5b 1a 09 45 00 |l..a. '..N.[..E.| +peer0.org1.example.com | 00000030 43 8e 60 d8 8b bd a2 50 13 c6 4b 02 a9 19 dd 30 |C.`....P..K....0| +peer0.org1.example.com | 00000040 e3 18 75 4d 2c 41 |..uM,A| +peer0.org1.example.com | [2c29 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c2a 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 gate 1574140959536913400 evaluation succeeds +peer0.org1.example.com | [2c2b 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2c2c 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2c2d 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c2e 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c2f 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2c30 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] handling GET_STATE from chaincode +peer0.org1.example.com | [2c31 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [2c32 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2c33 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2c34 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2c35 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] notifying Txid:9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253, channelID:businesschannel +peer0.org1.example.com | [2c36 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2c37 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9f7240e3] Exit chaincode: name:"lscc" (7ms) +peer0.org1.example.com | [2c38 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2c39 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253] +peer0.org1.example.com | [2c3a 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] Exit +peer0.org1.example.com | [2c3b 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2c3c 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [2c3d 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253, chaincode: lscc} +peer0.org1.example.com | [2c3e 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20B900C5840B69A47CEA998100066A...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2c3f 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 69E118B2B8613E82B176CEBE691A2CF0A4A88813FB479579A37FB778B44AD238 +peer0.org1.example.com | [2c40 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253, chaincode: lscc} +peer0.org1.example.com | [2c41 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] Exit +peer0.org1.example.com | [2c42 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253] +peer0.org1.example.com | [2c43 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45654 +peer0.org1.example.com | [2c44 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45654 grpc.code=OK grpc.call_duration=10.7115ms +peer0.org1.example.com | [2c45 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2c46 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2c47 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c48 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c49 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c4a 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c4b 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c4c 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c4d 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c4e 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [2c4f 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [2c50 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c51 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c52 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c53 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [2c54 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [2c55 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c56 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c57 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c58 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c59 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [2c5a 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [2c5b 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c5c 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c5d 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c5e 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c5f 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c60 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [2c61 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c62 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2c63 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151026 +peer0.org1.example.com | [2c64 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D6EFDF8881155557A6F10657D2C370287E4CBF70CF2997711ED6677DC85190F7 +peer0.org1.example.com | [2c65 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2c66 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2c67 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2c68 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [2c69 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6a 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6b 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2c6c 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6d 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2c6e 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6f 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2c70 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c73 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c71 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c74 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c72 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c75 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c76 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c77 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c78 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c79 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [2c7a 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c7b 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45658 +peer0.org1.example.com | [2c7c 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002611680 +peer0.org1.example.com | [2c7d 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2c7e 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2c7f 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2c80 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [2c81 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2c82 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 02 22 6f 87 b5 d4 3e 10 bc 81 51 45 d4 67 e0 |.."o...>...QE.g.| +peer0.org1.example.com | 00000010 06 2c bb 35 12 b9 66 e9 a2 cb 06 57 90 59 0f 1d |.,.5..f....W.Y..| +peer0.org1.example.com | [2c83 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 aa 7a 2c d0 c6 8b bb 26 3f cf |0E.!...z,....&?.| +peer0.org1.example.com | 00000010 a9 08 96 6b cb f2 c3 31 05 77 e6 4c 91 e2 b4 82 |...k...1.w.L....| +peer0.org1.example.com | 00000020 87 9a ad 75 0a 02 20 26 3c 28 0e a7 7b c0 8d 70 |...u.. &<(..{..p| +peer0.org1.example.com | 00000030 c4 6a e0 a9 59 b3 25 7e 50 fd d1 bc 3c 53 56 de |.j..Y.%~P...| +peer0.org1.example.com | [2c84 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2c85 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00308ad20, header 0xc002611a90 +peer0.org1.example.com | [2c86 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [2c87 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] processing txid: ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d +peer0.org1.example.com | [2c88 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d] +peer0.org1.example.com | [2c89 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2c8a 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d] +peer0.org1.example.com | [2c8b 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2c8d 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ff3e5552] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2c8e 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2c8c 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c90 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c91 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c92 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c93 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c8f 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData +peer0.org1.example.com | [2c94 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c96 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c97 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c98 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c95 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2c99 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [2c9a 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c9b 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c9c 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c9d 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 gate 1574140959840993100 evaluation starts +peer0.org1.example.com | [2c9e 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c9f 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2ca0 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2ca1 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 principal evaluation fails +peer0.org1.example.com | [2ca2 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 gate 1574140959840993100 evaluation fails +peer0.org1.example.com | [2ca3 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ca4 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ca5 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2ca6 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 gate 1574140959842436200 evaluation starts +peer0.org1.example.com | [2ca7 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ca8 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2ca9 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 principal matched by identity 0 +peer0.org1.example.com | [2caa 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 02 22 6f 87 b5 d4 3e 10 bc 81 51 45 d4 67 e0 |.."o...>...QE.g.| +peer1.org2.example.com | [2e33 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e34 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2e35 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2e36 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2e37 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2e38 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e39 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e3a 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e3b 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e3c 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e3d 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e3e 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e3f 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e40 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e41 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e42 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e43 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e44 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e45 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e46 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e47 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e48 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e49 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e4a 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e4b 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e4c 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e4d 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e4e 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e4f 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e50 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e51 11-19 05:22:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer1.org2.example.com | [2e52 11-19 05:22:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [2e53 11-19 05:22:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +peer1.org2.example.com | [2e54 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e55 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e56 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 8c 15 b1 93 96 33 06 47 51 09 02 a6 ea de 23 |......3.GQ.....#| +peer1.org2.example.com | 00000010 77 77 99 43 07 38 fc c3 a9 b2 0d 7c 88 ac a8 b9 |ww.C.8.....|....| +peer1.org2.example.com | [2e57 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 1b 07 8a f4 29 d1 4e 6c f4 47 e8 |0D. *....).Nl.G.| +peer1.org2.example.com | 00000010 96 69 86 13 57 0e ec 1f dd a4 a0 03 cb e0 71 45 |.i..W.........qE| +peer1.org1.example.com | [2a54 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a55 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a56 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [2a57 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a58 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a59 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a5a 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a5b 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [2a5c 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer1.org1.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer1.org1.example.com | [2a5d 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer1.org1.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer1.org1.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer1.org1.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer1.org1.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer1.org1.example.com | [2a5e 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [2a5f 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 98 a5 ce ed 12 b3 10 af 9d bc f0 |0D. ............| +peer1.org1.example.com | 00000010 2a a5 1d 10 1b 7e 74 b5 d1 fb f5 70 04 28 01 d4 |*....~t....p.(..| +peer1.org1.example.com | 00000020 6b 74 08 ee 02 20 34 7c 59 ee d6 9b 6c 45 1a a7 |kt... 4|Y...lE..| +peer1.org1.example.com | 00000030 5c c8 90 05 5b 54 73 23 a6 11 72 c0 f9 99 21 75 |\...[Ts#..r...!u| +peer1.org1.example.com | 00000040 76 34 5b e8 be 48 |v4[..H| +peer1.org1.example.com | [2a60 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2a61 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [2a62 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2a63 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2a64 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2a65 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a66 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a67 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a68 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [2a69 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a6a 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a6b 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2c74 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c75 11-19 05:22:40.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c76 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [2c77 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [2c78 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [2c79 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [2c7a 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c7b 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c7c 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +peer0.org2.example.com | 00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +peer0.org2.example.com | [2c7d 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +peer0.org2.example.com | 00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +peer0.org2.example.com | 00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +peer0.org2.example.com | 00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +peer0.org2.example.com | 00000040 69 8f 2f 73 d4 04 6d |i./s..m| +peer0.org2.example.com | [2c7e 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [2c7f 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [2c80 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c81 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c82 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c83 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c84 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c85 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c86 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c87 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c88 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a85d0 gate 1574140960063584900 evaluation starts +peer0.org2.example.com | [2c89 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a85d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c8a 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a85d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2c8b 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a85d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c8c 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a85d0 principal evaluation fails +peer0.org2.example.com | [2c8d 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a85d0 gate 1574140960063584900 evaluation fails +peer0.org2.example.com | [2c8e 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c8f 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c90 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2c91 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a8b40 gate 1574140960064803700 evaluation starts +peer0.org2.example.com | [2c92 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a8b40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c93 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a8b40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2c94 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a8b40 principal matched by identity 0 +peer0.org2.example.com | [2c95 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [2c96 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [2c97 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a8b40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c98 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a8b40 gate 1574140960064803700 evaluation succeeds +peer0.org2.example.com | [2c99 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c9a 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c9b 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c9c 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c9d 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c9e 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c9f 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ca0 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ca1 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ca2 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ca3 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ca4 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ca5 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a9ce0 gate 1574140960068731600 evaluation starts +peer0.org2.example.com | [2ca6 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a9ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ca7 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a9ce0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2ca8 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a9ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ca9 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a9ce0 principal evaluation fails +peer0.org2.example.com | [2caa 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a9ce0 gate 1574140960068731600 evaluation fails +peer0.org2.example.com | [2cab 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cac 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cad 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2cae 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094250 gate 1574140960069523000 evaluation starts +peer0.org2.example.com | [2caf 11-19 05:22:40.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2cb0 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2cb1 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094250 principal matched by identity 0 +peer0.org2.example.com | [2cb2 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [2cb3 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [2cb4 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094250 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2cb5 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094250 gate 1574140960069523000 evaluation succeeds +peer0.org2.example.com | [2cb6 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2cb7 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2cb8 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2cb9 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2cba 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cbb 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cbc 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cbd 11-19 05:22:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cbe 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cbf 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cc0 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cc1 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cc2 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2cc3 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [2cc4 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [2cc5 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cc6 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cc7 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cc8 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [2cc9 11-19 05:22:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cca 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ccb 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ccc 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ccd 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2cce 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 b5 e0 48 a1 f7 c1 a8 64 d9 12 db 88 de 32 4e |...H....d.....2N| +peer0.org2.example.com | 00000010 b8 87 fd 05 7e af ef b5 c4 0a 4a 6f d7 65 56 05 |....~.....Jo.eV.| +peer0.org2.example.com | [2ccf 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 f6 f1 ca 45 13 05 b5 2a 04 b0 |0E.!.....E...*..| +peer0.org2.example.com | 00000010 73 98 5d 7b 85 99 52 cd fe 34 3d 7a 39 68 71 bf |s.]{..R..4=z9hq.| +peer0.org2.example.com | 00000020 6d f9 cc 82 51 02 20 24 4c 87 6a f6 d3 b8 45 25 |m...Q. $L.j...E%| +peer0.org2.example.com | 00000030 94 3e ed 4e 6c 1a a2 09 b6 5e 61 01 d7 53 45 5e |.>.Nl....^a..SE^| +peer0.org2.example.com | 00000040 a9 64 78 c5 e3 a5 4d |.dx...M| +peer0.org2.example.com | [2cd0 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2cd1 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2cd2 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2cd3 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2cd4 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2cd5 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cd7 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cd8 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cd6 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2cd9 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cda 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2cdb 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cdc 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cdd 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cde 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cdf 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2ce0 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ce1 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2ce2 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ce3 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ce4 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ce5 11-19 05:22:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ce6 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ce7 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ce8 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ce9 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cea 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ceb 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cec 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ced 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [2cee 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cef 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2cf0 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cf1 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cf2 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2cf3 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2cf4 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2cf5 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924210 gate 1574140960787583500 evaluation starts +peer0.org2.example.com | [2cf6 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2cf7 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924210 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2cf8 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2cf9 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924210 principal evaluation fails +peer0.org2.example.com | [2cfa 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924210 gate 1574140960787583500 evaluation fails +peer0.org2.example.com | [2cfb 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cfc 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cfd 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2cfe 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924780 gate 1574140960790118200 evaluation starts +peer0.org2.example.com | [2cff 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d00 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924780 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2d01 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924780 principal matched by identity 0 +peer0.org2.example.com | [2d02 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c c1 4d d7 e6 df 6b b7 75 1c fb 12 f1 82 4f 03 |..M...k.u.....O.| +peer0.org2.example.com | 00000010 12 ea 04 1e ed 5a 04 93 07 d5 6a 3c 63 9b c6 f7 |.....Z....j DEBU Verify: sig = 00000000 30 45 02 21 00 94 1e 66 e6 8e 3a 6d 96 d1 8d a2 |0E.!...f..:m....| +peer0.org2.example.com | 00000010 f5 22 2e 67 9d 04 e7 18 ef 8f 0d c0 1f 10 50 04 |.".g..........P.| +peer0.org2.example.com | 00000020 f6 eb 29 ad d7 02 20 08 2f 47 cf 46 56 55 e6 d2 |..)... ./G.FVU..| +peer0.org2.example.com | 00000030 87 9b 0a 23 b1 1a 0b 30 d8 ec 55 3c bb 9d 09 03 |...#...0..U<....| +peer0.org2.example.com | 00000040 f8 7c bf 2e 13 28 53 |.|...(S| +peer0.org2.example.com | [2d04 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924780 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d05 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004924780 gate 1574140960790118200 evaluation succeeds +peer0.org2.example.com | [2d06 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d07 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d08 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d09 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d0a 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d0b 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2d0c 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2d0d 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2d0e 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2d0f 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d10 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d11 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d12 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d13 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d14 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d15 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d16 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d17 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d18 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d19 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2d1a 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d1b 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2d1c 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d1d 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d1e 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d1f 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d20 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d21 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d22 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d23 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d24 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d25 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d26 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d27 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d28 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2d29 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151028 +peer0.org2.example.com | [2d2a 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 26E7C66E91EB72F878FDA3D9B4903B2E3215E2F9483DF8F6B103D5CBADF6D806 +peer0.org2.example.com | [2d2b 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2d2c 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2d2d 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2d2e 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2d2f 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d30 11-19 05:22:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d31 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d32 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2d33 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d35 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2d34 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d38 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d37 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d39 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d36 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2d3a 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d3b 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d3c 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d3d 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d3e 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d3f 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d40 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d41 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d42 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d43 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d44 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [2d45 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d46 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d47 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d48 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d49 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2d4a 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d4b 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2d4c 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d4d 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d4e 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2d4f 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2d50 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2d51 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b010 gate 1574140962844761600 evaluation starts +peer0.org2.example.com | [2d52 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b010 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d53 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b010 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2d54 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2d55 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b010 principal evaluation fails +peer0.org2.example.com | [2d56 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b010 gate 1574140962844761600 evaluation fails +peer0.org2.example.com | [2d57 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d58 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d59 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2d5a 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b580 gate 1574140962846966800 evaluation starts +peer0.org2.example.com | [2d5b 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d5c 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b580 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2d5d 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b580 principal matched by identity 0 +peer0.org2.example.com | [2d5e 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer0.org2.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer0.org2.example.com | [2d5f 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer0.org2.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer0.org2.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer0.org2.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer0.org2.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer0.org2.example.com | [2d60 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b580 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d61 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00494b580 gate 1574140962846966800 evaluation succeeds +peer0.org2.example.com | [2d62 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d63 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d64 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d65 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d66 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d67 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2d68 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2a6c 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [2a6d 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a6e 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a6f 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a70 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a71 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a72 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a73 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a74 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a75 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a76 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a77 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a78 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a79 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a7a 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a7b 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a7c 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [2a7d 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a7e 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a7f 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a80 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [2a81 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a82 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a83 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a84 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a85 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a86 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2a87 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a88 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a89 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a8a 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a8b 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a8c 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a8d 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a8e 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043530b0 gate 1574140967458401800 evaluation starts +peer1.org1.example.com | [2a8f 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043530b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a90 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043530b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2a91 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043530b0 principal matched by identity 0 +peer1.org1.example.com | [2a92 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer1.org1.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer1.org1.example.com | [2a93 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer1.org1.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer1.org1.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer1.org1.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer1.org1.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer1.org1.example.com | [2a94 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043530b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a95 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043530b0 gate 1574140967458401800 evaluation succeeds +peer1.org1.example.com | [2a96 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a97 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a98 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a99 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a9a 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2a9b 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2a9c 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2a9d 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2a9e 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2a9f 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aa0 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aa1 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aa2 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [2aa3 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aa4 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aa5 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aa6 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2aa7 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2aa8 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aa9 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\2512Q\273\355\337\340\251\204Qir" > alive: alive:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > alive: +peer1.org1.example.com | [2aaa 11-19 05:22:47.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aab 11-19 05:22:47.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aac 11-19 05:22:47.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2aad 11-19 05:22:47.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ab0 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aae 11-19 05:22:47.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ab1 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aaf 11-19 05:22:47.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ab2 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ab3 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ab4 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ab5 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2ab6 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2ab7 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [2ab8 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [2ab9 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2aba 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2abb 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2abc 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2abd 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2abe 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2abf 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ac0 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ac1 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ac2 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377d60 gate 1574140967602597600 evaluation starts +peer1.org1.example.com | [2ac3 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377d60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ac4 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377d60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2ac5 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377d60 principal matched by identity 0 +peer1.org1.example.com | [2ac6 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2ac7 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2ac8 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377d60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ac9 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004377d60 gate 1574140967602597600 evaluation succeeds +peer1.org1.example.com | [2aca 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2acb 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2acc 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2acd 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ace 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2acf 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ad0 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2ad1 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ad2 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ad3 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ad4 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ad5 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ad6 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2ef0 gate 1574140967605115400 evaluation starts +peer1.org1.example.com | [2ad7 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2ef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ad8 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2ef0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2ad9 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2ef0 principal matched by identity 0 +peer1.org1.example.com | [2ada 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2adb 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2adc 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2ef0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2add 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2ef0 gate 1574140967605115400 evaluation succeeds +peer1.org1.example.com | [2ade 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2adf 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ae0 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ae1 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ae2 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ae3 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ae4 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ae5 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ae6 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ae7 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2ae8 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ae9 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2aea 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2aeb 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2aec 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2aed 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c62d0 gate 1574140967606741300 evaluation starts +peer1.org1.example.com | [2aee 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c62d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2aef 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c62d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2af0 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c62d0 principal matched by identity 0 +peer1.org1.example.com | [2af1 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2af2 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2af3 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c62d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2af4 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c62d0 gate 1574140967606741300 evaluation succeeds +peer1.org1.example.com | [2af5 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2af6 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2af7 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2af8 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2af9 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2afa 11-19 05:22:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2afb 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [2afc 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [2afd 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2afe 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aff 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b00 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b01 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b02 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b03 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b04 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b05 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e4160 gate 1574140967617065200 evaluation starts +peer1.org1.example.com | [2b06 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e4160 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b07 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e4160 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2b08 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e4160 principal matched by identity 0 +peer1.org1.example.com | [2b09 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2b0a 11-19 05:22:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2b0b 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e4160 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b0c 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e4160 gate 1574140967617065200 evaluation succeeds +peer1.org1.example.com | [2b0d 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b0e 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b0f 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b10 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b11 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b12 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b13 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b14 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b15 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b16 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b17 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b18 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b19 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b1a 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b1b 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b1c 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5540 gate 1574140967626074100 evaluation starts +peer1.org1.example.com | [2b1d 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b1e 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5540 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2b1f 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5540 principal matched by identity 0 +peer1.org1.example.com | [2b20 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2b21 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2b22 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5540 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b23 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5540 gate 1574140967626074100 evaluation succeeds +peer1.org1.example.com | [2b24 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b25 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b26 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b27 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b28 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2b29 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2b2a 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [2b2b 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [2b2c 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b2d 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b2e 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b2f 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b30 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b31 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b32 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b33 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b34 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044033d0 gate 1574140967629843800 evaluation starts +peer1.org1.example.com | [2b35 11-19 05:22:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044033d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b36 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044033d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2b37 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044033d0 principal matched by identity 0 +peer1.org1.example.com | [2b38 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2b39 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2b3a 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044033d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b3b 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044033d0 gate 1574140967629843800 evaluation succeeds +peer1.org1.example.com | [2b3c 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b3d 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b3e 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b3f 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b40 11-19 05:22:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b41 11-19 05:22:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b42 11-19 05:22:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b43 11-19 05:22:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2b44 11-19 05:22:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b45 11-19 05:22:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 06 2c bb 35 12 b9 66 e9 a2 cb 06 57 90 59 0f 1d |.,.5..f....W.Y..| +peer1.org2.example.com | 00000020 db d4 b1 5c 02 20 53 23 54 18 4a c2 cb c3 ba 1a |...\. S#T.J.....| +peer0.org2.example.com | [2d69 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2b46 11-19 05:22:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cab 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 aa 7a 2c d0 c6 8b bb 26 3f cf |0E.!...z,....&?.| +peer1.org2.example.com | 00000030 2d de 18 3c 29 d0 ac eb 78 d5 12 10 c4 18 11 d5 |-..<)...x.......| +peer0.org2.example.com | [2d6a 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2b47 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 a9 08 96 6b cb f2 c3 31 05 77 e6 4c 91 e2 b4 82 |...k...1.w.L....| +peer1.org2.example.com | 00000040 65 90 7a 6d 64 67 |e.zmdg| +peer0.org2.example.com | [2d6b 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b48 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 87 9a ad 75 0a 02 20 26 3c 28 0e a7 7b c0 8d 70 |...u.. &<(..{..p| +peer0.org2.example.com | [2d6c 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b49 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 c4 6a e0 a9 59 b3 25 7e 50 fd d1 bc 3c 53 56 de |.j..Y.%~P... DEBU Exiting +peer0.org2.example.com | [2d6d 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b4a 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 13 7f 03 e4 0f 2e 3e |......>| +peer1.org2.example.com | [2e59 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer0.org2.example.com | [2d6e 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | [2cac 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e5a 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org1.example.com | [2b4b 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d6f 11-19 05:22:42.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cad 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 gate 1574140959842436200 evaluation succeeds +peer1.org2.example.com | [2e5b 11-19 05:22:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2b4c 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2d70 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cae 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e5c 11-19 05:22:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15102C +peer1.org1.example.com | [2b4d 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d71 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2caf 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e5d 11-19 05:22:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3CFFB93D40B7B9CE1DE044B20DCC7A8D94D45FFDCD5AF8075B948B442A0F9162 +peer1.org1.example.com | [2b4e 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2d72 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cb0 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e5e 11-19 05:22:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2b4f 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d73 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\355Nl\032\242\t\266^a\001\327SE^\251dx\305\343\245M" > alive:N\243i\022\203\234;\177\342m\325\036\026\207\nY\025\255_\013m\307\364\212\271\204\325?\310\315\250\002 Imb\355\014t\303\377+f\306\224d\204\000\030M\326\202\306{\341q\356\220rkqF\027AJ" > +peer0.org1.example.com | [2cb1 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2e5f 11-19 05:22:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2b50 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [2d74 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cb2 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org2.example.com | [2e60 11-19 05:22:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [2b51 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d75 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cb3 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] handling GET_STATE from chaincode +peer1.org2.example.com | [2e61 11-19 05:22:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2b52 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d76 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e62 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cb4 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] getting state for chaincode lscc, key exp02, channel businesschannel +peer1.org1.example.com | [2b54 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d77 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e63 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cb5 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2b56 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d78 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e64 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cb6 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] Completed GET_STATE. Sending RESPONSE +peer1.org1.example.com | [2b55 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d79 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e65 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2cb7 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [2b53 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d7a 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e66 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2cb8 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] notifying Txid:ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d, channelID:businesschannel +peer1.org1.example.com | [2b57 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d7b 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e67 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2cb9 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [2b58 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d7c 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e68 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cba 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ff3e5552] Exit chaincode: name:"lscc" (7ms) +peer1.org1.example.com | [2b59 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d7d 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [2e6a 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2cbb 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [2d7e 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b5a 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e6b 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2cbc 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d] +peer0.org2.example.com | [2d7f 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b5c 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e6d 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cbd 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] Exit +peer0.org2.example.com | [2d80 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b5b 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e6c 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2cbe 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] Entry chaincode: name:"lscc" +peer0.org2.example.com | [2d81 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b5d 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e69 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cbf 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] escc for chaincode name:"lscc" is escc +peer0.org2.example.com | [2d82 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2b5e 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e6e 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cc0 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d, chaincode: lscc} +peer0.org2.example.com | [2d83 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer1.org1.example.com | [2b5f 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e6f 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cc1 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A65A7C15F607E85291E61BB2CC4F...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer1.org1.example.com | [2b60 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e70 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cc2 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4B05954EA029F5FB3126F8D207EE24D807D321E14584530547AB18BD9A867408 +peer0.org2.example.com | [2d84 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer1.org1.example.com | [2b61 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e71 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cc3 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d, chaincode: lscc} +peer0.org2.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer1.org1.example.com | [2b62 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e72 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [2cc4 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] Exit +peer0.org2.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer1.org1.example.com | [2b63 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e73 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cc5 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d] +peer0.org2.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer1.org1.example.com | [2b64 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cc6 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45658 +peer1.org2.example.com | [2e74 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer1.org1.example.com | [2b65 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cc7 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45658 grpc.code=OK grpc.call_duration=17.2089ms +peer1.org2.example.com | [2e75 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d85 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [2b66 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cc8 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e76 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [2b67 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cc9 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2e77 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2d86 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 cd de 18 6f fc c1 7f 35 2d c0 |0E.!.....o...5-.| +peer1.org1.example.com | [2b68 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cca 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2e78 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 43 18 dd 18 65 e8 1d 52 5e 8d fa 49 23 6f 0a 3a |C...e..R^..I#o.:| +peer1.org1.example.com | [2b69 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ccb 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e79 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000020 28 8c 23 2f 04 02 20 75 72 2f 51 ff 4a fd 44 28 |(.#/.. ur/Q.J.D(| +peer1.org1.example.com | [2b6a 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ccc 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e7a 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaad0 gate 1574140965758615400 evaluation starts +peer0.org2.example.com | 00000030 a5 7a bc 80 d7 4c 66 5f 77 ca 03 a1 7c 6c a2 6e |.z...Lf_w...|l.n| +peer1.org1.example.com | [2b6b 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ccd 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e7b 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 2c 4d 6d 3b 2d 55 99 |,Mm;-U.| +peer1.org1.example.com | [2b6c 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [2cce 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e7c 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaad0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2d87 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2b6d 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ccf 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [2e7d 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2d88 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [2b6e 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cd0 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e7e 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaad0 principal evaluation fails +peer0.org2.example.com | [2d89 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2b6f 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e7f 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaad0 gate 1574140965758615400 evaluation fails +peer0.org1.example.com | [2cd1 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2d8a 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2b70 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e80 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cd2 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d8b 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2b71 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e81 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cd3 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d8c 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b72 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [2e82 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2cd4 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2d8d 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b73 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e83 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab040 gate 1574140965759581100 evaluation starts +peer0.org1.example.com | [2cd5 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2d8e 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e84 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab040 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cd6 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b74 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2d8f 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org2.example.com | [2e85 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab040 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2cd7 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 gate 1574140959873188700 evaluation starts +peer1.org1.example.com | [2b75 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d90 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e86 11-19 05:22:45.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab040 principal matched by identity 0 +peer0.org1.example.com | [2cd8 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b76 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d91 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e87 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d a5 0a af 4e b2 ef 5e 59 87 0e 20 57 3a 0d c3 |....N..^Y.. W:..| +peer0.org1.example.com | [2cd9 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2b77 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2d92 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 bd da 3f 70 a1 59 3b fc 27 db 09 4b fc 67 2e 21 |..?p.Y;.'..K.g.!| +peer0.org1.example.com | [2cda 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 principal matched by identity 0 +peer1.org1.example.com | [2b78 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2d93 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\314\033N\tp\206\241\033\254\341 \3637\245" secret_envelope: > alive:N\243i\022\203\234;\177\342m\325\036\026\207\nY\025\255_\013m\307\364\212\271\204\325?\310\315\250\002 Imb\355\014t\303\377+f\306\224d\204\000\030M\326\202\306{\341q\356\220rkqF\027AJ" > +peer1.org2.example.com | [2e88 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 18 ce ea 32 59 59 8e 91 fd b7 87 |0D. t...2YY.....| +peer0.org1.example.com | [2cdb 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 4f 58 c8 cd 2b 73 96 ae 18 00 4a ef 90 8a c4 |ROX..+s....J....| +peer1.org1.example.com | [2b79 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2d94 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 96 17 ea fa 15 59 46 0d ff 5d 4a e4 5b df 4a 14 |.....YF..]J.[.J.| +peer0.org1.example.com | 00000010 51 3c 45 54 43 ae a4 51 c0 b9 91 91 98 14 db 0c |Q DEBU 0xc004419bb0 gate 1574140967830488800 evaluation starts +peer0.org2.example.com | [2d95 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 35 e8 94 a1 02 20 7d 66 cd 1c ac 2b a8 09 df e5 |5.... }f...+....| +peer0.org1.example.com | [2cdc 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d 61 44 dc e3 5e 99 b8 d7 a0 |0E.!..]aD..^....| +peer1.org1.example.com | [2b7b 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d96 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 9d 91 19 df da d9 92 b8 1e 56 57 50 31 12 c7 de |.........VWP1...| +peer0.org1.example.com | 00000010 90 d6 7a 38 b7 57 ce f5 58 f5 cb 97 26 e4 77 1f |..z8.W..X...&.w.| +peer1.org1.example.com | [2b7c 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419bb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2d97 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 81 c5 7e 2a 54 de |..~*T.| +peer0.org1.example.com | 00000020 9a 11 46 83 38 02 20 58 83 7b 51 65 27 c5 c8 b2 |..F.8. X.{Qe'...| +peer1.org1.example.com | [2b7d 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419bb0 principal matched by identity 0 +peer0.org2.example.com | [2d98 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e89 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab040 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000030 2e aa 5b e1 cb f7 6c 34 62 a8 ad 82 a1 e9 fb 20 |..[...l4b...... | +peer1.org1.example.com | [2b7e 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 2b fb 56 66 72 0c a1 7c 1c 98 f3 54 67 d0 19 |.+.Vfr..|...Tg..| +peer0.org2.example.com | [2d99 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e8a 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab040 gate 1574140965759581100 evaluation succeeds +peer0.org1.example.com | 00000040 df 2e 7e e5 7b 9d 4a |..~.{.J| +peer1.org1.example.com | 00000010 c9 bc 06 04 31 fa 64 6e 29 47 29 dc b7 92 13 2b |....1.dn)G)....+| +peer0.org2.example.com | [2d9a 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e8b 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2cdd 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b7f 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af 25 dd be 12 c8 98 26 b3 8c |0E.!...%.....&..| +peer0.org2.example.com | [2d9b 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e8c 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2cde 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 gate 1574140959873188700 evaluation succeeds +peer1.org1.example.com | 00000010 08 82 59 26 5d 1c 57 8f a5 f2 15 c2 3b 88 64 69 |..Y&].W.....;.di| +peer0.org2.example.com | [2d9c 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e8d 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2cdf 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 d4 68 bd dd 2c 02 20 32 7c 14 51 73 12 00 9c 00 |.h..,. 2|.Qs....| +peer0.org2.example.com | [2d9d 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e8e 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ce0 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 35 5c 11 4a 88 e9 36 02 0e 4c cf da f6 55 9a 61 |5\.J..6..L...U.a| +peer0.org2.example.com | [2d9e 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e8f 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2ce1 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 94 99 31 4d 03 90 08 |..1M...| +peer0.org2.example.com | [2d9f 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e90 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2ce2 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b80 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419bb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2da0 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e91 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2ce3 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b81 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419bb0 gate 1574140967830488800 evaluation succeeds +peer0.org2.example.com | [2da1 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e92 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2ce4 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2b82 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2da2 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e93 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2ce5 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2b83 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2da3 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [2e94 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ce6 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2b84 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2da4 11-19 05:22:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e95 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ce7 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2b85 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2da5 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2e96 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ce8 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b86 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2da6 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e97 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2ce9 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b87 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2da7 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2e98 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cea 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b88 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2da8 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e99 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ceb 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [2b89 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2da9 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2e9a 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cec 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b8a 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2daa 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e9b 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ced 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b8b 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dab 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cee 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e9c 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b8c 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dac 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cef 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e9d 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b8d 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dad 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cf0 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:/0\250\0062M\241\203\305\223\223\246a." > +peer1.org2.example.com | [2e9e 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b8e 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | [2dae 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cf1 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e9f 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b8f 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2daf 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cf2 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea0 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b90 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2db0 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea1 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cf3 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b91 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2db1 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea2 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cf4 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2db2 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea3 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b92 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cf5 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2db3 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea4 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b93 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > alive: +peer0.org1.example.com | [2cf6 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2db4 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea5 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b94 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cf7 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [2db5 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea6 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b95 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cf8 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 57 f7 09 74 93 35 a4 81 07 99 14 aa 26 89 ad |.W..t.5......&..| +peer0.org2.example.com | [2db6 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea7 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2b96 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 b4 e4 10 e7 e1 9e e8 26 50 4c ba 88 af 3e 9a 98 |.......&PL...>..| +peer0.org2.example.com | [2db7 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea8 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b97 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cf9 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 e6 fd cf 74 45 bd 4f 6d 1e cc 72 |0D. !...tE.Om..r| +peer0.org2.example.com | [2db8 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea9 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2b98 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e2 7e c2 ff 2c 57 3f a7 6d 14 47 f2 20 6f 53 01 |.~..,W?.m.G. oS.| +peer0.org2.example.com | [2db9 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eaa 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b99 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 22 c7 49 40 02 20 24 c1 91 9f 37 a6 a8 83 e2 36 |".I@. $...7....6| +peer0.org2.example.com | [2dba 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2eab 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b9a 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 8f 52 b3 be 3d 2f 5d 6e d7 8c 44 ae 82 08 c2 b4 |.R..=/]n..D.....| +peer0.org2.example.com | [2dbb 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151029 +peer1.org2.example.com | [2eac 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b9b 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000040 07 be c5 a0 06 c3 |......| +peer0.org2.example.com | [2dbc 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 08CEF34A286FFD2D1F68B30DA53C849F000C01FFE8953E308E780BB5F52DE955 +peer1.org2.example.com | [2ead 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b9c 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15102E +peer0.org1.example.com | [2cfa 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [2dbd 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2eae 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b9d 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE33456F4F885C62578264CDEE207C3DBAF2E19D2991D683335E6CB6DDD2E7EE +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [2dbe 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2eaf 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b9e 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cfb 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 48 c1 da 77 89 df 49 95 81 42 59 |0D. .H..w..I..BY| +peer0.org2.example.com | [2dbf 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [2eb0 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b9f 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 40 f6 f4 58 2a 93 8e fd c8 3f 2d ce 71 5d 92 34 |@..X*....?-.q].4| +peer0.org2.example.com | [2dc0 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" secret_envelope:\024\313\252_\224M\201\276\215)ys\310\355\003J=%" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2eb1 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ba0 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000020 2c e7 4b f5 02 20 57 33 7a 65 bf a2 49 36 2c a9 |,.K.. W3ze..I6,.| +peer0.org2.example.com | [2dc1 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eb2 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [2ba1 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000030 6f 13 f6 8e 65 cf 9e 2c 66 16 0f 2f 8f f7 f4 64 |o...e..,f../...d| +peer0.org2.example.com | [2dc2 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2eb3 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 ee 04 07 62 b0 a8 b7 bc 56 90 2a 9d 25 28 d8 |....b....V.*.%(.| +peer1.org1.example.com | [2ba2 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 05 b5 1f c6 ac 2f |...../| +peer0.org2.example.com | [2dc3 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 21 0a 01 9a 20 92 e9 a8 cf ab 41 aa a1 a4 b4 27 |!... .....A....'| +peer1.org1.example.com | [2ba3 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cfc 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2dc4 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2eb4 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f5 16 6d 14 7e 2a bc 60 a9 57 93 |0D. X..m.~*.`.W.| +peer1.org1.example.com | [2ba4 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cfd 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2dc5 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 de 91 c2 0c f7 92 b1 73 33 23 36 5f 6c e9 4e 60 |.......s3#6_l.N`| +peer1.org1.example.com | [2ba5 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cfe 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2dc6 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 75 77 b1 95 02 20 43 8d d9 e0 c1 c7 3b cf 50 f0 |uw... C.....;.P.| +peer1.org1.example.com | [2ba6 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cff 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2dc7 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 8a 72 9d ed 6f 5b e6 f2 89 3e a9 32 51 bb ed df |.r..o[...>.2Q...| +peer1.org1.example.com | [2ba7 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d00 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2dc8 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 e0 a9 84 51 69 72 |...Qir| +peer1.org1.example.com | [2ba8 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d01 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dc9 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" secret_envelope:\024\313\252_\224M\201\276\215)ys\310\355\003J=%" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eb5 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ba9 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d02 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dca 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eb6 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2d03 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [2baa 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dcb 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eb7 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2d04 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bab 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dcc 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eb8 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2d05 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bac 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dcd 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eb9 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2d06 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2bad 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dce 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [2eba 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bae 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d07 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:/0\250\0062M\241\203\305\223\223\246a." > +peer0.org2.example.com | [2dcf 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce f3 4a 28 6f fd 2d 1f 68 b3 0d a5 3c 84 9f |...J(o.-.h...<..| +peer1.org2.example.com | [2ebb 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2baf 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d08 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 00 0c 01 ff e8 95 3e 30 8e 78 0b b5 f5 2d e9 55 |......>0.x...-.U| +peer1.org2.example.com | [2ebd 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bb0 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [2d09 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dd0 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 05 50 ab 44 93 6e 30 0d 5d 66 29 |0D. D.P.D.n0.]f)| +peer1.org2.example.com | [2ebc 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb1 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 33 45 6f 4f 88 5c 62 57 82 64 cd ee 20 7c 3d |.3EoO.\bW.d.. |=| +peer0.org1.example.com | [2d0a 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 b1 44 9b 2b c2 a1 67 90 e8 2d b2 b0 46 7d 74 f5 |.D.+..g..-..F}t.| +peer1.org2.example.com | [2ebe 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 ba f2 e1 9d 29 91 d6 83 33 5e 6c b6 dd d2 e7 ee |....)...3^l.....| +peer0.org1.example.com | [2d0b 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 ba 49 78 df 02 20 49 09 7f 48 bd e9 c5 10 bf 91 |.Ix.. I..H......| +peer1.org2.example.com | [2ebf 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb2 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cd b0 8f 9a df 2f 34 fb 5c fd |0E.!......./4.\.| +peer0.org1.example.com | [2d0c 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 73 1b 45 93 d4 cb 59 37 d9 fc fc bb b2 3e b9 1b |s.E...Y7.....>..| +peer1.org2.example.com | [2ec0 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 d0 9c ac 6e a0 d4 d9 68 1d b3 f5 a9 c9 42 e2 a7 |...n...h.....B..| +peer0.org1.example.com | [2d0d 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 77 f5 b9 1a 48 ae |w...H.| +peer1.org2.example.com | [2ec1 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 3f b0 8c 94 d8 02 20 77 23 28 ea 66 db 39 7d 4a |?..... w#(.f.9}J| +peer0.org1.example.com | [2d0e 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dd1 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | [2ec2 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 32 23 aa 6c a9 ee e0 9a 6b f5 3c b7 6d f1 f7 63 |2#.l....k.<.m..c| +peer0.org1.example.com | [2d0f 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2ec3 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 b7 33 77 5a 21 87 a7 |.3wZ!..| +peer0.org1.example.com | [2d10 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dd2 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 73 58 45 6d db 9b 19 88 4c e4 |0E.!..sXEm....L.| +peer1.org2.example.com | [2ec4 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2bb3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | [2d11 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 81 52 05 88 14 ff bf ea d2 40 7a 8e 3c b3 a7 1a |.R.......@z.<...| +peer1.org2.example.com | [2ec5 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2d12 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 5f 84 f3 fd bd 02 20 2a c5 d0 9d a2 36 ac 75 8d |_..... *....6.u.| +peer1.org2.example.com | [2ec6 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2bb4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b bb 7a 39 be fd 72 71 fc 48 e4 |0E.!...z9..rq.H.| +peer0.org1.example.com | [2d13 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 8d 26 d2 f0 3e 14 cb aa 5f 94 4d 81 be 8d 29 79 |.&..>..._.M...)y| +peer1.org2.example.com | [2ec7 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 ba 83 2f a7 b1 09 6b 94 e9 f1 b1 0e 8a 29 fd 33 |../...k......).3| +peer0.org1.example.com | [2d14 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 73 c8 ed 03 4a 3d 25 |s...J=%| +peer1.org2.example.com | [2ec8 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 a9 9b 54 cc 36 02 20 52 7d 20 e4 7f 72 c1 01 af |..T.6. R} ..r...| +peer0.org1.example.com | [2d15 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2dd3 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2ec9 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000030 3c 3d 41 4b 43 bf 38 b4 d9 e3 52 76 15 61 4a 19 |<=AKC.8...Rv.aJ.| +peer0.org1.example.com | [2d16 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2dd4 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2eca 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 4d 16 d7 aa ac 12 b9 |M......| +peer0.org1.example.com | [2d17 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2dd5 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ecb 11-19 05:22:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bb5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2d18 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2dd6 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ecc 11-19 05:22:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2d19 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2dd7 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ecd 11-19 05:22:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bb7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d1a 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 gate 1574140960007325100 evaluation starts +peer0.org2.example.com | [2dd8 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ece 11-19 05:22:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d1b 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2dd9 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ecf 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bb9 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d1c 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2dda 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [2ed0 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bba 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d1d 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 principal matched by identity 0 +peer0.org2.example.com | [2ddb 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce f3 4a 28 6f fd 2d 1f 68 b3 0d a5 3c 84 9f |...J(o.-.h...<..| +peer1.org2.example.com | [2ed1 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bbb 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d1e 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 00 0c 01 ff e8 95 3e 30 8e 78 0b b5 f5 2d e9 55 |......>0.x...-.U| +peer1.org2.example.com | [2ed2 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bbc 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [2ddc 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 05 50 ab 44 93 6e 30 0d 5d 66 29 |0D. D.P.D.n0.]f)| +peer1.org2.example.com | [2ed3 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bbd 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2d1f 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 b1 44 9b 2b c2 a1 67 90 e8 2d b2 b0 46 7d 74 f5 |.D.+..g..-..F}t.| +peer1.org2.example.com | [2ed4 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bbe 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 ba 49 78 df 02 20 49 09 7f 48 bd e9 c5 10 bf 91 |.Ix.. I..H......| +peer1.org2.example.com | [2ed5 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | [2ed6 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 73 1b 45 93 d4 cb 59 37 d9 fc fc bb b2 3e b9 1b |s.E...Y7.....>..| +peer1.org1.example.com | [2bbf 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | [2ed7 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | 00000040 77 f5 b9 1a 48 ae |w...H.| +peer1.org1.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2ed8 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ddd 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org1.example.com | [2d20 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ed9 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dde 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org1.example.com | [2d21 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 gate 1574140960007325100 evaluation succeeds +peer1.org2.example.com | [2eda 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ddf 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org1.example.com | [2d22 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2edb 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2de1 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bc0 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d23 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2edc 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2de0 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2bc1 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2edd 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d24 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2de2 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer1.org1.example.com | [2bc2 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [2d25 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ede 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer1.org1.example.com | [2bc3 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d26 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2edf 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2de3 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer0.org1.example.com | [2d27 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bc4 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2ee0 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer0.org1.example.com | [2d28 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bc5 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ee1 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer0.org1.example.com | [2d29 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bc6 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ee2 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer0.org1.example.com | [2d2a 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bc7 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ee3 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer0.org1.example.com | [2d2b 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2bc8 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ee4 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4990 gate 1574140966862156400 evaluation starts +peer0.org2.example.com | [2de4 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d2c 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bc9 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ee5 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4990 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2de5 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d2d 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bca 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449c3a0 gate 1574140967941819400 evaluation starts +peer1.org2.example.com | [2ee6 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4990 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2de6 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d2e 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2bcb 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449c3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ee7 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2de7 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d2f 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2bcc 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449c3a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2ee8 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4990 principal evaluation fails +peer0.org2.example.com | [2de9 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [2d30 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2bcd 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449c3a0 principal matched by identity 0 +peer1.org2.example.com | [2ee9 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4990 gate 1574140966862156400 evaluation fails +peer0.org2.example.com | [2de8 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d31 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 gate 1574140960026320800 evaluation starts +peer1.org1.example.com | [2bce 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 2b fb 56 66 72 0c a1 7c 1c 98 f3 54 67 d0 19 |.+.Vfr..|...Tg..| +peer1.org2.example.com | [2eea 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2dea 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce f3 4a 28 6f fd 2d 1f 68 b3 0d a5 3c 84 9f |...J(o.-.h...<..| +peer0.org1.example.com | [2d32 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 c9 bc 06 04 31 fa 64 6e 29 47 29 dc b7 92 13 2b |....1.dn)G)....+| +peer1.org2.example.com | [2eeb 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 00 0c 01 ff e8 95 3e 30 8e 78 0b b5 f5 2d e9 55 |......>0.x...-.U| +peer0.org1.example.com | [2d33 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2bcf 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af 25 dd be 12 c8 98 26 b3 8c |0E.!...%.....&..| +peer1.org2.example.com | [2eec 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2deb 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 05 50 ab 44 93 6e 30 0d 5d 66 29 |0D. D.P.D.n0.]f)| +peer0.org1.example.com | [2d34 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 principal matched by identity 0 +peer1.org1.example.com | 00000010 08 82 59 26 5d 1c 57 8f a5 f2 15 c2 3b 88 64 69 |..Y&].W.....;.di| +peer1.org2.example.com | [2eed 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4f00 gate 1574140966862617600 evaluation starts +peer0.org2.example.com | 00000010 b1 44 9b 2b c2 a1 67 90 e8 2d b2 b0 46 7d 74 f5 |.D.+..g..-..F}t.| +peer0.org1.example.com | [2d35 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000020 d4 68 bd dd 2c 02 20 32 7c 14 51 73 12 00 9c 00 |.h..,. 2|.Qs....| +peer1.org2.example.com | [2eee 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4f00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 ba 49 78 df 02 20 49 09 7f 48 bd e9 c5 10 bf 91 |.Ix.. I..H......| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | 00000030 35 5c 11 4a 88 e9 36 02 0e 4c cf da f6 55 9a 61 |5\.J..6..L...U.a| +peer1.org2.example.com | [2eef 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4f00 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000030 73 1b 45 93 d4 cb 59 37 d9 fc fc bb b2 3e b9 1b |s.E...Y7.....>..| +peer0.org1.example.com | [2d36 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000040 94 99 31 4d 03 90 08 |..1M...| +peer1.org2.example.com | [2ef0 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4f00 principal matched by identity 0 +peer0.org2.example.com | 00000040 77 f5 b9 1a 48 ae |w...H.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | [2bd0 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449c3a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ef1 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org2.example.com | [2dec 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | [2bd1 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449c3a0 gate 1574140967941819400 evaluation succeeds +peer1.org2.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org2.example.com | [2ded 11-19 05:22:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | [2bd2 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ef2 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org2.example.com | [2dee 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2bd3 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org2.example.com | [2def 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2d37 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2bd4 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org2.example.com | [2df0 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d38 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 gate 1574140960026320800 evaluation succeeds +peer1.org1.example.com | [2bd5 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org2.example.com | [2df1 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d39 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bd6 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org2.example.com | [2df2 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d3a 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bd7 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ef3 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4f00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d3b 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2df3 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bd8 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [2ef4 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee4f00 gate 1574140966862617600 evaluation succeeds +peer0.org1.example.com | [2d3c 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2df4 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2bd9 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 33 45 6f 4f 88 5c 62 57 82 64 cd ee 20 7c 3d |.3EoO.\bW.d.. |=| +peer1.org2.example.com | [2ef5 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2d3d 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2df5 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 ba f2 e1 9d 29 91 d6 83 33 5e 6c b6 dd d2 e7 ee |....)...3^l.....| +peer1.org2.example.com | [2ef6 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2d3e 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2df6 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2bda 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cd b0 8f 9a df 2f 34 fb 5c fd |0E.!......./4.\.| +peer1.org2.example.com | [2ef7 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d3f 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45662 +peer0.org2.example.com | [2df7 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8a7e0 gate 1574140963863083200 evaluation starts +peer1.org1.example.com | 00000010 d0 9c ac 6e a0 d4 d9 68 1d b3 f5 a9 c9 42 e2 a7 |...n...h.....B..| +peer1.org2.example.com | [2ef8 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d40 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040a0fa0 +peer0.org2.example.com | [2df8 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8a7e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 3f b0 8c 94 d8 02 20 77 23 28 ea 66 db 39 7d 4a |?..... w#(.f.9}J| +peer1.org2.example.com | [2ef9 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d41 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2df9 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8a7e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000030 32 23 aa 6c a9 ee e0 9a 6b f5 3c b7 6d f1 f7 63 |2#.l....k.<.m..c| +peer1.org2.example.com | [2efa 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2d42 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2dfa 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8a7e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000040 b7 33 77 5a 21 87 a7 |.3wZ!..| +peer1.org2.example.com | [2efb 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2d43 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2dfb 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8a7e0 principal evaluation fails +peer1.org1.example.com | [2bdb 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2efc 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2d44 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org2.example.com | [2dfc 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8a7e0 gate 1574140963863083200 evaluation fails +peer1.org1.example.com | [2bdc 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2efd 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2d45 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2dfd 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bdd 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2efe 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d46 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 e1 e8 55 1a 49 f0 09 3d cd a7 23 cb 50 4b c1 |g..U.I..=..#.PK.| +peer0.org2.example.com | [2dfe 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bde 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eff 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 c3 42 7b 60 16 9e 04 6d be e8 aa c4 81 70 b1 ca |.B{`...m.....p..| +peer0.org2.example.com | [2dff 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2bdf 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f00 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d47 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d d9 d5 cc 71 95 48 67 47 27 de 0f |0D. ....q.HgG'..| +peer0.org2.example.com | [2e00 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8ad50 gate 1574140963866987500 evaluation starts +peer1.org1.example.com | [2be0 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 19 98 35 5c d5 21 1f ea db ae 89 38 20 39 5e 59 |..5\.!.....8 9^Y| +peer1.org2.example.com | [2f01 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [2e01 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8ad50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2be1 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 12 a7 09 4b 02 20 03 d6 8e 0d 89 6a 8a 87 86 3a |...K. .....j...:| +peer1.org2.example.com | [2f02 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e02 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8ad50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2be2 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 39 ae 4d e4 85 4a e6 ac 46 2f 5a aa 6c b5 f9 e5 |9.M..J..F/Z.l...| +peer1.org2.example.com | [2f03 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e03 11-19 05:22:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8ad50 principal matched by identity 0 +peer1.org1.example.com | [2be3 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000040 9a 0c 12 78 3a a9 |...x:.| +peer1.org2.example.com | [2f04 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e04 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer1.org1.example.com | [2be4 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 33 45 6f 4f 88 5c 62 57 82 64 cd ee 20 7c 3d |.3EoO.\bW.d.. |=| +peer0.org1.example.com | [2d48 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [2f05 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer1.org1.example.com | 00000010 ba f2 e1 9d 29 91 d6 83 33 5e 6c b6 dd d2 e7 ee |....)...3^l.....| +peer0.org1.example.com | [2d49 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00302da40, header 0xc0040a1450 +peer1.org2.example.com | [2f06 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\2512Q\273\355\337\340\251\204Qir" > alive: alive:vy\027\352F\2520\204\304=\203\026p\372" > +peer0.org2.example.com | [2e05 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer1.org1.example.com | [2be5 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cd b0 8f 9a df 2f 34 fb 5c fd |0E.!......./4.\.| +peer0.org1.example.com | [2d4a 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org2.example.com | [2f07 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer1.org1.example.com | 00000010 d0 9c ac 6e a0 d4 d9 68 1d b3 f5 a9 c9 42 e2 a7 |...n...h.....B..| +peer0.org1.example.com | [2d4b 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] processing txid: 721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997 +peer1.org2.example.com | [2f08 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer1.org1.example.com | 00000020 3f b0 8c 94 d8 02 20 77 23 28 ea 66 db 39 7d 4a |?..... w#(.f.9}J| +peer0.org1.example.com | [2d4c 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997] +peer1.org2.example.com | [2f09 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer1.org1.example.com | 00000030 32 23 aa 6c a9 ee e0 9a 6b f5 3c b7 6d f1 f7 63 |2#.l....k.<.m..c| +peer0.org1.example.com | [2d4d 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [2f0a 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer1.org1.example.com | 00000040 b7 33 77 5a 21 87 a7 |.3wZ!..| +peer0.org1.example.com | [2d4e 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997] +peer1.org2.example.com | [2f0b 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e06 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8ad50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2be6 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d4f 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] Entry chaincode: name:"lscc" +peer1.org2.example.com | [2f0c 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e07 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8ad50 gate 1574140963866987500 evaluation succeeds +peer1.org1.example.com | [2be7 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d50 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][721fbd11] Entry chaincode: name:"lscc" +peer1.org2.example.com | [2f0d 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e08 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2be8 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d51 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [2f0e 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2e09 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2be9 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2d52 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 e1 e8 55 1a 49 f0 09 3d cd a7 23 cb 50 4b c1 |g..U.I..=..#.PK.| +peer1.org2.example.com | [2f0f 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e0a 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2bea 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org1.example.com | 00000010 c3 42 7b 60 16 9e 04 6d be e8 aa c4 81 70 b1 ca |.B{`...m.....p..| +peer1.org2.example.com | [2f10 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2e0b 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org1.example.com | [2d53 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d d9 d5 cc 71 95 48 67 47 27 de 0f |0D. ....q.HgG'..| +peer1.org2.example.com | [2f11 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e0c 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2beb 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org1.example.com | 00000010 19 98 35 5c d5 21 1f ea db ae 89 38 20 39 5e 59 |..5\.!.....8 9^Y| +peer1.org2.example.com | [2f12 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [2e0d 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org1.example.com | 00000020 12 a7 09 4b 02 20 03 d6 8e 0d 89 6a 8a 87 86 3a |...K. .....j...:| +peer1.org2.example.com | [2f14 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e0e 11-19 05:22:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org1.example.com | 00000030 39 ae 4d e4 85 4a e6 ac 46 2f 5a aa 6c b5 f9 e5 |9.M..J..F/Z.l...| +peer1.org2.example.com | [2f15 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e0f 11-19 05:22:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer1.org1.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org1.example.com | 00000040 9a 0c 12 78 3a a9 |...x:.| +peer1.org2.example.com | [2f16 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer1.org1.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org1.example.com | [2d54 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [721fbd11] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [2f13 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e10 11-19 05:22:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer1.org1.example.com | [2bec 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d55 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [721fbd11] notifying Txid:721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997, channelID:businesschannel +peer1.org2.example.com | [2f18 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer1.org1.example.com | [2bed 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d56 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [2f17 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer1.org1.example.com | [2bee 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [2d57 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][721fbd11] Exit chaincode: name:"lscc" (1ms) +peer0.org2.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer1.org2.example.com | [2f19 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bef 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d58 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer1.org2.example.com | [2f1a 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf0 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d59 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997] +peer0.org2.example.com | [2e11 11-19 05:22:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f1b 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bf1 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d5a 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] Exit +peer0.org2.example.com | [2e12 11-19 05:22:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f1c 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bf2 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d5b 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] Entry chaincode: name:"lscc" +peer0.org2.example.com | [2e13 11-19 05:22:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f1d 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf3 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d5c 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] escc for chaincode name:"lscc" is escc +peer0.org2.example.com | [2e14 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f1e 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bf4 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d5d 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997, chaincode: lscc} +peer0.org2.example.com | [2e15 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f1f 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf5 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d5e 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A205C80A5E79FE27F1BAEE17595C0BF...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [2e16 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2f20 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bf6 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc6b0 gate 1574140967979644400 evaluation starts +peer0.org1.example.com | [2d5f 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D29CA9FE1B6F73D71D29101566F5DA488A9CA1CF3167632ABBAD3D1B9B791740 +peer0.org2.example.com | [2e17 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f21 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bf7 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc6b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d60 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997, chaincode: lscc} +peer0.org2.example.com | [2e18 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f22 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bf8 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc6b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2d61 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] Exit +peer0.org2.example.com | [2e19 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f23 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf9 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc6b0 principal matched by identity 0 +peer0.org1.example.com | [2d62 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997] +peer0.org2.example.com | [2e1a 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f24 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2bfa 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer0.org1.example.com | [2d63 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45662 +peer0.org2.example.com | [2e1b 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f25 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15102D +peer1.org1.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer0.org2.example.com | [2e1c 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f26 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 701DC4455D46A737682A170C616B99A6684256767F3ADD7A202F466F86B491D5 +peer1.org1.example.com | [2bfb 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer0.org1.example.com | [2d64 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45662 grpc.code=OK grpc.call_duration=4.456ms +peer1.org2.example.com | [2f27 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2e1d 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer0.org1.example.com | [2d65 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2f28 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2e1e 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer0.org1.example.com | [2d66 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2f29 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [2e1f 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer0.org1.example.com | [2d67 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f2a 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e20 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer0.org1.example.com | [2d68 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f2b 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e21 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bfc 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc6b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d69 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f2c 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e22 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2bfd 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc6b0 gate 1574140967979644400 evaluation succeeds +peer0.org1.example.com | [2d6a 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f2d 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e23 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bfe 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d6b 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f2f 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e24 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d6c 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bff 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f30 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e25 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d6d 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e26 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f2e 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d6e 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e27 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f31 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d6f 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e28 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028439e0 gate 1574140963934553200 evaluation starts +peer1.org2.example.com | [2f32 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d70 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e29 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028439e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f33 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d71 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e2a 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028439e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2f34 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d72 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e2b 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028439e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2f35 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [2d73 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e2c 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028439e0 principal evaluation fails +peer1.org2.example.com | [2f36 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer0.org1.example.com | [2d74 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e2d 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028439e0 gate 1574140963934553200 evaluation fails +peer1.org2.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer0.org1.example.com | [2d75 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e2e 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f37 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer0.org1.example.com | [2d76 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 gate 1574140960210392400 evaluation starts +peer0.org2.example.com | [2e2f 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer0.org1.example.com | [2d77 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e30 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer0.org1.example.com | [2d78 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2e31 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002843f50 gate 1574140963936801200 evaluation starts +peer1.org2.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer0.org1.example.com | [2d79 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 principal matched by identity 0 +peer0.org2.example.com | [2e32 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002843f50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer0.org1.example.com | [2d7a 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | [2e33 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002843f50 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2f38 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [2e34 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002843f50 principal matched by identity 0 +peer1.org2.example.com | [2f39 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d7b 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | [2e35 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 69 dd c5 b2 89 f8 8f ee 1f 88 02 62 38 e8 9a |.i..........b8..| +peer1.org2.example.com | [2f3a 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000010 a1 ff 8b c1 7a b7 0e a4 bb 7a e8 05 96 58 06 32 |....z....z...X.2| +peer1.org2.example.com | [2f3b 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | [2e36 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 29 f2 69 10 00 49 78 70 30 0c 12 |0D. .).i..Ixp0..| +peer1.org2.example.com | [2f3c 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000010 22 65 4f 43 c5 c1 dd a8 a4 f0 3a df cc 57 30 74 |"eOC......:..W0t| +peer1.org2.example.com | [2f3d 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | 00000020 ac a1 0e 4a 02 20 02 a7 df 04 15 59 cb de 65 99 |...J. .....Y..e.| +peer1.org2.example.com | [2f3e 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d7c 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000030 0f 4b 84 6f 1d b6 c3 8a 24 9d 1d 16 bb c4 c7 2c |.K.o....$......,| +peer1.org2.example.com | [2f3f 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d7d 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 gate 1574140960210392400 evaluation succeeds +peer0.org2.example.com | 00000040 f2 96 94 d2 36 f5 |....6.| +peer1.org2.example.com | [2f40 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d7e 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e37 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002843f50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f41 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d7f 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e38 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002843f50 gate 1574140963936801200 evaluation succeeds +peer1.org2.example.com | [2f42 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d80 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e39 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2f43 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [2d81 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e3a 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org2.example.com | [2f44 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer0.org1.example.com | [2d82 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer0.org2.example.com | [2e3b 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer0.org1.example.com | [2d83 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f45 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer0.org2.example.com | [2e3c 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer0.org1.example.com | [2d84 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer0.org2.example.com | [2e3d 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2d85 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer0.org2.example.com | [2e3f 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d86 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer0.org2.example.com | [2e40 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d87 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer0.org2.example.com | [2e41 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d88 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [2f46 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | [2e42 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d89 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2e43 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2f47 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a ef 52 86 c3 89 28 80 f5 b7 a1 |0E.!...R...(....| +peer0.org1.example.com | [2d8a 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e44 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 21 00 e2 64 9e 9d c9 4b a8 7d 62 74 48 ed 7c a2 |!..d...K.}btH.|.| +peer0.org1.example.com | [2d8b 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e45 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 86 72 e7 30 78 02 20 55 4e 6c 3f 4e e4 d5 cd 7a |.r.0x. UNl?N...z| +peer0.org1.example.com | [2d8c 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e46 11-19 05:22:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 9e 4d c6 f9 5e 86 af f8 34 40 2b 0e c0 8d bc 42 |.M..^...4@+....B| +peer0.org1.example.com | [2d8d 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e47 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 e3 c7 08 a5 9c 52 16 |.....R.| +peer0.org1.example.com | [2d8e 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e48 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f48 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2d8f 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e49 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347f1b0 gate 1574140963981607000 evaluation starts +peer1.org2.example.com | [2f49 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2d90 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 gate 1574140960385836700 evaluation starts +peer0.org2.example.com | [2e4a 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347f1b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f4a 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d91 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e4b 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347f1b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2f4b 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d92 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2e4c 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347f1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2f4c 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d93 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 principal matched by identity 0 +peer0.org2.example.com | [2e4d 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347f1b0 principal evaluation fails +peer1.org2.example.com | [2f4d 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d94 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 b5 e0 48 a1 f7 c1 a8 64 d9 12 db 88 de 32 4e |...H....d.....2N| +peer0.org2.example.com | [2e4e 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347f1b0 gate 1574140963981607000 evaluation fails +peer1.org2.example.com | [2f4e 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 b8 87 fd 05 7e af ef b5 c4 0a 4a 6f d7 65 56 05 |....~.....Jo.eV.| +peer0.org2.example.com | [2e3e 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2f4f 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2d95 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 f6 f1 ca 45 13 05 b5 2a 04 b0 |0E.!.....E...*..| +peer0.org2.example.com | [2e50 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2f50 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 73 98 5d 7b 85 99 52 cd fe 34 3d 7a 39 68 71 bf |s.]{..R..4=z9hq.| +peer0.org2.example.com | [2e51 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f51 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 6d f9 cc 82 51 02 20 24 4c 87 6a f6 d3 b8 45 25 |m...Q. $L.j...E%| +peer0.org2.example.com | [2e52 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2f52 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 94 3e ed 4e 6c 1a a2 09 b6 5e 61 01 d7 53 45 5e |.>.Nl....^a..SE^| +peer0.org2.example.com | [2e53 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2f53 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 a9 64 78 c5 e3 a5 4d |.dx...M| +peer0.org2.example.com | [2e54 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2f54 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d96 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e55 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2f55 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d97 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 gate 1574140960385836700 evaluation succeeds +peer0.org2.example.com | [2e56 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f56 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d98 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e57 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f57 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7a10 gate 1574140967466611800 evaluation starts +peer0.org1.example.com | [2d99 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e58 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f58 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7a10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d9a 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e59 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [2f59 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7a10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2d9b 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e5a 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f5a 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2d9c 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e5b 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f5b 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7a10 principal evaluation fails +peer0.org1.example.com | [2d9d 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2e5c 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f5c 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7a10 gate 1574140967466611800 evaluation fails +peer0.org1.example.com | [2d9e 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2f5d 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e5d 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2d9f 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2f5e 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e5e 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\314\033N\tp\206\241\033\254\341 \3637\245" > alive:N\243i\022\203\234;\177\342m\325\036\026\207\nY\025\255_\013m\307\364\212\271\204\325?\310\315\250\002 Imb\355\014t\303\377+f\306\224d\204\000\030M\326\202\306{\341q\356\220rkqF\027AJ" > +peer0.org1.example.com | [2da0 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2f5f 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2e5f 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2da1 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f60 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7f80 gate 1574140967467132500 evaluation starts +peer0.org2.example.com | [2e60 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2da2 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f61 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7f80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e4f 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2da3 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f62 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7f80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2e61 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2da4 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f63 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7f80 principal matched by identity 0 +peer0.org2.example.com | [2e62 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2da5 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f64 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org2.example.com | [2e63 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee220 gate 1574140963988761300 evaluation starts +peer0.org1.example.com | [2da6 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org2.example.com | [2e64 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee220 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2da7 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f65 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org2.example.com | [2e65 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee220 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2da8 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org2.example.com | [2e66 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee220 principal matched by identity 0 +peer0.org1.example.com | [2da9 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org2.example.com | [2e67 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | [2daa 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org1.example.com | [2dab 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e68 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | [2f66 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7f80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2dac 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | [2f67 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec7f80 gate 1574140967467132500 evaluation succeeds +peer0.org1.example.com | [2dad 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | [2f68 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2daf 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | [2f69 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2db0 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [2f6a 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2db1 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e69 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee220 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f6b 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2dae 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e6a 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee220 gate 1574140963988761300 evaluation succeeds +peer0.org1.example.com | [2db2 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f6c 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e6b 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2db3 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f6d 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e6c 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2db4 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f6e 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2e6d 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2db5 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f6f 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer0.org2.example.com | [2e6e 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2db6 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer0.org2.example.com | [2e6f 11-19 05:22:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2db7 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f70 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer0.org2.example.com | [2e70 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2db8 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer0.org2.example.com | [2e71 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2db9 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer0.org2.example.com | [2e72 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2dba 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer0.org2.example.com | [2e73 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2dbb 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer0.org2.example.com | [2e74 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2dbc 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45666 +peer1.org2.example.com | [2f71 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e75 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2dbd 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0041581e0 +peer1.org2.example.com | [2f72 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e76 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2dbe 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [2f73 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e77 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef3b0 gate 1574140963997697800 evaluation starts +peer0.org1.example.com | [2dbf 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2f74 11-19 05:22:47.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e78 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef3b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2dc0 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [2f75 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e79 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef3b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2dc1 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org2.example.com | [2f76 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e7a 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2dc2 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [2f77 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e7b 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef3b0 principal evaluation fails +peer0.org1.example.com | [2dc3 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 50 c5 9f 5a 1a 09 81 e5 b5 3b eb dd f8 cf 46 |.P..Z.....;....F| +peer1.org2.example.com | [2f78 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e7c 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef3b0 gate 1574140963997697800 evaluation fails +peer0.org1.example.com | 00000010 38 1c 05 e9 93 8e be 87 2a 46 e6 1e a0 84 09 a9 |8.......*F......| +peer1.org2.example.com | [2f79 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e7d 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dc4 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 64 92 f0 d8 f0 08 35 e2 bd bd |0E.!..d.....5...| +peer1.org2.example.com | [2f7a 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e7e 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 47 9e 69 52 1b e8 14 25 de 6e 62 0f 81 fe c9 f6 |G.iR...%.nb.....| +peer1.org2.example.com | [2f7b 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e7f 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000020 b4 39 09 d9 83 02 20 25 3f 0b dc 50 bf 93 af 87 |.9.... %?..P....| +peer1.org2.example.com | [2f7c 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e80 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef920 gate 1574140963998959400 evaluation starts +peer0.org1.example.com | 00000030 0f 66 03 ba 38 fe 7d 7e cf 46 fe 37 7b 8b 10 99 |.f..8.}~.F.7{...| +peer1.org2.example.com | [2f7d 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e81 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef920 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 b6 15 1f 5b 4d fc 54 |...[M.T| +peer1.org2.example.com | [2f7e 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e82 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef920 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2dc5 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [2f7f 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e83 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef920 principal matched by identity 0 +peer0.org1.example.com | [2dc6 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00308b8f0, header 0xc004158690 +peer1.org2.example.com | [2f80 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e84 11-19 05:22:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | [2dc7 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org2.example.com | [2f81 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [2dc8 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] processing txid: ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155 +peer1.org2.example.com | [2f82 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [2e85 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | [2dc9 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155] +peer1.org2.example.com | [2f83 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | [2dca 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [2f84 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | [2dcb 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155] +peer1.org2.example.com | [2f85 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | [2dcc 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] Entry chaincode: name:"lscc" +peer1.org2.example.com | [2f86 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [2dcd 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ed1356b9] Entry chaincode: name:"lscc" +peer1.org2.example.com | [2f87 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [2e86 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef920 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2dce 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [2f88 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e87 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ef920 gate 1574140963998959400 evaluation succeeds +peer0.org1.example.com | [2dcf 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes +peer1.org2.example.com | [2f89 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e88 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2dd0 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [2f8a 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e89 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2dd1 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2f8b 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e8a 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2dd2 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e8b 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2f8c 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [2dd3 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e8c 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | [2f8d 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [2dd4 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 gate 1574140960445268700 evaluation starts +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2f8e 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 2b fb 56 66 72 0c a1 7c 1c 98 f3 54 67 d0 19 |.+.Vfr..|...Tg..| +peer0.org1.example.com | [2dd5 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e8d 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 c9 bc 06 04 31 fa 64 6e 29 47 29 dc b7 92 13 2b |....1.dn)G)....+| +peer0.org1.example.com | [2dd6 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | [2f8f 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af 25 dd be 12 c8 98 26 b3 8c |0E.!...%.....&..| +peer0.org1.example.com | [2dd7 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000010 08 82 59 26 5d 1c 57 8f a5 f2 15 c2 3b 88 64 69 |..Y&].W.....;.di| +peer0.org1.example.com | [2dd8 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 principal evaluation fails +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000020 d4 68 bd dd 2c 02 20 32 7c 14 51 73 12 00 9c 00 |.h..,. 2|.Qs....| +peer0.org1.example.com | [2dd9 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 gate 1574140960445268700 evaluation fails +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | 00000030 35 5c 11 4a 88 e9 36 02 0e 4c cf da f6 55 9a 61 |5\.J..6..L...U.a| +peer0.org1.example.com | [2dda 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e8e 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000040 94 99 31 4d 03 90 08 |..1M...| +peer0.org1.example.com | [2ddb 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [2f90 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [2ddc 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2e8f 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [2ddd 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 gate 1574140960447204700 evaluation starts +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | [2f91 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 43 0c 0b 97 7f f2 2e 65 c1 c5 |0E.!..C......e..| +peer0.org1.example.com | [2dde 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000010 1f 84 a8 4e 20 fc ca ac 67 4a 34 ee 64 df 69 b4 |...N ...gJ4.d.i.| +peer0.org1.example.com | [2ddf 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000020 9f 10 0f ea 56 02 20 39 4a eb 66 cf fe ac 77 f3 |....V. 9J.f...w.| +peer0.org1.example.com | [2de0 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 principal matched by identity 0 +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | 00000030 fd 28 4d 90 7f ff 01 04 d8 cf 98 99 64 be 9d 6f |.(M.........d..o| +peer0.org1.example.com | [2de1 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 50 c5 9f 5a 1a 09 81 e5 b5 3b eb dd f8 cf 46 |.P..Z.....;....F| +peer0.org2.example.com | [2e90 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 8c 39 63 c8 76 49 f9 |.9c.vI.| +peer0.org1.example.com | 00000010 38 1c 05 e9 93 8e be 87 2a 46 e6 1e a0 84 09 a9 |8.......*F......| +peer0.org2.example.com | [2e91 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f92 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2de2 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 64 92 f0 d8 f0 08 35 e2 bd bd |0E.!..d.....5...| +peer0.org2.example.com | [2e92 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f93 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | 00000010 47 9e 69 52 1b e8 14 25 de 6e 62 0f 81 fe c9 f6 |G.iR...%.nb.....| +peer0.org2.example.com | [2e93 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2f94 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000020 b4 39 09 d9 83 02 20 25 3f 0b dc 50 bf 93 af 87 |.9.... %?..P....| +peer0.org2.example.com | [2e94 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f95 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000030 0f 66 03 ba 38 fe 7d 7e cf 46 fe 37 7b 8b 10 99 |.f..8.}~.F.7{...| +peer0.org2.example.com | [2e95 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f96 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000040 b6 15 1f 5b 4d fc 54 |...[M.T| +peer0.org2.example.com | [2e96 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f97 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2de3 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e97 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f98 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2de4 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 gate 1574140960447204700 evaluation succeeds +peer0.org2.example.com | [2e98 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f99 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2de5 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e99 11-19 05:22:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f9a 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [2de6 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e9a 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | [2f9b 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2de7 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [2f9c 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2de8 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e9b 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | [2f9d 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2de9 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | [2f9e 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:vy\027\352F\2520\204\304=\203\026p\372" > +peer0.org1.example.com | [2dea 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] handling GET_STATE_BY_RANGE from chaincode +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | [2f9f 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [2deb 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | [2fa0 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dec 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding a result +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [2fa1 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ded 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got keys and values. Sending RESPONSE +peer0.org2.example.com | [2e9c 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fa2 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2dee 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Completed GET_STATE_BY_RANGE. Sending RESPONSE +peer0.org2.example.com | [2e9d 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fa3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2def 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +peer0.org2.example.com | [2e9e 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2fa4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2df0 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] handling QUERY_STATE_CLOSE from chaincode +peer0.org2.example.com | [2e9f 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fa5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2df1 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Completed QUERY_STATE_CLOSE. Sending RESPONSE +peer0.org2.example.com | [2ea0 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fa6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2df2 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [2ea1 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2df3 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] notifying Txid:ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155, channelID:businesschannel +peer1.org2.example.com | [2fa7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ea2 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2df4 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [2fa8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ea3 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2df5 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ed1356b9] Exit chaincode: name:"lscc" (8ms) +peer1.org2.example.com | [2fa9 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [2ea4 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dfd0 gate 1574140964017750900 evaluation starts +peer0.org1.example.com | [2df6 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [2faa 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ea5 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dfd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2df7 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155] +peer1.org2.example.com | [2fab 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ea6 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dfd0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2df8 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] Exit +peer1.org2.example.com | [2fac 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ea7 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2df9 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] Entry chaincode: name:"lscc" +peer1.org2.example.com | [2fad 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ea8 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dfd0 principal evaluation fails +peer0.org1.example.com | [2dfa 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] escc for chaincode name:"lscc" is escc +peer1.org2.example.com | [2fae 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ea9 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dfd0 gate 1574140964017750900 evaluation fails +peer0.org1.example.com | [2dfb 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155, chaincode: lscc} +peer1.org2.example.com | [2faf 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2eaa 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dfc 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C332CA7C118DE70F75DAC3C81F9E...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [2fb0 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2eab 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dfd 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E8F3EAC912A91717DF04A358A34C2638F2866A19F71A0FEF714337ABA0EABB75 +peer1.org2.example.com | [2fb1 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b28c0 gate 1574140967921500800 evaluation starts +peer0.org2.example.com | [2eac 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2dfe 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155, chaincode: lscc} +peer1.org2.example.com | [2fb2 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b28c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ead 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0540 gate 1574140964018369800 evaluation starts +peer0.org1.example.com | [2dff 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] Exit +peer1.org2.example.com | [2fb3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b28c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2eae 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0540 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fb4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b28c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2e00 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155] +peer0.org2.example.com | [2eaf 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0540 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2fb5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b28c0 principal evaluation fails +peer0.org1.example.com | [2e01 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45666 +peer0.org2.example.com | [2eb0 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0540 principal matched by identity 0 +peer1.org2.example.com | [2fb6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b28c0 gate 1574140967921500800 evaluation fails +peer0.org1.example.com | [2e02 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45666 grpc.code=OK grpc.call_duration=14.9037ms +peer0.org2.example.com | [2eb1 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | [2fb7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e03 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [2fb8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e04 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2eb2 11-19 05:22:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | [2fb9 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2e05 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | [2fba 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b2e30 gate 1574140967922198600 evaluation starts +peer0.org1.example.com | [2e06 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | [2fbb 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b2e30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e07 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | [2fbc 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b2e30 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2e08 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [2fbd 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b2e30 principal matched by identity 0 +peer0.org1.example.com | [2e09 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [2eb3 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0540 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2fbe 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 33 45 6f 4f 88 5c 62 57 82 64 cd ee 20 7c 3d |.3EoO.\bW.d.. |=| +peer0.org1.example.com | [2e0a 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c c1 4d d7 e6 df 6b b7 75 1c fb 12 f1 82 4f 03 |..M...k.u.....O.| +peer0.org2.example.com | [2eb4 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0540 gate 1574140964018369800 evaluation succeeds +peer1.org2.example.com | 00000010 ba f2 e1 9d 29 91 d6 83 33 5e 6c b6 dd d2 e7 ee |....)...3^l.....| +peer0.org1.example.com | 00000010 12 ea 04 1e ed 5a 04 93 07 d5 6a 3c 63 9b c6 f7 |.....Z....j DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2fbf 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cd b0 8f 9a df 2f 34 fb 5c fd |0E.!......./4.\.| +peer0.org1.example.com | [2e0b 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 1e 66 e6 8e 3a 6d 96 d1 8d a2 |0E.!...f..:m....| +peer0.org2.example.com | [2eb6 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 d0 9c ac 6e a0 d4 d9 68 1d b3 f5 a9 c9 42 e2 a7 |...n...h.....B..| +peer0.org1.example.com | 00000010 f5 22 2e 67 9d 04 e7 18 ef 8f 0d c0 1f 10 50 04 |.".g..........P.| +peer0.org2.example.com | [2eb7 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 3f b0 8c 94 d8 02 20 77 23 28 ea 66 db 39 7d 4a |?..... w#(.f.9}J| +peer0.org1.example.com | 00000020 f6 eb 29 ad d7 02 20 08 2f 47 cf 46 56 55 e6 d2 |..)... ./G.FVU..| +peer0.org2.example.com | [2eb8 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 32 23 aa 6c a9 ee e0 9a 6b f5 3c b7 6d f1 f7 63 |2#.l....k.<.m..c| +peer0.org1.example.com | 00000030 87 9b 0a 23 b1 1a 0b 30 d8 ec 55 3c bb 9d 09 03 |...#...0..U<....| +peer0.org2.example.com | [2eb9 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 b7 33 77 5a 21 87 a7 |.3wZ!..| +peer0.org1.example.com | 00000040 f8 7c bf 2e 13 28 53 |.|...(S| +peer0.org2.example.com | [2eba 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fc0 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b2e30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e0c 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ebb 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2fc1 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b2e30 gate 1574140967922198600 evaluation succeeds +peer0.org1.example.com | [2e0d 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2ebc 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fc2 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2e0e 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2ebd 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fc3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2e0f 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2ebe 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2fc4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2e10 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2ebf 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2fc5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2e11 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ec0 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2fc6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e12 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ec1 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16d0 gate 1574140964032385700 evaluation starts +peer1.org2.example.com | [2fc7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2e13 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ec2 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fc8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2e14 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec3 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2fc9 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2e15 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec4 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2fca 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2e16 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec5 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16d0 principal evaluation fails +peer1.org2.example.com | [2fcb 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e17 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2ec6 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d16d0 gate 1574140964032385700 evaluation fails +peer1.org2.example.com | [2fcc 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e18 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec7 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2fcd 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e19 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2ec8 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2fce 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [2e1a 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ec9 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2fcf 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1b 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2eca 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d1c40 gate 1574140964032926800 evaluation starts +peer1.org2.example.com | [2fd0 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1c 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ecb 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d1c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fd1 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1d 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ecc 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d1c40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2fd2 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2e1e 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ecd 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d1c40 principal matched by identity 0 +peer1.org2.example.com | [2fd3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e1f 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ece 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | [2fd4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e20 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [2fd5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:vy\027\352F\2520\204\304=\203\026p\372" > +peer0.org1.example.com | [2e21 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ecf 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | [2fd6 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e23 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | [2fd7 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e22 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | [2fd8 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e24 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | [2fd9 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [2e25 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [2fda 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e26 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ed0 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d1c40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2fdb 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e27 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ed1 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d1c40 gate 1574140964032926800 evaluation succeeds +peer1.org2.example.com | [2fdc 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e28 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ed2 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2fdd 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2e29 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ed3 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2fde 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e2b 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ed4 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2fdf 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e2c 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2ed5 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2fe0 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e2d 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ed6 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | [2fe1 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e2e 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [2fe2 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e2f 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ed7 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | [2fe3 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e30 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | [2fe4 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e31 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | [2fe5 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e32 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | [2fe6 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e33 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [2fe7 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e34 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 gate 1574140960842860500 evaluation starts +peer0.org2.example.com | [2ed8 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e35 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fe8 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ed9 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e36 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [2fe9 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2eda 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e37 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 principal matched by identity 0 +peer1.org2.example.com | [2fea 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2edb 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e38 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 e7 c6 6e 91 eb 72 f8 78 fd a3 d9 b4 90 3b 2e |&..n..r.x.....;.| +peer1.org2.example.com | [2feb 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2edc 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 32 15 e2 f9 48 3d f8 f6 b1 03 d5 cb ad f6 d8 06 |2...H=..........| +peer1.org2.example.com | [2fec 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2edd 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2e39 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 4e a3 69 12 83 9c 3b 7f e2 6d d5 |0D. >N.i...;..m.| +peer1.org2.example.com | [2fed 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ede 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 1e 16 87 0a 59 15 ad 5f 0b 6d c7 f4 8a b9 84 d5 |....Y.._.m......| +peer1.org2.example.com | [2fee 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828310 gate 1574140968159634100 evaluation starts +peer0.org2.example.com | [2edf 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 3f c8 cd a8 02 20 49 6d 62 ed 0c 74 c3 ff 2b 66 |?.... Imb..t..+f| +peer1.org2.example.com | [2fef 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828310 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ee0 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 c6 94 64 84 00 18 4d d6 82 c6 7b e1 71 ee 90 72 |..d...M...{.q..r| +peer1.org2.example.com | [2ff0 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828310 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2ee1 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 6b 71 46 17 41 4a |kqF.AJ| +peer1.org2.example.com | [2ff1 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ee2 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2e3a 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ff2 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828310 principal evaluation fails +peer0.org2.example.com | [2ee3 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493f6a0 gate 1574140964035195400 evaluation starts +peer0.org1.example.com | [2e3b 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 gate 1574140960842860500 evaluation succeeds +peer1.org2.example.com | [2ff3 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828310 gate 1574140968159634100 evaluation fails +peer0.org2.example.com | [2ee4 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493f6a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e3c 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ff4 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ee5 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493f6a0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2e3d 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ff5 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ee6 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493f6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2e3e 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2ff6 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ee7 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493f6a0 principal evaluation fails +peer0.org1.example.com | [2e3f 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ff7 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828880 gate 1574140968160384800 evaluation starts +peer0.org2.example.com | [2ee8 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493f6a0 gate 1574140964035195400 evaluation fails +peer0.org1.example.com | [2e40 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ff8 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828880 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ee9 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e41 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2ff9 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828880 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2eea 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e42 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2ffa 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828880 principal matched by identity 0 +peer0.org2.example.com | [2eeb 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2e43 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2ffb 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | [2eec 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493fc10 gate 1574140964035522000 evaluation starts +peer0.org1.example.com | [2e44 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [2eed 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493fc10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e45 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ffc 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | [2eee 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493fc10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2e46 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | [2eef 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493fc10 principal matched by identity 0 +peer0.org1.example.com | [2e47 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | [2ef0 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | [2e2a 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [2e48 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [2ef1 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | [2e49 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ffd 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828880 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | [2e4a 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ffe 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002828880 gate 1574140968160384800 evaluation succeeds +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | [2e4b 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fff 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | [2e4c 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3000 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [2e4d 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3001 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ef2 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493fc10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e4e 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3002 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ef3 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493fc10 gate 1574140964035522000 evaluation succeeds +peer0.org1.example.com | [2e4f 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3003 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ef4 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2e50 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3004 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ef5 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ef6 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3005 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ef7 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2e51 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3006 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ef8 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e52 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3007 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ef9 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e53 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3008 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2efa 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2e54 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3009 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2efb 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e55 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [300a 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2efc 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e56 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [300b 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ab0 gate 1574140968162210600 evaluation starts +peer0.org2.example.com | [2efd 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2e57 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [300c 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2efe 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2e58 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [300d 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ab0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2eff 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2e59 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [300e 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2f00 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2eda0 gate 1574140964036924400 evaluation starts +peer0.org1.example.com | [2e5a 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [300f 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ab0 principal evaluation fails +peer0.org2.example.com | [2f01 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2eda0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e5b 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3010 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002829ab0 gate 1574140968162210600 evaluation fails +peer0.org2.example.com | [2f02 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2eda0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2e5c 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3011 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f03 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2eda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2e5d 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3012 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f04 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2eda0 principal evaluation fails +peer0.org1.example.com | [2e5e 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3013 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f05 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2eda0 gate 1574140964036924400 evaluation fails +peer0.org1.example.com | [2e5f 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3014 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c2020 gate 1574140968165947700 evaluation starts +peer0.org2.example.com | [2f06 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e60 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45670 +peer1.org2.example.com | [3015 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c2020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f07 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e61 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040abc20 +peer1.org2.example.com | [3016 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c2020 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2f08 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2e62 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [3017 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c2020 principal matched by identity 0 +peer0.org2.example.com | [2f09 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2f310 gate 1574140964037280800 evaluation starts +peer0.org1.example.com | [2e63 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [3018 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | [2f0a 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2f310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e64 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [2f0b 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2f310 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2e65 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org2.example.com | [3019 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | [2f0c 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2f310 principal matched by identity 0 +peer0.org1.example.com | [2e66 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | [2f0d 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | [2e67 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 01 cf 4c 91 3f 21 7b 2e bb 82 fc c4 90 a2 c3 |...L.?!{........| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | 00000010 af 97 52 9a 0c 4e 09 97 34 1a 69 e5 c1 aa da b2 |..R..N..4.i.....| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | [2f0e 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | [2e68 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 5a c4 71 91 c4 48 ef 04 23 5a |0E.!..Z.q..H..#Z| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000010 db f2 72 47 82 71 09 b6 cc 25 2e 4a 4e 6e 77 9b |..rG.q...%.JNnw.| +peer1.org2.example.com | [301a 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000020 fc 97 c7 f1 83 02 20 2f a8 46 06 a4 67 34 58 f0 |...... /.F..g4X.| +peer1.org2.example.com | [301b 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c2020 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000030 e5 d6 9b 5f 50 6a 90 94 83 fc bc 01 e4 51 16 c4 |..._Pj.......Q..| +peer1.org2.example.com | [301c 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c2020 gate 1574140968165947700 evaluation succeeds +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | 00000040 66 9c 38 85 b5 94 b2 |f.8....| +peer1.org2.example.com | [301d 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f0f 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2f310 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e69 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [301e 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f10 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2f310 gate 1574140964037280800 evaluation succeeds +peer0.org1.example.com | [2e6a 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00348f340, header 0xc00389dc70 +peer1.org2.example.com | [301f 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f11 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2e6b 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org2.example.com | [3020 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f12 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2e6c 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] processing txid: a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049 +peer1.org2.example.com | [3021 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | [2f13 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2e6d 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049] +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [2f14 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2e6e 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] Entry chaincode: name:"qscc" +peer1.org2.example.com | [3022 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | [2e6f 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a71e8a30] Entry chaincode: name:"qscc" +peer0.org1.example.com | [2e70 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2e71 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [2e72 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [2e73 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2e74 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2e75 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2e76 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2e77 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 gate 1574140960927905600 evaluation starts +peer0.org1.example.com | [2e78 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e79 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2e7a 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2e7b 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 principal evaluation fails +peer0.org1.example.com | [2e7c 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 gate 1574140960927905600 evaluation fails +peer0.org1.example.com | [2e7d 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e7e 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e7f 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2e80 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 gate 1574140960931082100 evaluation starts +peer0.org1.example.com | [2e81 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e82 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2e83 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 principal matched by identity 0 +peer0.org1.example.com | [2e84 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 01 cf 4c 91 3f 21 7b 2e bb 82 fc c4 90 a2 c3 |...L.?!{........| +peer0.org1.example.com | 00000010 af 97 52 9a 0c 4e 09 97 34 1a 69 e5 c1 aa da b2 |..R..N..4.i.....| +peer0.org1.example.com | [2e85 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 5a c4 71 91 c4 48 ef 04 23 5a |0E.!..Z.q..H..#Z| +peer0.org1.example.com | 00000010 db f2 72 47 82 71 09 b6 cc 25 2e 4a 4e 6e 77 9b |..rG.q...%.JNnw.| +peer0.org1.example.com | 00000020 fc 97 c7 f1 83 02 20 2f a8 46 06 a4 67 34 58 f0 |...... /.F..g4X.| +peer0.org1.example.com | 00000030 e5 d6 9b 5f 50 6a 90 94 83 fc bc 01 e4 51 16 c4 |..._Pj.......Q..| +peer0.org1.example.com | 00000040 66 9c 38 85 b5 94 b2 |f.8....| +peer0.org1.example.com | [2e86 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e87 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 gate 1574140960931082100 evaluation succeeds +peer0.org1.example.com | [2e88 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2e89 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2e8a 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2e8b 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2e8c 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a71e8a30] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2e8d 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a71e8a30] notifying Txid:a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049, channelID:businesschannel +peer0.org1.example.com | [2e8e 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2e8f 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a71e8a30] Exit chaincode: name:"qscc" (6ms) +peer0.org1.example.com | [2e90 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] Exit +peer0.org1.example.com | [2e91 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] Entry chaincode: name:"qscc" +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [3023 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [3024 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [3025 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3026 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3027 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3028 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3029 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [302a 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [302b 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [302c 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [302d 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [302e 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [302f 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3030 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730190 gate 1574140968170680100 evaluation starts +peer1.org2.example.com | [3031 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730190 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3032 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730190 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3033 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3034 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730190 principal evaluation fails +peer1.org2.example.com | [3035 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730190 gate 1574140968170680100 evaluation fails +peer1.org2.example.com | [3036 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3037 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3038 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3039 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730700 gate 1574140968170996000 evaluation starts +peer1.org2.example.com | [303a 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [303b 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730700 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [303c 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730700 principal matched by identity 0 +peer1.org2.example.com | [303d 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [303e 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [303f 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730700 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3040 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002730700 gate 1574140968170996000 evaluation succeeds +peer1.org2.example.com | [3041 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3042 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3043 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3044 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3045 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3046 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e92 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] escc for chaincode name:"qscc" is escc +peer0.org1.example.com | [2e93 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049, chaincode: qscc} +peer0.org1.example.com | [2e94 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20447C6471E72FD712C641B9273077...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2e95 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37A67D79752761A7E0F9E23FA37609FE30C13A0AEDBB9E59DD9975D1D57E3FEC +peer0.org1.example.com | [2e96 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049, chaincode: qscc} +peer0.org1.example.com | [2e97 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] Exit +peer0.org1.example.com | [2e98 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45670 +peer0.org1.example.com | [2e99 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45670 grpc.code=OK grpc.call_duration=11.3459ms +peer0.org1.example.com | [2e9a 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2e9b 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2e9c 11-19 05:22:41.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45674 +peer0.org1.example.com | [2e9d 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0028607d0 +peer0.org1.example.com | [2e9e 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2e9f 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2ea0 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2ea1 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [2ea2 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2ea3 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 1d c0 db f8 49 67 a8 75 68 d1 22 7b 30 d2 82 |.....Ig.uh."{0..| +peer0.org1.example.com | 00000010 ea 13 3c 78 54 f1 c7 81 ea 59 93 be fb dc 35 c2 |.. DEBU Verify: sig = 00000000 30 45 02 21 00 83 6d f6 66 c2 25 0b 38 0e 52 86 |0E.!..m.f.%.8.R.| +peer0.org1.example.com | 00000010 fd 2d f9 a9 12 ce 2b 51 52 62 4b 94 26 9e 58 88 |.-....+QRbK.&.X.| +peer0.org1.example.com | 00000020 93 47 d4 c1 0e 02 20 6e 84 0a 13 0d ce c2 58 58 |.G.... n......XX| +peer0.org1.example.com | 00000030 8d fa 13 d2 81 2f 56 36 27 f4 48 eb ff a6 33 ae |...../V6'.H...3.| +peer0.org1.example.com | 00000040 bb d8 6b 84 22 a1 29 |..k.".)| +peer0.org1.example.com | [2ea5 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2ea6 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003097110, header 0xc002860be0 +peer0.org1.example.com | [2ea7 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [2ea8 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] processing txid: 06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167 +peer0.org1.example.com | [2ea9 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167] +peer0.org1.example.com | [2eaa 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] Entry chaincode: name:"qscc" +peer0.org1.example.com | [2eab 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][06660719] Entry chaincode: name:"qscc" +peer0.org1.example.com | [2eac 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2ead 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +peer0.org1.example.com | [2eae 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber +peer0.org1.example.com | [2eaf 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2eb0 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2eb1 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2eb2 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2eb3 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 gate 1574140961096740200 evaluation starts +peer0.org1.example.com | [2eb4 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2eb5 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2eb6 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2eb7 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 principal evaluation fails +peer0.org1.example.com | [2eb8 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 gate 1574140961096740200 evaluation fails +peer0.org1.example.com | [2eb9 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2eba 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ebb 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2ebc 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 gate 1574140961098776400 evaluation starts +peer0.org1.example.com | [2ebd 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ebe 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2ebf 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 principal matched by identity 0 +peer0.org1.example.com | [2ec0 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 1d c0 db f8 49 67 a8 75 68 d1 22 7b 30 d2 82 |.....Ig.uh."{0..| +peer0.org1.example.com | 00000010 ea 13 3c 78 54 f1 c7 81 ea 59 93 be fb dc 35 c2 |.. DEBU Verify: sig = 00000000 30 45 02 21 00 83 6d f6 66 c2 25 0b 38 0e 52 86 |0E.!..m.f.%.8.R.| +peer0.org1.example.com | 00000010 fd 2d f9 a9 12 ce 2b 51 52 62 4b 94 26 9e 58 88 |.-....+QRbK.&.X.| +peer0.org1.example.com | 00000020 93 47 d4 c1 0e 02 20 6e 84 0a 13 0d ce c2 58 58 |.G.... n......XX| +peer0.org1.example.com | 00000030 8d fa 13 d2 81 2f 56 36 27 f4 48 eb ff a6 33 ae |...../V6'.H...3.| +peer0.org1.example.com | 00000040 bb d8 6b 84 22 a1 29 |..k.".)| +peer0.org2.example.com | [2f15 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [2f16 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [2f17 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [2f18 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [2f19 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f1a 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f1b 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f1c 11-19 05:22:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f1d 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f1e 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f1f 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f20 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3047 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3048 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3049 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [304a 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [304b 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [304c 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [304d 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002731b60 gate 1574140968171855700 evaluation starts +peer1.org2.example.com | [304e 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002731b60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [304f 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002731b60 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3050 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002731b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3051 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002731b60 principal evaluation fails +peer1.org2.example.com | [3052 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002731b60 gate 1574140968171855700 evaluation fails +peer1.org2.example.com | [3053 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3054 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3055 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3056 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026e44b0 gate 1574140968172129500 evaluation starts +peer1.org2.example.com | [3057 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026e44b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3058 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026e44b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3059 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026e44b0 principal matched by identity 0 +peer1.org2.example.com | [305a 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [305b 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [305c 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026e44b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [305d 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026e44b0 gate 1574140968172129500 evaluation succeeds +peer1.org2.example.com | [305e 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [305f 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3060 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3061 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3062 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [3063 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [3064 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [3065 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [3066 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3067 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3068 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [2f21 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f22 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f23 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [2f24 11-19 05:22:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f25 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f26 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f27 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f28 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2f29 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f2a 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f2b 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f2c 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f2d 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f2e 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f2f 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f30 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003459d0 gate 1574140964733770700 evaluation starts +peer0.org2.example.com | [2f31 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003459d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f32 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003459d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2f33 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003459d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2f34 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003459d0 principal evaluation fails +peer0.org2.example.com | [2f35 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003459d0 gate 1574140964733770700 evaluation fails +peer0.org2.example.com | [2f36 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f37 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f38 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f39 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345f40 gate 1574140964738623200 evaluation starts +peer0.org2.example.com | [2f3a 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345f40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f3b 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345f40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2f3c 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345f40 principal matched by identity 0 +peer0.org2.example.com | [2f3d 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 fd 67 c9 e3 55 b6 4c 4b fa a0 b8 bb f8 85 14 |..g..U.LK.......| +peer0.org2.example.com | 00000010 36 97 99 a2 1f 8e 7f 8b 44 c0 e3 ab 37 7a 98 df |6.......D...7z..| +peer0.org2.example.com | [2f3e 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f3f 11-19 05:22:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 16 ae 30 2a 35 ec 39 1e d8 19 69 |0D. P..0*5.9...i| +peer0.org2.example.com | 00000010 81 bb fc c0 50 a1 61 8f 73 1f c8 f1 25 91 37 7d |....P.a.s...%.7}| +peer0.org2.example.com | 00000020 44 e2 32 6a 02 20 57 0a 1e 4d f7 92 6c c9 17 38 |D.2j. W..M..l..8| +peer0.org2.example.com | 00000030 6f b2 21 47 d0 33 9b e8 56 16 09 6e 77 29 1a e0 |o.!G.3..V..nw)..| +peer0.org1.example.com | [2ec2 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ec3 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 gate 1574140961098776400 evaluation succeeds +peer0.org1.example.com | [2ec4 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ec5 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ec6 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ec7 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ec8 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2] +peer0.org1.example.com | [2ec9 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[51321] +peer0.org1.example.com | [2eca 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[38114], Going to peek [8] bytes +peer0.org1.example.com | [2ecb 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[25514], placementInfo={fileNum=[0], startOffset=[51321], bytesOffset=[51324]} +peer0.org1.example.com | [2ecc 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU [06660719] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2ecd 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU [06660719] notifying Txid:06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167, channelID:businesschannel +peer0.org1.example.com | [2ece 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2ecf 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][06660719] Exit chaincode: name:"qscc" (6ms) +peer0.org1.example.com | [2ed0 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] Exit +peer0.org1.example.com | [2ed1 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] Entry chaincode: name:"qscc" +peer0.org1.example.com | [2ed2 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] escc for chaincode name:"qscc" is escc +peer0.org1.example.com | [2ed3 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167, chaincode: qscc} +peer0.org1.example.com | [2ed4 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209665AB006161DC05CD5748DEA848...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2ed5 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ABE7F8E5DB9E4E043182CF40DC83C1DB0F610DDC2446DFE8E80C88FD629E9682 +peer0.org1.example.com | [2ed6 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167, chaincode: qscc} +peer0.org1.example.com | [2ed7 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] Exit +peer0.org1.example.com | [2ed8 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45674 +peer0.org1.example.com | [2ed9 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45674 grpc.code=OK grpc.call_duration=11.7049ms +peer0.org1.example.com | [2eda 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2edb 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2edc 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45678 +peer0.org1.example.com | [2edd 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002861e00 +peer0.org1.example.com | [2ede 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2edf 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2ee0 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2ee1 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [2ee2 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2ee3 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee 5f 9c f9 6f 9d 76 9a a1 3b ff fe bb 71 3a c1 |._..o.v..;...q:.| +peer0.org1.example.com | 00000010 c0 ea eb 93 47 95 d2 f1 46 ce 7a c0 98 01 09 2d |....G...F.z....-| +peer0.org1.example.com | [2ee4 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 96 32 c2 f3 40 81 0e ac c2 5e |0E.!...2..@....^| +peer0.org1.example.com | 00000010 f8 6d 54 9b f9 0c 4c a1 5e a7 d7 57 52 e8 21 a1 |.mT...L.^..WR.!.| +peer0.org1.example.com | 00000020 56 a0 3e c8 49 02 20 2a 15 80 04 12 a2 99 01 68 |V.>.I. *.......h| +peer0.org1.example.com | 00000030 c2 0b ed 97 f1 6c ca d5 89 68 93 71 45 21 6b 8f |.....l...h.qE!k.| +peer0.org1.example.com | 00000040 eb 07 c5 91 2d 08 44 |....-.D| +peer0.org1.example.com | [2ee5 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2ee6 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003097500, header 0xc004014230 +peer0.org1.example.com | [2ee7 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [2ee8 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] processing txid: 54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d +peer0.org1.example.com | [2ee9 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d] +peer0.org1.example.com | [2eea 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] Entry chaincode: name:"cscc" +peer0.org1.example.com | [2eeb 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][54cdbaa0] Entry chaincode: name:"cscc" +peer0.org1.example.com | [2eec 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2eed 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock +peer0.org1.example.com | [2eee 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock +peer0.org1.example.com | [2eef 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2ef0 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ef1 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ef2 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ef3 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 gate 1574140961561400300 evaluation starts +peer0.org1.example.com | [2ef4 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ef5 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3069 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [306a 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [306b 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [306c 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [306d 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [306e 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [306f 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3070 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3071 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3072 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690be0 gate 1574140968179864000 evaluation starts +peer1.org2.example.com | [3073 11-19 05:22:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690be0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3074 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690be0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3075 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3076 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690be0 principal evaluation fails +peer1.org2.example.com | [3077 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002690be0 gate 1574140968179864000 evaluation fails +peer1.org2.example.com | [3078 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3079 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [307a 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [307b 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691150 gate 1574140968182787700 evaluation starts +peer1.org2.example.com | [307c 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [307d 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691150 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [307e 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691150 principal matched by identity 0 +peer1.org2.example.com | [307f 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [3080 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [3081 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691150 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3082 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691150 gate 1574140968182787700 evaluation succeeds +peer1.org2.example.com | [3083 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3084 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3085 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3086 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3087 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3088 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ef6 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2ef7 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 principal evaluation fails +peer0.org1.example.com | [2ef8 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 gate 1574140961561400300 evaluation fails +peer0.org1.example.com | [2ef9 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2efa 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2efb 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2efc 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 gate 1574140961563984300 evaluation starts +peer0.org1.example.com | [2efd 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2efe 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2eff 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 principal matched by identity 0 +peer0.org1.example.com | [2f00 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee 5f 9c f9 6f 9d 76 9a a1 3b ff fe bb 71 3a c1 |._..o.v..;...q:.| +peer0.org1.example.com | 00000010 c0 ea eb 93 47 95 d2 f1 46 ce 7a c0 98 01 09 2d |....G...F.z....-| +peer0.org1.example.com | [2f01 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 96 32 c2 f3 40 81 0e ac c2 5e |0E.!...2..@....^| +peer0.org1.example.com | 00000010 f8 6d 54 9b f9 0c 4c a1 5e a7 d7 57 52 e8 21 a1 |.mT...L.^..WR.!.| +peer0.org1.example.com | 00000020 56 a0 3e c8 49 02 20 2a 15 80 04 12 a2 99 01 68 |V.>.I. *.......h| +peer0.org1.example.com | 00000030 c2 0b ed 97 f1 6c ca d5 89 68 93 71 45 21 6b 8f |.....l...h.qE!k.| +peer0.org1.example.com | 00000040 eb 07 c5 91 2d 08 44 |....-.D| +peer0.org1.example.com | [2f02 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2f03 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 gate 1574140961563984300 evaluation succeeds +peer0.org1.example.com | [2f04 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2f05 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2f06 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2f07 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2f08 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [54cdbaa0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2f09 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [54cdbaa0] notifying Txid:54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d, channelID:businesschannel +peer0.org1.example.com | [2f0a 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2f0b 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][54cdbaa0] Exit chaincode: name:"cscc" (8ms) +peer0.org1.example.com | [2f0c 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] Exit +peer0.org1.example.com | [2f0d 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] Entry chaincode: name:"cscc" +peer0.org1.example.com | [2f0e 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] escc for chaincode name:"cscc" is escc +peer0.org1.example.com | [2f0f 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d, chaincode: cscc} +peer0.org1.example.com | [2f10 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A207318100A857D86AEFC63229C628D...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2f11 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8D5A39A62391EAD2A49AD1313BE456279CE50B9B70F909E67A77339D5440E8A2 +peer0.org1.example.com | [2f12 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d, chaincode: cscc} +peer0.org1.example.com | [2f13 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] Exit +peer0.org1.example.com | [2f14 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45678 +peer0.org1.example.com | [2f15 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45678 grpc.code=OK grpc.call_duration=12.8337ms +peer0.org1.example.com | [2f16 11-19 05:22:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f17 11-19 05:22:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f18 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45682 +peer0.org1.example.com | [2f19 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004015270 +peer0.org1.example.com | [2f1a 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2f1b 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2f1c 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2f1d 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [2f1e 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2f1f 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 2b f4 77 68 c4 06 15 78 51 11 80 d5 05 f3 66 |.+.wh...xQ.....f| +peer0.org1.example.com | 00000010 ac 4c 11 2e e9 16 db 1c 6c c6 2b 1f 8b bb 89 ce |.L......l.+.....| +peer0.org1.example.com | [2f20 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f a6 70 8d 1f 61 7b 0c ce 46 51 fb |0D. O.p..a{..FQ.| +peer0.org1.example.com | 00000010 36 0f 24 bb cd b7 61 22 8e b1 68 0d b0 44 c5 ef |6.$...a"..h..D..| +peer0.org1.example.com | 00000020 ab 2b fc a8 02 20 0f 7e 4b 12 ce 4f d3 56 64 ad |.+... .~K..O.Vd.| +peer0.org1.example.com | 00000030 fc 2d 40 ad 35 1d 02 fc c4 a2 06 07 ee 51 ad b5 |.-@.5........Q..| +peer0.org1.example.com | 00000040 02 ef f9 54 7a ec |...Tz.| +peer0.org1.example.com | [2f21 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2f22 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003097960, header 0xc004015680 +peer0.org1.example.com | [2f23 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [2f24 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] processing txid: e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd +peer0.org1.example.com | [2f25 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd] +peer0.org1.example.com | [2f26 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] Entry chaincode: name:"cscc" +peer0.org1.example.com | [2f27 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e926ee28] Entry chaincode: name:"cscc" +peer0.org1.example.com | [2f28 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2f29 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [2f2a 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 2b f4 77 68 c4 06 15 78 51 11 80 d5 05 f3 66 |.+.wh...xQ.....f| +peer0.org1.example.com | 00000010 ac 4c 11 2e e9 16 db 1c 6c c6 2b 1f 8b bb 89 ce |.L......l.+.....| +peer0.org1.example.com | [2f2b 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f a6 70 8d 1f 61 7b 0c ce 46 51 fb |0D. O.p..a{..FQ.| +peer0.org1.example.com | 00000010 36 0f 24 bb cd b7 61 22 8e b1 68 0d b0 44 c5 ef |6.$...a"..h..D..| +peer0.org1.example.com | 00000020 ab 2b fc a8 02 20 0f 7e 4b 12 ce 4f d3 56 64 ad |.+... .~K..O.Vd.| +peer0.org1.example.com | 00000030 fc 2d 40 ad 35 1d 02 fc c4 a2 06 07 ee 51 ad b5 |.-@.5........Q..| +peer0.org1.example.com | 00000040 02 ef f9 54 7a ec |...Tz.| +peer0.org1.example.com | [2f2c 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [e926ee28] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2f2d 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [e926ee28] notifying Txid:e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd, channelID:businesschannel +peer0.org1.example.com | [2f2e 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2f2f 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e926ee28] Exit chaincode: name:"cscc" (3ms) +peer0.org1.example.com | [2f30 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] Exit +peer0.org1.example.com | [2f31 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] Entry chaincode: name:"cscc" +peer0.org1.example.com | [2f32 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] escc for chaincode name:"cscc" is escc +peer0.org1.example.com | [2f33 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd, chaincode: cscc} +peer0.org1.example.com | [2f34 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20545ADCFE4571C5C45685CF77E750...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2f35 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6F0F8D204A118C41D9C9311CD2BFB6AE8E509E4A2BE9644376A27F95ACCA4397 +peer0.org1.example.com | [2f36 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd, chaincode: cscc} +peer0.org1.example.com | [2f37 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] Exit +peer0.org1.example.com | [2f38 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45682 +peer0.org1.example.com | [2f39 11-19 05:22:41.76 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45682 grpc.code=OK grpc.call_duration=12.5077ms +peer0.org1.example.com | [2f3a 11-19 05:22:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f3b 11-19 05:22:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f3c 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2f3d 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f3e 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2f40 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f41 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2f3f 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f42 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f46 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f43 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f44 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f45 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f47 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f48 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f49 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f4a 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f4b 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f4c 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f4d 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f4e 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f4f 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f50 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f51 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f52 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f53 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f54 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2f55 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151027 +peer0.org1.example.com | [2f56 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 48C673BAD1705012CFA6FB8FB1AA85212A60CDDDA452078BC5AEAC961EE161FC +peer0.org1.example.com | [2f57 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2f58 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2f59 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2f5a 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f5b 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f5c 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f5d 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f5e 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f5f 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f61 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f60 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f62 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f63 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f64 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f65 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f66 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f67 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f68 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f69 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2f6a 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer0.org1.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer0.org1.example.com | [2f6b 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer0.org1.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer0.org1.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer0.org1.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer0.org1.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer0.org1.example.com | [2f6c 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2f6d 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2f6e 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f6f 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f70 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f71 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f72 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f73 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f74 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2f75 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer0.org1.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer0.org1.example.com | [2f76 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer0.org1.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer0.org1.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer0.org1.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer0.org1.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer0.org1.example.com | [2f77 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [2f78 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 02 e4 ea 29 c7 5b b9 ab 2c 55 |0E.!.....).[..,U| +peer0.org1.example.com | 00000010 f5 b5 1b ca 01 a3 b0 1e 37 ab b0 26 fd 83 40 6d |........7..&..@m| +peer0.org1.example.com | 00000020 ad 51 f3 df 4f 02 20 48 1c ce 40 10 45 22 b5 a9 |.Q..O. H..@.E"..| +peer0.org1.example.com | 00000030 c2 df 94 dc a5 b6 9e ed 71 47 54 76 b7 57 71 f3 |........qGTv.Wq.| +peer0.org1.example.com | 00000040 e7 fa f1 14 df 30 8e |.....0.| +peer0.org1.example.com | [2f79 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f7a 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f7b 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2f7c 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2f7d 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f7e 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f7f 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f80 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [2f81 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f82 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +peer0.org1.example.com | 00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +peer0.org1.example.com | [2f83 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +peer0.org1.example.com | 00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +peer0.org1.example.com | 00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +peer0.org1.example.com | 00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +peer0.org1.example.com | 00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +peer0.org1.example.com | [2f84 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2f85 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2f86 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f87 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f88 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f89 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f8a 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2f8b 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f8c 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f8d 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f8e 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f8f 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f90 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f91 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f92 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f93 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f94 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f95 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f96 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2f97 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2f98 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2f99 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2f9a 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2f9b 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2f9c 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 gate 1574140963285716800 evaluation starts +peer0.org1.example.com | [2f9d 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f9e 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2f9f 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 principal matched by identity 0 +peer0.org1.example.com | [2fa0 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [2fa1 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [2fa2 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2fa3 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 gate 1574140963285716800 evaluation succeeds +peer0.org1.example.com | [2fa4 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fa5 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fa6 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2fa7 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2fa8 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fa9 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [2faa 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [2fab 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fac 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [2fad 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [2fae 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2faf 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fb0 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2fb1 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fb2 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fb3 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2fb4 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2fb5 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2fb6 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 gate 1574140963292146300 evaluation starts +peer0.org1.example.com | [2fb7 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2fb8 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2fb9 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 principal matched by identity 0 +peer0.org1.example.com | [2fba 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [2fbb 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [2fbc 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2fbd 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 gate 1574140963292146300 evaluation succeeds +peer0.org1.example.com | [2fbe 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fbf 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fc0 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2fc1 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2fc2 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fc3 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fc4 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc5 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc6 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc7 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2fc8 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fc9 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fca 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2fcb 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2fcc 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2fcd 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 gate 1574140963294803900 evaluation starts +peer0.org1.example.com | [2fce 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2fcf 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2fd0 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 principal matched by identity 0 +peer0.org1.example.com | [2fd1 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [2fd2 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [2fd3 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2fd4 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 gate 1574140963294803900 evaluation succeeds +peer0.org1.example.com | [2fd5 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fd6 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fd7 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2fd8 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2fd9 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [2fda 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [2fdb 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [2fdc 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [2fdd 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fde 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fdf 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2fe0 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fe1 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fe2 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2fe4 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer0.org1.example.com | [2fe5 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer0.org1.example.com | [2fe6 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer0.org1.example.com | [2fe3 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2fe7 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2fe8 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 gate 1574140963308507600 evaluation starts +peer0.org1.example.com | [2fe9 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2fea 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [2feb 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 principal matched by identity 0 +peer0.org1.example.com | [2fec 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [2fed 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [2fee 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2fef 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 gate 1574140963308507600 evaluation succeeds +peer0.org1.example.com | [2ff0 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ff1 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ff2 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ff3 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ff4 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ff5 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ff6 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [2ff7 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [2ff8 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [2ff9 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [2ffa 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ffb 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ffc 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2ffd 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ffe 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fff 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3000 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3001 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3002 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 gate 1574140963316186500 evaluation starts +peer0.org1.example.com | [3003 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3004 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3005 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 principal matched by identity 0 +peer0.org1.example.com | [3006 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [3007 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [3008 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3009 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 gate 1574140963316186500 evaluation succeeds +peer0.org1.example.com | [300a 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [300b 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [300c 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [300d 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [300e 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [300f 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3010 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3011 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3012 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3013 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3014 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3015 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3016 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 gate 1574140963322921300 evaluation starts +peer0.org1.example.com | [3017 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3018 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3019 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 principal matched by identity 0 +peer0.org1.example.com | [301a 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [301b 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [301c 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [301d 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 gate 1574140963322921300 evaluation succeeds +peer0.org1.example.com | [301e 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [301f 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3020 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3021 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3022 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3023 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3024 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3025 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3026 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3027 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3028 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3029 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [302a 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [302b 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [302c 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [302d 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [302e 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [302f 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3030 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3031 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3032 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3033 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3034 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3035 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3036 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3037 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3038 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3039 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [303a 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [303b 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [303c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [303d 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [303e 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [303f 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3040 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3041 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3042 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3043 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3044 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3045 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3046 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 gate 1574140963441894200 evaluation starts +peer0.org1.example.com | [3047 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3048 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3049 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 principal matched by identity 0 +peer0.org1.example.com | [304a 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +peer0.org1.example.com | 00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +peer0.org1.example.com | [304b 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +peer0.org1.example.com | 00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +peer0.org1.example.com | 00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +peer0.org1.example.com | 00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +peer0.org1.example.com | 00000040 1b ac e1 20 f3 37 a5 |... .7.| +peer0.org1.example.com | [304c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [304d 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 gate 1574140963441894200 evaluation succeeds +peer0.org1.example.com | [304e 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [304f 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3050 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3051 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3052 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3053 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3054 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3055 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3056 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3057 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3058 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3059 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [305a 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [305b 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [305c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [305d 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [305e 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [305f 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:N\243i\022\203\234;\177\342m\325\036\026\207\nY\025\255_\013m\307\364\212\271\204\325?\310\315\250\002 Imb\355\014t\303\377+f\306\224d\204\000\030M\326\202\306{\341q\356\220rkqF\027AJ" > alive:\314\033N\tp\206\241\033\254\341 \3637\245" > alive:/0\250\0062M\241\203\305\223\223\246a." > +peer0.org1.example.com | [3060 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3061 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3062 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3063 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3064 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3065 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3066 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3067 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3068 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3069 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [306a 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [306b 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [306c 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [306d 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [306e 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [306f 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [3070 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3071 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3072 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3073 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3074 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3075 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3076 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3077 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3078 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3079 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [307a 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [307b 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [307c 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [307d 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [307e 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [307f 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3080 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [3081 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3082 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3083 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3084 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3085 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3086 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3087 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3088 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 gate 1574140963832300800 evaluation starts +peer0.org1.example.com | [3089 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [308a 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [308b 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 principal matched by identity 0 +peer0.org1.example.com | [308c 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce f3 4a 28 6f fd 2d 1f 68 b3 0d a5 3c 84 9f |...J(o.-.h...<..| +peer0.org1.example.com | 00000010 00 0c 01 ff e8 95 3e 30 8e 78 0b b5 f5 2d e9 55 |......>0.x...-.U| +peer0.org1.example.com | [308d 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 05 50 ab 44 93 6e 30 0d 5d 66 29 |0D. D.P.D.n0.]f)| +peer0.org1.example.com | 00000010 b1 44 9b 2b c2 a1 67 90 e8 2d b2 b0 46 7d 74 f5 |.D.+..g..-..F}t.| +peer0.org1.example.com | 00000020 ba 49 78 df 02 20 49 09 7f 48 bd e9 c5 10 bf 91 |.Ix.. I..H......| +peer0.org1.example.com | 00000030 73 1b 45 93 d4 cb 59 37 d9 fc fc bb b2 3e b9 1b |s.E...Y7.....>..| +peer0.org1.example.com | 00000040 77 f5 b9 1a 48 ae |w...H.| +peer0.org1.example.com | [308e 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [308f 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 gate 1574140963832300800 evaluation succeeds +peer0.org1.example.com | [3090 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3091 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3092 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3093 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3094 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3095 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3096 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3097 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3098 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3099 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [309a 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [309b 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [309c 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [309d 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [309e 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [309f 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30a0 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [30a1 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\271\033w\365\271\032H\256" > alive:\314\033N\tp\206\241\033\254\341 \3637\245" > alive:/0\250\0062M\241\203\305\223\223\246a." > +peer0.org1.example.com | [30a2 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [30a3 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30a4 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [30a5 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [30a6 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30a7 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [30a8 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [30a9 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 69 dd c5 b2 89 f8 8f ee 1f 88 02 62 38 e8 9a |.i..........b8..| +peer0.org1.example.com | 00000010 a1 ff 8b c1 7a b7 0e a4 bb 7a e8 05 96 58 06 32 |....z....z...X.2| +peer0.org1.example.com | [30aa 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 29 f2 69 10 00 49 78 70 30 0c 12 |0D. .).i..Ixp0..| +peer0.org1.example.com | 00000010 22 65 4f 43 c5 c1 dd a8 a4 f0 3a df cc 57 30 74 |"eOC......:..W0t| +peer0.org1.example.com | 00000020 ac a1 0e 4a 02 20 02 a7 df 04 15 59 cb de 65 99 |...J. .....Y..e.| +peer0.org1.example.com | 00000030 0f 4b 84 6f 1d b6 c3 8a 24 9d 1d 16 bb c4 c7 2c |.K.o....$......,| +peer0.org1.example.com | 00000040 f2 96 94 d2 36 f5 |....6.| +peer0.org1.example.com | [30ab 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [30ac 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 e6 b9 89 ba 77 5a 63 f6 fd 1f |0E.!......wZc...| +peer0.org1.example.com | 00000010 47 06 15 50 af ab 3c 8f 9f 52 b5 90 0c 73 43 3b |G..P..<..R...sC;| +peer0.org1.example.com | 00000020 99 18 c1 40 29 02 20 7c 14 13 74 11 2a b0 ad 49 |...@). |..t.*..I| +peer0.org1.example.com | 00000030 34 5d d5 5c f3 fa e6 c1 0a 4e db f3 8a f8 09 bc |4].\.....N......| +peer0.org1.example.com | 00000040 8b e6 ba e3 67 e9 ce |....g..| +peer0.org1.example.com | [30ad 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [30ae 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [30af 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [30b0 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [30b1 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [30b2 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b3 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b4 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [30b5 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [30b6 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b7 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b8 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b9 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30ba 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [30bb 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30bc 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30bd 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [30bf 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30be 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:/0\250\0062M\241\203\305\223\223\246a." > +peer0.org1.example.com | [30c0 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [30c1 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30c2 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [30c3 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [30c4 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c5 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c6 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c7 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30c8 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [30c9 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [30ca 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [30cb 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100D1801 +peer0.org1.example.com | [30cc 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B2F252E3F4C143602C371554AD51091D71B920F0288BF558A0D11FD74295E0C +peer0.org1.example.com | [30cd 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [30ce 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30cf 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30d0 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30d1 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30d2 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [30d3 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30d4 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30d5 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [30d6 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30d7 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [30d8 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151028 +peer0.org1.example.com | [30d9 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E2FD67C9E355B64C4BFAA0B8BBF88514369799A21F8E7F8B44C0E3AB377A98DF +peer0.org1.example.com | [30da 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [30db 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [30dc 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [30dd 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [30de 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30df 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30e0 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [30e1 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30e2 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [30e3 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30e4 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30e5 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30e6 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [30e7 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30e8 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30e9 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30ea 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30eb 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [30ec 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [30ed 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30ee 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [30ef 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [30f0 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30f1 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [30f2 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [30f3 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [30f4 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [30f5 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [30f6 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [30f7 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 gate 1574140965357533500 evaluation starts +peer0.org1.example.com | [30f8 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [30f9 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [30fa 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 principal matched by identity 0 +peer0.org1.example.com | [30fb 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c ff b9 3d 40 b7 b9 ce 1d e0 44 b2 0d cc 7a 8d |<..=@.....D...z.| +peer0.org1.example.com | 00000010 94 d4 5f fd cd 5a f8 07 5b 94 8b 44 2a 0f 91 62 |.._..Z..[..D*..b| +peer0.org1.example.com | [30fc 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 36 2c f0 39 11 4c a6 14 c9 0f |0E.!..6,.9.L....| +peer0.org1.example.com | 00000010 a9 2c cd c9 ad c0 c5 d6 f2 b8 57 47 2d 16 a8 dd |.,........WG-...| +peer0.org1.example.com | 00000020 4f 50 f0 dc b7 02 20 0b 4e 4b b3 fe 7f 10 8a 45 |OP.... .NK.....E| +peer0.org1.example.com | 00000030 e7 1a e6 e7 0a df 3c 0d 3e 76 79 17 ea 46 aa 30 |......<.>vy..F.0| +peer0.org1.example.com | 00000040 84 c4 3d 83 16 70 fa |..=..p.| +peer0.org1.example.com | [30fd 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [30fe 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 gate 1574140965357533500 evaluation succeeds +peer0.org1.example.com | [30ff 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3100 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3101 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3102 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3103 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3104 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3105 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3106 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3107 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3108 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3109 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [310a 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [310b 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [310c 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [310d 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [310e 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [310f 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3110 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3111 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3112 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3113 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3114 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3115 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3116 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3117 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3118 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3119 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [311a 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [311b 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [311c 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [311d 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [311e 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [311f 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3120 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3121 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3122 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3123 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3124 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3125 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3126 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3127 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3128 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d a5 0a af 4e b2 ef 5e 59 87 0e 20 57 3a 0d c3 |....N..^Y.. W:..| +peer0.org1.example.com | 00000010 bd da 3f 70 a1 59 3b fc 27 db 09 4b fc 67 2e 21 |..?p.Y;.'..K.g.!| +peer1.org1.example.com | [2c00 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c01 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c02 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c03 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c04 11-19 05:22:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c05 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c06 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c07 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c08 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c09 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c0a 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c0b 11-19 05:22:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c0c 11-19 05:22:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c ce b0 93 0d e3 0d 2a 64 93 39 8b 3f 77 fd 92 |\......*d.9.?w..| +peer1.org1.example.com | 00000010 fe 62 57 34 db b8 c6 d0 bc 54 fd 75 e8 b3 2f bc |.bW4.....T.u../.| +peer1.org1.example.com | [2c0d 11-19 05:22:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 17 fb 62 5e 9f c2 ac 71 28 ef |0E.!....b^...q(.| +peer1.org1.example.com | 00000010 b6 9f ed b8 f3 45 bb 68 f2 7e ec 27 90 b0 04 d9 |.....E.h.~.'....| +peer1.org1.example.com | 00000020 69 b9 e0 7d 08 02 20 68 9f a9 74 36 ad b0 52 13 |i..}.. h..t6..R.| +peer1.org1.example.com | 00000030 da 83 a8 28 ab f5 41 22 7f a3 40 c0 8d ae be bd |...(..A"..@.....| +peer1.org1.example.com | 00000040 1a 46 44 ce 89 7b 9f |.FD..{.| +peer1.org1.example.com | [2c0e 11-19 05:22:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c0f 11-19 05:22:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [2c10 11-19 05:22:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer1.org1.example.com | [2c11 11-19 05:22:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer1.org1.example.com | [2c12 11-19 05:22:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer1.org1.example.com | [2c13 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c14 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c15 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c16 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [2c17 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 99 fe f6 10 26 9e ab ef 45 32 3d fd de 31 a1 |.....&...E2=..1.| +peer1.org1.example.com | 00000010 60 88 f5 42 f6 2b 21 ad 4c 9c 91 be 8d 56 ad 83 |`..B.+!.L....V..| +peer1.org1.example.com | [2c18 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 71 6b ba 80 4c f6 18 ba d9 72 |0E.!..qk..L....r| +peer1.org1.example.com | 00000010 c2 55 24 e4 89 1e fa 2c 02 86 26 92 56 17 78 ae |.U$....,..&.V.x.| +peer1.org1.example.com | 00000020 b4 a4 5d 6b 07 02 20 1c 22 0a ea 61 ed 09 02 03 |..]k.. ."..a....| +peer1.org1.example.com | 00000030 3b 3e f2 e4 ba 7d cb 3d d9 2d e4 b6 ab ee 71 6b |;>...}.=.-....qk| +peer1.org1.example.com | 00000040 c1 63 76 ee 04 44 d3 |.cv..D.| +peer1.org1.example.com | [2c19 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c1a 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2c1b 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2c1c 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2c1d 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2c1e 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c1f 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c20 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c21 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c22 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c23 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c24 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c25 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c27 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c26 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c28 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c29 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c2a 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c2b 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c2c 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c2d 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c2e 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c2f 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c30 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c31 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c32 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c33 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c34 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c35 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c36 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c37 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c38 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c39 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2c3a 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 04 0c aa 34 74 c4 |...4t.| +peer0.org2.example.com | [2f40 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345f40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f41 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345f40 gate 1574140964738623200 evaluation succeeds +peer0.org2.example.com | [2f42 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f43 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f44 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f45 11-19 05:22:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f46 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f47 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2f48 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2f49 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2f4a 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2f4b 11-19 05:22:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f4c 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f4d 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f4e 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f4f 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f50 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f51 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f52 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f53 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f54 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f55 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f56 11-19 05:22:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f57 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f58 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f59 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5a 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5b 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2f5c 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5d 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5e 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f5f 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2f61 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f60 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f62 11-19 05:22:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f63 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [2f64 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [2f65 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2f66 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC15100D1801 +peer0.org2.example.com | [2f67 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BD8C15B19396330647510902A6EADE23777799430738FCC3A9B20D7C88ACA8B9 +peer0.org2.example.com | [2f68 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [2f69 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f6a 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f6b 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f6c 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f6d 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2f6e 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f6f 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f70 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f71 11-19 05:22:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f72 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f73 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f74 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f75 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [2f76 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c ff b9 3d 40 b7 b9 ce 1d e0 44 b2 0d cc 7a 8d |<..=@.....D...z.| +peer0.org2.example.com | 00000010 94 d4 5f fd cd 5a f8 07 5b 94 8b 44 2a 0f 91 62 |.._..Z..[..D*..b| +peer0.org2.example.com | [2f77 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 36 2c f0 39 11 4c a6 14 c9 0f |0E.!..6,.9.L....| +peer0.org2.example.com | 00000010 a9 2c cd c9 ad c0 c5 d6 f2 b8 57 47 2d 16 a8 dd |.,........WG-...| +peer0.org2.example.com | 00000020 4f 50 f0 dc b7 02 20 0b 4e 4b b3 fe 7f 10 8a 45 |OP.... .NK.....E| +peer0.org2.example.com | 00000030 e7 1a e6 e7 0a df 3c 0d 3e 76 79 17 ea 46 aa 30 |......<.>vy..F.0| +peer0.org2.example.com | 00000040 84 c4 3d 83 16 70 fa |..=..p.| +peer0.org2.example.com | [2f78 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f79 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2f7a 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2f7b 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2f7c 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2f7d 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f7e 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f7f 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f80 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f81 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3089 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [308a 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [308b 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [308c 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [308d 11-19 05:22:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [308e 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [308f 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686ee0 gate 1574140968190341400 evaluation starts +peer1.org2.example.com | [3090 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3091 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686ee0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3092 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3093 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686ee0 principal evaluation fails +peer1.org2.example.com | [3094 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686ee0 gate 1574140968190341400 evaluation fails +peer1.org2.example.com | [3095 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3096 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3097 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3098 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687450 gate 1574140968192696600 evaluation starts +peer1.org2.example.com | [3099 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [309a 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687450 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [309b 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687450 principal matched by identity 0 +peer1.org2.example.com | [309c 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [309d 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [309e 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687450 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [309f 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002687450 gate 1574140968192696600 evaluation succeeds +peer1.org2.example.com | [30a0 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30a1 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30a2 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [30a3 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [30a4 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [30a5 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [30a6 11-19 05:22:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30a7 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30a8 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30a9 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [30aa 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30ab 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30ac 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3129 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 18 ce ea 32 59 59 8e 91 fd b7 87 |0D. t...2YY.....| +peer1.org1.example.com | [2c3b 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2c3c 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c3d 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c3e 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2c3f 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c40 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c41 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f0de0 gate 1574140970362235600 evaluation starts +peer1.org1.example.com | [2c42 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f0de0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c43 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f0de0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2c44 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f0de0 principal matched by identity 0 +peer1.org1.example.com | [2c45 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 20 5a b1 6e 86 5a 5f 5b 78 1e a2 d9 e3 4d d3 |U Z.n.Z_[x....M.| +peer1.org1.example.com | 00000010 a5 11 57 a0 c9 6a 40 7a 21 cd 09 54 70 03 cd 71 |..W..j@z!..Tp..q| +peer1.org1.example.com | [2c46 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 5c 36 8b 4b 88 fa d0 1f 72 be |0E.!..\6.K....r.| +peer1.org1.example.com | 00000010 72 53 26 f4 53 e2 88 73 2e b4 3e 83 fa 23 34 d5 |rS&.S..s..>..#4.| +peer1.org1.example.com | 00000020 61 70 98 61 a5 02 20 6e c4 f7 e0 a4 06 fe eb 15 |ap.a.. n........| +peer1.org1.example.com | 00000030 df 76 d9 e5 54 9e cb ae ff a1 87 21 d3 08 62 d3 |.v..T......!..b.| +peer1.org1.example.com | 00000040 26 05 6e 1b 69 46 7f |&.n.iF.| +peer1.org1.example.com | [2c47 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f0de0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c48 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f0de0 gate 1574140970362235600 evaluation succeeds +peer1.org1.example.com | [2c49 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c4a 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c4b 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c4c 11-19 05:22:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c4d 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c4e 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2c4f 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2c50 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2c51 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2c52 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c53 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c54 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c55 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c56 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c57 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c58 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c59 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c5a 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c5b 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c5c 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c5d 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c5e 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c5f 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c60 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [30ad 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [30ae 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30af 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [30b0 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [30b1 11-19 05:22:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [30b2 11-19 05:22:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30b3 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30b4 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30b5 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30b6 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [30b7 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30b8 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [30b9 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30ba 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30bb 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [30bc 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [30bd 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [30be 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7ed0 gate 1574140969730678200 evaluation starts +peer1.org2.example.com | [30bf 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30c0 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7ed0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [30c1 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [30c2 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7ed0 principal evaluation fails +peer1.org2.example.com | [30c3 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028a7ed0 gate 1574140969730678200 evaluation fails +peer1.org2.example.com | [30c4 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30c5 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30c6 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [30c7 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670480 gate 1574140969730991000 evaluation starts +peer1.org2.example.com | [30c8 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30c9 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670480 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [30ca 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670480 principal matched by identity 0 +peer1.org2.example.com | [30cb 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 99 fe f6 10 26 9e ab ef 45 32 3d fd de 31 a1 |.....&...E2=..1.| +peer1.org2.example.com | 00000010 60 88 f5 42 f6 2b 21 ad 4c 9c 91 be 8d 56 ad 83 |`..B.+!.L....V..| +peer1.org1.example.com | [2c61 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c62 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c63 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c64 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c65 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c66 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c67 11-19 05:22:50.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [2c68 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2c69 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15102F +peer1.org1.example.com | [2c6a 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 78FD056AEB63BCD46E64ACCB617DB0646600900B1CE6CE49A3967875718472FA +peer1.org1.example.com | [2c6b 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2c6c 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2c6d 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2c6e 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2c6f 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c70 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c71 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c72 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c73 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c74 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c75 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c76 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c77 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c78 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c79 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c7a 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [2c7b 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c7c 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c7d 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c7e 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c7f 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c80 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2c81 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 fd 05 6a eb 63 bc d4 6e 64 ac cb 61 7d b0 64 |x..j.c..nd..a}.d| +peer1.org1.example.com | 00000010 66 00 90 0b 1c e6 ce 49 a3 96 78 75 71 84 72 fa |f......I..xuq.r.| +peer1.org1.example.com | [2c82 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 94 df c5 8b 71 1c 95 0f b1 1c |0E.!......q.....| +peer1.org1.example.com | 00000010 1d 9c 3a 43 01 af 01 bc ca 94 4a 52 24 5d e8 aa |..:C......JR$]..| +peer1.org1.example.com | 00000020 9e 41 fa 9e 51 02 20 18 8d 66 86 ba 85 cc 91 d0 |.A..Q. ..f......| +peer1.org1.example.com | 00000030 5a 45 8e b2 85 71 b7 be d3 d0 d0 80 dc 28 a0 db |ZE...q.......(..| +peer1.org1.example.com | 00000040 06 80 4e 56 69 97 a5 |..NVi..| +peer1.org1.example.com | [2c83 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c84 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30cc 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 71 6b ba 80 4c f6 18 ba d9 72 |0E.!..qk..L....r| +peer1.org2.example.com | 00000010 c2 55 24 e4 89 1e fa 2c 02 86 26 92 56 17 78 ae |.U$....,..&.V.x.| +peer1.org2.example.com | 00000020 b4 a4 5d 6b 07 02 20 1c 22 0a ea 61 ed 09 02 03 |..]k.. ."..a....| +peer1.org2.example.com | 00000030 3b 3e f2 e4 ba 7d cb 3d d9 2d e4 b6 ab ee 71 6b |;>...}.=.-....qk| +peer1.org2.example.com | 00000040 c1 63 76 ee 04 44 d3 |.cv..D.| +peer1.org2.example.com | [30cd 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670480 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [30ce 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670480 gate 1574140969730991000 evaluation succeeds +peer1.org2.example.com | [30cf 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30d0 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30d1 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [30d2 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [30d3 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30d4 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [30d5 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [30d6 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30d7 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [30d8 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [30d9 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30da 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30db 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30dc 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30dd 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30de 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30df 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30e0 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30e1 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30e3 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30e5 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30e2 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [30e4 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30e6 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30e7 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30e8 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30e9 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [30ea 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30eb 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30ec 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30ed 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30ee 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [30ef 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30f0 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f82 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f83 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f84 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f85 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f86 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f87 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f88 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f89 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f8a 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f8b 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2f8c 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c85 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c86 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c87 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c88 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c89 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2c8a 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 fd 05 6a eb 63 bc d4 6e 64 ac cb 61 7d b0 64 |x..j.c..nd..a}.d| +peer1.org1.example.com | 00000010 66 00 90 0b 1c e6 ce 49 a3 96 78 75 71 84 72 fa |f......I..xuq.r.| +peer1.org1.example.com | [2c8b 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 94 df c5 8b 71 1c 95 0f b1 1c |0E.!......q.....| +peer1.org1.example.com | 00000010 1d 9c 3a 43 01 af 01 bc ca 94 4a 52 24 5d e8 aa |..:C......JR$]..| +peer1.org1.example.com | 00000020 9e 41 fa 9e 51 02 20 18 8d 66 86 ba 85 cc 91 d0 |.A..Q. ..f......| +peer1.org1.example.com | 00000030 5a 45 8e b2 85 71 b7 be d3 d0 d0 80 dc 28 a0 db |ZE...q.......(..| +peer1.org1.example.com | 00000040 06 80 4e 56 69 97 a5 |..NVi..| +peer1.org1.example.com | [2c8c 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c8d 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c8e 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c8f 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c90 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c91 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c92 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c93 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c94 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c95 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [2c96 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c97 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2c98 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c99 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 96 17 ea fa 15 59 46 0d ff 5d 4a e4 5b df 4a 14 |.....YF..]J.[.J.| +peer0.org1.example.com | 00000020 35 e8 94 a1 02 20 7d 66 cd 1c ac 2b a8 09 df e5 |5.... }f...+....| +peer0.org1.example.com | 00000030 9d 91 19 df da d9 92 b8 1e 56 57 50 31 12 c7 de |.........VWP1...| +peer0.org1.example.com | 00000040 81 c5 7e 2a 54 de |..~*T.| +peer0.org1.example.com | [312a 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [312b 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [312c 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [312d 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [312e 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [312f 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3130 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3131 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3132 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3133 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3134 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3135 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3136 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3137 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3138 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3139 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [313a 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [313b 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [313c 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [313d 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [313e 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [313f 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3140 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3141 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3142 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3143 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3144 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3145 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3146 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c9a 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2c9b 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c9c 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c9d 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454cd10 gate 1574140970819756700 evaluation starts +peer1.org1.example.com | [2c9e 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454cd10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c9f 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454cd10 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2ca0 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454cd10 principal matched by identity 0 +peer1.org1.example.com | [2ca1 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf fa 58 15 af 2e 8b 60 6a c6 89 9f a7 36 e8 55 |..X....`j....6.U| +peer1.org1.example.com | 00000010 07 0a ef b0 02 18 4e 55 9a f9 10 26 ed 57 ae 94 |......NU...&.W..| +peer1.org1.example.com | [2ca2 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f d1 c1 a8 b5 bc e8 7b c2 7a d1 36 |0D. .......{.z.6| +peer1.org1.example.com | 00000010 fd ca 47 e3 7a 8c b6 34 ac 0b 58 29 3b f0 02 c4 |..G.z..4..X);...| +peer1.org1.example.com | 00000020 b9 76 56 9b 02 20 12 94 3a c2 d2 e4 08 74 15 10 |.vV.. ..:....t..| +peer1.org1.example.com | 00000030 27 2c 39 cd 7f b2 05 d3 5f 2d 9d c4 23 ce 5d 57 |',9....._-..#.]W| +peer1.org1.example.com | 00000040 9b 26 17 e3 b4 82 |.&....| +peer1.org1.example.com | [2ca3 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454cd10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ca4 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454cd10 gate 1574140970819756700 evaluation succeeds +peer1.org1.example.com | [2ca5 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ca6 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ca7 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ca8 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ca9 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2caa 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2cab 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2cac 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2cad 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2cae 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2caf 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cb0 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cb1 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cb2 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cb3 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cb4 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cb5 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cb6 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cb7 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cb8 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cb9 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cba 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cbb 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cbc 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cbd 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cbe 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cbf 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cc0 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cc1 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2cc2 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cc3 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2cc4 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cc5 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cc6 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cc7 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cc8 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cc9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cca 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ccb 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ccc 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [2ccd 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer1.org1.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer1.org1.example.com | [2cce 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer1.org1.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer1.org1.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer1.org1.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer1.org1.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer1.org1.example.com | [2ccf 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [2f8d 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2f8e 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f8f 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f90 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f91 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f92 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f93 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f94 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f95 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [2f96 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f97 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f98 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f99 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f9a 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f9b 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f9c 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f9d 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002720af0 gate 1574140965765153300 evaluation starts +peer0.org2.example.com | [2f9e 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002720af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f9f 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002720af0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2fa0 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002720af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2fa1 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002720af0 principal evaluation fails +peer0.org2.example.com | [2fa2 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002720af0 gate 1574140965765153300 evaluation fails +peer0.org2.example.com | [2fa3 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fa4 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fa5 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2fa6 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002721060 gate 1574140965766711200 evaluation starts +peer0.org2.example.com | [2fa7 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002721060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fa8 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002721060 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [2fa9 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002721060 principal matched by identity 0 +peer0.org2.example.com | [2faa 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d a5 0a af 4e b2 ef 5e 59 87 0e 20 57 3a 0d c3 |....N..^Y.. W:..| +peer0.org2.example.com | 00000010 bd da 3f 70 a1 59 3b fc 27 db 09 4b fc 67 2e 21 |..?p.Y;.'..K.g.!| +peer0.org1.example.com | [3147 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3148 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3149 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [314a 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [314b 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [314c 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [314d 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [314e 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [314f 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3150 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3151 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 gate 1574140965806924300 evaluation starts +peer0.org1.example.com | [3152 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3153 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3154 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 principal matched by identity 0 +peer0.org1.example.com | [3155 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 ee 04 07 62 b0 a8 b7 bc 56 90 2a 9d 25 28 d8 |....b....V.*.%(.| +peer0.org1.example.com | 00000010 21 0a 01 9a 20 92 e9 a8 cf ab 41 aa a1 a4 b4 27 |!... .....A....'| +peer0.org1.example.com | [3156 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f5 16 6d 14 7e 2a bc 60 a9 57 93 |0D. X..m.~*.`.W.| +peer0.org1.example.com | 00000010 de 91 c2 0c f7 92 b1 73 33 23 36 5f 6c e9 4e 60 |.......s3#6_l.N`| +peer0.org1.example.com | 00000020 75 77 b1 95 02 20 43 8d d9 e0 c1 c7 3b cf 50 f0 |uw... C.....;.P.| +peer0.org1.example.com | 00000030 8a 72 9d ed 6f 5b e6 f2 89 3e a9 32 51 bb ed df |.r..o[...>.2Q...| +peer0.org1.example.com | 00000040 e0 a9 84 51 69 72 |...Qir| +peer0.org1.example.com | [3157 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3158 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 gate 1574140965806924300 evaluation succeeds +peer0.org1.example.com | [3159 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [315a 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [315b 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [315c 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [315d 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [315e 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [315f 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3160 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3161 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3162 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3163 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3164 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3165 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3166 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3167 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3168 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3169 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [316a 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [316b 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [316c 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [316d 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [316e 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [316f 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3170 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3171 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3172 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3173 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3174 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3175 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3176 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3177 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3178 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3179 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [317a 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [317b 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [317c 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [317d 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [317e 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [317f 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3180 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3181 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3182 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3183 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3184 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [30f1 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30f2 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [30f3 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [30f4 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 b4 69 c1 fc dc 9b 56 9a 94 d8 56 64 7c 2b |...i....V...Vd|+| +peer1.org2.example.com | 00000010 0f da 5e ea 8b 12 2b 8a 0b ce b9 b0 25 24 99 c0 |..^...+.....%$..| +peer1.org2.example.com | [30f5 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 7e bf a8 69 d2 7b 8b 8d 70 ff 42 |0D. .~..i.{..p.B| +peer1.org2.example.com | 00000010 b5 5a 85 fb de 97 19 9c 0c 91 3b 44 94 4e ba 2e |.Z........;D.N..| +peer1.org2.example.com | 00000020 7f 1e 44 71 02 20 72 fa 9a 08 c4 85 f7 fd f8 98 |..Dq. r.........| +peer1.org2.example.com | 00000030 79 e7 c2 6c 33 b2 dc 3e 59 07 7b b1 4d ad 50 aa |y..l3..>Y.{.M.P.| +peer1.org2.example.com | 00000040 d8 ab 8e 00 3d 87 |....=.| +peer1.org2.example.com | [30f6 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30f7 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [30f8 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [30f9 11-19 05:22:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [30fa 11-19 05:22:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [30fb 11-19 05:22:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15102E +peer1.org2.example.com | [30fc 11-19 05:22:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 55205AB16E865A5F5B781EA2D9E34DD3A51157A0C96A407A21CD09547003CD71 +peer1.org2.example.com | [30fd 11-19 05:22:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [30fe 11-19 05:22:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [30ff 11-19 05:22:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3100 11-19 05:22:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3101 11-19 05:22:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3102 11-19 05:22:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3103 11-19 05:22:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3104 11-19 05:22:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3105 11-19 05:22:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3106 11-19 05:22:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3107 11-19 05:22:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3108 11-19 05:22:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3109 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [310a 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [310b 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [310c 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [310d 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [310e 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [310f 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3110 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3111 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3112 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3113 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 20 5a b1 6e 86 5a 5f 5b 78 1e a2 d9 e3 4d d3 |U Z.n.Z_[x....M.| +peer1.org2.example.com | 00000010 a5 11 57 a0 c9 6a 40 7a 21 cd 09 54 70 03 cd 71 |..W..j@z!..Tp..q| +peer1.org1.example.com | [2cd0 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc 62 7d ff cd c7 fc 83 45 c1 4e |0E.!..b}.....E.N| +peer1.org1.example.com | 00000010 be 73 1b a4 8f d0 83 84 ff 92 ed b2 33 95 1e d8 |.s..........3...| +peer1.org1.example.com | 00000020 76 81 67 b2 21 02 20 3b 89 d8 12 cc d6 77 09 79 |v.g.!. ;.....w.y| +peer1.org1.example.com | 00000030 0a e7 f2 3b df 26 29 e9 7e 04 81 a0 22 3c 81 c3 |...;.&).~..."<..| +peer1.org1.example.com | 00000040 3c 37 3f a2 5e 9f 85 |<7?.^..| +peer1.org1.example.com | [2cd1 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2cd2 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [2cd3 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2cd4 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2cd5 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2cd6 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cd7 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cd8 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cd9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [2cda 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cdb 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cdc 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2fab 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 18 ce ea 32 59 59 8e 91 fd b7 87 |0D. t...2YY.....| +peer0.org2.example.com | 00000010 96 17 ea fa 15 59 46 0d ff 5d 4a e4 5b df 4a 14 |.....YF..]J.[.J.| +peer0.org2.example.com | 00000020 35 e8 94 a1 02 20 7d 66 cd 1c ac 2b a8 09 df e5 |5.... }f...+....| +peer0.org2.example.com | 00000030 9d 91 19 df da d9 92 b8 1e 56 57 50 31 12 c7 de |.........VWP1...| +peer0.org2.example.com | 00000040 81 c5 7e 2a 54 de |..~*T.| +peer0.org2.example.com | [2fac 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002721060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2fad 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002721060 gate 1574140965766711200 evaluation succeeds +peer0.org2.example.com | [2fae 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2faf 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fb0 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fb1 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2fb2 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fb3 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2fb4 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2fb5 11-19 05:22:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2fb6 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2fb7 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fb8 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fb9 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fba 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbb 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbc 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbd 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbe 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbf 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fc0 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fc1 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2fc2 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fc3 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2fc4 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fc5 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fc6 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fc7 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fc8 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fc9 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fca 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fcb 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fcc 11-19 05:22:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2fcd 11-19 05:22:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15102A +peer0.org2.example.com | [2fce 11-19 05:22:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F1EE040762B0A8B7BC56902A9D2528D8210A019A2092E9A8CFAB41AAA1A4B427 +peer0.org2.example.com | [2fcf 11-19 05:22:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2fd0 11-19 05:22:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2fd1 11-19 05:22:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2fd2 11-19 05:22:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2fd3 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fd4 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cdd 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\206\\e\223\322\314\020\037\215\252\010\222\315" secret_envelope: > alive: +peer1.org1.example.com | [2cde 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cdf 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ce0 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ce1 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ce2 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ce3 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ce4 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ce5 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ce6 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ce7 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ce8 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ce9 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cea 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ceb 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cec 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ced 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [2cee 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cef 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cf0 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cf1 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5] to 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [2cf2 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cf3 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cf4 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cf5 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cf6 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cf7 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2cf8 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3114 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 5c 36 8b 4b 88 fa d0 1f 72 be |0E.!..\6.K....r.| +peer1.org2.example.com | 00000010 72 53 26 f4 53 e2 88 73 2e b4 3e 83 fa 23 34 d5 |rS&.S..s..>..#4.| +peer1.org2.example.com | 00000020 61 70 98 61 a5 02 20 6e c4 f7 e0 a4 06 fe eb 15 |ap.a.. n........| +peer1.org2.example.com | 00000030 df 76 d9 e5 54 9e cb ae ff a1 87 21 d3 08 62 d3 |.v..T......!..b.| +peer1.org2.example.com | 00000040 26 05 6e 1b 69 46 7f |&.n.iF.| +peer1.org2.example.com | [3115 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3116 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3117 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3118 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3119 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [311a 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [311b 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [311c 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [311d 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [311e 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [311f 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3120 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3121 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3122 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652f30 gate 1574140970774191500 evaluation starts +peer1.org2.example.com | [3123 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652f30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3124 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652f30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3125 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3126 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652f30 principal evaluation fails +peer1.org2.example.com | [3127 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002652f30 gate 1574140970774191500 evaluation fails +peer1.org2.example.com | [3128 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3129 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [312a 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [312b 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026534b0 gate 1574140970774592000 evaluation starts +peer1.org2.example.com | [312c 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026534b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [312d 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026534b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [312e 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026534b0 principal matched by identity 0 +peer1.org2.example.com | [312f 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 fd 05 6a eb 63 bc d4 6e 64 ac cb 61 7d b0 64 |x..j.c..nd..a}.d| +peer1.org2.example.com | 00000010 66 00 90 0b 1c e6 ce 49 a3 96 78 75 71 84 72 fa |f......I..xuq.r.| +peer1.org2.example.com | [3130 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 94 df c5 8b 71 1c 95 0f b1 1c |0E.!......q.....| +peer1.org2.example.com | 00000010 1d 9c 3a 43 01 af 01 bc ca 94 4a 52 24 5d e8 aa |..:C......JR$]..| +peer1.org2.example.com | 00000020 9e 41 fa 9e 51 02 20 18 8d 66 86 ba 85 cc 91 d0 |.A..Q. ..f......| +peer0.org1.example.com | [3185 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3186 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3187 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3188 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3189 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [318a 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [318b 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [318c 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [318d 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [318e 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [318f 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3190 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3191 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151029 +peer0.org1.example.com | [3192 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E778CB717DAC4B5240EDA64B6F43074AA39D348E37C5AB86D3F52269D8C23D6A +peer0.org1.example.com | [3193 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3194 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3195 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3196 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3197 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3198 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3199 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [319a 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 5a 45 8e b2 85 71 b7 be d3 d0 d0 80 dc 28 a0 db |ZE...q.......(..| +peer1.org2.example.com | 00000040 06 80 4e 56 69 97 a5 |..NVi..| +peer1.org2.example.com | [3131 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026534b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3132 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026534b0 gate 1574140970774592000 evaluation succeeds +peer1.org2.example.com | [3133 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3134 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3135 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3136 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3137 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3138 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3139 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [313a 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [313b 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [313c 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [313d 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [313e 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [313f 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3140 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3141 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3142 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3143 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3144 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3145 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3146 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3147 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3148 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3149 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [314a 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [314b 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [314c 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [314d 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [314e 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [314f 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3150 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3151 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3152 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3153 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3154 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3155 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [3156 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3157 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3158 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3159 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cf9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2cfa 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cfb 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cfc 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2cfd 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2cfe 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2cff 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457b5a0 gate 1574140971464810000 evaluation starts +peer1.org1.example.com | [2d00 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457b5a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d01 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457b5a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2d02 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457b5a0 principal matched by identity 0 +peer1.org1.example.com | [2d03 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer1.org1.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer1.org1.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer1.org1.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer1.org1.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer1.org1.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer1.org1.example.com | [2d05 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457b5a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d06 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457b5a0 gate 1574140971464810000 evaluation succeeds +peer1.org1.example.com | [2d07 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d08 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d09 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d0a 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d0b 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2d0c 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2d0d 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2d0e 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2d0f 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2d10 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d11 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d12 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d13 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [2d14 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d15 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d16 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d17 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [315a 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [315b 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [315c 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [315d 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [315e 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [315f 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3160 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3161 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3162 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3163 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3164 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3165 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [3166 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf fa 58 15 af 2e 8b 60 6a c6 89 9f a7 36 e8 55 |..X....`j....6.U| +peer1.org2.example.com | 00000010 07 0a ef b0 02 18 4e 55 9a f9 10 26 ed 57 ae 94 |......NU...&.W..| +peer1.org2.example.com | [3167 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f d1 c1 a8 b5 bc e8 7b c2 7a d1 36 |0D. .......{.z.6| +peer1.org2.example.com | 00000010 fd ca 47 e3 7a 8c b6 34 ac 0b 58 29 3b f0 02 c4 |..G.z..4..X);...| +peer1.org2.example.com | 00000020 b9 76 56 9b 02 20 12 94 3a c2 d2 e4 08 74 15 10 |.vV.. ..:....t..| +peer1.org2.example.com | 00000030 27 2c 39 cd 7f b2 05 d3 5f 2d 9d c4 23 ce 5d 57 |',9....._-..#.]W| +peer1.org2.example.com | 00000040 9b 26 17 e3 b4 82 |.&....| +peer1.org2.example.com | [3168 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3169 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [316a 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [316b 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [316c 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [316d 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [316e 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [316f 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3170 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3171 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3172 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3173 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3174 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3175 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3176 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3177 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2fd5 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fd6 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2fd7 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2fd8 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fd9 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2fda 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fdb 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fdc 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fde 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fdd 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fdf 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fe0 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fe1 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fe2 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fe3 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [2fe4 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 ee 04 07 62 b0 a8 b7 bc 56 90 2a 9d 25 28 d8 |....b....V.*.%(.| +peer0.org2.example.com | 00000010 21 0a 01 9a 20 92 e9 a8 cf ab 41 aa a1 a4 b4 27 |!... .....A....'| +peer0.org2.example.com | [2fe5 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f5 16 6d 14 7e 2a bc 60 a9 57 93 |0D. X..m.~*.`.W.| +peer0.org2.example.com | 00000010 de 91 c2 0c f7 92 b1 73 33 23 36 5f 6c e9 4e 60 |.......s3#6_l.N`| +peer0.org2.example.com | 00000020 75 77 b1 95 02 20 43 8d d9 e0 c1 c7 3b cf 50 f0 |uw... C.....;.P.| +peer0.org2.example.com | 00000030 8a 72 9d ed 6f 5b e6 f2 89 3e a9 32 51 bb ed df |.r..o[...>.2Q...| +peer0.org2.example.com | 00000040 e0 a9 84 51 69 72 |...Qir| +peer0.org2.example.com | [2fe6 11-19 05:22:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fe7 11-19 05:22:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fe8 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2fe9 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2fea 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2feb 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fec 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fed 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fee 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fef 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff0 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [2ff1 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ff2 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ff3 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3178 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3179 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [317a 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [317b 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [317c 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [317d 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [317e 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [317f 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3180 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3181 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3182 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3183 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3184 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3185 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3186 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3187 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3188 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000372a90 gate 1574140970848294100 evaluation starts +peer1.org2.example.com | [3189 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000372a90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [318a 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000372a90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [318b 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000372a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [318c 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000372a90 principal evaluation fails +peer1.org2.example.com | [318d 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000372a90 gate 1574140970848294100 evaluation fails +peer1.org2.example.com | [318e 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [318f 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3190 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3191 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373060 gate 1574140970848673100 evaluation starts +peer1.org2.example.com | [3192 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373060 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3193 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373060 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3194 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373060 principal matched by identity 0 +peer1.org2.example.com | [3195 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer1.org2.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer1.org2.example.com | [3196 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer1.org1.example.com | [2d18 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\206\\e\223\322\314\020\037\215\252\010\222\315" > alive: alive: +peer1.org1.example.com | [2d19 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d1a 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d1b 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d1c 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d1d 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2d1e 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d1f 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d20 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d21 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d22 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d23 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d24 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d25 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2d26 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2d27 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [2d28 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [2d29 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2a 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2b 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d2c 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d2d 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d2e 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer1.org2.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer1.org2.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer1.org2.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer1.org2.example.com | [3197 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373060 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3198 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000373060 gate 1574140970848673100 evaluation succeeds +peer1.org2.example.com | [3199 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [319a 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [319b 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [319c 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [319d 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [319e 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [319f 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [31a0 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [31a1 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [31a2 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a3 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a4 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a5 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [31a6 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a7 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a8 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [31aa 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\206\\e\223\322\314\020\037\215\252\010\222\315" > alive: alive: alive:\203\372#4\325ap\230a\245\002 n\304\367\340\244\006\376\353\025\337v\331\345T\236\313\256\377\241\207!\323\010b\323&\005n\033iF\177" > +peer1.org2.example.com | [31ab 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [31ac 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31ad 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [31ae 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31af 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31b0 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31b1 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31b2 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [31b3 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [31b4 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [31b5 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [31b6 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [31b7 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ff4 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ff5 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [2ff6 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff7 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ff8 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ff9 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ffa 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ffb 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ffc 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ffd 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351920 gate 1574140966845116400 evaluation starts +peer0.org2.example.com | [2ffe 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351920 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fff 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351920 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3000 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3001 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351920 principal evaluation fails +peer0.org2.example.com | [3002 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351920 gate 1574140966845116400 evaluation fails +peer0.org2.example.com | [3003 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3004 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3005 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3006 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351e90 gate 1574140966845619000 evaluation starts +peer0.org2.example.com | [3007 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351e90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3008 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351e90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3009 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351e90 principal matched by identity 0 +peer0.org2.example.com | [300a 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org2.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org2.example.com | [300b 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org2.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org2.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org2.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org2.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org2.example.com | [300c 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351e90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [300d 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003351e90 gate 1574140966845619000 evaluation succeeds +peer0.org2.example.com | [300e 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [300f 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3010 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3011 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3012 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3013 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2d2f 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d30 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d31 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2760 gate 1574140971592908400 evaluation starts +peer1.org1.example.com | [2d33 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2760 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d34 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2760 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2d35 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2760 principal matched by identity 0 +peer1.org1.example.com | [2d36 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2d37 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2d38 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d39 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2760 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d3a 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2760 gate 1574140971592908400 evaluation succeeds +peer1.org1.example.com | [2d3b 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d32 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d3c 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d3d 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d3e 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d3f 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d40 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d41 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d42 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d43 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d44 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d45 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d46 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d47 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e38f0 gate 1574140971595342900 evaluation starts +peer1.org1.example.com | [2d48 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e38f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d49 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e38f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2d4a 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e38f0 principal matched by identity 0 +peer1.org1.example.com | [2d4b 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2d4c 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2d4d 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e38f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d4e 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e38f0 gate 1574140971595342900 evaluation succeeds +peer0.org1.example.com | [319b 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [319c 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [319d 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [319e 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [319f 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [31a0 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31a1 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31a2 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31a3 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31a4 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [31a5 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org1.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org1.example.com | [31a6 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org1.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org1.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org1.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org1.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org1.example.com | [31a7 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31a8 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31a9 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31aa 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31ab 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31ac 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ad 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ae 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31af 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [31b0 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [31b1 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org1.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org1.example.com | [31b2 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org1.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org1.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org1.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org1.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org1.example.com | [31b3 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [31b4 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 98 a5 ce ed 12 b3 10 af 9d bc f0 |0D. ............| +peer0.org1.example.com | 00000010 2a a5 1d 10 1b 7e 74 b5 d1 fb f5 70 04 28 01 d4 |*....~t....p.(..| +peer0.org1.example.com | 00000020 6b 74 08 ee 02 20 34 7c 59 ee d6 9b 6c 45 1a a7 |kt... 4|Y...lE..| +peer0.org1.example.com | 00000030 5c c8 90 05 5b 54 73 23 a6 11 72 c0 f9 99 21 75 |\...[Ts#..r...!u| +peer0.org1.example.com | 00000040 76 34 5b e8 be 48 |v4[..H| +peer0.org1.example.com | [31b5 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [31b6 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [31b7 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31b8 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3014 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3015 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3016 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3017 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3018 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3019 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [301a 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [301b 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [301c 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [301d 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [301e 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [301f 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:vy\027\352F\2520\204\304=\203\026p\372" > alive:\2512Q\273\355\337\340\251\204Qir" > +peer0.org2.example.com | [3020 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3021 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3022 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3023 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3024 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3025 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3026 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3027 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3028 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3029 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [302a 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [302b 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [302c 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [302d 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [302e 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2d4f 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d50 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d51 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d52 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d53 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d54 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d55 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d56 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d57 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d58 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d59 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d5a 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d5b 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d5c 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d5d 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d5e 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004600cd0 gate 1574140971596583400 evaluation starts +peer1.org1.example.com | [2d5f 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004600cd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d60 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004600cd0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2d61 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004600cd0 principal matched by identity 0 +peer1.org1.example.com | [2d62 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2d63 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2d64 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004600cd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d65 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004600cd0 gate 1574140971596583400 evaluation succeeds +peer1.org1.example.com | [2d66 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d67 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d68 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d69 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d6a 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2d6b 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2d6c 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [2d6d 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | [302f 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer0.org2.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer0.org2.example.com | [3030 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer0.org2.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer0.org2.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer0.org2.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer0.org2.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer0.org2.example.com | [3031 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3032 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a ef 52 86 c3 89 28 80 f5 b7 a1 |0E.!...R...(....| +peer0.org2.example.com | 00000010 21 00 e2 64 9e 9d c9 4b a8 7d 62 74 48 ed 7c a2 |!..d...K.}btH.|.| +peer0.org2.example.com | 00000020 86 72 e7 30 78 02 20 55 4e 6c 3f 4e e4 d5 cd 7a |.r.0x. UNl?N...z| +peer0.org2.example.com | 00000030 9e 4d c6 f9 5e 86 af f8 34 40 2b 0e c0 8d bc 42 |.M..^...4@+....B| +peer0.org2.example.com | 00000040 e3 c7 08 a5 9c 52 16 |.....R.| +peer0.org2.example.com | [3033 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3034 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [3035 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3036 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3037 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3038 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3039 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [303a 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [303b 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [303c 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [303d 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [303e 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [303f 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3040 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" secret_envelope: > alive:\2512Q\273\355\337\340\251\204Qir" > +peer0.org2.example.com | [3041 11-19 05:22:47.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3042 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3043 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3044 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3045 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3046 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3047 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3048 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3049 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304a 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304b 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304c 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304d 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304e 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304f 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [31b8 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [31b9 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31ba 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [31bb 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31bc 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [31bd 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31be 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [31bf 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [31c0 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [31c1 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31c2 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [31c3 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [31c4 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31c5 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [31c6 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [31c7 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31c8 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [31c9 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15102F +peer1.org2.example.com | [31ca 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BB5CDEF1C6D60206FAC07DF14A9BEE187EB58BEA3EB30A743C41B9C5AB344263 +peer1.org2.example.com | [31cb 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [31cc 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [31cd 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [31ce 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31cf 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [31d0 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\367" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31b9 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ba 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31bb 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31bc 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31bd 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [31be 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org1.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org1.example.com | [31bf 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org1.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org1.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org1.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org1.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org1.example.com | [31c0 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31c1 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31c2 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31c3 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31c4 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31c5 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31c6 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [31c7 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [31c8 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31c9 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ca 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31cb 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [31cc 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31cd 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ce 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [31cf 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31d0 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31d1 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31d2 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [31d3 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31d4 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3050 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3051 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3052 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3053 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3054 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3055 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3056 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3057 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3058 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3059 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [305a 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [305b 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [305c 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [305d 11-19 05:22:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [305e 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [305f 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3060 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3061 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3062 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3063 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [31d1 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31d2 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [31d3 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [31d4 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31d5 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [31d6 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31d7 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\367" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [31d8 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31d9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [31da 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [31db 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31dc 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [31dd 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [31de 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer1.org2.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer1.org2.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer1.org2.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer1.org2.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer1.org2.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer1.org2.example.com | [31e0 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [31e1 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 af 37 0b a2 a1 6d 62 8f e4 74 e7 |0D. B.7...mb..t.| +peer1.org2.example.com | 00000010 b6 df f1 bf 81 42 c1 c6 82 f3 af 83 5a 10 29 f7 |.....B......Z.).| +peer1.org2.example.com | 00000020 e4 c5 01 d7 02 20 14 8f ac 86 e2 9c 67 7a f7 61 |..... ......gz.a| +peer1.org2.example.com | 00000030 c9 79 70 e0 dd 51 f5 f1 e6 aa a9 29 db bc 96 f0 |.yp..Q.....)....| +peer1.org2.example.com | 00000040 b0 d6 2a 6d 3e f7 |..*m>.| +peer1.org2.example.com | [31e2 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [31e3 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [31e4 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31e5 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31e6 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [31e7 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31e8 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [31e9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [31ea 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [2d6e 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d6f 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d70 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d71 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d72 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d73 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d74 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d75 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d76 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cb60 gate 1574140971600311200 evaluation starts +peer1.org1.example.com | [2d77 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cb60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d78 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cb60 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2d79 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cb60 principal matched by identity 0 +peer1.org1.example.com | [2d7a 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2d7b 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2d7c 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cb60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d7d 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cb60 gate 1574140971600311200 evaluation succeeds +peer1.org1.example.com | [2d7e 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d7f 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d80 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d81 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d82 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d83 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d84 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d85 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d86 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3064 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3065 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3066 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3067 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15102B +peer0.org2.example.com | [3068 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 172BFB5666720CA17C1C98F35467D019C9BC060431FA646E294729DCB792132B +peer0.org2.example.com | [3069 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [306a 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [306b 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [306c 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306d 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [306e 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [306f 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3070 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3071 11-19 05:22:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3072 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3073 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3074 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3075 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3076 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3077 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [3078 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3079 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [307a 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [307b 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [307c 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 2b fb 56 66 72 0c a1 7c 1c 98 f3 54 67 d0 19 |.+.Vfr..|...Tg..| +peer0.org2.example.com | 00000010 c9 bc 06 04 31 fa 64 6e 29 47 29 dc b7 92 13 2b |....1.dn)G)....+| +peer0.org2.example.com | [307d 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af 25 dd be 12 c8 98 26 b3 8c |0E.!...%.....&..| +peer0.org2.example.com | 00000010 08 82 59 26 5d 1c 57 8f a5 f2 15 c2 3b 88 64 69 |..Y&].W.....;.di| +peer0.org2.example.com | 00000020 d4 68 bd dd 2c 02 20 32 7c 14 51 73 12 00 9c 00 |.h..,. 2|.Qs....| +peer0.org2.example.com | 00000030 35 5c 11 4a 88 e9 36 02 0e 4c cf da f6 55 9a 61 |5\.J..6..L...U.a| +peer0.org2.example.com | 00000040 94 99 31 4d 03 90 08 |..1M...| +peer0.org2.example.com | [307e 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [307f 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 43 0c 0b 97 7f f2 2e 65 c1 c5 |0E.!..C......e..| +peer1.org2.example.com | [31eb 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [31ec 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31ed 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31ee 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [31ef 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [31f0 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [31f1 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7860 gate 1574140971467662500 evaluation starts +peer1.org2.example.com | [31f2 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31f3 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7860 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [31f4 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [31f5 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7860 principal evaluation fails +peer1.org2.example.com | [31f6 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7860 gate 1574140971467662500 evaluation fails +peer1.org2.example.com | [31f7 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31f8 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31f9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [31fa 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7ea0 gate 1574140971467972000 evaluation starts +peer1.org2.example.com | [31fb 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31fc 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7ea0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [31fd 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7ea0 principal matched by identity 0 +peer1.org2.example.com | [31fe 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer1.org2.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer1.org2.example.com | [31ff 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer1.org2.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer1.org2.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer1.org2.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer1.org2.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer1.org2.example.com | [3200 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7ea0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3201 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c7ea0 gate 1574140971467972000 evaluation succeeds +peer1.org2.example.com | [3202 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3203 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3204 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3205 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3206 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3207 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3208 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3209 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer1.org2.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer1.org2.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer1.org2.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer1.org2.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer1.org2.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer0.org1.example.com | [31d5 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [31d6 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [31d7 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [31d8 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 gate 1574140967275337200 evaluation starts +peer0.org1.example.com | [31d9 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [31da 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [31db 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 principal matched by identity 0 +peer0.org1.example.com | [31dc 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [31dd 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [31de 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [31df 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [31e0 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 gate 1574140967275337200 evaluation succeeds +peer0.org1.example.com | [31e1 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31e2 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31e3 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [31e4 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [31e5 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [31e6 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [31e7 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [31e8 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [31e9 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31ea 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31eb 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [31ec 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31ed 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31ee 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [31ef 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [31f0 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [31f1 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 gate 1574140967277005400 evaluation starts +peer1.org1.example.com | [2d87 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d88 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d89 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d8a 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d8b 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d8c 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d8d 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461df40 gate 1574140971601338000 evaluation starts +peer1.org1.example.com | [2d8e 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461df40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d8f 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461df40 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2d90 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461df40 principal matched by identity 0 +peer1.org1.example.com | [2d91 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2d92 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2d93 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461df40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d94 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461df40 gate 1574140971601338000 evaluation succeeds +peer1.org1.example.com | [2d95 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d96 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d97 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d98 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d99 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2d9a 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2d9b 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [2d9c 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [2d9d 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d9e 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31f2 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [31f3 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [31f4 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [31f5 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 principal matched by identity 0 +peer0.org1.example.com | [31f6 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [31f7 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [31f8 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [31f9 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 gate 1574140967277005400 evaluation succeeds +peer0.org1.example.com | [31fa 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31fb 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31fc 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [31fd 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [31fe 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31ff 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3200 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [3201 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [3202 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [3203 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [3204 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3205 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3206 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3207 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3208 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3209 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [320a 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [320b 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [320c 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 gate 1574140967278548700 evaluation starts +peer0.org1.example.com | [320d 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [320e 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [320f 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 principal matched by identity 0 +peer0.org1.example.com | [3210 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [3211 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [3212 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3213 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 gate 1574140967278548700 evaluation succeeds +peer0.org1.example.com | [3214 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3215 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3216 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3217 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3218 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3219 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [321a 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [321b 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [321c 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [321d 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [321e 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [321f 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3220 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 gate 1574140967279497700 evaluation starts +peer0.org1.example.com | [3221 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3222 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3223 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 principal matched by identity 0 +peer0.org1.example.com | [3224 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [3225 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [3226 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3227 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 gate 1574140967279497700 evaluation succeeds +peer0.org1.example.com | [3228 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3229 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [322a 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [322b 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [322c 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [322d 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [322e 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [322f 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d9f 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2da0 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2da1 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2da2 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2da3 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2da4 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2da5 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463ddd0 gate 1574140971603452200 evaluation starts +peer1.org1.example.com | [2da6 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463ddd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2da7 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463ddd0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2da8 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463ddd0 principal matched by identity 0 +peer1.org1.example.com | [2da9 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2daa 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2dab 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463ddd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2dac 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463ddd0 gate 1574140971603452200 evaluation succeeds +peer1.org1.example.com | [2dad 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2dae 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2daf 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2db0 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2db1 11-19 05:22:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2db2 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2db3 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2db4 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2db5 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2db6 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2db7 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2db8 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2db9 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dba 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dbb 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dbc 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dbd 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2dbe 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2dbf 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2dc0 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2dc1 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2dc2 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2dc3 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dc4 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc5 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dc6 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc7 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dc8 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc9 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 1f 84 a8 4e 20 fc ca ac 67 4a 34 ee 64 df 69 b4 |...N ...gJ4.d.i.| +peer0.org2.example.com | 00000020 9f 10 0f ea 56 02 20 39 4a eb 66 cf fe ac 77 f3 |....V. 9J.f...w.| +peer0.org2.example.com | 00000030 fd 28 4d 90 7f ff 01 04 d8 cf 98 99 64 be 9d 6f |.(M.........d..o| +peer0.org2.example.com | 00000040 8c 39 63 c8 76 49 f9 |.9c.vI.| +peer0.org2.example.com | [3080 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3081 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3082 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3083 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3084 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3085 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3086 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 2b fb 56 66 72 0c a1 7c 1c 98 f3 54 67 d0 19 |.+.Vfr..|...Tg..| +peer0.org2.example.com | 00000010 c9 bc 06 04 31 fa 64 6e 29 47 29 dc b7 92 13 2b |....1.dn)G)....+| +peer0.org2.example.com | [3087 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af 25 dd be 12 c8 98 26 b3 8c |0E.!...%.....&..| +peer0.org2.example.com | 00000010 08 82 59 26 5d 1c 57 8f a5 f2 15 c2 3b 88 64 69 |..Y&].W.....;.di| +peer0.org2.example.com | 00000020 d4 68 bd dd 2c 02 20 32 7c 14 51 73 12 00 9c 00 |.h..,. 2|.Qs....| +peer0.org2.example.com | 00000030 35 5c 11 4a 88 e9 36 02 0e 4c cf da f6 55 9a 61 |5\.J..6..L...U.a| +peer0.org2.example.com | 00000040 94 99 31 4d 03 90 08 |..1M...| +peer0.org2.example.com | [3088 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3089 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [308a 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [308b 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [308c 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer0.org2.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer0.org2.example.com | [308d 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer0.org2.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer0.org2.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer0.org2.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer0.org2.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer0.org2.example.com | [308e 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [308f 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3090 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3091 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3092 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3093 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3094 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3095 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3096 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 2b fb 56 66 72 0c a1 7c 1c 98 f3 54 67 d0 19 |.+.Vfr..|...Tg..| +peer0.org2.example.com | 00000010 c9 bc 06 04 31 fa 64 6e 29 47 29 dc b7 92 13 2b |....1.dn)G)....+| +peer0.org2.example.com | [3097 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af 25 dd be 12 c8 98 26 b3 8c |0E.!...%.....&..| +peer0.org2.example.com | 00000010 08 82 59 26 5d 1c 57 8f a5 f2 15 c2 3b 88 64 69 |..Y&].W.....;.di| +peer0.org2.example.com | 00000020 d4 68 bd dd 2c 02 20 32 7c 14 51 73 12 00 9c 00 |.h..,. 2|.Qs....| +peer0.org2.example.com | 00000030 35 5c 11 4a 88 e9 36 02 0e 4c cf da f6 55 9a 61 |5\.J..6..L...U.a| +peer0.org2.example.com | 00000040 94 99 31 4d 03 90 08 |..1M...| +peer0.org2.example.com | [3098 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3099 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [309a 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [309b 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [309c 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [320b 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [320c 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [320d 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [320e 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [320f 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3210 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3211 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3212 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3213 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer1.org2.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer1.org2.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer1.org2.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer1.org2.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer1.org2.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer1.org2.example.com | [3215 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3216 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3217 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3218 11-19 05:22:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3219 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [321a 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [321b 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [321c 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [321d 11-19 05:22:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [321e 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [321f 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3220 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3221 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3222 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3223 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3224 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3225 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3226 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [3227 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3228 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3229 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [322a 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [322b 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [322c 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [322d 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357\034eOv<\225\330XM\254Mn\312\225\216(\002 \034\327\345\342\3557+\036\274\2261@\002\001\007\373\271'\221RI\323\r\262\002!]}\350\nQI" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3230 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3231 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3232 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3233 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3234 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3235 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3236 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3237 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 gate 1574140967280317600 evaluation starts +peer0.org1.example.com | [3238 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3239 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [323a 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 principal matched by identity 0 +peer0.org1.example.com | [323b 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [323c 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [323d 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [323e 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 gate 1574140967280317600 evaluation succeeds +peer0.org1.example.com | [323f 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3240 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3241 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3242 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3243 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [3244 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [3245 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [3246 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [3247 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3248 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [309d 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [309e 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [309f 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30a0 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [30a1 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [30a2 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [30a3 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7a9d0 gate 1574140967843265700 evaluation starts +peer0.org2.example.com | [30a4 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7a9d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30a5 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7a9d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [30a6 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7a9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [30a7 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7a9d0 principal evaluation fails +peer0.org2.example.com | [30a8 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7a9d0 gate 1574140967843265700 evaluation fails +peer0.org2.example.com | [30a9 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [30aa 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [30ab 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [30ac 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7af40 gate 1574140967843603600 evaluation starts +peer0.org2.example.com | [30ad 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7af40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30ae 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7af40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [30af 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7af40 principal matched by identity 0 +peer0.org2.example.com | [30b0 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +peer0.org2.example.com | 00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +peer0.org2.example.com | [30b1 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +peer0.org2.example.com | 00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +peer0.org2.example.com | 00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +peer0.org2.example.com | 00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +peer0.org2.example.com | 00000040 f0 eb 8b 19 ff 0f |......| +peer0.org2.example.com | [30b2 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7af40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [30b3 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7af40 gate 1574140967843603600 evaluation succeeds +peer0.org2.example.com | [30b4 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [30b5 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [30b6 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [30b7 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [30b8 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30b9 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30ba 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [30bb 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer0.org2.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer0.org2.example.com | [30bc 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer0.org2.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer0.org2.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer0.org2.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer0.org2.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer1.org1.example.com | [2dca 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dcb 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dcc 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dcd 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dce 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dcf 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dd0 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd1 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd2 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd3 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dd4 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd5 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd6 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd7 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dd8 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dd9 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dda 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ddb 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ddc 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ddd 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [2dde 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ddf 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de0 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [322e 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\357\034eOv<\225\330XM\254Mn\312\225\216(\002 \034\327\345\342\3557+\036\274\2261@\002\001\007\373\271'\221RI\323\r\262\002!]}\350\nQI" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [322f 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357\034eOv<\225\330XM\254Mn\312\225\216(\002 \034\327\345\342\3557+\036\274\2261@\002\001\007\373\271'\221RI\323\r\262\002!]}\350\nQI" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3230 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [3231 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +peer1.org2.example.com | 00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +peer1.org2.example.com | [3232 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +peer1.org2.example.com | 00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +peer1.org2.example.com | 00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +peer1.org2.example.com | 00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +peer1.org2.example.com | 00000040 48 c8 4f cd b1 c7 f7 |H.O....| +peer1.org2.example.com | [3233 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3234 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 28 ba 45 09 00 14 43 ce 49 7a |0E.!..(.E...C.Iz| +peer1.org2.example.com | 00000010 7c f4 43 3e ef 1c 65 4f 76 3c 95 d8 58 4d ac 4d ||.C>..eOv<..XM.M| +peer1.org2.example.com | 00000020 6e ca 95 8e 28 02 20 1c d7 e5 e2 ed 37 2b 1e bc |n...(. .....7+..| +peer1.org2.example.com | 00000030 96 31 40 02 01 07 fb b9 27 91 52 49 d3 0d b2 02 |.1@.....'.RI....| +peer1.org2.example.com | 00000040 21 5d 7d e8 0a 51 49 |!]}..QI| +peer1.org2.example.com | [3235 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3236 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [3237 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3238 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3239 11-19 05:22:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [323a 11-19 05:22:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323b 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323c 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323d 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [323e 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [323f 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3240 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3241 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\357\034eOv<\225\330XM\254Mn\312\225\216(\002 \034\327\345\342\3557+\036\274\2261@\002\001\007\373\271'\221RI\323\r\262\002!]}\350\nQI" > > alive:\203\372#4\325ap\230a\245\002 n\304\367\340\244\006\376\353\025\337v\331\345T\236\313\256\377\241\207!\323\010b\323&\005n\033iF\177" > +peer1.org2.example.com | [3242 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3243 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3244 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3245 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3249 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [324a 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [324b 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [324c 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [324d 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [324e 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [324f 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 gate 1574140967286862100 evaluation starts +peer0.org1.example.com | [3250 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3251 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3252 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 principal matched by identity 0 +peer0.org1.example.com | [3253 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [3254 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [3255 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3256 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 gate 1574140967286862100 evaluation succeeds +peer0.org1.example.com | [3257 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3258 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3259 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [325a 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [325b 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [325c 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [325d 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [325e 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [325f 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3260 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3261 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3262 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3263 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3264 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3265 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [3266 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3267 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3268 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3269 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [326a 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30bd 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30be 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30bf 11-19 05:22:47.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30c0 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30c1 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30c2 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [30c3 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [30c5 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30c4 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [30c7 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30c6 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [30c8 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [30c9 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30ca 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30cb 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30cc 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [30cd 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30ce 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30d0 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [30cf 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30d1 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [30d2 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [30d3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002826f80 gate 1574140967925279400 evaluation starts +peer0.org2.example.com | [30d4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002826f80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30d5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002826f80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [30d6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002826f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [30d7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002826f80 principal evaluation fails +peer0.org2.example.com | [30d8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002826f80 gate 1574140967925279400 evaluation fails +peer0.org2.example.com | [30d9 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [30da 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [30db 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [30dc 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028274f0 gate 1574140967927502200 evaluation starts +peer0.org2.example.com | [30dd 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028274f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30de 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028274f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [30df 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028274f0 principal matched by identity 0 +peer1.org1.example.com | [2de1 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de2 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2de3 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [2de4 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2de5 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2de6 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2de7 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2de8 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2de9 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2dea 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2deb 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004687100 gate 1574140971847033200 evaluation starts +peer1.org1.example.com | [2dec 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004687100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ded 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004687100 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2dee 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004687100 principal matched by identity 0 +peer1.org1.example.com | [2def 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +peer1.org1.example.com | 00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +peer1.org1.example.com | [2df0 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +peer1.org1.example.com | 00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +peer1.org1.example.com | 00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +peer1.org1.example.com | 00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +peer1.org1.example.com | 00000040 48 c8 4f cd b1 c7 f7 |H.O....| +peer1.org1.example.com | [2df1 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004687100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2df2 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004687100 gate 1574140971847033200 evaluation succeeds +peer1.org1.example.com | [2df3 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2df4 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2df5 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2df6 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2df7 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2df8 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2df9 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2dfa 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2dfb 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2dfc 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dfd 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dfe 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dff 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [2e00 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e01 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e02 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e03 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2e04 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\206\\e\223\322\314\020\037\215\252\010\222\315" > alive: alive: +peer1.org1.example.com | [2e05 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e06 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e07 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e08 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e09 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e0a 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e0b 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e0c 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e0d 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2e0e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151030 +peer1.org1.example.com | [2e0f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FCAFE41B390905C2B432FF4969926454016D8FE19A4ABD7112264CF6A768EFC0 +peer1.org1.example.com | [2e10 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2e11 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2e12 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2e13 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2e14 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e15 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2e16 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e17 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e18 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e19 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2e1a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e1b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e1c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e1d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e1e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e1f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e20 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e21 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e22 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [2e23 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer1.org1.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer1.org1.example.com | [2e24 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer1.org1.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer1.org1.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer1.org1.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer1.org1.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer1.org1.example.com | [2e25 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e26 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e27 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [2e28 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e29 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e2a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e2b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e2c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e2d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e2e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e2f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e80d0 gate 1574140971924728300 evaluation starts +peer1.org1.example.com | [2e30 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e80d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e31 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e80d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2e32 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e80d0 principal matched by identity 0 +peer0.org2.example.com | [30e0 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [30e1 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [30e2 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028274f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [30e3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028274f0 gate 1574140967927502200 evaluation succeeds +peer0.org2.example.com | [30e4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [30e5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [30e6 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [30e7 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [30e8 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30e9 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30ea 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [30eb 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30ec 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30ed 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [30ee 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [30ef 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [30f0 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fc680 gate 1574140967937557900 evaluation starts +peer0.org2.example.com | [30f1 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fc680 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30f2 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fc680 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [30f3 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fc680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [30f4 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fc680 principal evaluation fails +peer0.org2.example.com | [30f5 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fc680 gate 1574140967937557900 evaluation fails +peer0.org2.example.com | [30f6 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [30f7 11-19 05:22:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [30f8 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [30f9 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcbf0 gate 1574140967940351000 evaluation starts +peer0.org2.example.com | [30fa 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcbf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30fb 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcbf0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [30fc 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcbf0 principal matched by identity 0 +peer0.org2.example.com | [30fd 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [30fe 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [30ff 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcbf0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3100 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcbf0 gate 1574140967940351000 evaluation succeeds +peer1.org2.example.com | [3246 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3247 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3248 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3249 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [324a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [324b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [324c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [324d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [324e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [324f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3250 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3251 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3252 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3253 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3254 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3255 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005334d0 gate 1574140971922108400 evaluation starts +peer1.org2.example.com | [3256 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005334d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3257 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005334d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3258 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005334d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3259 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005334d0 principal evaluation fails +peer1.org2.example.com | [325a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005334d0 gate 1574140971922108400 evaluation fails +peer1.org2.example.com | [325b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [325c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [325d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [325e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a40 gate 1574140971922360100 evaluation starts +peer1.org2.example.com | [325f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3260 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3261 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a40 principal matched by identity 0 +peer1.org2.example.com | [3262 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer1.org2.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer1.org2.example.com | [3263 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer1.org2.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer1.org2.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer1.org2.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer1.org2.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer1.org2.example.com | [3264 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3265 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000533a40 gate 1574140971922360100 evaluation succeeds +peer1.org2.example.com | [3266 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3267 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3268 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3269 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [326a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [326b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [326c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [326d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [326e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [326f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3270 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3271 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3272 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [3273 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3274 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3275 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3276 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3277 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\206\\e\223\322\314\020\037\215\252\010\222\315" > alive: alive: alive:\203\372#4\325ap\230a\245\002 n\304\367\340\244\006\376\353\025\337v\331\345T\236\313\256\377\241\207!\323\010b\323&\005n\033iF\177" > +peer1.org2.example.com | [3278 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3279 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [327a 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [327b 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [327c 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [327d 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [327e 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [327f 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3280 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3281 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3282 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3283 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3284 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3285 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3286 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3287 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3288 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:40884 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3289 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [328a 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [328b 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [328c 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [328d 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [328e 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [328f 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3290 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3291 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3292 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550cc0 gate 1574140972156404100 evaluation starts +peer1.org2.example.com | [3293 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3295 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550cc0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3294 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3296 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3297 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550cc0 principal evaluation fails +peer1.org2.example.com | [3298 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000550cc0 gate 1574140972156404100 evaluation fails +peer1.org2.example.com | [3299 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [329a 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [329b 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [329c 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000551230 gate 1574140972157607300 evaluation starts +peer1.org2.example.com | [329d 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000551230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [329e 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000551230 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [329f 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000551230 principal matched by identity 0 +peer1.org2.example.com | [32a0 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [32a1 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [32a2 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000551230 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32a3 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000551230 gate 1574140972157607300 evaluation succeeds +peer1.org2.example.com | [32a4 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32a5 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32a6 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32a7 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32a8 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32a9 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32aa 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [32ab 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32ac 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32ad 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32ae 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32af 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32b0 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004efb0 gate 1574140972159814500 evaluation starts +peer1.org2.example.com | [32b1 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004efb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32b2 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004efb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [32b3 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004efb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32b4 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004efb0 principal evaluation fails +peer1.org2.example.com | [32b5 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004efb0 gate 1574140972159814500 evaluation fails +peer1.org2.example.com | [32b6 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32b7 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32b8 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32b9 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f520 gate 1574140972160440800 evaluation starts +peer1.org2.example.com | [32ba 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32bb 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f520 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [32bc 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f520 principal matched by identity 0 +peer1.org2.example.com | [32bd 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [32be 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | [326b 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [326c 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [326d 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [326e 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [326f 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3270 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3271 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3272 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3273 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3274 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3275 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3276 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3277 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [3278 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3279 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [327a 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [327b 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [327c 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [327d 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [327e 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [327f 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 gate 1574140967441785100 evaluation starts +peer0.org1.example.com | [3280 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3281 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3282 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 principal matched by identity 0 +peer1.org1.example.com | [2e33 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +peer1.org1.example.com | 00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +peer1.org1.example.com | [2e34 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +peer1.org1.example.com | 00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +peer1.org1.example.com | 00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +peer1.org1.example.com | 00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +peer1.org1.example.com | 00000040 48 c8 4f cd b1 c7 f7 |H.O....| +peer1.org1.example.com | [2e35 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e80d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e36 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e80d0 gate 1574140971924728300 evaluation succeeds +peer1.org1.example.com | [2e37 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e38 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e39 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e3a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e3b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2e3c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e3d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2e3e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer1.org1.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer1.org1.example.com | [2e3f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer1.org1.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer1.org1.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer1.org1.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer1.org1.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer1.org1.example.com | [2e40 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e41 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e42 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e43 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e44 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e45 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e46 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e47 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2e48 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer1.org1.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer1.org1.example.com | [2e49 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer1.org1.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer1.org1.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer1.org1.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer1.org1.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer1.org1.example.com | [2e4a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2e4b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 b3 05 3c d7 73 7f b7 ed 31 5d |0E.!....<.s...1]| +peer1.org1.example.com | 00000010 2c c1 51 08 76 2d 68 6a e5 1d 87 b5 a8 32 9f 85 |,.Q.v-hj.....2..| +peer1.org1.example.com | 00000020 e2 1e ce b7 a9 02 20 58 23 bf 44 25 74 39 ed de |...... X#.D%t9..| +peer1.org1.example.com | 00000030 eb 80 69 19 3f aa 48 02 2f 95 95 b4 ca ae f2 3f |..i.?.H./......?| +peer1.org1.example.com | 00000040 e4 13 50 84 6f db 73 |..P.o.s| +peer1.org1.example.com | [2e4c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2e4d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2e4e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e4f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e50 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e51 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e52 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e53 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [32bf 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f520 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32c0 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f520 gate 1574140972160440800 evaluation succeeds +peer1.org2.example.com | [32c1 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32c2 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32c3 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32c4 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32c5 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [32c6 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [32c7 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | [3283 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +peer0.org1.example.com | 00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +peer0.org1.example.com | [3284 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +peer0.org1.example.com | 00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +peer0.org1.example.com | 00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +peer0.org1.example.com | 00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +peer0.org1.example.com | 00000040 fa de 87 f3 37 db 46 |....7.F| +peer0.org1.example.com | [3285 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3286 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 gate 1574140967441785100 evaluation succeeds +peer0.org1.example.com | [3287 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3288 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3289 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [328a 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [328b 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [328c 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [328d 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [328e 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [328f 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3290 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3291 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3292 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3293 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [3294 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3295 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3296 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3297 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3298 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\2512Q\273\355\337\340\251\204Qir" > alive:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > alive: +peer0.org1.example.com | [3299 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [329a 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [329b 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [329c 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [329d 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [329e 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [329f 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32a0 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [32a1 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3101 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3102 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3103 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3104 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3105 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [3106 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [3107 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [3108 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [3109 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [310a 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [310b 11-19 05:22:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [310c 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [310d 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [310e 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [310f 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3110 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3111 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3112 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3113 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3114 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3115 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f2a0 gate 1574140967951133900 evaluation starts +peer0.org2.example.com | [3116 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3117 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f2a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3118 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3119 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f2a0 principal evaluation fails +peer0.org2.example.com | [311a 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f2a0 gate 1574140967951133900 evaluation fails +peer0.org2.example.com | [311b 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [311c 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [311d 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [32c8 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [32c9 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32ca 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [32cb 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32cc 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32cd 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32ce 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [32cf 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32d0 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32d1 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32d2 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32d3 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32d4 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b880 gate 1574140972163300800 evaluation starts +peer1.org2.example.com | [32d5 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b880 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32d6 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b880 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [32d7 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32d8 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b880 principal evaluation fails +peer1.org2.example.com | [32d9 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002b880 gate 1574140972163300800 evaluation fails +peer1.org2.example.com | [32da 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32db 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32dc 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32dd 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002be20 gate 1574140972163627700 evaluation starts +peer1.org2.example.com | [32de 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002be20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32df 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002be20 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [32e0 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002be20 principal matched by identity 0 +peer1.org2.example.com | [32e1 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [32e2 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [32e3 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002be20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32e4 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00002be20 gate 1574140972163627700 evaluation succeeds +peer1.org2.example.com | [32e5 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32e6 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32e7 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32e8 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32a2 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [32a3 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [32a4 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32a5 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [32a6 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [32a7 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [32a8 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [32a9 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32aa 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [32ab 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [32ac 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [32ad 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32ae 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32af 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32b0 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32b1 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32b2 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32b3 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [32b4 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32b5 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [32b6 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [32b7 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32b8 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [32b9 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [32ba 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e54 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [2e55 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e56 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e57 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e58 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e59 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e5a 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e5b 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e5c 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047093c0 gate 1574140971954413000 evaluation starts +peer1.org1.example.com | [2e5d 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047093c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e5e 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047093c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2e5f 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047093c0 principal matched by identity 0 +peer1.org1.example.com | [2e60 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer1.org1.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer1.org1.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer1.org1.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer1.org1.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer1.org1.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer1.org1.example.com | [2e62 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047093c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e63 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047093c0 gate 1574140971954413000 evaluation succeeds +peer1.org1.example.com | [2e64 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e65 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e66 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e67 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e68 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e69 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e6a 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [2e6b 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer1.org1.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer1.org1.example.com | [2e6c 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer1.org1.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer1.org1.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer1.org1.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer1.org1.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer1.org1.example.com | [2e6d 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e6e 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [311e 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f810 gate 1574140967955936500 evaluation starts +peer0.org2.example.com | [311f 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3120 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f810 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3121 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f810 principal matched by identity 0 +peer0.org2.example.com | [3122 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [3123 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [3124 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3125 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330f810 gate 1574140967955936500 evaluation succeeds +peer0.org2.example.com | [3126 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3127 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3128 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3129 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [312a 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [312b 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [312c 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [312d 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [312e 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [312f 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3130 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3131 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3132 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a549a0 gate 1574140967959125100 evaluation starts +peer0.org2.example.com | [3133 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a549a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3134 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a549a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3135 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a549a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3136 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a549a0 principal evaluation fails +peer0.org1.example.com | [32bb 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32bc 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32bd 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32be 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32bf 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32c0 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32c1 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 gate 1574140967833147400 evaluation starts +peer0.org1.example.com | [32c2 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32c3 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [32c4 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 principal matched by identity 0 +peer0.org1.example.com | [32c5 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 2b fb 56 66 72 0c a1 7c 1c 98 f3 54 67 d0 19 |.+.Vfr..|...Tg..| +peer0.org1.example.com | 00000010 c9 bc 06 04 31 fa 64 6e 29 47 29 dc b7 92 13 2b |....1.dn)G)....+| +peer0.org1.example.com | [32c6 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af 25 dd be 12 c8 98 26 b3 8c |0E.!...%.....&..| +peer0.org1.example.com | 00000010 08 82 59 26 5d 1c 57 8f a5 f2 15 c2 3b 88 64 69 |..Y&].W.....;.di| +peer0.org1.example.com | 00000020 d4 68 bd dd 2c 02 20 32 7c 14 51 73 12 00 9c 00 |.h..,. 2|.Qs....| +peer0.org1.example.com | 00000030 35 5c 11 4a 88 e9 36 02 0e 4c cf da f6 55 9a 61 |5\.J..6..L...U.a| +peer0.org1.example.com | 00000040 94 99 31 4d 03 90 08 |..1M...| +peer0.org1.example.com | [32c7 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32c8 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 gate 1574140967833147400 evaluation succeeds +peer0.org1.example.com | [32c9 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32ca 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32cb 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32cc 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32cd 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [32ce 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [32cf 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [32d0 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [32d1 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [32d2 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32d3 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32d4 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32d5 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [32d6 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32d7 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32d8 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32d9 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [32da 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [32db 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32dc 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > alive: +peer1.org2.example.com | [32e9 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32ea 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32eb 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [32ec 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32ed 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32ee 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32ef 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32f0 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32f1 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385bb0 gate 1574140972169699700 evaluation starts +peer1.org2.example.com | [32f2 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32f3 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385bb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [32f4 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32f5 11-19 05:22:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385bb0 principal evaluation fails +peer1.org2.example.com | [32f6 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000385bb0 gate 1574140972169699700 evaluation fails +peer1.org2.example.com | [32f7 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32f8 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32f9 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32fa 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ae230 gate 1574140972170275400 evaluation starts +peer1.org2.example.com | [32fb 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ae230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32fc 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ae230 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [32fd 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ae230 principal matched by identity 0 +peer1.org2.example.com | [32fe 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [32ff 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [3300 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ae230 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3301 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ae230 gate 1574140972170275400 evaluation succeeds +peer1.org2.example.com | [3302 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3303 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3304 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3305 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3306 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [3307 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [3308 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [3309 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [330a 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [330b 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [330c 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [330d 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [330e 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [330f 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3310 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3311 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3312 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3313 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3314 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3315 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3316 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a72e0 gate 1574140972178834500 evaluation starts +peer1.org2.example.com | [3317 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a72e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3318 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a72e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3319 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a72e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [331a 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a72e0 principal evaluation fails +peer1.org2.example.com | [331b 11-19 05:22:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a72e0 gate 1574140972178834500 evaluation fails +peer1.org2.example.com | [331c 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [331d 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [331e 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [331f 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a7850 gate 1574140972180695200 evaluation starts +peer1.org2.example.com | [3320 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a7850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3321 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a7850 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3322 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a7850 principal matched by identity 0 +peer1.org2.example.com | [3323 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [3324 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [3325 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a7850 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3326 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0005a7850 gate 1574140972180695200 evaluation succeeds +peer1.org2.example.com | [3327 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3328 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3329 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [332a 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [332b 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [332c 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [332d 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [332e 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [332f 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3330 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3331 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3332 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3333 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000486e90 gate 1574140972181818000 evaluation starts +peer1.org2.example.com | [3334 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000486e90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3335 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000486e90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3336 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000486e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3337 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000486e90 principal evaluation fails +peer1.org2.example.com | [3338 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000486e90 gate 1574140972181818000 evaluation fails +peer1.org2.example.com | [3339 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [333a 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [333b 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [333c 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000487480 gate 1574140972182141700 evaluation starts +peer1.org2.example.com | [333d 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000487480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [333e 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000487480 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [333f 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000487480 principal matched by identity 0 +peer1.org2.example.com | [3340 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [3341 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [3342 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000487480 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3343 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000487480 gate 1574140972182141700 evaluation succeeds +peer1.org2.example.com | [3344 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3345 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3346 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3347 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3348 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org2.example.com | [3349 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org2.example.com | [334a 11-19 05:22:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [334b 11-19 05:22:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3137 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a549a0 gate 1574140967959125100 evaluation fails +peer0.org2.example.com | [3138 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3139 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [313a 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [313b 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a54f10 gate 1574140967959628700 evaluation starts +peer0.org2.example.com | [313c 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a54f10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [313d 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a54f10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [313e 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a54f10 principal matched by identity 0 +peer0.org2.example.com | [313f 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [3140 11-19 05:22:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [3141 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a54f10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3142 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a54f10 gate 1574140967959628700 evaluation succeeds +peer0.org2.example.com | [3143 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3144 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3145 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3146 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3147 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [3148 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [3149 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [314a 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [314b 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [314c 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [314d 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [314e 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [314f 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3150 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3151 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3152 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3153 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3154 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e970 gate 1574140967962451500 evaluation starts +peer0.org2.example.com | [3155 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3156 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e970 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3157 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3158 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e970 principal evaluation fails +peer0.org2.example.com | [3159 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e970 gate 1574140967962451500 evaluation fails +peer0.org2.example.com | [315a 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [315b 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [315c 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [315d 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291eee0 gate 1574140967964032800 evaluation starts +peer0.org2.example.com | [315e 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291eee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [315f 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291eee0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3160 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291eee0 principal matched by identity 0 +peer0.org2.example.com | [3161 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [3162 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [3163 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291eee0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3164 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291eee0 gate 1574140967964032800 evaluation succeeds +peer0.org2.example.com | [3165 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3166 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3167 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3168 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3169 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [316a 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [316b 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [316c 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [316d 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [316e 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [316f 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3170 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3171 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe070 gate 1574140967966633100 evaluation starts +peer0.org2.example.com | [3172 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe070 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3173 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe070 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3174 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3175 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe070 principal evaluation fails +peer0.org2.example.com | [3176 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe070 gate 1574140967966633100 evaluation fails +peer0.org2.example.com | [3177 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3178 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3179 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [317a 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe5e0 gate 1574140967966909800 evaluation starts +peer0.org2.example.com | [317b 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe5e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [317c 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe5e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [317d 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe5e0 principal matched by identity 0 +peer0.org2.example.com | [317e 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [317f 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [3180 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe5e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3181 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fe5e0 gate 1574140967966909800 evaluation succeeds +peer0.org2.example.com | [3182 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3183 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3184 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3185 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3186 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [3187 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [3188 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [3189 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [318a 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [318b 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [318c 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [318d 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [318e 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [318f 11-19 05:22:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3190 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3191 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3192 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32dd 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [32de 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [32df 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32e0 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32e1 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32e2 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32e3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [32e4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [32e5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32e6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [32e7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [32e8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 33 45 6f 4f 88 5c 62 57 82 64 cd ee 20 7c 3d |.3EoO.\bW.d.. |=| +peer0.org1.example.com | 00000010 ba f2 e1 9d 29 91 d6 83 33 5e 6c b6 dd d2 e7 ee |....)...3^l.....| +peer0.org1.example.com | [32e9 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cd b0 8f 9a df 2f 34 fb 5c fd |0E.!......./4.\.| +peer0.org1.example.com | 00000010 d0 9c ac 6e a0 d4 d9 68 1d b3 f5 a9 c9 42 e2 a7 |...n...h.....B..| +peer0.org1.example.com | 00000020 3f b0 8c 94 d8 02 20 77 23 28 ea 66 db 39 7d 4a |?..... w#(.f.9}J| +peer0.org1.example.com | 00000030 32 23 aa 6c a9 ee e0 9a 6b f5 3c b7 6d f1 f7 63 |2#.l....k.<.m..c| +peer0.org1.example.com | 00000040 b7 33 77 5a 21 87 a7 |.3wZ!..| +peer0.org1.example.com | [32ea 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [32eb 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b bb 7a 39 be fd 72 71 fc 48 e4 |0E.!...z9..rq.H.| +peer0.org1.example.com | 00000010 ba 83 2f a7 b1 09 6b 94 e9 f1 b1 0e 8a 29 fd 33 |../...k......).3| +peer0.org1.example.com | 00000020 a9 9b 54 cc 36 02 20 52 7d 20 e4 7f 72 c1 01 af |..T.6. R} ..r...| +peer0.org1.example.com | 00000030 3c 3d 41 4b 43 bf 38 b4 d9 e3 52 76 15 61 4a 19 |<=AKC.8...Rv.aJ.| +peer0.org1.example.com | 00000040 4d 16 d7 aa ac 12 b9 |M......| +peer0.org1.example.com | [32ec 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [32ed 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [32ee 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [32ef 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [32f0 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [32f1 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32f2 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32f3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32f4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [32f5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32f6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3193 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3194 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3195 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3196 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ba710 gate 1574140967971228100 evaluation starts +peer0.org2.example.com | [3197 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ba710 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3198 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ba710 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3199 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ba710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [319a 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ba710 principal evaluation fails +peer0.org2.example.com | [319b 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ba710 gate 1574140967971228100 evaluation fails +peer0.org2.example.com | [319c 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [319d 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [319e 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [319f 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bac80 gate 1574140967971619300 evaluation starts +peer0.org2.example.com | [31a0 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bac80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31a1 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bac80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [31a2 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bac80 principal matched by identity 0 +peer0.org2.example.com | [31a3 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 33 45 6f 4f 88 5c 62 57 82 64 cd ee 20 7c 3d |.3EoO.\bW.d.. |=| +peer0.org2.example.com | 00000010 ba f2 e1 9d 29 91 d6 83 33 5e 6c b6 dd d2 e7 ee |....)...3^l.....| +peer0.org2.example.com | [31a4 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cd b0 8f 9a df 2f 34 fb 5c fd |0E.!......./4.\.| +peer0.org2.example.com | 00000010 d0 9c ac 6e a0 d4 d9 68 1d b3 f5 a9 c9 42 e2 a7 |...n...h.....B..| +peer0.org2.example.com | 00000020 3f b0 8c 94 d8 02 20 77 23 28 ea 66 db 39 7d 4a |?..... w#(.f.9}J| +peer0.org2.example.com | 00000030 32 23 aa 6c a9 ee e0 9a 6b f5 3c b7 6d f1 f7 63 |2#.l....k.<.m..c| +peer0.org2.example.com | 00000040 b7 33 77 5a 21 87 a7 |.3wZ!..| +peer0.org2.example.com | [31a5 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bac80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [31a6 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bac80 gate 1574140967971619300 evaluation succeeds +peer0.org2.example.com | [31a7 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31a8 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31a9 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [31aa 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [31ab 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [31ac 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [31ad 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [31ae 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [31af 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [31b0 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31b1 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31b2 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31b3 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [31b4 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b5 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b6 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b7 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [31b8 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [31ba 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [334c 11-19 05:22:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [334d 11-19 05:22:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [334e 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [334f 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3350 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3351 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3352 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3353 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3354 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3355 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3356 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3357 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes +peer1.org2.example.com | [3358 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes +peer1.org2.example.com | [3359 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [335a 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [335b 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [335c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [335d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [335e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b6b30 gate 1574140974177125300 evaluation starts +peer1.org2.example.com | [335f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b6b30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3360 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b6b30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3361 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b6b30 principal matched by identity 0 +peer1.org2.example.com | [3362 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 14 9b 1e 52 33 81 b6 7f b5 bc bf b7 5a db 2c |_...R3.......Z.,| +peer1.org2.example.com | 00000010 1f 95 62 d9 52 71 fc ac 93 dc 76 4f 40 0f 06 94 |..b.Rq....vO@...| +peer1.org2.example.com | [3363 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 aa 5a 6d 21 8c ab 87 9d 99 39 |0E.!...Zm!.....9| +peer1.org2.example.com | 00000010 00 1c b9 e8 40 19 cf aa 41 5e a1 26 fa 9d 28 aa |....@...A^.&..(.| +peer1.org2.example.com | 00000020 68 4c 16 5e 53 02 20 06 b2 ec e0 1f b5 3f 52 27 |hL.^S. ......?R'| +peer1.org2.example.com | 00000030 1a d8 ac 9f 99 9b 6c a0 8a 95 ff 89 78 e5 4b 4e |......l.....x.KN| +peer1.org2.example.com | 00000040 1d a4 c9 63 b2 0d ff |...c...| +peer1.org2.example.com | [3364 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b6b30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3365 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b6b30 gate 1574140974177125300 evaluation succeeds +peer1.org2.example.com | [3366 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [3367 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [3368 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [3369 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [336a 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [336b 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer1.org2.example.com | [336c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [336d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org2.example.com | [336e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org2.example.com | [336f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [3370 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer1.org2.example.com | [3371 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3372 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3373 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3374 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3375 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3376 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3377 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer1.org2.example.com | [3378 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org2.example.com | [3379 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer1.org2.example.com | [337a 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer1.org2.example.com | [337b 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [337c 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0034d9340 env 0xc0027ad270 txn 0 +peer1.org2.example.com | [337d 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0027ad270 +peer1.org2.example.com | [337e 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +peer1.org2.example.com | [337f 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [3380 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [3381 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [3382 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3383 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org2.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer1.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer1.org2.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer1.org2.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer1.org2.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer1.org2.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer1.org2.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer1.org2.example.com | fQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3384 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer1.org2.example.com | [3385 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [3386 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [3387 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 17 9f c3 74 1b 52 69 8b 1b 61 04 bd 5f 6e fc |....t.Ri..a.._n.| +peer1.org2.example.com | 00000010 23 3f 14 b1 da 98 c7 eb 83 d0 99 5b 69 2c d6 fb |#?.........[i,..| +peer1.org2.example.com | [3388 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 c1 b9 60 ac e7 e3 8e 4c 35 f5 e3 |0D. R..`....L5..| +peer1.org2.example.com | 00000010 d0 57 4c 17 2b 63 e9 4e 0f 90 1b 11 66 33 ac 45 |.WL.+c.N....f3.E| +peer1.org2.example.com | 00000020 36 ba 41 a0 02 20 68 1d 3d 55 3a d4 2c 2e 3b ec |6.A.. h.=U:.,.;.| +peer1.org2.example.com | 00000030 b5 d4 40 5a 67 23 76 05 76 b9 63 e3 ff 94 86 d4 |..@Zg#v.v.c.....| +peer1.org2.example.com | 00000040 35 94 c1 49 86 f1 |5..I..| +peer1.org2.example.com | [3389 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [338a 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00360a000, header channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +peer1.org2.example.com | [338b 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [338c 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [338d 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [338e 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [338f 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [3390 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [3391 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [3392 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [3393 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [3394 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [3395 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [3396 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [2e6f 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e70 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [2e71 11-19 05:22:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer1.org1.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer1.org1.example.com | [2e72 11-19 05:22:51.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer1.org1.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer1.org1.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer1.org1.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer1.org1.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer1.org1.example.com | [2e73 11-19 05:22:51.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e74 11-19 05:22:51.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e75 11-19 05:22:51.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e76 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e77 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e78 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e79 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e7a 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e7b 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e7c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e7d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e7e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e7f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [2e80 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e81 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [2e82 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047663f0 gate 1574140974171546800 evaluation starts +peer1.org1.example.com | [2e83 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047663f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e84 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047663f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2e85 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047663f0 principal matched by identity 0 +peer1.org1.example.com | [2e86 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab 52 71 44 2f de 1c 33 6d 2b 43 f3 13 a5 29 |..RqD/..3m+C...)| +peer1.org1.example.com | 00000010 f5 f2 b6 34 fc 9d 18 02 a5 29 97 a2 dc 36 5c 29 |...4.....)...6\)| +peer1.org1.example.com | [2e87 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba f1 23 59 ba 95 10 18 34 f7 48 |0E.!...#Y....4.H| +peer1.org1.example.com | 00000010 e5 6b e9 bf b7 83 68 5e ba 97 08 35 84 f3 97 02 |.k....h^...5....| +peer1.org1.example.com | 00000020 b7 67 77 60 2b 02 20 31 ca f9 67 7f d4 24 bc 4d |.gw`+. 1..g..$.M| +peer1.org1.example.com | 00000030 cc 10 28 f0 97 f3 f0 48 5f 57 ff 4c b7 27 7a d2 |..(....H_W.L.'z.| +peer1.org1.example.com | 00000040 9c 23 26 0c 0e 32 8f |.#&..2.| +peer1.org1.example.com | [2e88 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047663f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e89 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047663f0 gate 1574140974171546800 evaluation succeeds +peer1.org1.example.com | [2e8a 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2e8b 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2e8c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2e8d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2e8e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [2e8f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer1.org1.example.com | [2e90 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e91 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [2e92 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org1.example.com | [2e93 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [2e94 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer1.org1.example.com | [2e95 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer1.org1.example.com | [2e96 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org1.example.com | [2e97 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer1.org1.example.com | [2e98 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer1.org1.example.com | [2e99 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [2e9a 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0040b49c0 env 0xc0046bcc30 txn 0 +peer0.org2.example.com | [31b9 11-19 05:22:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > alive:\2512Q\273\355\337\340\251\204Qir" > +peer0.org2.example.com | [31bb 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31bc 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31bd 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [31be 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31bf 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31c0 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [31c1 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [31c2 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31c3 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [31c4 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [31c5 11-19 05:22:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31c6 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [31c7 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31c8 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31c9 11-19 05:22:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31ca 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [31cb 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [31cc 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [31cd 11-19 05:22:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31ce 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [31cf 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31d0 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [31d1 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [31d2 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31d3 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31d4 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3397 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [3398 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [3399 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [339a 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [339b 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [339c 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [339d 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [339e 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [339f 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [33a0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [33a1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [33a2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [33a3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [33a4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [33a5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [33a6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [33a7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [33a8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [33a9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [33aa 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [33ab 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [33ac 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer1.org2.example.com | [33ad 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer1.org2.example.com | [33ae 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org2.example.com | [33af 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [33b0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [33b1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [33b2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [33b3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [33b4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [33b5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [33b6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [33b7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer1.org2.example.com | [33b8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [33b9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org2.example.com | [33ba 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +peer1.org2.example.com | [33bb 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036f5c0 gate 1574140974183816100 evaluation starts +peer1.org2.example.com | [33bc 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036f5c0 signed by 0 principal evaluation starts (used [false false false]) +peer1.org2.example.com | [33bd 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036f5c0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [33be 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036f5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [33bf 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036f5c0 processing identity 1 with bytes of 1151ae0 +peer1.org2.example.com | [33c0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [33c1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [33c2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [33c3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [33c4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [33c5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [33c6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036f5c0 principal matched by identity 1 +peer1.org2.example.com | [33c7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +peer1.org2.example.com | 00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...| +peer1.org2.example.com | [33c8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +peer1.org2.example.com | 00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +peer1.org2.example.com | 00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +peer1.org2.example.com | 00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +peer1.org2.example.com | 00000040 46 bf 84 1c 8c 35 |F....5| +peer1.org2.example.com | [33c9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036f5c0 principal evaluation succeeds for identity 1 +peer1.org2.example.com | [33ca 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036f5c0 gate 1574140974183816100 evaluation succeeds +peer1.org2.example.com | [33cb 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [33cc 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [33cd 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org2.example.com | [33ce 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +peer1.org2.example.com | [33cf 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036ff20 gate 1574140974197087900 evaluation starts +peer1.org2.example.com | [33d0 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036ff20 signed by 0 principal evaluation starts (used [false false false]) +peer1.org2.example.com | [33d1 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036ff20 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [33d2 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036ff20 principal matched by identity 0 +peer1.org2.example.com | [33d3 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +peer1.org2.example.com | 00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR| +peer1.org1.example.com | [2e9b 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0046bcc30 +peer1.org1.example.com | [2e9c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +peer1.org1.example.com | [2e9d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [2e9e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [2e9f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [2ea0 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ea1 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer1.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer1.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer1.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer1.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer1.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer1.org1.example.com | fQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2ea2 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer1.org1.example.com | [2ea3 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [2ea4 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [2ea5 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 17 9f c3 74 1b 52 69 8b 1b 61 04 bd 5f 6e fc |....t.Ri..a.._n.| +peer1.org1.example.com | 00000010 23 3f 14 b1 da 98 c7 eb 83 d0 99 5b 69 2c d6 fb |#?.........[i,..| +peer1.org1.example.com | [2ea6 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 c1 b9 60 ac e7 e3 8e 4c 35 f5 e3 |0D. R..`....L5..| +peer1.org1.example.com | 00000010 d0 57 4c 17 2b 63 e9 4e 0f 90 1b 11 66 33 ac 45 |.WL.+c.N....f3.E| +peer1.org1.example.com | 00000020 36 ba 41 a0 02 20 68 1d 3d 55 3a d4 2c 2e 3b ec |6.A.. h.=U:.,.;.| +peer1.org1.example.com | 00000030 b5 d4 40 5a 67 23 76 05 76 b9 63 e3 ff 94 86 d4 |..@Zg#v.v.c.....| +peer1.org1.example.com | 00000040 35 94 c1 49 86 f1 |5..I..| +peer1.org1.example.com | [2ea7 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [2ea8 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0047b4000, header channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +peer1.org1.example.com | [2ea9 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [2eaa 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [2eab 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [2eac 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [2ead 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [2eae 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [2eaf 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [2eb0 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [2eb1 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [2eb2 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [2eb3 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [2eb4 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [2eb5 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [2eb6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eba 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ebb 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ebc 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [2ebd 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [2ebe 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [2ebf 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [2ec0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [2ec1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [33d4 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +peer1.org2.example.com | 00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +peer1.org2.example.com | 00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +peer1.org2.example.com | 00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +peer1.org2.example.com | 00000040 28 40 4c 89 f5 38 |(@L..8| +peer1.org2.example.com | [33d5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036ff20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [33d6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036ff20 gate 1574140974197087900 evaluation succeeds +peer1.org2.example.com | [33d7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [33d8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [33d9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer1.org2.example.com | [33da 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer1.org2.example.com | [33db 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [33dc 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [33dd 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33de 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [33df 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e0 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e1 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e2 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e3 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e4 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e5 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e6 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e7 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e8 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e9 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33ea 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33eb 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33ec 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [33ed 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33ee 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [33ef 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer1.org2.example.com | [33f0 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org2.example.com | [33f1 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [33f2 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [33f3 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33f4 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [33f5 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33f6 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [33f7 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [33f8 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [33f9 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [33fa 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [33fb 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [33fc 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [33fd 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [33fe 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [33ff 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [3400 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [3401 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [3402 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [3403 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [3404 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [31d6 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31d7 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [31d8 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [31d9 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [31d5 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [31da 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dcf20 gate 1574140969738531800 evaluation starts +peer0.org2.example.com | [31db 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dcf20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31dc 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dcf20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [31dd 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dcf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [31de 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dcf20 principal evaluation fails +peer0.org2.example.com | [31df 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dcf20 gate 1574140969738531800 evaluation fails +peer0.org2.example.com | [31e0 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31e1 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31e2 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [31e3 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dd4b0 gate 1574140969739548200 evaluation starts +peer0.org2.example.com | [31e4 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dd4b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31e5 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dd4b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [31e6 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dd4b0 principal matched by identity 0 +peer0.org2.example.com | [31e7 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 99 fe f6 10 26 9e ab ef 45 32 3d fd de 31 a1 |.....&...E2=..1.| +peer0.org2.example.com | 00000010 60 88 f5 42 f6 2b 21 ad 4c 9c 91 be 8d 56 ad 83 |`..B.+!.L....V..| +peer0.org2.example.com | [31e8 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 71 6b ba 80 4c f6 18 ba d9 72 |0E.!..qk..L....r| +peer0.org2.example.com | 00000010 c2 55 24 e4 89 1e fa 2c 02 86 26 92 56 17 78 ae |.U$....,..&.V.x.| +peer0.org2.example.com | 00000020 b4 a4 5d 6b 07 02 20 1c 22 0a ea 61 ed 09 02 03 |..]k.. ."..a....| +peer0.org2.example.com | 00000030 3b 3e f2 e4 ba 7d cb 3d d9 2d e4 b6 ab ee 71 6b |;>...}.=.-....qk| +peer0.org2.example.com | 00000040 c1 63 76 ee 04 44 d3 |.cv..D.| +peer0.org2.example.com | [31e9 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dd4b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [31ea 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028dd4b0 gate 1574140969739548200 evaluation succeeds +peer0.org2.example.com | [31eb 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31ec 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31ed 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [31ee 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [31ef 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [31f0 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [31f1 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [31f2 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [31f3 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [31f4 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31f5 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31f6 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31f7 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [31f8 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31f9 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31fa 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31fb 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31fc 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31fd 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31fe 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31ff 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3200 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3405 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3406 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [3407 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [3408 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [3409 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [340a 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [340b 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org2.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org2.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org2.example.com | 1g== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [340c 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org2.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org2.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [340d 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [340e 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [340f 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [3410 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [3411 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [3412 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [3413 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3414 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [3415 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org2.example.com | [3416 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [3417 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [3418 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [3419 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [341a 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [341b 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [341c 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [341d 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [341e 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [341f 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org2.example.com | [3420 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org2.example.com | [3421 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [3422 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [3423 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org2.example.com | [3424 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +peer1.org2.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +peer1.org2.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +peer1.org2.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3425 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [3426 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [3427 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3428 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [3429 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [342a 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [342b 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [342c 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [342d 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [342e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org2.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org2.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org2.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [342f 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer1.org2.example.com | [3430 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer1.org2.example.com | [3431 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3432 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3433 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3434 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [3435 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [3436 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [3437 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [3438 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [3439 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [343a 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [343b 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [343c 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [343d 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [343e 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer1.org2.example.com | [343f 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org2.example.com | [3440 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org2.example.com | [3441 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer1.org2.example.com | [3442 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [3443 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [3444 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [3445 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [3446 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [3447 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [3448 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [3449 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [344a 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [344b 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [344c 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [32f7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [32f8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [32f9 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [32fa 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32fb 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [32fc 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [32fd 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32fe 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32ff 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3300 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3301 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [3302 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [3303 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3304 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100E1801 +peer0.org1.example.com | [3305 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CCEB0930DE30D2A6493398B3F77FD92FE625734DBB8C6D0BC54FD75E8B32FBC +peer0.org1.example.com | [3306 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [3307 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3308 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3309 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [330a 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [330b 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [330c 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [330d 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [330e 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [330f 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3310 11-19 05:22:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [3311 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3312 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15102A +peer0.org1.example.com | [3313 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AD99FEF610269EABEF45323DFDDE31A16088F542F62B21AD4C9C91BE8D56AD83 +peer0.org1.example.com | [3314 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3315 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3316 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3317 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3318 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3319 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [331a 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [331b 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [331c 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [331d 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [331f 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3321 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [331e 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3320 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3323 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3322 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3324 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3325 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3326 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3327 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3328 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3329 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [332a 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [332b 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [332c 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [332d 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [332e 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [332f 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3330 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3331 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 gate 1574140970378653500 evaluation starts +peer0.org1.example.com | [3332 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3333 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3334 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 principal matched by identity 0 +peer0.org1.example.com | [3335 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 20 5a b1 6e 86 5a 5f 5b 78 1e a2 d9 e3 4d d3 |U Z.n.Z_[x....M.| +peer0.org1.example.com | 00000010 a5 11 57 a0 c9 6a 40 7a 21 cd 09 54 70 03 cd 71 |..W..j@z!..Tp..q| +peer0.org1.example.com | [3336 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 5c 36 8b 4b 88 fa d0 1f 72 be |0E.!..\6.K....r.| +peer0.org1.example.com | 00000010 72 53 26 f4 53 e2 88 73 2e b4 3e 83 fa 23 34 d5 |rS&.S..s..>..#4.| +peer0.org1.example.com | 00000020 61 70 98 61 a5 02 20 6e c4 f7 e0 a4 06 fe eb 15 |ap.a.. n........| +peer0.org1.example.com | 00000030 df 76 d9 e5 54 9e cb ae ff a1 87 21 d3 08 62 d3 |.v..T......!..b.| +peer0.org1.example.com | 00000040 26 05 6e 1b 69 46 7f |&.n.iF.| +peer0.org1.example.com | [3337 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3338 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 gate 1574140970378653500 evaluation succeeds +peer0.org1.example.com | [3339 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [333a 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ec2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [2ec3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [2ec4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [2ec5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [2ec6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [2ec7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [2ec8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [2ec9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [2eca 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [2ecb 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [2ecc 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [2ecd 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [2ece 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer1.org1.example.com | [2ecf 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer1.org1.example.com | [2ed0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org1.example.com | [2ed1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2ed2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [2ed3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [2ed4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2ed5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [2ed6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [2ed7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [2ed8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [2ed9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer1.org1.example.com | [2eda 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2edb 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | [2edc 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +peer1.org1.example.com | [2edd 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eef30 gate 1574140974187318300 evaluation starts +peer1.org1.example.com | [2ede 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eef30 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [2edf 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eef30 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2ee0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eef30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2ee1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eef30 processing identity 1 with bytes of 1151ae0 +peer1.org1.example.com | [2ee2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [2ee3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [2ee4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [2ee5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [2ee6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [2ee7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [2ee8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eef30 principal matched by identity 1 +peer1.org1.example.com | [2ee9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +peer1.org1.example.com | 00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...| +peer1.org1.example.com | [2eea 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +peer1.org1.example.com | 00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +peer1.org1.example.com | 00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +peer1.org1.example.com | 00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +peer1.org1.example.com | 00000040 46 bf 84 1c 8c 35 |F....5| +peer1.org1.example.com | [2eeb 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eef30 principal evaluation succeeds for identity 1 +peer1.org1.example.com | [2eec 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eef30 gate 1574140974187318300 evaluation succeeds +peer1.org1.example.com | [2eed 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [2eee 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [2eef 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [333b 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [333c 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [333d 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [333e 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [333f 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3340 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3341 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3342 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3343 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3344 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3345 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3346 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3347 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3348 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3349 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [334a 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [334b 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [334c 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [334d 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [334e 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [334f 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3350 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3351 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3352 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3353 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3354 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3355 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3356 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3357 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3358 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3359 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [335a 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [335b 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [335c 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [335d 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [344d 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [344e 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [344f 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [3450 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3451 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [3452 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [3453 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [3454 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [3455 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [3456 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [3457 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [3458 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [3459 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [345a 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [345b 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [345c 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [345d 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [345e 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [345f 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [3460 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [3461 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [3462 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [3463 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3464 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [3465 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [3466 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [3467 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [3468 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [3469 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [346a 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [346b 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [346c 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [346d 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [346e 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [346f 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [3470 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3471 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [3472 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [3473 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [3474 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [3475 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [3476 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [3477 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [3478 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [3479 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [347a 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [347b 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [347c 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [347d 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [347e 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [347f 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [3480 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [3481 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [3482 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [3483 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3484 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3485 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [3486 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [3487 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [3488 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer1.org2.example.com | [3489 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [348a 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [348b 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [348c 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [348d 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [348e 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [348f 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [3490 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [3491 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [3492 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [3493 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [3494 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [3495 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [3496 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [3497 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [3498 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [3201 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3202 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3203 11-19 05:22:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3204 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3205 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3206 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3207 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3208 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3209 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [320a 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [320b 11-19 05:22:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [320c 11-19 05:22:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [320d 11-19 05:22:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [320e 11-19 05:22:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [320f 11-19 05:22:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC15100E1801 +peer0.org2.example.com | [3210 11-19 05:22:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C0F8B469C1FCDC9B569A94D856647C2B0FDA5EEA8B122B8A0BCEB9B0252499C0 +peer0.org2.example.com | [3211 11-19 05:22:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [3212 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3213 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3214 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3215 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3216 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3217 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3218 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3219 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [321a 11-19 05:22:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [321b 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [321c 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [321d 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [321e 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [321f 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 20 5a b1 6e 86 5a 5f 5b 78 1e a2 d9 e3 4d d3 |U Z.n.Z_[x....M.| +peer0.org2.example.com | 00000010 a5 11 57 a0 c9 6a 40 7a 21 cd 09 54 70 03 cd 71 |..W..j@z!..Tp..q| +peer0.org2.example.com | [3220 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 5c 36 8b 4b 88 fa d0 1f 72 be |0E.!..\6.K....r.| +peer0.org2.example.com | 00000010 72 53 26 f4 53 e2 88 73 2e b4 3e 83 fa 23 34 d5 |rS&.S..s..>..#4.| +peer0.org2.example.com | 00000020 61 70 98 61 a5 02 20 6e c4 f7 e0 a4 06 fe eb 15 |ap.a.. n........| +peer0.org2.example.com | 00000030 df 76 d9 e5 54 9e cb ae ff a1 87 21 d3 08 62 d3 |.v..T......!..b.| +peer0.org2.example.com | 00000040 26 05 6e 1b 69 46 7f |&.n.iF.| +peer0.org2.example.com | [3221 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3222 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3223 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2ef0 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +peer1.org1.example.com | [2ef1 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ef860 gate 1574140974190822100 evaluation starts +peer1.org1.example.com | [2ef2 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ef860 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [335e 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [335f 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3360 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3361 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3362 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 fd 05 6a eb 63 bc d4 6e 64 ac cb 61 7d b0 64 |x..j.c..nd..a}.d| +peer0.org1.example.com | 00000010 66 00 90 0b 1c e6 ce 49 a3 96 78 75 71 84 72 fa |f......I..xuq.r.| +peer0.org1.example.com | [3363 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 94 df c5 8b 71 1c 95 0f b1 1c |0E.!......q.....| +peer0.org1.example.com | 00000010 1d 9c 3a 43 01 af 01 bc ca 94 4a 52 24 5d e8 aa |..:C......JR$]..| +peer0.org1.example.com | 00000020 9e 41 fa 9e 51 02 20 18 8d 66 86 ba 85 cc 91 d0 |.A..Q. ..f......| +peer0.org1.example.com | 00000030 5a 45 8e b2 85 71 b7 be d3 d0 d0 80 dc 28 a0 db |ZE...q.......(..| +peer0.org1.example.com | 00000040 06 80 4e 56 69 97 a5 |..NVi..| +peer0.org1.example.com | [3364 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3365 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3366 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3367 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3368 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3369 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [336a 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [336b 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [336c 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [336d 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [336e 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [336f 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3370 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3371 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3372 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3373 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3374 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3375 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3376 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3377 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3378 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3379 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [337a 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [337b 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [337c 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [337d 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [337e 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [337f 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3380 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3381 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3499 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [349a 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org2.example.com | [349b 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [349c 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [349d 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [349e 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [349f 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34a0 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [34a1 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [34a2 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [34a3 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b76af0 gate 1574140974313457700 evaluation starts +peer1.org2.example.com | [34a4 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b76af0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34a5 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b76af0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [34a6 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b76af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [34a7 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b76af0 principal evaluation fails +peer1.org2.example.com | [34a8 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b76af0 gate 1574140974313457700 evaluation fails +peer1.org2.example.com | [34a9 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34aa 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34ab 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [34ac 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77070 gate 1574140974313934900 evaluation starts +peer1.org2.example.com | [34ad 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34ae 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77070 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [34af 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77070 principal matched by identity 0 +peer1.org2.example.com | [34b0 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org2.example.com | [34b1 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | [34b2 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34b3 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77070 gate 1574140974313934900 evaluation succeeds +peer1.org2.example.com | [34b4 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34b5 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34b6 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [34b7 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [34b8 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34b9 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34ba 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34bb 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [34bc 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [34bd 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [34be 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77bb0 gate 1574140974314864200 evaluation starts +peer1.org2.example.com | [34bf 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34c0 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77bb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3224 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3225 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3226 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3227 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3228 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3229 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [322a 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [322b 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [322c 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [322d 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [322e 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [322f 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3230 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3231 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3233 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3234 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3232 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3235 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3236 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3237 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3238 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3239 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [323a 11-19 05:22:50.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [323b 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [323c 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [323d 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [323e 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [323f 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ef3 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ef860 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2ef4 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ef860 principal matched by identity 0 +peer1.org1.example.com | [2ef5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +peer1.org1.example.com | 00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR| +peer1.org1.example.com | [2ef6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +peer1.org1.example.com | 00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +peer1.org1.example.com | 00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +peer1.org1.example.com | 00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +peer1.org1.example.com | 00000040 28 40 4c 89 f5 38 |(@L..8| +peer1.org1.example.com | [2ef7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ef860 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ef8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ef860 gate 1574140974190822100 evaluation succeeds +peer1.org1.example.com | [2ef9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [2efa 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [2efb 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer1.org1.example.com | [2efc 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer1.org1.example.com | [2efd 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [2efe 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [2eff 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [2f00 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [2f01 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f02 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f03 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f04 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f05 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f06 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f07 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f08 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f09 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f0a 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f0b 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f0c 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f0d 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f0e 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f0f 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f10 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f11 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f12 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [2f13 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer1.org1.example.com | [2f14 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org1.example.com | [2f15 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [2f16 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [2f17 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f18 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f19 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [2f1a 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [2f1b 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [2f1c 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [2f1d 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [2f1e 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [2f1f 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [2f20 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [2f21 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [3382 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3383 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3384 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3385 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3386 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3387 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3388 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3389 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [338a 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [338b 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [338c 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [338d 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [338e 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [338f 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3390 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3391 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3392 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [3393 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f22 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [2f23 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [2f24 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [2f25 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [2f26 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [2f27 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [2f28 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [2f29 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [2f2a 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [2f2b 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [2f2c 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [2f2d 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [2f2e 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [2f2f 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | 1g== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2f30 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2f31 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [2f32 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [2f33 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [2f34 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [2f35 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [2f36 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [2f37 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [2f38 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [2f39 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [2f3a 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [2f3b 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [2f3c 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [2f3d 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [2f3e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2f3f 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [2f40 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [2f41 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [2f42 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [2f43 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | [2f44 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [2f45 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [2f46 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [2f47 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [34c1 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [34c2 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77bb0 principal evaluation fails +peer1.org2.example.com | [34c3 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b77bb0 gate 1574140974314864200 evaluation fails +peer1.org2.example.com | [34c4 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34c5 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34c6 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [34c7 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5c120 gate 1574140974328953700 evaluation starts +peer1.org2.example.com | [34c8 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5c120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34c9 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5c120 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [34ca 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5c120 principal matched by identity 0 +peer1.org2.example.com | [34cb 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org2.example.com | [34cc 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | [3240 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3241 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3242 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3243 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3244 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3245 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3246 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048955a0 gate 1574140970770932500 evaluation starts +peer0.org2.example.com | [3247 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048955a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3248 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048955a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3249 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048955a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [324a 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048955a0 principal evaluation fails +peer0.org2.example.com | [324b 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048955a0 gate 1574140970770932500 evaluation fails +peer0.org2.example.com | [324c 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [324d 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [324e 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [324f 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004895b10 gate 1574140970771404600 evaluation starts +peer0.org2.example.com | [3250 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004895b10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3251 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004895b10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3252 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004895b10 principal matched by identity 0 +peer0.org2.example.com | [3253 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 fd 05 6a eb 63 bc d4 6e 64 ac cb 61 7d b0 64 |x..j.c..nd..a}.d| +peer0.org2.example.com | 00000010 66 00 90 0b 1c e6 ce 49 a3 96 78 75 71 84 72 fa |f......I..xuq.r.| +peer0.org2.example.com | [3254 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 94 df c5 8b 71 1c 95 0f b1 1c |0E.!......q.....| +peer0.org2.example.com | 00000010 1d 9c 3a 43 01 af 01 bc ca 94 4a 52 24 5d e8 aa |..:C......JR$]..| +peer0.org2.example.com | 00000020 9e 41 fa 9e 51 02 20 18 8d 66 86 ba 85 cc 91 d0 |.A..Q. ..f......| +peer0.org2.example.com | 00000030 5a 45 8e b2 85 71 b7 be d3 d0 d0 80 dc 28 a0 db |ZE...q.......(..| +peer0.org2.example.com | 00000040 06 80 4e 56 69 97 a5 |..NVi..| +peer0.org2.example.com | [3255 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004895b10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3256 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004895b10 gate 1574140970771404600 evaluation succeeds +peer0.org2.example.com | [3257 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3258 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3259 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [325a 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [325b 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [325c 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [325d 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [325e 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [325f 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3260 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3261 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3262 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3263 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3264 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3265 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3266 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3267 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3268 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3269 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [326a 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3394 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3395 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3396 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3397 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3398 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3399 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [339a 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 gate 1574140970808514900 evaluation starts +peer0.org1.example.com | [339b 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [339c 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [339d 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 principal matched by identity 0 +peer0.org1.example.com | [339e 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf fa 58 15 af 2e 8b 60 6a c6 89 9f a7 36 e8 55 |..X....`j....6.U| +peer0.org1.example.com | 00000010 07 0a ef b0 02 18 4e 55 9a f9 10 26 ed 57 ae 94 |......NU...&.W..| +peer0.org1.example.com | [339f 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f d1 c1 a8 b5 bc e8 7b c2 7a d1 36 |0D. .......{.z.6| +peer0.org1.example.com | 00000010 fd ca 47 e3 7a 8c b6 34 ac 0b 58 29 3b f0 02 c4 |..G.z..4..X);...| +peer0.org1.example.com | 00000020 b9 76 56 9b 02 20 12 94 3a c2 d2 e4 08 74 15 10 |.vV.. ..:....t..| +peer0.org1.example.com | 00000030 27 2c 39 cd 7f b2 05 d3 5f 2d 9d c4 23 ce 5d 57 |',9....._-..#.]W| +peer0.org1.example.com | 00000040 9b 26 17 e3 b4 82 |.&....| +peer0.org1.example.com | [33a0 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [33a1 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 gate 1574140970808514900 evaluation succeeds +peer0.org1.example.com | [33a2 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33a3 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33a4 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [33a5 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [33a6 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33a7 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [33a8 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [33a9 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [33aa 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [33ab 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ac 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ad 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ae 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33af 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33b0 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33b1 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33b2 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33b3 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33b4 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [33b5 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org2.example.com | [34cd 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5c120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34ce 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5c120 gate 1574140974328953700 evaluation succeeds +peer1.org2.example.com | [34cf 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34d0 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34d1 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [34d2 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [34d3 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34d4 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34d5 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [34d6 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [34d7 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [34d8 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5cbb0 gate 1574140974334958800 evaluation starts +peer1.org2.example.com | [34d9 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5cbb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34da 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5cbb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [34db 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5cbb0 principal matched by identity 0 +peer1.org2.example.com | [34dc 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [34dd 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [34de 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5cbb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34df 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5cbb0 gate 1574140974334958800 evaluation succeeds +peer1.org2.example.com | [34e0 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34e1 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34e2 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [34e3 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [34e4 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org2.example.com | [34e5 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [34e6 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [34e8 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [34e9 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [34ea 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [34eb 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [34ec 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d27b90, CONNECTING +peer1.org2.example.com | [34e7 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34ed 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org2.example.com | [34ee 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [34ef 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [34f0 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34f1 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [34f2 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [34f3 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [34f4 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [34f5 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0030f3dc0, CONNECTING +peer1.org2.example.com | [34f6 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d27b90, READY +peer1.org2.example.com | [34f7 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [34f8 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer1.org2.example.com | [34f9 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer1.org1.example.com | [2f48 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2f49 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [2f4a 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [2f4b 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [2f4c 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [2f4d 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org1.example.com | [2f4e 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org1.example.com | [2f4f 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [2f50 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [2f51 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org1.example.com | [2f52 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +peer1.org1.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +peer1.org1.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +peer1.org1.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2f53 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer1.org1.example.com | [2f54 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer1.org1.example.com | [2f55 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [2f56 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [2f57 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [2f58 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer1.org1.example.com | [2f59 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer1.org1.example.com | [2f5a 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org1.example.com | [2f5b 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org1.example.com | [2f5c 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [2f5d 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [2f5e 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [2f5f 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [2f60 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [2f61 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [2f62 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [2f63 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [2f64 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [2f65 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [2f66 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [2f67 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [2f68 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [2f69 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [2f6a 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [2f6b 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [2f6c 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [2f6d 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [2f6e 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [2f6f 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [2f70 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [2f71 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [2f72 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [2f73 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [2f74 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [2f75 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [2f76 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2f77 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [2f78 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [2f79 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [2f7a 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [2f7b 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [2f7c 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [2f7d 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [2f7e 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2f7f 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [2f80 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [2f81 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [2f82 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [2f83 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [2f84 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [2f85 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [2f86 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [2f87 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [2f88 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f89 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [2f8a 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [2f8b 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [2f8c 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [2f8d 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [2f8e 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [2f8f 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [2f90 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [2f91 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [2f92 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [2f93 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [2f94 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2f95 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [2f96 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [2f97 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [2f98 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [2f99 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [2f9a 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [2f9b 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [2f9c 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [2f9d 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [2f9e 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [2f9f 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [2fa0 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [2fa1 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [2fa2 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [2fa3 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [2fa4 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [2fa5 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [2fa6 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [2fa7 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [326b 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [326c 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [326d 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [326e 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [326f 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3270 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3271 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3272 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3273 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3274 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3275 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3276 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3277 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3278 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3279 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [327a 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [327b 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [327c 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [327d 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [327e 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [327f 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3280 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15102C +peer0.org2.example.com | [3281 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BFFA5815AF2E8B606AC6899FA736E855070AEFB002184E559AF91026ED57AE94 +peer0.org2.example.com | [3282 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3283 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3284 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3285 11-19 05:22:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [3286 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3287 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3288 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3289 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [328a 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [328b 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [328c 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [328d 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [328e 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [328f 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3290 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3291 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3292 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fa8 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2fa9 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [2faa 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [2fab 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer1.org1.example.com | [2fac 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [2fad 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [2fae 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [2faf 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [2fb0 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [2fb1 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [2fb2 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2fb3 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [2fb4 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [2fb5 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [2fb6 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [2fb7 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [34fa 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.9:7051 +peer1.org2.example.com | [34fb 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer1.org2.example.com | [34fc 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 44 02 20 11 86 e2 18 7a c9 f7 fd 42 ad 8b a1 |0D. ....z...B...| +peer1.org2.example.com | 00000010 61 38 df 08 ac 88 98 20 ca 25 de 84 c7 73 4f 88 |a8..... .%...sO.| +peer1.org2.example.com | 00000020 c4 c6 38 4c 02 20 48 0c f7 9c 47 7d 2f 4d cd 97 |..8L. H...G}/M..| +peer1.org2.example.com | 00000030 33 98 e9 e2 d2 c8 41 db 08 1b 6a fc 73 92 5d 2e |3.....A...j.s.].| +peer1.org2.example.com | 00000040 92 c3 bd 9f ab eb |......| +peer1.org2.example.com | [34fe 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +peer1.org2.example.com | [34ff 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3500 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151035 +peer1.org2.example.com | [3501 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FAE9D74E28EA8051F1C43090E0A110BF4BD10E72F26E76D55189967BC53223AA +peer1.org2.example.com | [3502 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3503 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3504 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3505 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org2.example.com | [3506 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [3507 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org2.example.com | [3508 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3509 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [350a 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [350b 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [350c 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [350d 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [350e 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0030f3dc0, READY +peer1.org2.example.com | [350f 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:14600766127828456472 tag:EMPTY mem_req:\321\327\257\021f#\204\364\034\023\326\010^BD1Y\234\201\372\204\323\001\003a\273\204\240\356\274F" > > > , Envelope: 283 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3510 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:14600766127828456472 tag:EMPTY mem_req:\321\327\257\021f#\204\364\034\023\326\010^BD1Y\234\201\372\204\323\001\003a\273\204\240\356\274F" > > > , Envelope: 283 bytes, Signature: 0 bytes +peer1.org2.example.com | [3511 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3512 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 isn't responsive: EOF +peer1.org2.example.com | [3513 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> WARN Entering [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] +peer1.org2.example.com | [3514 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2, Metadata: +peer1.org2.example.com | [3515 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [3516 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org2.example.com | [3517 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3518 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [3519 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [351a 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org2.example.com | [351b 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [351c 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [351d 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [351e 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0034d9340 env 0xc0027ad270 txn 0 +peer1.org2.example.com | [351f 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [3520 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 275ms +peer1.org2.example.com | [3521 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [3522 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [3523 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [3524 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer1.org2.example.com | [3525 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [3526 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [3527 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [3528 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer1.org2.example.com | [3529 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [352a 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [352b 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [352c 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [352d 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [352e 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [352f 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [33b6 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33b7 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [33b8 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33b9 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33ba 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33bb 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33bc 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33bd 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33be 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33bf 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33c0 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33c1 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33c2 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33c3 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33c4 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33c5 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33c6 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [33c7 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15102B +peer0.org1.example.com | [33c8 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A7549E6148BD0DFEE4BE5E4C3E7B568CBD02391EEEF9CF63C52E06D675EF3834 +peer0.org1.example.com | [33c9 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [33ca 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [33cb 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [33cc 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33cd 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [33ce 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [33cf 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33d0 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [33d1 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3293 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3294 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3295 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3296 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3297 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3298 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3299 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [329a 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [329b 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf fa 58 15 af 2e 8b 60 6a c6 89 9f a7 36 e8 55 |..X....`j....6.U| +peer0.org2.example.com | 00000010 07 0a ef b0 02 18 4e 55 9a f9 10 26 ed 57 ae 94 |......NU...&.W..| +peer0.org2.example.com | [329c 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f d1 c1 a8 b5 bc e8 7b c2 7a d1 36 |0D. .......{.z.6| +peer0.org2.example.com | 00000010 fd ca 47 e3 7a 8c b6 34 ac 0b 58 29 3b f0 02 c4 |..G.z..4..X);...| +peer0.org2.example.com | 00000020 b9 76 56 9b 02 20 12 94 3a c2 d2 e4 08 74 15 10 |.vV.. ..:....t..| +peer0.org2.example.com | 00000030 27 2c 39 cd 7f b2 05 d3 5f 2d 9d c4 23 ce 5d 57 |',9....._-..#.]W| +peer0.org2.example.com | 00000040 9b 26 17 e3 b4 82 |.&....| +peer0.org2.example.com | [329d 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [329e 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [329f 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [32a0 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32a1 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [32a2 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [32a3 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32a4 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [32a5 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [32a6 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [32a7 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [33d2 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [33d3 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d4 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d5 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [33d6 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d7 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [33d8 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [33d9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33da 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [33db 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [33dc 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer0.org1.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer0.org1.example.com | [33dd 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer0.org1.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer0.org1.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer0.org1.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer0.org1.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer0.org1.example.com | [33de 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33df 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33e0 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e1 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e2 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [33e3 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [33e4 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e5 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [33e6 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [33e7 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer0.org1.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer0.org1.example.com | [33e8 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer0.org1.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer0.org1.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer0.org1.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer0.org1.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer0.org1.example.com | [33e9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33ea 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33eb 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ec 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ed 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [33ee 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [33ef 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33f0 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fb8 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [2fb9 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [2fba 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [2fbb 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [2fbc 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [2fbd 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [2fbe 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [2fbf 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org1.example.com | [2fc0 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [2fc1 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fc2 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fc3 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2fc4 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2fc5 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2fc6 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910300 gate 1574140974343259600 evaluation starts +peer1.org1.example.com | [2fc7 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910300 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fc8 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910300 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2fc9 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2fca 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910300 principal evaluation fails +peer1.org1.example.com | [2fcb 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910300 gate 1574140974343259600 evaluation fails +peer1.org1.example.com | [2fcc 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fcd 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fce 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2fcf 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910870 gate 1574140974345070600 evaluation starts +peer1.org1.example.com | [2fd0 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910870 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fd1 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910870 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2fd2 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910870 principal matched by identity 0 +peer1.org1.example.com | [2fd3 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [2fd4 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [2fd5 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910870 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2fd6 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910870 gate 1574140974345070600 evaluation succeeds +peer1.org1.example.com | [2fd7 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2fd8 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2fd9 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2fda 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2fdb 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fdc 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fdd 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fde 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2fdf 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2fe0 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2fe1 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049113b0 gate 1574140974368950200 evaluation starts +peer1.org1.example.com | [2fe2 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049113b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fe3 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049113b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2fe4 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049113b0 principal matched by identity 0 +peer1.org1.example.com | [2fe5 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org1.example.com | [2fe6 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org1.example.com | [2fe7 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049113b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2fe8 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049113b0 gate 1574140974368950200 evaluation succeeds +peer1.org1.example.com | [2fe9 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fea 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2feb 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2fec 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2fed 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fee 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fef 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ff0 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ff1 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ff2 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ff3 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911ef0 gate 1574140974375181800 evaluation starts +peer1.org1.example.com | [2ff4 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911ef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ff5 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911ef0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [2ff6 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911ef0 principal matched by identity 0 +peer1.org1.example.com | [2ff7 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer1.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer1.org1.example.com | [2ff8 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer1.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer1.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer1.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer1.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer1.org1.example.com | [2ff9 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911ef0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ffa 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911ef0 gate 1574140974375181800 evaluation succeeds +peer1.org1.example.com | [2ffb 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ffc 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ffd 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ffe 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2fff 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org1.example.com | [3000 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [3001 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [3002 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3003 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [3004 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [3005 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [3006 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [3007 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [3008 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [3009 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [300b 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org1.example.com | [300c 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [300d 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [300e 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [300a 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004942840, CONNECTING +peer1.org1.example.com | [300f 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3011 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3012 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3013 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3014 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [3010 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [3015 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [3016 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [3017 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0049a0480, CONNECTING +peer1.org1.example.com | [3018 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [3019 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [301a 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org1.example.com | [301b 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [301c 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [301d 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [301e 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [301f 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 251ms +peer1.org1.example.com | [3020 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [3021 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [3022 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [3023 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer1.org1.example.com | [3024 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [3025 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [3026 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [3027 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer1.org1.example.com | [3028 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [3029 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [302c 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [302a 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004942840, READY +peer1.org1.example.com | [302b 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0049a0480, READY +peer1.org1.example.com | [302d 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [302e 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [302f 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [3030 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [3031 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0040b49c0 env 0xc0046bcc30 txn 0 +peer1.org1.example.com | [3032 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [3033 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [3034 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [3035 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [3036 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc004a963c0)} +peer1.org1.example.com | [3037 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [3038 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [3039 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [303a 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org1.example.com | [303b 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org1.example.com | [303c 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org1.example.com | [303d 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [303e 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org1.example.com | [303f 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org1.example.com | [3040 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.9:7051 +peer1.org1.example.com | [3041 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org1.example.com | [3042 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [3043 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer1.org1.example.com | [3044 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3045 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3046 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer1.org1.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer1.org1.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer1.org1.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3047 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3048 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3049 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [304a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [304b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [304c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [304d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [304e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [304f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3050 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3051 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3052 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3053 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2ecf0 gate 1574140974485312200 evaluation starts +peer1.org1.example.com | [3054 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2ecf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3055 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2ecf0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3056 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [3057 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3058 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3059 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2ecf0 principal matched by identity 0 +peer1.org1.example.com | [305a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 45 02 21 00 d6 75 ed ce ea 89 4f 92 e8 fd d5 |0E.!..u....O....| +peer1.org1.example.com | 00000010 c7 2d 4f 57 a1 0b f5 f2 dd cd cd 6e 01 7e 44 1b |.-OW.......n.~D.| +peer1.org1.example.com | 00000020 a2 4f f9 db 27 02 20 77 eb f4 c5 e2 7e 23 f5 61 |.O..'. w....~#.a| +peer1.org1.example.com | 00000030 a0 76 1e c4 12 9e 4c 4f 22 ec 17 77 8e 0f ff 2c |.v....LO"..w...,| +peer1.org1.example.com | 00000040 cb e2 37 ca 98 c7 8b |..7....| +peer1.org1.example.com | [305c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2ecf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [305d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2ecf0 gate 1574140974485312200 evaluation succeeds +peer1.org1.example.com | [305e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [305f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3060 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3061 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3062 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +peer1.org1.example.com | [3063 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3064 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3065 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151036 +peer1.org1.example.com | [3066 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 71B8B511A908B567DC7AD7F006EB520CE9735ADDE15D37444294EDF5C0CCB344 +peer1.org1.example.com | [3067 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3068 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3069 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [306a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [306b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:4690190296622089687 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [306c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:4690190296622089687 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [306d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [306e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 isn't responsive: EOF +peer1.org1.example.com | [306f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3070 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> WARN Entering [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] +peer1.org1.example.com | [3071 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2, Metadata: +peer1.org1.example.com | [3072 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [3073 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org1.example.com | [3074 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3075 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xa2, 0x69, 0x20, 0xe7, 0x6, 0xba, 0xc2, 0x3, 0x29, 0x26, 0xfe, 0xbd, 0x9b, 0x32, 0xd3, 0x6e, 0x64, 0xfd, 0x5e, 0xe2, 0x9c, 0x95, 0x4, 0xb3, 0xa2, 0x44, 0xc8, 0xfa, 0x28, 0x5a, 0x80, 0x58} txOffsets= +peer1.org1.example.com | txId=546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf locPointer=offset=71, bytesLength=37478 +peer1.org1.example.com | ] +peer1.org1.example.com | [3076 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89506, bytesLength=37478] for tx ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to txid-index +peer1.org1.example.com | [3077 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89506, bytesLength=37478] for tx number:[0] ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to blockNumTranNum index +peer1.org1.example.com | [3078 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127957], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org1.example.com | [3079 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org1.example.com | [307a 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org1.example.com | [307b 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer1.org1.example.com | [307c 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [307d 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [307e 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [307f 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [3080 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [3081 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3082 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org1.example.com | [3083 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org1.example.com | [3084 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [3085 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [3086 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org1.example.com | [3087 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [3088 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org1.example.com | [3089 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org1.example.com | [308a 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [308b 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org1.example.com | [308c 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org1.example.com | [308d 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer1.org1.example.com | [308e 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 73ms (state_validation=44ms block_and_pvtdata_commit=21ms state_commit=5ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer1.org1.example.com | [308f 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3090 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F0B3D5E6FC999EEC15...08071A0C0A0565787030321203312E30 +peer1.org1.example.com | [3091 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FAE1138BD518863C3151AD2D9240B365277446AA5644AE5182431C41FCAF540E +peer1.org1.example.com | [3092 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer1.org1.example.com | [3093 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45148 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [3094 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 92 03 ef c0 53 9a 9c 02 d4 d2 78 c4 d8 97 cd |!....S.....x....| +peer1.org1.example.com | 00000010 6f 60 f0 1b 60 70 a2 d2 ea e5 8a df 5c 15 90 6f |o`..`p......\..o| +peer1.org1.example.com | [3095 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a8 4b d9 43 fc cd 99 c8 3e 86 |0E.!...K.C....>.| +peer1.org1.example.com | 00000010 6c 14 cc 6a 95 3f 29 35 bf de f5 6e aa 12 8f c7 |l..j.?)5...n....| +peer1.org1.example.com | 00000020 5d 6a e0 77 a8 02 20 1b ca b7 34 b9 c9 f7 f5 54 |]j.w.. ...4....T| +peer1.org1.example.com | 00000030 29 a9 77 a0 b4 fa 3c af bf a9 a7 0f e6 74 71 a6 |).w...<......tq.| +peer1.org1.example.com | 00000040 e9 96 8f 46 20 44 6d |...F Dm| +peer1.org1.example.com | [3096 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [3097 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3098 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org1.example.com | [3099 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org1.example.com | [309a 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f a7 80 0b 0e 02 3f 3a bd bc 4d |0E.!.......?:..M| +peer1.org1.example.com | 00000010 d9 2e 4d e0 e1 4b 8a cf 14 18 09 d0 78 86 fb e9 |..M..K......x...| +peer1.org1.example.com | 00000020 dc 9a dc 2f 8f 02 20 1f 82 2c ca b6 c8 c6 cb 6a |.../.. ..,.....j| +peer1.org1.example.com | 00000030 67 f8 2f f5 54 23 72 2b 86 ab a0 c6 d9 25 3e 0d |g./.T#r+.....%>.| +peer1.org1.example.com | 00000040 6e c6 54 c6 09 4b 5c |n.T..K\| +peer1.org1.example.com | [309b 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org1.example.com | [309c 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [309d 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151037 +peer1.org1.example.com | [309f 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1E90FF8129B6F992401BD819431FF75435688EB1531D267D977380FD63181E93 +peer1.org1.example.com | [30a0 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [30a1 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [30a2 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [30a3 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:15188735461824668321 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [30a4 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:15188735461824668321 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes +peer1.org1.example.com | [30a5 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [309e 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [30a6 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org1.example.com | [30a7 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:45148 disconnected +peer1.org1.example.com | [30a8 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:45148 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m4.8130277s +peer1.org1.example.com | [30a9 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [30aa 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [30ab 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.759Z grpc.peer_address=172.18.0.9:51680 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=131.3µs +peer1.org1.example.com | [30ac 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [30ad 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org1.example.com | [30ae 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org1.example.com | [30af 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.9:51680 +peer1.org1.example.com | [30b0 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51680 +peer1.org1.example.com | [30b1 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30b2 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30b3 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30b4 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30b5 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30b6 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30b7 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30b8 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30b9 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [30ba 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30bb 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30bc 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c12d10 gate 1574140974768438500 evaluation starts +peer1.org1.example.com | [30bd 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c12d10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30be 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c12d10 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [30bf 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c12d10 principal matched by identity 0 +peer1.org1.example.com | [30c0 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 44 02 20 1c bb dd a8 9c c9 68 c4 30 15 99 d9 |0D. ......h.0...| +peer1.org1.example.com | 00000010 fb 97 6e 80 c5 ea 56 ab 3e 63 79 d8 38 82 d3 f9 |..n...V.>cy.8...| +peer1.org1.example.com | 00000020 74 ce 05 da 02 20 7f 6b 12 a5 2c 64 64 c2 67 cc |t.... .k..,dd.g.| +peer1.org1.example.com | 00000030 80 3c ec 33 13 59 71 72 7f 30 e8 6f 86 79 07 93 |.<.3.Yqr.0.o.y..| +peer1.org1.example.com | 00000040 27 36 8f d3 65 e2 |'6..e.| +peer1.org1.example.com | [30c2 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30c3 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30c4 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30c5 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30c6 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [30c7 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 2c 2a 3a 1f 2f 27 f5 2f e6 33 59 48 1f 2b b8 |h,*:./'./.3YH.+.| +peer1.org1.example.com | 00000010 80 7f 48 ac 25 1b 19 a5 6d b5 c8 4d 98 4c 13 58 |..H.%...m..M.L.X| +peer1.org1.example.com | [30c8 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 db 06 53 32 2a 8b 1f 1a ca 77 66 |0D. ...S2*....wf| +peer1.org1.example.com | 00000010 02 cf fb a1 20 1c de 53 00 37 f9 f5 45 f2 06 37 |.... ..S.7..E..7| +peer1.org1.example.com | 00000020 e9 72 2b b7 02 20 48 1a 2c 9b 64 d7 2f 6a b0 1f |.r+.. H.,.d./j..| +peer1.org1.example.com | 00000030 3f 5b 85 a6 89 70 16 e9 27 8c 61 fd b2 82 76 d3 |?[...p..'.a...v.| +peer1.org1.example.com | 00000040 74 27 b1 70 7b 43 |t'.p{C| +peer1.org1.example.com | [30c9 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30ca 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [30cb 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [30cc 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [30cd 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.783Z grpc.peer_address=172.18.0.6:45324 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=116.1µs +peer1.org1.example.com | [30ce 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [30cf 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30d0 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30d1 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30d2 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c12d10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30d3 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c12d10 gate 1574140974768438500 evaluation succeeds +peer1.org1.example.com | [30d4 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [30d5 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org1.example.com | [30d6 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org1.example.com | [30d7 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:45324 +peer1.org1.example.com | [30d8 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:45324 +peer1.org1.example.com | [30d9 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org1.example.com | [30da 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 d2 af b8 90 9d 91 e6 c1 9d 7e e1 |0D. h.........~.| +peer1.org1.example.com | 00000010 1f 27 86 19 ef 1b d1 22 ea a2 01 26 d9 d2 3f 17 |.'....."...&..?.| +peer1.org1.example.com | 00000020 98 f0 f5 dc 02 20 2c 05 53 7c ed 9a 7c 81 2f 28 |..... ,.S|..|./(| +peer1.org1.example.com | 00000030 ce b0 42 1e 35 e8 e5 5d 9e c1 a1 98 a6 23 8a 4d |..B.5..].....#.M| +peer1.org1.example.com | 00000040 f0 74 97 e0 f6 94 |.t....| +peer1.org1.example.com | [30db 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30dc 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30dd 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30de 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30df 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:51680 +peer1.org1.example.com | [30e0 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:51680 +peer1.org1.example.com | [30e1 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:45324 +peer1.org1.example.com | [30e2 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:45324 +peer1.org1.example.com | [30e3 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30e4 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30e5 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer1.org1.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org1.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org1.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [30e6 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [30e7 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30e8 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [30e9 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [30ea 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [30eb 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [30ec 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [30ed 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30ee 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30ef 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30f0 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30f1 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45324 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30f2 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30f3 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45324 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [30f4 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [30f5 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:45324 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [30f6 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30f7 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [30f8 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30f9 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004c67c10, CONNECTING +peer1.org1.example.com | [30fa 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:45324 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\241\251\342\031" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [30fb 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33f1 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [33f2 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer0.org1.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer0.org1.example.com | [33f3 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer0.org1.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer0.org1.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer0.org1.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer0.org1.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer0.org1.example.com | [33f4 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [33f5 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc 62 7d ff cd c7 fc 83 45 c1 4e |0E.!..b}.....E.N| +peer0.org1.example.com | 00000010 be 73 1b a4 8f d0 83 84 ff 92 ed b2 33 95 1e d8 |.s..........3...| +peer0.org1.example.com | 00000020 76 81 67 b2 21 02 20 3b 89 d8 12 cc d6 77 09 79 |v.g.!. ;.....w.y| +peer0.org1.example.com | 00000030 0a e7 f2 3b df 26 29 e9 7e 04 81 a0 22 3c 81 c3 |...;.&).~..."<..| +peer0.org1.example.com | 00000040 3c 37 3f a2 5e 9f 85 |<7?.^..| +peer0.org1.example.com | [33f6 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [33f7 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [33f8 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33f9 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33fa 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33fb 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33fc 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [33fd 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [33fe 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ff 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3400 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3401 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3402 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3403 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3404 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3405 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3406 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3407 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3408 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3409 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [340a 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [340b 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [340c 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [340d 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [340e 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 gate 1574140971278077600 evaluation starts +peer0.org1.example.com | [340f 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3410 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3411 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 principal matched by identity 0 +peer0.org1.example.com | [3412 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [3413 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [3414 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3415 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 gate 1574140971278077600 evaluation succeeds +peer0.org1.example.com | [3416 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3417 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3418 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3419 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [341a 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [341b 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [341c 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [341d 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | [32a8 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [32a9 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [32aa 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407eb60 gate 1574140970847589300 evaluation starts +peer0.org2.example.com | [32ab 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407eb60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32ac 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407eb60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [32ad 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407eb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [32ae 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407eb60 principal evaluation fails +peer0.org2.example.com | [32af 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407eb60 gate 1574140970847589300 evaluation fails +peer0.org2.example.com | [32b0 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32b1 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32b2 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [32b3 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407f0d0 gate 1574140970849523600 evaluation starts +peer0.org2.example.com | [32b4 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407f0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32b5 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407f0d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [32b6 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407f0d0 principal matched by identity 0 +peer0.org2.example.com | [32b7 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer0.org2.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer0.org2.example.com | [32b8 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer0.org2.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer0.org2.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer0.org2.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer0.org2.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer0.org2.example.com | [32b9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407f0d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [32ba 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407f0d0 gate 1574140970849523600 evaluation succeeds +peer0.org2.example.com | [32bb 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32bc 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32bd 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [32be 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [32bf 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [32c0 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [32c1 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [32c2 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [32c3 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [32c4 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32c5 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32c6 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32c7 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [32c8 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32c9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32ca 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32cb 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [30fc 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\241\251\342\031" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [30fd 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004c67c10, READY +peer1.org1.example.com | [30fe 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [30ff 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org1.example.com | [3100 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org1.example.com | [3101 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [3102 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org1.example.com | [3103 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [3104 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer1.org1.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer1.org1.example.com | [3105 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer1.org1.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer1.org1.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer1.org1.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer1.org1.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer1.org1.example.com | [3106 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org1.example.com | [3107 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 b1 2e f4 27 6c 71 01 96 91 d2 a7 |0D. y...'lq.....| +peer1.org1.example.com | 00000010 dd 72 57 e7 e6 7b 3d 2f bf aa 59 eb 91 57 25 54 |.rW..{=/..Y..W%T| +peer1.org1.example.com | 00000020 20 ea 4d a9 02 20 7b c5 84 32 71 99 24 7b ac 87 | .M.. {..2q.${..| +peer1.org1.example.com | 00000030 70 a2 b4 61 c2 93 cf a3 79 c7 8d 0c 82 a5 42 ba |p..a....y.....B.| +peer1.org1.example.com | 00000040 e4 f7 a6 49 0e 31 |...I.1| +peer1.org1.example.com | [3108 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org1.example.com | [310a 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [310b 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [310c 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [310d 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [310e 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f isn't responsive: rpc error: code = Unavailable desc = transport is closing +peer1.org1.example.com | [3111 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> WARN Entering [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] +peer1.org1.example.com | [3112 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: +peer1.org1.example.com | [3113 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3109 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3114 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org1.example.com | [3115 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 c5 3d ea b9 fb dc ee 7d e7 4d ec |0D. `.=.....}.M.| +peer1.org1.example.com | 00000010 70 dc d8 58 43 fe 6f aa 62 c5 ce 57 99 e3 01 84 |p..XC.o.b..W....| +peer1.org1.example.com | 00000020 8b 9f f4 fa 02 20 6f 4c dc c7 33 b9 37 7b 4d 57 |..... oL..3.7{MW| +peer1.org1.example.com | 00000030 ac 7d cd 19 93 17 42 2b 70 fd 98 d7 45 4e f2 6a |.}....B+p...EN.j| +peer1.org1.example.com | 00000040 ad 3e a1 a9 e2 19 |.>....| +peer1.org1.example.com | [310f 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [3116 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3110 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:45324 disconnected +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [341e 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [341f 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3420 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3421 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3422 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3423 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3424 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3425 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3426 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 gate 1574140971286894000 evaluation starts +peer0.org1.example.com | [3427 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3117 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:45324 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=89.2093ms +peer1.org1.example.com | [3118 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3119 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes t: {1574140894789402700 50 {} [] 0} +peer1.org1.example.com | [311a 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [311b 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [311c 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [311d 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [311e 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [311f 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3120 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\241\251\342\031" > > alive: +peer1.org1.example.com | [3121 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3122 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3123 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [3124 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [3125 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [3126 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [3127 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d286b0, CONNECTING +peer1.org1.example.com | [3128 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3129 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d286b0, READY +peer1.org1.example.com | [312a 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [312b 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209C6FC4E4580A385429...546D56F70CC8EB8417910D6AD7EAD004 +peer1.org1.example.com | [312c 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1076A92169FC98EF4BD2A2DEC72DD828172EA3C0644FC5A37425F08290B69ED4 +peer1.org1.example.com | [312d 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [312e 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org1.example.com | [312f 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org1.example.com | [3130 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 7c 43 f8 27 06 bf 94 01 78 39 |0E.!..|C.'....x9| +peer1.org1.example.com | 00000010 aa 04 b2 40 d7 04 b0 06 5f 83 c9 fe 35 29 0e 74 |...@...._...5).t| +peer1.org1.example.com | 00000020 16 01 0a 44 3e 02 20 6a 60 72 7b 8e 3d f4 bf 76 |...D>. j`r{.=..v| +peer1.org1.example.com | 00000030 62 43 8d 3c 49 13 70 f8 d2 d3 78 91 c6 f2 3f 06 |bC.| +peer1.org1.example.com | [3131 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [3428 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3429 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 principal matched by identity 0 +peer0.org1.example.com | [342a 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [342b 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [342c 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [342d 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [342e 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 gate 1574140971286894000 evaluation succeeds +peer0.org1.example.com | [342f 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3430 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3431 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3432 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3433 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3434 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3435 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3436 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3437 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3438 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3439 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [343a 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [343b 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [343c 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [343d 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [343e 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [343f 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 gate 1574140971295586300 evaluation starts +peer0.org1.example.com | [3440 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3441 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3442 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 principal matched by identity 0 +peer0.org1.example.com | [3443 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [3444 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [3445 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3446 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 gate 1574140971295586300 evaluation succeeds +peer0.org1.example.com | [3447 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3132 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3133 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3134 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3135 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3136 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3137 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3138 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3139 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [313a 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [313b 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [313c 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [313d 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [313e 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [313f 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3140 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3141 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3142 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3143 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3144 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer1.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer1.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer1.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3145 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d785b0 gate 1574140975298861300 evaluation starts +peer1.org1.example.com | [3146 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d785b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3147 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d785b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3148 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d785b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3149 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d785b0 principal evaluation fails +peer1.org1.example.com | [314a 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d785b0 gate 1574140975298861300 evaluation fails +peer1.org1.example.com | [314b 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [314c 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [314d 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [314e 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d793c0 gate 1574140975299148400 evaluation starts +peer1.org1.example.com | [314f 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d793c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3150 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d793c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3151 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d793c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [3152 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d793c0 principal evaluation fails +peer1.org1.example.com | [3153 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d793c0 gate 1574140975299148400 evaluation fails +peer1.org1.example.com | [3154 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3155 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3156 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3157 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d79950 gate 1574140975299393100 evaluation starts +peer1.org1.example.com | [3158 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d79950 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3159 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d79950 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [315a 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [315b 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [315c 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [3448 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3449 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [344a 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [344b 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [344c 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [344d 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [344e 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [344f 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3450 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3451 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3452 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3453 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3454 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3455 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3456 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3457 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 gate 1574140971304196900 evaluation starts +peer0.org1.example.com | [3458 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3459 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [345a 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 principal matched by identity 0 +peer0.org1.example.com | [345b 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [345c 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [345d 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [345e 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 gate 1574140971304196900 evaluation succeeds +peer0.org1.example.com | [345f 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3460 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3461 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3462 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3463 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3464 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [32cc 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\206\\e\223\322\314\020\037\215\252\010\222\315" > alive:\203\372#4\325ap\230a\245\002 n\304\367\340\244\006\376\353\025\337v\331\345T\236\313\256\377\241\207!\323\010b\323&\005n\033iF\177" > alive: +peer0.org2.example.com | [32cd 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [32ce 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32cf 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [32d0 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32d1 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32d2 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32d3 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32d4 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [32d5 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [32d6 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [32d7 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32d8 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\367" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [32d9 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32da 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\367" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [32db 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [32dc 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer0.org2.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer0.org2.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer0.org2.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer0.org2.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer0.org2.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer0.org2.example.com | [32de 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [32df 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 af 37 0b a2 a1 6d 62 8f e4 74 e7 |0D. B.7...mb..t.| +peer0.org2.example.com | 00000010 b6 df f1 bf 81 42 c1 c6 82 f3 af 83 5a 10 29 f7 |.....B......Z.).| +peer0.org2.example.com | 00000020 e4 c5 01 d7 02 20 14 8f ac 86 e2 9c 67 7a f7 61 |..... ......gz.a| +peer0.org2.example.com | 00000030 c9 79 70 e0 dd 51 f5 f1 e6 aa a9 29 db bc 96 f0 |.yp..Q.....)....| +peer0.org2.example.com | 00000040 b0 d6 2a 6d 3e f7 |..*m>.| +peer0.org2.example.com | [32e0 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [32e1 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [32e2 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [32e3 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [32e4 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [32e5 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32e6 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3530 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [315d 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d79950 principal matched by identity 0 +peer1.org1.example.com | [315e 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [315f 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3160 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d79950 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3161 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d79950 gate 1574140975299393100 evaluation succeeds +peer1.org1.example.com | [3162 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3163 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3164 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3165 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3166 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3167 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3168 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3169 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [316a 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [316b 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [316c 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [316d 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [316e 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [316f 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3170 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3171 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3172 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3173 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [3174 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3175 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3176 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3177 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3178 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3465 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [3466 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [3467 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [3468 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [3469 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [346a 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [346b 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [346c 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [346d 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [346e 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [346f 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3470 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3471 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 gate 1574140971311005200 evaluation starts +peer0.org1.example.com | [3472 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3473 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3474 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 principal matched by identity 0 +peer0.org1.example.com | [3475 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [3476 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [3477 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3478 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 gate 1574140971311005200 evaluation succeeds +peer0.org1.example.com | [3479 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [347a 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [347b 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [347c 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [347d 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [347e 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32e7 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32e8 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [32e9 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32ea 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32eb 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [32ec 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\367" > > alive: +peer0.org2.example.com | [32ed 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [32ee 11-19 05:22:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32ef 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [32f0 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32f1 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32f2 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32f3 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32f4 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [32f5 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [32f6 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32f7 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32f8 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32f9 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32fa 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32fb 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32fc 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [32fd 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32fe 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [32ff 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3300 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3301 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3302 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3303 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3304 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3305 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3306 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3307 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3308 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3309 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [330a 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [330b 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [330c 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [330d 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [330e 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [330f 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3310 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3311 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3312 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3313 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3314 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15102D +peer0.org2.example.com | [3315 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 142BDE78537395F0E7BCC58E2CA7BE13F29D1CDF4C3CBB2260E3885C96BC746B +peer0.org2.example.com | [3316 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3317 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3318 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3319 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [331a 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [331b 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [331c 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [331d 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [331e 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [331f 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\357\034eOv<\225\330XM\254Mn\312\225\216(\002 \034\327\345\342\3557+\036\274\2261@\002\001\007\373\271'\221RI\323\r\262\002!]}\350\nQI" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3320 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\357\034eOv<\225\330XM\254Mn\312\225\216(\002 \034\327\345\342\3557+\036\274\2261@\002\001\007\373\271'\221RI\323\r\262\002!]}\350\nQI" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3321 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3322 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3323 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3324 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3325 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3326 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3327 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +peer0.org2.example.com | 00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +peer0.org2.example.com | [3328 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +peer0.org2.example.com | 00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +peer0.org2.example.com | 00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +peer0.org2.example.com | 00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +peer0.org2.example.com | 00000040 48 c8 4f cd b1 c7 f7 |H.O....| +peer0.org2.example.com | [3329 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [332a 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [332b 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [332c 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [332d 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer0.org2.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer0.org2.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer0.org2.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer0.org2.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer0.org2.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer0.org2.example.com | [332f 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3330 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3331 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3332 11-19 05:22:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3333 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [3334 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3335 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [3336 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3337 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +peer0.org2.example.com | 00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +peer0.org2.example.com | [3338 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +peer0.org2.example.com | 00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +peer0.org2.example.com | 00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +peer0.org2.example.com | 00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +peer0.org2.example.com | 00000040 48 c8 4f cd b1 c7 f7 |H.O....| +peer0.org2.example.com | [3339 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [333a 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 28 ba 45 09 00 14 43 ce 49 7a |0E.!..(.E...C.Iz| +peer0.org2.example.com | 00000010 7c f4 43 3e ef 1c 65 4f 76 3c 95 d8 58 4d ac 4d ||.C>..eOv<..XM.M| +peer0.org2.example.com | 00000020 6e ca 95 8e 28 02 20 1c d7 e5 e2 ed 37 2b 1e bc |n...(. .....7+..| +peer0.org2.example.com | 00000030 96 31 40 02 01 07 fb b9 27 91 52 49 d3 0d b2 02 |.1@.....'.RI....| +peer0.org2.example.com | 00000040 21 5d 7d e8 0a 51 49 |!]}..QI| +peer0.org2.example.com | [333b 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [333c 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [333d 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [333e 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [347f 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3480 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3481 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3482 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3483 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3484 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3485 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 gate 1574140971322564700 evaluation starts +peer0.org1.example.com | [3486 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3487 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3488 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 principal matched by identity 0 +peer0.org1.example.com | [3489 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [348a 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [348b 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [348c 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 gate 1574140971322564700 evaluation succeeds +peer0.org1.example.com | [348d 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [348e 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [348f 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3490 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3491 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3492 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3493 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3494 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3495 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3496 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3497 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3498 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3499 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [349a 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [349b 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [349c 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [349d 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [349e 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [349f 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [34a0 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34a1 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34a2 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34a3 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [34a4 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3531 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [3532 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [3533 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [3534 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0029493c0)} +peer1.org2.example.com | [3535 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [3536 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [3537 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [3538 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org2.example.com | [3539 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org2.example.com | [353a 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org2.example.com | [353b 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org2.example.com | [353c 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [353d 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer1.org2.example.com | [353e 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xa2, 0x69, 0x20, 0xe7, 0x6, 0xba, 0xc2, 0x3, 0x29, 0x26, 0xfe, 0xbd, 0x9b, 0x32, 0xd3, 0x6e, 0x64, 0xfd, 0x5e, 0xe2, 0x9c, 0x95, 0x4, 0xb3, 0xa2, 0x44, 0xc8, 0xfa, 0x28, 0x5a, 0x80, 0x58} txOffsets= +peer1.org2.example.com | txId=546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf locPointer=offset=71, bytesLength=37478 +peer1.org2.example.com | ] +peer1.org2.example.com | [353f 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89508, bytesLength=37478] for tx ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to txid-index +peer1.org2.example.com | [3540 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89508, bytesLength=37478] for tx number:[0] ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to blockNumTranNum index +peer1.org2.example.com | [3541 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer1.org2.example.com | [3542 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [3543 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127959], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org2.example.com | [3544 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org2.example.com | [3545 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org2.example.com | [3546 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer1.org2.example.com | [3547 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [3548 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [3549 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [354a 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [354b 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [354c 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [354d 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org2.example.com | [354e 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [354f 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org2.example.com | [3550 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org2.example.com | [3551 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [3552 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org2.example.com | [3553 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer1.org2.example.com | [3554 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 19ms (state_validation=2ms block_and_pvtdata_commit=8ms state_commit=5ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer1.org2.example.com | [3555 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org2.example.com | [3556 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3557 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E49FD3F4FE999EEC15...08071A0C0A0565787030321203312E30 +peer1.org2.example.com | [3558 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 829ECEC8E7EF536BDBF6D483D1536D0D5BEC050E8861622F7A4EA3CB92CE9C37 +peer1.org2.example.com | [3559 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer0.org2.example.com | [333f 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3340 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3341 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3342 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3343 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +peer0.org2.example.com | 00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +peer0.org2.example.com | [3344 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +peer0.org2.example.com | 00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +peer0.org2.example.com | 00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +peer0.org2.example.com | 00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +peer0.org2.example.com | 00000040 48 c8 4f cd b1 c7 f7 |H.O....| +peer0.org2.example.com | [3345 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3346 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3347 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3348 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3349 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [334a 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [334b 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [334c 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [334d 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [334e 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [334f 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3350 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f757e0 gate 1574140971876522900 evaluation starts +peer0.org2.example.com | [3351 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f757e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3352 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f757e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3353 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f757e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3354 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f757e0 principal evaluation fails +peer0.org2.example.com | [3355 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f757e0 gate 1574140971876522900 evaluation fails +peer0.org2.example.com | [3356 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3357 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3358 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3359 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f75d50 gate 1574140971876769400 evaluation starts +peer0.org2.example.com | [335a 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f75d50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [335b 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f75d50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [335c 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f75d50 principal matched by identity 0 +peer0.org2.example.com | [335d 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +peer0.org2.example.com | 00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +peer0.org1.example.com | [34a5 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [34a6 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [34a7 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [34a8 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34a9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [34aa 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [34ab 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34ac 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [34ad 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [34ae 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34af 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [34b0 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34b1 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34b2 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [34b3 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [34b4 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [34b5 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 gate 1574140971467263900 evaluation starts +peer0.org1.example.com | [34b6 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [34b7 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [34b8 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 principal matched by identity 0 +peer0.org1.example.com | [34b9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer0.org1.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer0.org1.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer0.org1.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer0.org1.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer0.org1.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer0.org1.example.com | [34bb 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [34bc 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 gate 1574140971467263900 evaluation succeeds +peer1.org1.example.com | [3179 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [317a 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [317b 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [317c 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [317d 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [317e 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [317f 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3180 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3181 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3182 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3183 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3184 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3185 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3186 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3187 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004db46d0 gate 1574140975361837200 evaluation starts +peer1.org1.example.com | [3188 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004db46d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3189 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004db46d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [318a 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [318b 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [318c 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [318d 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004db46d0 principal matched by identity 0 +peer1.org1.example.com | [318e 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 ae a1 5d 97 02 b5 c0 bb c9 2c 40 ec 1d 00 7f |...]......,@....| +peer1.org1.example.com | 00000010 b6 98 81 7d 8c 81 25 6e 11 cc b4 9e 9e 91 d9 07 |...}..%n........| +peer1.org1.example.com | [318f 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 4f f8 2d 69 74 14 7e 80 f1 2b |0E.!..O.-it.~..+| +peer1.org1.example.com | 00000010 74 a6 c1 79 3a c1 a6 a5 7b f7 95 f9 81 32 b2 ae |t..y:...{....2..| +peer1.org1.example.com | 00000020 d5 3a e4 9c c3 02 20 2e 8d c5 23 07 2b fe d6 1f |.:.... ...#.+...| +peer1.org1.example.com | 00000030 3b c0 0f 51 8e 4f 31 84 ab fc 84 29 28 13 99 7b |;..Q.O1....)(..{| +peer1.org1.example.com | 00000040 2b f4 12 e1 84 22 71 |+...."q| +peer1.org1.example.com | [3190 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004db46d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3191 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004db46d0 gate 1574140975361837200 evaluation succeeds +peer1.org1.example.com | [3192 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3193 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3194 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3195 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3196 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [34bd 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34be 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34bf 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [34c0 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [34c1 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [34c2 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [34c3 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [34c4 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [34c5 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [34c6 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34c7 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34c8 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34c9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [34ca 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34cb 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34cc 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34cd 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34ce 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +peer0.org1.example.com | [34cf 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d0 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34d1 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d2 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d3 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34d4 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34d5 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34d6 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d7 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d8 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d9 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [34da 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34db 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [34dc 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [355a 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org2.example.com | [355b 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [355c 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [355d 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer1.org2.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer1.org2.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer1.org2.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [355e 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [355f 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [3560 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3561 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3562 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3563 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [335e 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +peer0.org2.example.com | 00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +peer0.org2.example.com | 00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +peer0.org2.example.com | 00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +peer0.org2.example.com | 00000040 1f 8d aa 08 92 cd |......| +peer0.org2.example.com | [335f 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f75d50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3360 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f75d50 gate 1574140971876769400 evaluation succeeds +peer0.org2.example.com | [3361 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3362 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3363 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3364 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3365 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3366 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3367 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3368 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer0.org2.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer0.org2.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer0.org2.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer0.org2.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer0.org2.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer0.org2.example.com | [336a 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [336b 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [336c 11-19 05:22:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [336d 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [336e 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [336f 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3370 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3371 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3372 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3373 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3374 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3375 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3376 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37228 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [3377 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3378 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3379 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34dd 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [34de 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [34df 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34e0 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [34e1 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [34e2 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [34e3 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34e4 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34e5 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34e6 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34e7 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34e8 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34e9 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [34ea 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34eb 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [34ec 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [34ed 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34ee 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [34ef 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [34f0 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34f1 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [34f2 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34f3 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34f4 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [34f5 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3564 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3565 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3566 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3567 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3568 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3569 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [356a 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032485a0 gate 1574140974509617800 evaluation starts +peer1.org2.example.com | [356b 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032485a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [356c 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032485a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [356d 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [356e 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [356f 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [3570 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032485a0 principal matched by identity 0 +peer1.org2.example.com | [3571 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org2.example.com | [3572 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 29 4b b4 1b 48 c9 12 37 09 3b |0E.!..)K..H..7.;| +peer1.org2.example.com | 00000010 2b 99 bc 04 44 f1 5d 8d 82 26 65 34 d9 b2 d6 ad |+...D.]..&e4....| +peer1.org2.example.com | 00000020 0b 0a 7c bd 07 02 20 65 7c 99 bc 36 c3 94 3a f9 |..|... e|..6..:.| +peer1.org2.example.com | 00000030 e3 a9 55 e6 ef bb 71 ec 96 28 eb 54 01 5f 37 1c |..U...q..(.T._7.| +peer1.org2.example.com | 00000040 c7 27 0f 3b 70 9f 0a |.'.;p..| +peer1.org2.example.com | [3573 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032485a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3574 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032485a0 gate 1574140974509617800 evaluation succeeds +peer1.org2.example.com | [3575 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3576 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3577 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3578 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3579 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org2.example.com | [357a 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [357b 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [357c 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [357d 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151036 +peer1.org2.example.com | [357e 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1ED9259F501642B018CA628BD27C75BBFA30DD02F46A16282C54B3E02BA24146 +peer1.org2.example.com | [357f 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3580 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3581 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3582 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3583 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12679499264910794022 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3197 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3198 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3199 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [319a 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [319b 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [319c 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [319d 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [319e 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [319f 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31a0 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31a1 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31a2 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [31a3 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [31a4 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31a5 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [31a6 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31a7 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [31a8 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31a9 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [31aa 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [31ab 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ac 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [31ad 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ae 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [31af 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [31b0 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [31b1 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31b2 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31b3 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31b4 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31b5 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31b6 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31b7 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [31b8 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31b9 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ba 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [31bb 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [31bc 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5 6] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [31bd 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34f6 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [34f7 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 gate 1574140971838507800 evaluation starts +peer0.org1.example.com | [34f8 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [34f9 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [34fa 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 principal matched by identity 0 +peer0.org1.example.com | [34fb 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +peer0.org1.example.com | 00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +peer0.org1.example.com | [34fc 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +peer0.org1.example.com | 00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +peer0.org1.example.com | 00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +peer0.org1.example.com | 00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +peer0.org1.example.com | 00000040 48 c8 4f cd b1 c7 f7 |H.O....| +peer0.org1.example.com | [34fd 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [34fe 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 gate 1574140971838507800 evaluation succeeds +peer0.org1.example.com | [34ff 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3500 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3501 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3502 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3503 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3504 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3505 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3506 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3507 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3508 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3509 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [350a 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [350b 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [350c 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [350d 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [350e 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [350f 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3510 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +peer0.org1.example.com | [3511 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [3512 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3513 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3514 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3515 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3516 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [337a 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [337b 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [337c 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [337d 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [337e 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [337f 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3380 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034619c0 gate 1574140971915364000 evaluation starts +peer0.org2.example.com | [3381 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034619c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3382 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034619c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3383 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034619c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3384 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034619c0 principal evaluation fails +peer0.org2.example.com | [3385 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034619c0 gate 1574140971915364000 evaluation fails +peer0.org2.example.com | [3386 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3387 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3388 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3389 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461f30 gate 1574140971915608700 evaluation starts +peer0.org2.example.com | [338a 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461f30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [338b 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461f30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [338c 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461f30 principal matched by identity 0 +peer0.org2.example.com | [338d 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [338e 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [338f 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461f30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3390 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003461f30 gate 1574140971915608700 evaluation succeeds +peer0.org2.example.com | [3391 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3392 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3393 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3394 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3395 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3396 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3397 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3398 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3399 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [339a 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [339b 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [339c 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [339d 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f50c0 gate 1574140971919741800 evaluation starts +peer1.org1.example.com | [31be 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [31bf 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [31c0 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31c1 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [31c2 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [31c3 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31c4 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [31c5 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31c6 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31c7 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [31c8 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [31c9 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [31ca 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847ea0 gate 1574140975476540000 evaluation starts +peer1.org1.example.com | [31cb 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [31cc 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847ea0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [31cd 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847ea0 principal matched by identity 0 +peer1.org1.example.com | [31ce 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer1.org1.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer1.org1.example.com | [31cf 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer1.org1.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer1.org1.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer1.org1.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer1.org1.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer1.org1.example.com | [31d0 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847ea0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [31d1 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847ea0 gate 1574140975476540000 evaluation succeeds +peer1.org1.example.com | [31d2 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31d3 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31d4 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [31d5 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [339e 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f50c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [339f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f50c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [33a0 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f50c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [33a1 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f50c0 principal evaluation fails +peer0.org2.example.com | [33a2 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f50c0 gate 1574140971919741800 evaluation fails +peer0.org2.example.com | [33a3 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33a4 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33a5 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33a6 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f5630 gate 1574140971920214900 evaluation starts +peer0.org2.example.com | [33a7 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f5630 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33a8 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f5630 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [33a9 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f5630 principal matched by identity 0 +peer0.org2.example.com | [33aa 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [33ab 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [33ac 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f5630 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33ad 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f5630 gate 1574140971920214900 evaluation succeeds +peer0.org2.example.com | [33ae 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33af 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33b0 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33b1 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33b2 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [33b3 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [33b4 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [33b5 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [33b6 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33b7 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [33b8 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | [33b9 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | [33ba 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33bb 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3584 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:12679499264910794022 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | [3585 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3586 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3587 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [3588 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:40884 disconnected +peer1.org2.example.com | [3589 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:40884 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m3.8569617s +peer1.org2.example.com | [358a 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [358b 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.609Z grpc.peer_address=172.18.0.6:41034 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=200.3µs +peer1.org2.example.com | [358c 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [358d 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer1.org2.example.com | [358e 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer1.org2.example.com | [358f 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:41034 +peer1.org2.example.com | [3590 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:41034 +peer1.org2.example.com | [3591 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3592 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3593 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3517 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3518 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3519 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [351a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [351b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [351c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [351d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [351e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer0.org1.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer0.org1.example.com | [351f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer0.org1.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer0.org1.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer0.org1.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer0.org1.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer0.org1.example.com | [3520 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3521 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 b3 05 3c d7 73 7f b7 ed 31 5d |0E.!....<.s...1]| +peer0.org1.example.com | 00000010 2c c1 51 08 76 2d 68 6a e5 1d 87 b5 a8 32 9f 85 |,.Q.v-hj.....2..| +peer0.org1.example.com | 00000020 e2 1e ce b7 a9 02 20 58 23 bf 44 25 74 39 ed de |...... X#.D%t9..| +peer0.org1.example.com | 00000030 eb 80 69 19 3f aa 48 02 2f 95 95 b4 ca ae f2 3f |..i.?.H./......?| +peer0.org1.example.com | 00000040 e4 13 50 84 6f db 73 |..P.o.s| +peer0.org1.example.com | [3522 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3523 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [3524 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3525 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3526 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3527 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3528 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3529 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [352a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [352b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [352c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [352d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [352e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +peer0.org1.example.com | [352f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3530 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3531 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3532 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3533 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3534 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3535 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3536 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3537 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3538 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3539 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [353a 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [353b 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [353c 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 gate 1574140974136070500 evaluation starts +peer0.org1.example.com | [353d 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [353e 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [353f 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 principal matched by identity 0 +peer0.org1.example.com | [3540 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab 52 71 44 2f de 1c 33 6d 2b 43 f3 13 a5 29 |..RqD/..3m+C...)| +peer0.org1.example.com | 00000010 f5 f2 b6 34 fc 9d 18 02 a5 29 97 a2 dc 36 5c 29 |...4.....)...6\)| +peer0.org1.example.com | [3541 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba f1 23 59 ba 95 10 18 34 f7 48 |0E.!...#Y....4.H| +peer0.org1.example.com | 00000010 e5 6b e9 bf b7 83 68 5e ba 97 08 35 84 f3 97 02 |.k....h^...5....| +peer0.org1.example.com | 00000020 b7 67 77 60 2b 02 20 31 ca f9 67 7f d4 24 bc 4d |.gw`+. 1..g..$.M| +peer0.org1.example.com | 00000030 cc 10 28 f0 97 f3 f0 48 5f 57 ff 4c b7 27 7a d2 |..(....H_W.L.'z.| +peer0.org1.example.com | 00000040 9c 23 26 0c 0e 32 8f |.#&..2.| +peer0.org1.example.com | [3542 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3543 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 gate 1574140974136070500 evaluation succeeds +peer0.org1.example.com | [3544 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3545 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3546 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3547 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3548 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org1.example.com | [3549 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org1.example.com | [354a 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [354c 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +peer0.org1.example.com | [354d 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [354b 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer0.org1.example.com | [354e 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer0.org1.example.com | [354f 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer0.org1.example.com | [3550 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org1.example.com | [3551 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer0.org1.example.com | [3552 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org1.example.com | [3553 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [3554 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0003cf1c0 env 0xc002913cc0 txn 0 +peer0.org1.example.com | [3555 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002913cc0 +peer0.org1.example.com | [3556 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +peer0.org1.example.com | [3557 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [3558 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3559 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [355a 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [355b 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org1.example.com | fQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [355c 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer0.org1.example.com | [355d 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [31d6 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31d7 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [31d8 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [31d9 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [31da 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [31db 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31dc 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31dd 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31de 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [31df 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31e0 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31e1 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31e2 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31e3 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: dead: +peer1.org1.example.com | [31e4 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [31e5 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31e6 11-19 05:22:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31e7 11-19 05:22:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org1.example.com | [31e8 11-19 05:22:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [31e9 11-19 05:22:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ea 11-19 05:22:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [31eb 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ec 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ed 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ee 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [31ef 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [31f0 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [31f1 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | [31f2 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f3 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f4 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [31f6 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31f7 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31f8 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [31f9 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [31fa 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [31f5 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31fb 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adabc0 gate 1574140975597484900 evaluation starts +peer1.org1.example.com | [31fc 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adabc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [31fd 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adabc0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [31fe 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adabc0 principal matched by identity 0 +peer1.org1.example.com | [31ff 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [3200 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [3201 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [3202 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adabc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3203 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adabc0 gate 1574140975597484900 evaluation succeeds +peer1.org1.example.com | [3204 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3205 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3206 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3207 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3208 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3209 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [320a 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [320b 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [320c 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [320e 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [320d 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [320f 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3210 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3211 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb890 gate 1574140975602014900 evaluation starts +peer1.org1.example.com | [3212 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb890 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3213 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb890 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3214 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb890 principal matched by identity 0 +peer1.org1.example.com | [3215 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3216 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [3217 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [3218 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3219 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb890 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [321a 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb890 gate 1574140975602014900 evaluation succeeds +peer1.org1.example.com | [321b 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [321c 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [321d 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [321e 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [321f 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3220 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3221 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3222 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3223 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3224 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3225 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3226 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3227 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab310 gate 1574140975614712500 evaluation starts +peer1.org1.example.com | [3228 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab310 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3229 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab310 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [322a 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab310 principal matched by identity 0 +peer1.org1.example.com | [322b 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [322c 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [322d 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab310 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33bc 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33bd 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33be 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33bf 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33c0 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33c1 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [33c2 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc1ce0 gate 1574140971929391700 evaluation starts +peer0.org2.example.com | [33c3 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc1ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33c4 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc1ce0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [33c5 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc1ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [33c6 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc1ce0 principal evaluation fails +peer0.org2.example.com | [33c7 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc1ce0 gate 1574140971929391700 evaluation fails +peer0.org2.example.com | [33c8 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33c9 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33ca 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33cb 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdc250 gate 1574140971929642300 evaluation starts +peer0.org2.example.com | [33cc 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdc250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33cd 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdc250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [33ce 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdc250 principal matched by identity 0 +peer0.org2.example.com | [33cf 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org2.example.com | [33d0 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org2.example.com | [33d1 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdc250 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33d2 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdc250 gate 1574140971929642300 evaluation succeeds +peer0.org2.example.com | [33d3 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33d4 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33d5 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33d6 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33d7 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d8 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d9 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33da 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33db 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33dc 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33dd 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33de 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [33df 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd3e0 gate 1574140971930549100 evaluation starts +peer0.org2.example.com | [33e0 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd3e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33e1 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd3e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [33e2 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [33e3 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd3e0 principal evaluation fails +peer0.org2.example.com | [33e4 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd3e0 gate 1574140971930549100 evaluation fails +peer0.org2.example.com | [33e5 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33e6 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33e7 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33e8 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd950 gate 1574140971930800800 evaluation starts +peer0.org2.example.com | [33e9 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd950 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33ea 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd950 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [33eb 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd950 principal matched by identity 0 +peer0.org2.example.com | [33ec 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [33ed 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [33ee 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd950 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33ef 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdd950 gate 1574140971930800800 evaluation succeeds +peer0.org2.example.com | [33f0 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33f1 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33f2 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33f3 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33f4 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [33f5 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [33f6 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33f7 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [33f8 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33f9 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33fa 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33fb 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33fc 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33fd 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33fe 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33ff 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3400 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3401 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff3b0 gate 1574140971936295300 evaluation starts +peer0.org2.example.com | [3402 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff3b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3403 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff3b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3404 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3405 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff3b0 principal evaluation fails +peer0.org2.example.com | [3406 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff3b0 gate 1574140971936295300 evaluation fails +peer0.org2.example.com | [3407 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3408 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3409 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3594 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3595 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3596 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3597 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3598 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3599 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [359a 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [359b 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [359c 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e7940 gate 1574140974619197300 evaluation starts +peer1.org2.example.com | [359d 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e7940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [359e 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e7940 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [359f 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e7940 principal matched by identity 0 +peer1.org2.example.com | [35a0 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org2.example.com | [35a1 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 8a 4d 29 74 76 bd cf 11 6f 33 |0E.!...M)tv...o3| +peer1.org2.example.com | 00000010 7b b4 d1 87 dd 3e ec 03 93 da 6c 8c 19 7f 78 80 |{....>....l...x.| +peer1.org2.example.com | 00000020 2b 39 fd e5 50 02 20 56 06 8c d1 43 aa 8e 56 0a |+9..P. V...C..V.| +peer1.org2.example.com | 00000030 21 f4 b5 eb 94 19 76 b2 08 a0 cb e2 f5 24 d0 54 |!.....v......$.T| +peer1.org2.example.com | 00000040 96 03 b1 96 3c 06 ab |....<..| +peer1.org2.example.com | [35a2 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e7940 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35a3 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e7940 gate 1574140974619197300 evaluation succeeds +peer1.org2.example.com | [35a4 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35a5 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35a6 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [35a7 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [35a8 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:41034 +peer1.org2.example.com | [35a9 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:41034 +peer1.org2.example.com | [35aa 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 12679499264910794022, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ab 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35ac 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12679499264910794022, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org1.example.com | [355e 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [355f 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 17 9f c3 74 1b 52 69 8b 1b 61 04 bd 5f 6e fc |....t.Ri..a.._n.| +peer0.org1.example.com | 00000010 23 3f 14 b1 da 98 c7 eb 83 d0 99 5b 69 2c d6 fb |#?.........[i,..| +peer0.org1.example.com | [3560 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 c1 b9 60 ac e7 e3 8e 4c 35 f5 e3 |0D. R..`....L5..| +peer0.org1.example.com | 00000010 d0 57 4c 17 2b 63 e9 4e 0f 90 1b 11 66 33 ac 45 |.WL.+c.N....f3.E| +peer0.org1.example.com | 00000020 36 ba 41 a0 02 20 68 1d 3d 55 3a d4 2c 2e 3b ec |6.A.. h.=U:.,.;.| +peer0.org1.example.com | 00000030 b5 d4 40 5a 67 23 76 05 76 b9 63 e3 ff 94 86 d4 |..@Zg#v.v.c.....| +peer0.org1.example.com | 00000040 35 94 c1 49 86 f1 |5..I..| +peer0.org1.example.com | [3561 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3562 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003762000, header channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +peer0.org1.example.com | [3563 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [3564 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [3565 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3566 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [3567 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3568 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [3569 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [356a 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [356b 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [356c 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [356d 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [356e 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [356f 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [3570 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3571 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [3572 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3573 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3574 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3575 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [3576 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [3577 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3578 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [3579 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [357a 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [357b 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [357c 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [357d 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [357e 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [357f 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3580 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3581 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3582 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3583 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [322e 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab310 gate 1574140975614712500 evaluation succeeds +peer1.org1.example.com | [322f 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3230 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3231 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [340a 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff920 gate 1574140971936537000 evaluation starts +peer0.org2.example.com | [340b 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff920 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [340c 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff920 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [340d 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff920 principal matched by identity 0 +peer0.org2.example.com | [340e 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [340f 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [3410 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff920 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3411 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ff920 gate 1574140971936537000 evaluation succeeds +peer0.org2.example.com | [3412 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3413 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3414 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3415 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3416 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3417 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3418 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3419 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [341a 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [341b 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [341c 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [341d 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [341e 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471cab0 gate 1574140971937526300 evaluation starts +peer0.org2.example.com | [341f 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471cab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3420 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471cab0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [35ad 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [35ae 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35af 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35b0 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer1.org2.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer1.org2.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org2.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer1.org2.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [35b1 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [35b2 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [35b3 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [35b4 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35b5 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35b6 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [35b7 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [35b8 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [35b9 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5930 gate 1574140974632989200 evaluation starts +peer1.org2.example.com | [35ba 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35bb 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5930 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [35bc 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [35bd 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [35be 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [35bf 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5930 principal matched by identity 0 +peer1.org2.example.com | [35c0 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer1.org2.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer1.org2.example.com | [35c1 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer1.org2.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer1.org2.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer1.org2.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer1.org2.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer1.org2.example.com | [35c2 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5930 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35c3 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5930 gate 1574140974632989200 evaluation succeeds +peer1.org2.example.com | [35c4 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35c5 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35c6 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [35c7 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [35c8 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [35c9 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35ca 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [3232 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3233 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3234 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3235 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3236 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3237 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3238 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3239 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [323a 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aabe70 gate 1574140975623674200 evaluation starts +peer1.org1.example.com | [323b 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aabe70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [323c 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aabe70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [323d 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aabe70 principal matched by identity 0 +peer1.org1.example.com | [323e 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [323f 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3240 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aabe70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3241 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aabe70 gate 1574140975623674200 evaluation succeeds +peer1.org1.example.com | [3242 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3243 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3244 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3245 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3246 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3247 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3248 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3249 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [324a 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [324b 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [324c 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [324d 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [324e 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [324f 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3250 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3251 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3584 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3585 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3586 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes +peer0.org1.example.com | [3587 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3588 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [3589 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer0.org1.example.com | [358a 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer0.org1.example.com | [358b 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer0.org1.example.com | [358c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [358d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [358e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [358f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3590 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3591 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [3592 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [3593 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [3594 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer0.org1.example.com | [3595 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3596 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org1.example.com | [3597 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +peer0.org1.example.com | [3598 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 gate 1574140974182282900 evaluation starts +peer0.org1.example.com | [3599 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [359a 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [359b 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [359c 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 processing identity 1 with bytes of 1151ae0 +peer0.org1.example.com | [359d 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | [359e 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [359f 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [35a0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [35a1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | [35a2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [35a3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 principal matched by identity 1 +peer0.org1.example.com | [35a4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +peer0.org1.example.com | 00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...| +peer0.org1.example.com | [35a5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +peer0.org1.example.com | 00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +peer0.org1.example.com | 00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +peer0.org1.example.com | 00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +peer0.org1.example.com | 00000040 46 bf 84 1c 8c 35 |F....5| +peer0.org1.example.com | [35a6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 principal evaluation succeeds for identity 1 +peer0.org1.example.com | [35a7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 gate 1574140974182282900 evaluation succeeds +peer0.org1.example.com | [35a8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [35a9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [35aa 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [35ab 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +peer1.org2.example.com | [35cb 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 62 34 b9 23 38 2c b1 97 b1 6f 2f 16 8b e0 34 |.b4.#8,...o/...4| +peer0.org2.example.com | [3421 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471cab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3252 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [35ac 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 gate 1574140974183180200 evaluation starts +peer1.org2.example.com | 00000010 99 68 ad 01 9f 37 5d 4d 28 f1 ca 80 69 6d bd 9a |.h...7]M(...im..| +peer0.org2.example.com | [3422 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471cab0 principal evaluation fails +peer1.org1.example.com | [3253 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45930 gate 1574140975628462200 evaluation starts +peer0.org1.example.com | [35ad 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 signed by 0 principal evaluation starts (used [false false false]) +peer1.org2.example.com | [35cc 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 75 94 96 e5 15 c3 ed 97 5a 93 66 |0D. Iu.......Z.f| +peer0.org2.example.com | [3423 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471cab0 gate 1574140971937526300 evaluation fails +peer1.org1.example.com | [3254 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35ae 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 7b 3b 58 bf 85 09 cf d8 42 1a 98 fb 9e b1 20 f8 |{;X.....B..... .| +peer0.org2.example.com | [3424 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3255 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45930 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [35af 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 principal matched by identity 0 +peer1.org2.example.com | 00000020 d8 ce 01 e1 02 20 63 bd 05 d5 d0 67 da 21 de 3c |..... c....g.!.<| +peer0.org2.example.com | [3425 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3256 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45930 principal matched by identity 0 +peer0.org1.example.com | [35b0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +peer1.org2.example.com | 00000030 3f c8 25 1d a1 f0 20 c7 8e 58 14 37 33 9b f9 7a |?.%... ..X.73..z| +peer0.org2.example.com | [3426 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3257 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR| +peer1.org2.example.com | 00000040 33 ae 24 46 14 0e |3.$F..| +peer0.org2.example.com | [3427 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471d020 gate 1574140971937870900 evaluation starts +peer1.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [35b1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +peer1.org2.example.com | [35cd 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3428 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471d020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3258 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +peer1.org2.example.com | [35ce 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1574140895837304100 50 {} [] 0} +peer0.org2.example.com | [3429 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471d020 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +peer1.org2.example.com | [35cf 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [342a 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471d020 principal matched by identity 0 +peer1.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +peer1.org2.example.com | [35d0 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [342b 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 28 40 4c 89 f5 38 |(@L..8| +peer1.org2.example.com | [35d1 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [35b2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35d2 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e d9 25 9f 50 16 42 b0 18 ca 62 8b d2 7c 75 bb |..%.P.B...b..|u.| +peer0.org2.example.com | [342c 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | [3259 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45930 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org2.example.com | 00000010 fa 30 dd 02 f4 6a 16 28 2c 54 b3 e0 2b a2 41 46 |.0...j.(,T..+.AF| +peer1.org1.example.com | [325a 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45930 gate 1574140975628462200 evaluation succeeds +peer0.org1.example.com | [35b3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 gate 1574140974183180200 evaluation succeeds +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org2.example.com | [35d3 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea ed 25 49 23 31 35 45 ab 54 5d |0E.!...%I#15E.T]| +peer1.org1.example.com | [325b 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [35b4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org2.example.com | 00000010 8a c9 ac d6 4e bd 44 d5 2a e2 52 21 dc 6d 13 19 |....N.D.*.R!.m..| +peer1.org1.example.com | [325c 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [35b5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org2.example.com | 00000020 11 63 6e e2 26 02 20 4c b9 1c 06 42 cd dd 9b c3 |.cn.&. L...B....| +peer1.org1.example.com | [325d 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [35b6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org2.example.com | [342d 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471d020 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 f7 c5 f4 63 34 7f fb 4d 9a 25 4b ec 69 01 c5 5f |...c4..M.%K.i.._| +peer1.org1.example.com | [325e 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [342e 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471d020 gate 1574140971937870900 evaluation succeeds +peer0.org1.example.com | [35b7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer1.org2.example.com | 00000040 a1 c0 7d 06 a0 27 26 |..}..'&| +peer1.org1.example.com | [325f 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [342f 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [35b8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [35d4 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3260 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3430 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [35b9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [35d5 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3261 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3431 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [35ba 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [35d6 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3262 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3432 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [35bb 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [35d7 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3263 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3433 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | [35bc 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [35d8 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3264 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [35bd 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [35d9 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3265 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3434 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | [35be 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [35da 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3266 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | [35bf 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [35db 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [3267 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2ac0 gate 1574140975642076700 evaluation starts +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | [35c0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [35dc 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3268 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2ac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | [35c1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [35dd 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3269 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2ac0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [35c2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [35de 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [326a 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2ac0 principal matched by identity 0 +peer0.org2.example.com | [3435 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | [35c3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [35df 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [326b 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [35c4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [35e0 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3436 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | [35c5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [35e1 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [326c 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | [35c6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | [35e2 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | [35c7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | [35e3 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485b810 gate 1574140974732745100 evaluation starts +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | [35c8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | [35e4 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485b810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [35c9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [35e5 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485b810 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3437 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35ca 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [326d 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2ac0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35e6 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485b810 principal matched by identity 0 +peer0.org2.example.com | [3438 11-19 05:22:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:46178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [35cb 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer1.org1.example.com | [326e 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b2ac0 gate 1574140975642076700 evaluation succeeds +peer1.org2.example.com | [35e7 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 2c 2a 3a 1f 2f 27 f5 2f e6 33 59 48 1f 2b b8 |h,*:./'./.3YH.+.| +peer0.org2.example.com | [3439 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [35cc 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org1.example.com | [326f 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 80 7f 48 ac 25 1b 19 a5 6d b5 c8 4d 98 4c 13 58 |..H.%...m..M.L.X| +peer0.org2.example.com | [343a 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [35cd 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3270 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35e8 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 db 06 53 32 2a 8b 1f 1a ca 77 66 |0D. ...S2*....wf| +peer0.org2.example.com | [343b 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35ce 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [3271 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 02 cf fb a1 20 1c de 53 00 37 f9 f5 45 f2 06 37 |.... ..S.7..E..7| +peer0.org2.example.com | [343c 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [35cf 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3272 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 e9 72 2b b7 02 20 48 1a 2c 9b 64 d7 2f 6a b0 1f |.r+.. H.,.d./j..| +peer0.org2.example.com | [343d 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [35d0 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3273 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000030 3f 5b 85 a6 89 70 16 e9 27 8c 61 fd b2 82 76 d3 |?[...p..'.a...v.| +peer0.org2.example.com | [343e 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [35d1 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | 00000040 74 27 b1 70 7b 43 |t'.p{C| +peer0.org2.example.com | [343f 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [35d2 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [3274 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | [35e9 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485b810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3440 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [35d3 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | [35ea 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485b810 gate 1574140974732745100 evaluation succeeds +peer0.org2.example.com | [3441 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [35d4 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | [35eb 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3442 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83a50 gate 1574140971947506200 evaluation starts +peer0.org1.example.com | [35d5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | [35ec 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3443 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35d6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [35ed 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3444 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83a50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [35d7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [3275 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35ee 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3445 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [35d8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [3276 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [35ef 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3446 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83a50 principal evaluation fails +peer0.org1.example.com | [35d9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [3277 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | [35f0 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3447 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83a50 gate 1574140971947506200 evaluation fails +peer0.org1.example.com | [35da 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [35f1 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3448 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [35db 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [3278 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | [35f2 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3449 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [35dc 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | [35f3 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [344a 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [35dd 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | [35f4 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [344b 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83fc0 gate 1574140971947843900 evaluation starts +peer0.org1.example.com | [35de 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | [35f5 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [344c 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83fc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35df 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [35f6 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [344d 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83fc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [35e0 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [3279 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35f7 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [344e 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83fc0 principal matched by identity 0 +peer0.org1.example.com | [35e1 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [327a 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35f8 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [344f 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer0.org1.example.com | [35e2 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [327b 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35f9 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer0.org1.example.com | [35e3 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [327c 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [35fa 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3450 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer0.org1.example.com | [35e4 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [327d 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35fb 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer0.org1.example.com | [35e5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [327e 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35fc 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer0.org1.example.com | [35e6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [327f 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [35fd 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer0.org1.example.com | [35e7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3280 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35fe 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer0.org1.example.com | [35e8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [3281 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ff 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3451 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83fc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [35e9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3282 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [3600 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3452 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f83fc0 gate 1574140971947843900 evaluation succeeds +peer0.org1.example.com | [35ea 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3283 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [3601 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3453 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3284 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35eb 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [3602 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [3454 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3285 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [35ec 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [3603 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3455 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3286 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151038 +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [3604 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3456 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3287 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 001452C08B42972EA956E488E5B804808453EE2BFD4B8A5040C2CB0BF583E691 +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [3605 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3457 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3288 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [3606 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3458 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3289 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org2.example.com | [3607 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3459 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [328a 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [3608 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [345a 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [328b 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [3609 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345b 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [328c 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org2.example.com | [360a 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345c 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [328d 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org2.example.com | [360b 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345d 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [328e 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | [360c 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345e 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [328f 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org2.example.com | [360d 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345f 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [3290 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org2.example.com | [3460 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [360e 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3291 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org2.example.com | [3461 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [360f 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3292 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 1g== +peer0.org2.example.com | [3462 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3610 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3293 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3463 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3611 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.8Z grpc.peer_address=172.18.0.9:56082 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=106.4µs +peer1.org1.example.com | [3294 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [35ed 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [3612 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3464 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\206\\e\223\322\314\020\037\215\252\010\222\315" > alive: +peer1.org1.example.com | [3295 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3613 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer0.org2.example.com | [3465 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [3296 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [3614 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer0.org2.example.com | [3466 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3297 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [3615 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.9:56082 +peer0.org2.example.com | [3467 11-19 05:22:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3298 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [3616 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:56082 +peer0.org2.example.com | [3468 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3299 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 14 52 c0 8b 42 97 2e a9 56 e4 88 e5 b8 04 80 |..R..B...V......| +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org2.example.com | [3617 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Obtaining identity +peer1.org1.example.com | 00000010 84 53 ee 2b fd 4b 8a 50 40 c2 cb 0b f5 83 e6 91 |.S.+.K.P@.......| +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer0.org2.example.com | [346a 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [329a 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 76 bf af b4 1f ec 9e 39 3f 48 1c |0D. .v......9?H.| +peer0.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org2.example.com | [3618 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 78 db fc a0 cf 47 02 e0 aa 01 d6 |0D. .x....G.....| +peer0.org2.example.com | [346b 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 c1 e6 be 43 c4 d7 1f 7b 37 35 10 6b cb 74 73 e3 |...C...{75.k.ts.| +peer0.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org2.example.com | 00000010 5b cd 39 48 92 8e 44 98 76 9c ab f1 f0 48 18 5d |[.9H..D.v....H.]| +peer0.org2.example.com | [346c 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 3b b9 33 81 02 20 31 e4 30 72 fb 76 48 eb 8c 04 |;.3.. 1.0r.vH...| +peer0.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org2.example.com | 00000020 e8 29 95 ec 02 20 22 f5 54 ca 51 4c 52 3f 35 45 |.)... ".T.QLR?5E| +peer0.org2.example.com | [346d 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000030 83 64 6c 8c 67 10 94 cd ee d5 62 6b 75 bc 3b 37 |.dl.g.....bku.;7| +peer0.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org2.example.com | 00000030 eb 3c 79 35 ff f4 7e 95 de d8 ab a3 bb f9 d1 f0 |. DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 d1 b0 1b 75 a1 c7 |...u..| +peer0.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org2.example.com | 00000040 f7 79 7e 1c 80 d6 |.y~...| +peer0.org2.example.com | [346f 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [329b 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org2.example.com | [3619 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:56082 +peer0.org2.example.com | [3470 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [329c 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [361a 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:56082 +peer0.org2.example.com | [3471 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [329d 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [35ee 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [361b 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org2.example.com | [3472 11-19 05:22:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [329e 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [35ef 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [361c 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3473 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [329f 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [35f0 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [361d 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00273e9c0, CONNECTING +peer0.org2.example.com | [3474 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a0 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [35f1 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [361e 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56082 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3475 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a1 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35f2 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [361f 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32a2 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [35f3 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [3476 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3620 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [32a3 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [35f4 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [3477 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [32a4 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [35f5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [3478 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [32a6 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3621 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35f6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org2.example.com | [3479 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.7:32984 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [32a7 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3622 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00273e9c0, READY +peer0.org1.example.com | [35f7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [347a 11-19 05:22:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32a5 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3623 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [35f8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [347b 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32a8 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3624 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer0.org1.example.com | [35f9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [347c 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32a9 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3625 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer0.org1.example.com | [35fa 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [35fb 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [347d 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [3626 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.9:7051 +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [347e 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [32aa 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [3627 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer0.org2.example.com | [347f 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [3480 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468fbc0 gate 1574140974139221600 evaluation starts +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [3628 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3481 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468fbc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer1.org1.example.com | [32ac 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3482 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468fbc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [3629 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 dc 26 92 ca 20 e5 bc 1b 2a f0 |0E.!...&.. ...*.| +peer1.org1.example.com | [32ad 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3483 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468fbc0 principal matched by identity 0 +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | 00000010 84 27 ab 8f d8 2d 16 9c c3 8e 9b 89 38 95 b5 6f |.'...-......8..o| +peer0.org2.example.com | [3484 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 14 9b 1e 52 33 81 b6 7f b5 bc bf b7 5a db 2c |_...R3.......Z.,| +peer1.org1.example.com | [32ae 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | 00000020 71 7a c0 2c a1 02 20 5c ae 35 39 a6 a0 ab e0 c1 |qz.,.. \.59.....| +peer0.org2.example.com | 00000010 1f 95 62 d9 52 71 fc ac 93 dc 76 4f 40 0f 06 94 |..b.Rq....vO@...| +peer1.org1.example.com | [32af 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | 00000030 9a 3f a3 35 bd 24 a6 ae cd 7d 32 60 88 49 fc 0f |.?.5.$...}2`.I..| +peer0.org2.example.com | [3485 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 aa 5a 6d 21 8c ab 87 9d 99 39 |0E.!...Zm!.....9| +peer1.org1.example.com | [32b0 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 14 52 c0 8b 42 97 2e a9 56 e4 88 e5 b8 04 80 |..R..B...V......| +peer0.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | 00000040 13 0e 1a a7 e9 9f e1 |.......| +peer0.org2.example.com | 00000010 00 1c b9 e8 40 19 cf aa 41 5e a1 26 fa 9d 28 aa |....@...A^.&..(.| +peer1.org1.example.com | 00000010 84 53 ee 2b fd 4b 8a 50 40 c2 cb 0b f5 83 e6 91 |.S.+.K.P@.......| +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | [362a 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +peer0.org2.example.com | 00000020 68 4c 16 5e 53 02 20 06 b2 ec e0 1f b5 3f 52 27 |hL.^S. ......?R'| +peer1.org1.example.com | [32b1 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 76 bf af b4 1f ec 9e 39 3f 48 1c |0D. .v......9?H.| +peer0.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [362b 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 1a d8 ac 9f 99 9b 6c a0 8a 95 ff 89 78 e5 4b 4e |......l.....x.KN| +peer1.org1.example.com | 00000010 c1 e6 be 43 c4 d7 1f 7b 37 35 10 6b cb 74 73 e3 |...C...{75.k.ts.| +peer0.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | [362c 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | 00000040 1d a4 c9 63 b2 0d ff |...c...| +peer1.org1.example.com | 00000020 3b b9 33 81 02 20 31 e4 30 72 fb 76 48 eb 8c 04 |;.3.. 1.0r.vH...| +peer0.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | [362d 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3486 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468fbc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 83 64 6c 8c 67 10 94 cd ee d5 62 6b 75 bc 3b 37 |.dl.g.....bku.;7| +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [362e 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [3487 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468fbc0 gate 1574140974139221600 evaluation succeeds +peer1.org1.example.com | 00000040 d1 b0 1b 75 a1 c7 |...u..| +peer0.org1.example.com | [35fc 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [362f 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:56082 disconnected +peer0.org2.example.com | [3488 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [32b2 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [35fd 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [3630 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:56082 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=34.5285ms +peer0.org2.example.com | [3489 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [32b3 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35fe 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3631 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [348a 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [32b4 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35ff 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [3632 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [348b 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [32b5 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3600 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org2.example.com | [3633 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [348c 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org1.example.com | [32b6 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3601 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org2.example.com | [3634 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [348d 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org1.example.com | [32b7 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3602 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [3635 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [348e 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [32b8 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3603 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [3636 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3490 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +peer1.org1.example.com | [32b9 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3604 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org2.example.com | [3637 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [348f 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer1.org1.example.com | [32ba 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3605 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [3638 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3491 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [32bb 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [3639 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3493 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer1.org1.example.com | [32bc 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [363a 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3492 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer1.org1.example.com | [32bd 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [363b 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3494 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org1.example.com | [32be 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [363c 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3495 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer1.org1.example.com | [32bf 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [3496 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer1.org2.example.com | [363d 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [32c0 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [3497 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [363e 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [32c1 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [3498 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0033a27c0 env 0xc002796190 txn 0 +peer1.org2.example.com | [363f 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489f3a0 gate 1574140974864082000 evaluation starts +peer1.org1.example.com | [32c2 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +peer0.org2.example.com | [3499 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002796190 +peer1.org2.example.com | [3640 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489f3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [32c3 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [349a 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +peer1.org2.example.com | [3641 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489f3a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [32c4 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +peer0.org2.example.com | [349b 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [3642 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489f3a0 principal matched by identity 0 +peer1.org1.example.com | [32c5 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | [349c 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [3643 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer1.org1.example.com | [32c6 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +peer0.org2.example.com | [349d 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer1.org1.example.com | [32c7 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +peer0.org2.example.com | [349e 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3644 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer1.org1.example.com | [32c8 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [349f 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer1.org1.example.com | [32c9 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3606 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [32ca 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3607 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org2.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer1.org1.example.com | [32cb 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3608 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer1.org2.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer1.org1.example.com | [32cc 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e9c50 gate 1574140975838481100 evaluation starts +peer0.org1.example.com | [3609 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer1.org1.example.com | [32cd 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e9c50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [360a 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer1.org2.example.com | [3645 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489f3a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [32ce 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e9c50 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [360b 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer1.org2.example.com | [3646 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489f3a0 gate 1574140974864082000 evaluation succeeds +peer0.org1.example.com | [360c 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer1.org2.example.com | [3647 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [360d 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [32cf 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e9c50 principal matched by identity 0 +peer0.org2.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer1.org2.example.com | [3648 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [360e 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [32d0 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 09 ab be 7f b4 68 fe 58 15 ee c9 67 cf a9 f8 |......h.X...g...| +peer0.org2.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer1.org2.example.com | [3649 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [360f 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000010 25 58 4a 5e 05 21 2e 74 d5 71 7f 0b ca 0e 20 89 |%XJ^.!.t.q.... .| +peer0.org2.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer1.org2.example.com | [364a 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [32d1 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 4c 8f 70 f4 18 25 6d 1c e9 78 c9 |0D. ~L.p..%m..x.| +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | fQ== +peer1.org2.example.com | [364b 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 9b 56 7a b5 36 99 02 00 b0 e3 2f bc e5 14 33 f1 |.Vz.6...../...3.| +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [364c 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000020 e3 42 59 cf 02 20 5f dd d2 1a e5 6b 82 c5 39 9e |.BY.. _....k..9.| +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [34a0 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +peer1.org2.example.com | [364d 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000030 66 99 b9 40 7d 8b 2f e2 86 f2 0d 41 95 e3 b9 ff |f..@}./....A....| +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | [34a1 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [364e 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000040 ed 74 eb 90 82 07 |.t....| +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [34a2 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [364f 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [32d2 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [34a3 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 17 9f c3 74 1b 52 69 8b 1b 61 04 bd 5f 6e fc |....t.Ri..a.._n.| +peer1.org2.example.com | [3650 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32d3 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e9c50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | 00000010 23 3f 14 b1 da 98 c7 eb 83 d0 99 5b 69 2c d6 fb |#?.........[i,..| +peer1.org2.example.com | [3651 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32d4 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e9c50 gate 1574140975838481100 evaluation succeeds +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org2.example.com | [34a4 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 c1 b9 60 ac e7 e3 8e 4c 35 f5 e3 |0D. R..`....L5..| +peer1.org2.example.com | [3652 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | 00000010 d0 57 4c 17 2b 63 e9 4e 0f 90 1b 11 66 33 ac 45 |.WL.+c.N....f3.E| +peer1.org2.example.com | [3653 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [32d5 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org2.example.com | 00000020 36 ba 41 a0 02 20 68 1d 3d 55 3a d4 2c 2e 3b ec |6.A.. h.=U:.,.;.| +peer1.org2.example.com | [3654 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32d6 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | 00000030 b5 d4 40 5a 67 23 76 05 76 b9 63 e3 ff 94 86 d4 |..@Zg#v.v.c.....| +peer1.org2.example.com | [3655 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32d7 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org2.example.com | 00000040 35 94 c1 49 86 f1 |5..I..| +peer1.org2.example.com | [3656 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32d8 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org2.example.com | [34a5 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [3657 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [32d9 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [34a6 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc000306000, header channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +peer1.org2.example.com | [3658 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [32da 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1574140895837304100 51 {} [] 0} +peer0.org1.example.com | [3610 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org2.example.com | [34a7 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [3659 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32db 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3611 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org2.example.com | [34a8 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [365a 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\203\372#4\325ap\230a\245\002 n\304\367\340\244\006\376\353\025\337v\331\345T\236\313\256\377\241\207!\323\010b\323&\005n\033iF\177" > +peer1.org1.example.com | [32dc 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3612 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [34a9 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [365b 11-19 05:22:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer1.org1.example.com | [32dd 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3613 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [34aa 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [365c 11-19 05:22:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org1.example.com | [32de 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3614 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [34ab 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [365d 11-19 05:22:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +peer1.org1.example.com | [32df 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3615 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [34ac 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [365e 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:57.035Z grpc.peer_address=172.18.0.9:56090 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=156.7µs +peer1.org1.example.com | [32e0 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3616 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [34ad 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [32e1 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32e2 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [365f 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3617 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [34ae 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [32e3 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3660 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20415E889B8E6788E10A...9E08543A893CC5DCBDFB5A53C192B889 +peer1.org1.example.com | [32e4 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32e5 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [34af 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [3618 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [32e6 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3619 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [34b0 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [3661 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FBE856D84BAE1F86CE1C307F54ED85D4376C6A194DC57A0504648DD411BB6DD +peer1.org1.example.com | [32e7 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [361a 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [34b1 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [3662 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.9:56090 +peer1.org1.example.com | [32e8 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [361b 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [34b2 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [3663 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:56090 +peer1.org1.example.com | [32e9 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [361c 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer0.org2.example.com | [34b3 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [3664 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [361d 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer0.org2.example.com | [34b4 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer1.org1.example.com | [32eb 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [361e 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer0.org2.example.com | [34b5 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [3665 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 18 f8 05 e2 f1 d1 a0 67 ca 4a 04 |0D. Z.......g.J.| +peer1.org1.example.com | [32ec 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [361f 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer0.org2.example.com | [34b6 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | 00000010 53 f9 08 0e 28 2b c2 28 81 bc 2c 26 68 a1 1a 5a |S...(+.(..,&h..Z| +peer1.org1.example.com | [32ed 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3620 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [34b7 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | 00000020 c7 1b de 84 02 20 0f e0 01 11 e3 16 ba 29 b9 14 |..... .......)..| +peer1.org1.example.com | [32ee 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3621 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [34b8 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | 00000030 78 dd d2 07 2b 15 4c f4 1d 5b 9f 4b fc 16 7c 42 |x...+.L..[.K..|B| +peer1.org1.example.com | [32ef 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3622 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [34b9 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | 00000040 25 6c 24 d4 d1 32 |%l$..2| +peer1.org1.example.com | [32f0 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a070 gate 1574140975863269200 evaluation starts +peer0.org1.example.com | [3623 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [34ba 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [3666 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:56090 +peer1.org1.example.com | [32f1 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a070 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3624 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [34bb 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [3667 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:56090 +peer1.org1.example.com | [32f2 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a070 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3625 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [34bc 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3668 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [32f3 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a070 principal matched by identity 0 +peer0.org1.example.com | [3626 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [34bd 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [3669 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 30 73 65 03 73 e2 92 33 1c a7 51 52 b2 19 7f |}0se.s..3..QR...| +peer1.org1.example.com | [32f4 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer0.org1.example.com | [3627 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [34be 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | 00000010 06 af 95 9c 8c 0f ac f0 2a f2 3b 13 5a e3 7d 8e |........*.;.Z.}.| +peer1.org1.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer0.org1.example.com | [3628 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [34bf 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [366a 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 8d 60 60 24 b3 23 89 62 20 3c a1 |0D. i.``$.#.b <.| +peer1.org1.example.com | [32f5 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer0.org1.example.com | [3629 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [34c0 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | 00000010 ff 26 ad 04 56 62 68 bf 30 9f 24 52 04 ce a7 15 |.&..Vbh.0.$R....| +peer1.org1.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer0.org1.example.com | [362a 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [34c1 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | 00000020 6b 49 1b 65 02 20 1c 23 38 23 13 54 ae 9f 53 99 |kI.e. .#8#.T..S.| +peer1.org1.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer0.org1.example.com | [362b 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [34c2 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | 00000030 a9 13 53 da 92 fe d7 4c 68 bb ab 81 6d b5 09 7f |..S....Lh...m...| +peer1.org1.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer0.org1.example.com | [362c 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [34c3 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | 00000040 10 ae 59 11 8e cc |..Y...| +peer1.org1.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer0.org1.example.com | [362d 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [34c4 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [366b 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32f6 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a070 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [362e 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [34c5 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [366c 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org1.example.com | [32f7 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a070 gate 1574140975863269200 evaluation succeeds +peer0.org1.example.com | [362f 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [34c6 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [366d 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org1.example.com | [32f8 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3630 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [34c7 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [366e 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32f9 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3631 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [34c8 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer1.org2.example.com | [366f 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32fa 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3632 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [34c9 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer1.org2.example.com | [3670 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32fb 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3633 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [34ca 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org2.example.com | [3671 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32fc 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3634 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34cb 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3672 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32fe 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3635 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [34cc 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3673 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [32fd 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3636 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [34cd 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [3674 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32ff 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3637 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [34ce 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [3301 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3675 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3638 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [34cf 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [3302 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3676 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3639 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [34d0 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [3300 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3677 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [363a 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [34d1 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [3303 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3678 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [363b 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [34d2 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [3304 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3679 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [363c 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [34d3 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer1.org1.example.com | [3305 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [367a 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [363d 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [34d4 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3306 11-19 05:22:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [367b 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820290 gate 1574140975286252000 evaluation starts +peer0.org1.example.com | [363e 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [34d5 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | [3307 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [367c 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820290 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [363f 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [34d6 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +peer1.org1.example.com | [3308 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [367d 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820290 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3640 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [34d7 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6660 gate 1574140974150836300 evaluation starts +peer1.org1.example.com | [3309 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [367e 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820290 principal matched by identity 0 +peer0.org1.example.com | [3641 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [34d8 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6660 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [330a 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [367f 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | [3642 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34d9 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6660 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [330c 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [34da 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3643 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [330d 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3680 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | [34db 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6660 processing identity 1 with bytes of 1151ae0 +peer0.org1.example.com | [3644 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | [330e 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [34dc 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | [3645 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | [330f 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [34dd 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [3646 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | [3310 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [34de 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3647 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3312 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34df 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3648 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [3681 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820290 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [330b 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | [34e0 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | [3649 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [3682 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820290 gate 1574140975286252000 evaluation succeeds +peer1.org1.example.com | [3313 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e1 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [364a 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [3683 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3314 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e2 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6660 principal matched by identity 1 +peer0.org1.example.com | [364b 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3684 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3315 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e3 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +peer0.org1.example.com | [364c 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [3685 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3316 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...| +peer0.org1.example.com | [364d 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [3686 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3317 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [34e4 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +peer0.org1.example.com | [364e 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [3687 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3318 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +peer0.org1.example.com | [364f 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [3688 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3319 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +peer0.org1.example.com | [3650 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [3689 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3311 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +peer0.org1.example.com | [3651 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [368a 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [331a 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 46 bf 84 1c 8c 35 |F....5| +peer0.org1.example.com | [3652 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [368b 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [331b 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e5 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6660 principal evaluation succeeds for identity 1 +peer0.org1.example.com | [3653 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [368c 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [331c 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e6 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6660 gate 1574140974150836300 evaluation succeeds +peer0.org1.example.com | [3654 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [368d 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [331d 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e7 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3655 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [368e 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820e80 gate 1574140975292614400 evaluation starts +peer1.org1.example.com | [331e 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34e8 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3656 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [368f 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820e80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [331f 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [34e9 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [3657 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [3690 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820e80 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3320 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151039 +peer0.org2.example.com | [34ea 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +peer0.org1.example.com | [3658 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [3691 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820e80 principal matched by identity 0 +peer1.org1.example.com | [3321 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 139670E9D4DE9BC07D4B9FEEAADEB8B61A67B2BD746C26136EF5A3BFBD592AB7 +peer0.org2.example.com | [34eb 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c7050 gate 1574140974151711100 evaluation starts +peer0.org1.example.com | [3659 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [3692 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | [3322 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [34ec 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c7050 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [365a 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [3323 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [34ed 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c7050 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [365b 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [3693 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | [3324 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [34ee 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c7050 principal matched by identity 0 +peer0.org1.example.com | [365c 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | [3325 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [34ef 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +peer0.org1.example.com | [365d 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | [3326 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR| +peer0.org1.example.com | [365e 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | [3327 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [34f0 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +peer0.org1.example.com | [365f 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3328 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +peer0.org1.example.com | [3660 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [3694 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820e80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3329 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +peer0.org1.example.com | [3661 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [3695 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002820e80 gate 1574140975292614400 evaluation succeeds +peer1.org1.example.com | [332a 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +peer0.org1.example.com | [3662 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [3696 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [332b 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 28 40 4c 89 f5 38 |(@L..8| +peer0.org1.example.com | [3663 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [3697 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [332c 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34f1 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c7050 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3664 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3698 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [332d 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34f2 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c7050 gate 1574140974151711100 evaluation succeeds +peer0.org1.example.com | [3665 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3699 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [332e 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [34f3 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3666 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [369a 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [332f 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34f4 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3667 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [3330 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [369b 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [34f5 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org1.example.com | [3668 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer1.org1.example.com | [3331 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0930 gate 1574140975934636800 evaluation starts +peer1.org2.example.com | [369c 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34f6 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org1.example.com | [3669 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [3332 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [369d 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [34f7 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [366a 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [3333 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0930 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [369e 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34f8 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [366b 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [3334 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0930 principal matched by identity 0 +peer1.org2.example.com | [369f 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34f9 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [366c 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [3335 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | [36a0 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34fa 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [366d 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [36a1 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34fb 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [366e 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [3336 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | [36a2 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [34fc 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [366f 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Obtaining identity +peer0.org2.example.com | [34fd 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3670 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer1.org2.example.com | [36a4 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34fe 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3671 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | [36a5 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [34ff 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3672 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [36a6 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3500 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [3673 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [3337 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0930 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [36a7 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3502 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3674 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [3338 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0930 gate 1574140975934636800 evaluation succeeds +peer1.org2.example.com | [36a8 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3503 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3675 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [3339 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36a9 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3504 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [3676 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [333a 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36aa 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3501 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3677 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [333b 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [36ab 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3505 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3678 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [333c 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [36ac 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2e0c0 gate 1574140975312016700 evaluation starts +peer0.org2.example.com | [3506 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3679 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [333d 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36ad 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2e0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3507 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [367a 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [333e 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36ae 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2e0c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3509 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [367b 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org1.example.com | [333f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [36af 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2e0c0 principal matched by identity 0 +peer0.org2.example.com | [350a 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer0.org1.example.com | [367c 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [3340 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [36b0 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | [3508 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [367d 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [3341 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [350b 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer0.org1.example.com | [367e 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3342 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [36b1 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | [350d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [367f 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3343 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | [350e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3680 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3344 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | [350f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3681 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | [3510 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3682 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3345 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3511 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3683 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 gate 1574140974258118800 evaluation starts +peer1.org1.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer1.org2.example.com | [36b2 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2e0c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3512 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [3684 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer1.org2.example.com | [36b3 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2e0c0 gate 1574140975312016700 evaluation succeeds +peer0.org2.example.com | [3513 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3685 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer1.org2.example.com | [36b4 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3514 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3687 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer1.org2.example.com | [36b5 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3688 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 principal evaluation fails +peer0.org2.example.com | [3515 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3346 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [36b6 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3686 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.262Z grpc.peer_address=172.18.0.9:44810 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=224.7µs +peer0.org2.example.com | [3516 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [36b7 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3689 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 gate 1574140974258118800 evaluation fails +peer0.org2.example.com | [3517 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [36b8 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3347 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 10 e1 a3 82 e7 0f f0 42 d5 8b |0E.!.........B..| +peer0.org1.example.com | [368a 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3518 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | 00000010 a6 5c 50 11 b3 23 7c 8a 3b 56 f7 48 bc 49 74 e6 |.\P..#|.;V.H.It.| +peer1.org2.example.com | [36b9 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [368b 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3519 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | 00000020 95 14 73 0b 18 02 20 01 c5 ec 67 7e a7 dd 27 de |..s... ...g~..'.| +peer1.org2.example.com | [36ba 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [368c 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [351a 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | 00000030 a4 ad ab fd 81 41 ed 0b f7 0a 6e 10 2c 4c 20 03 |.....A....n.,L .| +peer1.org2.example.com | [36bb 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [368d 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 gate 1574140974264307300 evaluation starts +peer0.org2.example.com | [351b 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | 00000040 1a 4f 2d 36 f3 6a d2 |.O-6.j.| +peer1.org2.example.com | [36bc 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [368e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [351c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [3348 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [36bd 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [368f 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [351d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [3349 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [36be 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3690 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 principal matched by identity 0 +peer0.org2.example.com | [351e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [334a 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36bf 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3691 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org2.example.com | [351f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [334b 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c0 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org2.example.com | [3520 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [334c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [36c1 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f310 gate 1574140975321893900 evaluation starts +peer0.org1.example.com | [3692 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org2.example.com | [3521 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [334d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36c2 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org2.example.com | [3522 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [334e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [36c3 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f310 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org2.example.com | [3523 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [334f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [36c4 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f310 principal matched by identity 0 +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org2.example.com | [3524 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [3350 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c5 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org2.example.com | [3525 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [3351 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [3693 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3526 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3352 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c6 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | [3694 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 gate 1574140974264307300 evaluation succeeds +peer0.org2.example.com | [3527 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3353 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | [3695 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3528 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [3354 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | [3696 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3529 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3355 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | [3697 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [352a 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3356 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [3698 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [352b 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [3357 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [36c7 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f310 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3699 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [352c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [3358 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36c8 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f310 gate 1574140975321893900 evaluation succeeds +peer0.org1.example.com | [369a 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [3359 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [36c9 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [369b 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [335b 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36ca 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [369c 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [335c 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36cb 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [369d 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer1.org1.example.com | [335d 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [36cc 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [369e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [335e 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [36cd 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [369f 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 gate 1574140974268764500 evaluation starts +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | [335f 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [36ce 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36a0 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer1.org1.example.com | [3360 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003377410 gate 1574140975962705500 evaluation starts +peer1.org2.example.com | [36cf 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [36a1 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer1.org1.example.com | [3361 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003377410 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36d0 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151037 +peer0.org1.example.com | [36a2 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 principal matched by identity 0 +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | [3362 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003377410 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [36d1 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A8AEA15D9702B5C0BBC92C40EC1D007FB698817D8C81256E11CCB49E9E91D907 +peer0.org1.example.com | [36a3 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer1.org1.example.com | [3363 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003377410 principal matched by identity 0 +peer1.org2.example.com | [36d2 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org2.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer1.org1.example.com | [335a 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [36d3 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [36a4 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org2.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer1.org1.example.com | [3364 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | [36d4 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org2.example.com | 1g== +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [36d5 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3365 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | [36d6 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org2.example.com | [352d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Obtaining identity +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org2.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer1.org2.example.com | [36d8 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36a5 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | [36d9 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [36a6 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 gate 1574140974268764500 evaluation succeeds +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [36a7 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36da 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer1.org1.example.com | [3366 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [36a8 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36db 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [3367 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003377410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [36a9 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [36dc 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer1.org1.example.com | [3368 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003377410 gate 1574140975962705500 evaluation succeeds +peer0.org1.example.com | [36aa 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [36dd 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer1.org1.example.com | [3369 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [36ab 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36de 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer1.org1.example.com | [336a 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [36ac 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36df 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer1.org1.example.com | [336b 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer0.org1.example.com | [36ad 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36e0 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer1.org1.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer0.org1.example.com | [36ae 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [36e1 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer1.org1.example.com | [336c 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [36af 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [36e2 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [336d 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer0.org1.example.com | [36b0 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [36e3 11-19 05:22:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [352e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer0.org1.example.com | [36b1 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 gate 1574140974275783000 evaluation starts +peer1.org2.example.com | [36e4 11-19 05:22:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [352f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer0.org1.example.com | [36b2 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36e5 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [3530 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer0.org1.example.com | [36b3 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [36e6 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3531 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer0.org1.example.com | [36b4 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 principal matched by identity 0 +peer1.org2.example.com | [36e7 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3532 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [336e 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [36b5 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer1.org2.example.com | [36e8 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3533 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [336f 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer1.org2.example.com | [36e9 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3534 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3370 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36b6 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer1.org2.example.com | [36ea 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3535 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3371 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer1.org2.example.com | [36eb 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3536 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | [3372 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer1.org2.example.com | [36ec 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3537 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [3373 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer1.org2.example.com | [36ed 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3538 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3374 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer1.org2.example.com | [36ee 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3539 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [36b7 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3375 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [36ef 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [353a 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [36b8 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 gate 1574140974275783000 evaluation succeeds +peer1.org1.example.com | [3376 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36f0 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [353b 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [36b9 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3377 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36f1 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [36ba 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3378 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [36f2 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [36bb 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3379 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [36f3 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [36bc 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [337a 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [36f4 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | [36bd 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org1.example.com | [337b 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ac10 gate 1574140975966619700 evaluation starts +peer1.org2.example.com | [36f5 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [36be 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [337c 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ac10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [36f6 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [36bf 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [337d 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ac10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [36f7 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36c0 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [337e 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ac10 principal matched by identity 0 +peer0.org2.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer1.org2.example.com | [36f8 11-19 05:22:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [36c1 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org1.example.com | [337f 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer0.org2.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [36f9 11-19 05:22:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151038 +peer0.org1.example.com | [36c2 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer1.org2.example.com | [36fa 11-19 05:22:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AA06B03491A987232C0FE4A72C304C139CA6FA36D1DD60C38A040E749DA8451D +peer0.org1.example.com | [36c3 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer1.org1.example.com | [3380 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer0.org2.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [36fb 11-19 05:22:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [36c4 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer0.org2.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer1.org2.example.com | [36fc 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [36c5 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer0.org2.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer1.org2.example.com | [36fd 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [36c6 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [36fe 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36c7 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer0.org2.example.com | [353c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [36ff 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [36c8 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [3381 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ac10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [353d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [3700 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [36c9 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [3382 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ac10 gate 1574140975966619700 evaluation succeeds +peer0.org2.example.com | [353e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3701 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ca 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003624240, CONNECTING +peer1.org1.example.com | [3383 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [353f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [3702 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [36cb 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3384 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [350c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3703 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [36cc 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3385 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3540 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3704 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3386 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [36cd 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3705 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3541 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3387 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36ce 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [3706 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3542 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes +peer1.org1.example.com | [3388 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36cf 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3707 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3543 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3389 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [36d0 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org2.example.com | [3708 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3544 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org1.example.com | [338a 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer0.org1.example.com | [36d1 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org2.example.com | [3709 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3545 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org1.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer0.org1.example.com | [36d2 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:44810 +peer1.org2.example.com | [370a 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3546 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [338b 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer0.org1.example.com | [36d3 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44810 +peer1.org2.example.com | [370b 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3547 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer0.org1.example.com | [36d4 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [370c 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3548 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org1.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer0.org1.example.com | [36d5 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3549 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [370d 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer0.org1.example.com | [36d6 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [370e 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer0.org1.example.com | [36d7 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [370f 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [338c 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36d8 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [3710 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [338d 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36d9 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org2.example.com | [3711 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [338e 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [338f 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3390 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3391 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36da 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36db 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36dc 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +peer0.org2.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +peer0.org1.example.com | [36dd 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [36de 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [36df 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 gate 1574140974307034000 evaluation starts +peer0.org1.example.com | [36e0 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [36e1 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3392 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [36e2 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 principal matched by identity 0 +peer1.org1.example.com | [3393 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | [3712 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [36e3 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer0.org2.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +peer1.org2.example.com | [3713 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer1.org1.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer0.org2.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +peer1.org2.example.com | [3714 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [36e4 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 36 dd 56 67 a5 70 32 b9 22 67 |0E.!..6.Vg.p2."g| +peer1.org1.example.com | [3395 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3715 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cab0 gate 1574140975486935400 evaluation starts +peer0.org1.example.com | 00000010 75 70 18 c0 e7 29 21 94 17 aa 1f ef 8b 84 09 85 |up...)!.........| +peer1.org2.example.com | [3716 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cab0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer0.org2.example.com | [354a 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | 00000020 61 24 fe f5 01 02 20 41 60 12 1f 53 36 63 b5 c2 |a$.... A`..S6c..| +peer1.org2.example.com | [3717 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cab0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer0.org2.example.com | [354b 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | 00000030 ed de 4d 88 24 8c 56 d8 b5 24 55 40 5d 3d c5 ff |..M.$.V..$U@]=..| +peer1.org2.example.com | [3718 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cab0 principal matched by identity 0 +peer1.org1.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer0.org1.example.com | 00000040 aa 4f 7d 2c e6 40 7b |.O},.@{| +peer1.org2.example.com | [3719 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer1.org1.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer0.org2.example.com | [354c 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [36e5 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer1.org1.example.com | [3396 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [354d 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [36e6 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 gate 1574140974307034000 evaluation succeeds +peer1.org2.example.com | [371a 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer1.org1.example.com | [3397 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [354e 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [36e7 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer1.org1.example.com | [3398 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [354f 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [36e8 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer1.org1.example.com | [3399 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3550 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [36e9 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer1.org1.example.com | [339a 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3551 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [36ea 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer1.org2.example.com | [371b 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cab0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3552 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [36eb 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44810 +peer1.org2.example.com | [371c 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cab0 gate 1574140975486935400 evaluation succeeds +peer1.org1.example.com | [339b 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3553 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [36ec 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44810 +peer1.org2.example.com | [371d 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [339c 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [36ed 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [339d 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [36ee 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [36ef 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [371e 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [371f 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [36f0 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [339e 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3720 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [36f1 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003624240, READY +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [339f 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3721 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36f2 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [33a0 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bb460 gate 1574140976002528200 evaluation starts +peer1.org2.example.com | [3722 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36f3 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [33a1 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bb460 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3723 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [36f4 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer1.org1.example.com | [33a2 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bb460 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3724 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer0.org1.example.com | [36f6 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [33a3 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bb460 principal matched by identity 0 +peer1.org2.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer0.org1.example.com | [36f7 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer1.org1.example.com | [33a4 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer1.org2.example.com | [3725 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer0.org1.example.com | [36f8 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer1.org2.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer0.org1.example.com | [36f5 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org2.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer1.org1.example.com | [33a5 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer1.org2.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer0.org1.example.com | [36f9 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer0.org2.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer1.org1.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer1.org2.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer0.org1.example.com | [36fb 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer1.org2.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer0.org1.example.com | [36fc 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0003cf1c0 env 0xc002913cc0 txn 0 +peer0.org2.example.com | [3554 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer1.org1.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer1.org2.example.com | [3726 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36fa 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051 +peer0.org2.example.com | [3555 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer1.org1.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer1.org2.example.com | [3727 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36fd 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [3556 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [33a6 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bb460 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3728 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36fe 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 194ms +peer0.org2.example.com | [3557 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [33a7 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bb460 gate 1574140976002528200 evaluation succeeds +peer1.org2.example.com | [3729 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [36ff 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [3558 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [33a8 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [372a 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +peer0.org1.example.com | [3700 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [3559 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [33a9 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +peer0.org1.example.com | [3701 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [355a 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [33aa 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [372b 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +peer0.org1.example.com | [3702 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer0.org2.example.com | [355b 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [33ab 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +peer0.org1.example.com | [3703 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [355c 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [33ac 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +peer0.org1.example.com | [3704 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [355d 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer1.org1.example.com | [33ad 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +peer0.org1.example.com | [3705 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [355e 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer1.org1.example.com | [33ae 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | 00000040 48 c8 4f cd b1 c7 f7 |H.O....| +peer0.org1.example.com | [3706 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer0.org2.example.com | [355f 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org1.example.com | [33af 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer0.org1.example.com | [3707 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [372c 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[]}, deadMembers={[]} +peer0.org2.example.com | [3560 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org1.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer0.org1.example.com | [3708 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [372d 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3561 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [33b0 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer0.org1.example.com | [3709 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44810 disconnected +peer1.org2.example.com | [372e 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3562 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer0.org1.example.com | [370c 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.294Z grpc.peer_address=172.18.0.9:44810 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.5689ms +peer1.org2.example.com | [372f 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3563 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer0.org1.example.com | [370a 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3730 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3564 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer0.org1.example.com | [370b 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer1.org1.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer1.org1.example.com | [33b1 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [370d 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33b2 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3731 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3565 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [370e 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33b3 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3732 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3566 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [370f 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [33b4 11-19 05:22:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3733 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer0.org2.example.com | [3567 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [33b5 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer0.org2.example.com | [3568 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [33b6 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3734 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer0.org2.example.com | [3569 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [33b7 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer0.org2.example.com | [356a 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [33b8 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer0.org2.example.com | [356b 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [33b9 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer0.org2.example.com | [356c 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer1.org1.example.com | [33ba 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer0.org2.example.com | [356d 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer1.org1.example.com | [33bb 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3735 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | [356e 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer1.org1.example.com | [33bc 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | [356f 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [33bd 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3736 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 37 11 3f 05 bd 9d ab a0 83 fd |0E.!..7.?.......| +peer0.org1.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org2.example.com | [3570 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [33be 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 19 85 c7 ce 18 b6 21 1e 3a 90 4e 9d 3f 1b dc b6 |......!.:.N.?...| +peer0.org1.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org2.example.com | [3571 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [33bf 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 1c 94 bc 6b a6 02 20 79 10 bd b5 01 e4 42 3a 55 |...k.. y.....B:U| +peer0.org1.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org2.example.com | [3572 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [33c0 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 51 22 f1 84 58 41 0c 23 f6 57 22 a3 ca 6c f2 a7 |Q"..XA.#.W"..l..| +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3573 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [33c1 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000040 e7 79 e0 14 1b 9e e8 |.y.....| +peer0.org1.example.com | [3710 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [3574 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [33c2 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3737 11-19 05:22:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3712 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [3575 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [33c3 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3738 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3576 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [3714 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [33c4 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003108c40 gate 1574140976184645700 evaluation starts +peer1.org2.example.com | [3739 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3577 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3715 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33c5 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003108c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [373a 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3578 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [3716 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [33c6 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003108c40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [373b 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3579 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [3713 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [33c7 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003108c40 principal matched by identity 0 +peer1.org2.example.com | [373c 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [357a 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [3717 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33c8 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | [373d 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [357b 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [3711 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [373e 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [357c 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [3718 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [373f 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [357d 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [3719 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [33c9 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | [3740 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [357e 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [371a 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | [3741 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36m[357f 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [371b 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | [3742 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3580 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [371c 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | [3743 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3581 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3744 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [371d 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [3582 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [33ca 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003108c40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3745 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476e180 gate 1574140975502483900 evaluation starts +peer1.org2.example.com | [3746 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476e180 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3720 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [33cb 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003108c40 gate 1574140976184645700 evaluation succeeds +peer1.org2.example.com | [3747 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476e180 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3721 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [33cc 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3748 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476e180 principal matched by identity 0 +peer0.org2.example.com | [3583 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3722 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [33cd 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3749 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer0.org2.example.com | [3584 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3723 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0032101c0)} +peer1.org1.example.com | [33ce 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer0.org2.example.com | [3585 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [3724 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [33cf 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [374a 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer0.org2.example.com | [3586 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [3725 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [33d0 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer0.org2.example.com | [3587 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3726 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [33d1 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer0.org2.example.com | [3588 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3727 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org1.example.com | [33d2 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer0.org2.example.com | [3589 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3728 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org1.example.com | [33d3 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer0.org2.example.com | [358a 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3729 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org2.example.com | [374b 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476e180 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [33d4 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [358b 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [372a 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer1.org2.example.com | [374c 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476e180 gate 1574140975502483900 evaluation succeeds +peer1.org1.example.com | [33d5 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [358c 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [372b 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer1.org2.example.com | [374d 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [33d6 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [358d 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [372c 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [374e 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [33d7 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [358e 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [372d 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100F1801 +peer1.org2.example.com | [374f 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [33d8 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [358f 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [372e 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 219203EFC0539A9C02D4D278C4D897CD6F60F01B6070A2D2EAE58ADF5C15906F +peer1.org2.example.com | [3750 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [33d9 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3590 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [372f 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer1.org2.example.com | [3751 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33da 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3591 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [371e 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3752 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33db 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3592 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [3730 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3753 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [33dc 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +peer0.org2.example.com | [3593 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [3731 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3754 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 62 34 b9 23 38 2c b1 97 b1 6f 2f 16 8b e0 34 |.b4.#8,...o/...4| +peer1.org1.example.com | 00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +peer0.org2.example.com | [3594 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3732 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 99 68 ad 01 9f 37 5d 4d 28 f1 ca 80 69 6d bd 9a |.h...7]M(...im..| +peer1.org1.example.com | [33dd 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +peer0.org2.example.com | [3595 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3733 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3755 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 75 94 96 e5 15 c3 ed 97 5a 93 66 |0D. Iu.......Z.f| +peer1.org1.example.com | 00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +peer0.org2.example.com | [3596 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [3734 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000010 7b 3b 58 bf 85 09 cf d8 42 1a 98 fb 9e b1 20 f8 |{;X.....B..... .| +peer1.org1.example.com | 00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +peer0.org2.example.com | [3597 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [3735 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 gate 1574140974394508300 evaluation starts +peer1.org2.example.com | 00000020 d8 ce 01 e1 02 20 63 bd 05 d5 d0 67 da 21 de 3c |..... c....g.!.<| +peer1.org1.example.com | 00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +peer0.org2.example.com | [3598 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [3736 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 3f c8 25 1d a1 f0 20 c7 8e 58 14 37 33 9b f9 7a |?.%... ..X.73..z| +peer1.org1.example.com | 00000040 17 d6 e3 e0 b8 28 |.....(| +peer0.org2.example.com | [3599 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [3737 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000040 33 ae 24 46 14 0e |3.$F..| +peer1.org1.example.com | [33de 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [359a 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [3738 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [3756 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [359b 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [3739 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 principal evaluation fails +peer1.org2.example.com | [3757 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33df 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 4a 87 68 33 71 50 f2 8b 5c fb 2c |0D. CJ.h3qP..\.,| +peer0.org2.example.com | [359c 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [373a 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 gate 1574140974394508300 evaluation fails +peer1.org2.example.com | [3758 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | 00000010 0c e9 a2 bb d6 1c ae e0 28 f1 dc ce 71 20 91 75 |........(...q .u| +peer0.org2.example.com | [359d 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [373b 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3759 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer1.org1.example.com | 00000020 59 84 39 46 02 20 17 fc 12 98 75 82 1b 28 40 be |Y.9F. ....u..(@.| +peer0.org2.example.com | [359e 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [373c 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer1.org1.example.com | 00000030 e0 de 5e 9f 83 f6 e9 ee c9 ee ef b3 8d 78 93 9f |..^..........x..| +peer0.org2.example.com | [359f 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [371f 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.364Z grpc.peer_address=172.18.0.9:44814 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=368.5µs +peer1.org2.example.com | [375a 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer1.org1.example.com | 00000040 16 1d c8 84 a4 62 |.....b| +peer0.org2.example.com | [35a0 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [373d 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org2.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer1.org1.example.com | [33e0 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [35a1 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [373e 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer1.org1.example.com | [33e1 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [35a2 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [373f 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 gate 1574140974400052800 evaluation starts +peer1.org2.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer1.org1.example.com | [33e2 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [35a3 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [3740 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer1.org1.example.com | [33e3 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [35a4 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [3741 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [375b 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33e4 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [35a5 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [3742 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [375c 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33e5 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35a6 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [3743 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [375d 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33e6 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35a7 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [375e 11-19 05:22:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3744 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [33e7 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35a8 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [375f 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3745 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 principal matched by identity 0 +peer1.org1.example.com | [33e8 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [35a9 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3760 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3746 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Obtaining identity +peer1.org2.example.com | [3761 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35aa 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer1.org1.example.com | [33ea 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3762 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35ab 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org1.example.com | [3747 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 20 af 81 73 f7 43 bd 47 5e 2c 7f |0D. . ..s.C.G^,.| +peer1.org1.example.com | [33eb 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3763 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35ac 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | 00000010 36 dd 54 93 a7 20 2e f5 a9 ea 73 de 29 72 0e a9 |6.T.. ....s.)r..| +peer1.org2.example.com | [3764 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [33ec 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [35ad 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | 00000020 9a a7 b1 be 02 20 15 1f 52 f4 e8 fe bb 39 16 89 |..... ..R....9..| +peer1.org2.example.com | [3765 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33ed 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [35ae 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | 00000030 a5 56 2f 91 d6 3b 98 eb 5f af 98 c0 6d 1f 72 27 |.V/..;.._...m.r'| +peer1.org1.example.com | [33ee 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3766 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [35af 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | 00000040 9a 58 53 50 95 8e |.XSP..| +peer1.org1.example.com | [33ef 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3767 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35b0 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [3748 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [33f0 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3768 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35b1 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [374a 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 gate 1574140974400052800 evaluation succeeds +peer1.org1.example.com | [33f1 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3769 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [35b2 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [374b 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [33f2 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [376a 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [35b3 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [374c 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [33f3 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [376b 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [35b4 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [374d 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [33f4 11-19 05:22:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer1.org2.example.com | [376c 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16140 gate 1574140975612094800 evaluation starts +peer0.org2.example.com | [35b5 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [374e 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [33f5 11-19 05:22:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer1.org2.example.com | [376d 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16140 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35b6 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [374f 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +peer1.org1.example.com | [33f6 11-19 05:22:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer1.org2.example.com | [376e 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16140 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [35b7 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [3750 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33f7 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [376f 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16140 principal matched by identity 0 +peer0.org2.example.com | [35b8 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [3751 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [33f8 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3770 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | [35b9 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [3752 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151030 +peer1.org1.example.com | [33f9 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [35ba 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [3753 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 943A5E5F743A3E8F686C43210DFB5A83752F927FD975E5E7E8B38208B2B380F5 +peer1.org1.example.com | [33fa 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3771 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | [35bb 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [3754 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [33fb 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | [35bc 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [3755 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [33fc 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | [35bd 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [3756 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [33fd 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | [35be 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org1.example.com | [3757 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33fe 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [35bf 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer0.org1.example.com | [3758 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12617889285552745019 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [33ff 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3772 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16140 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [35c0 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [3749 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xa2, 0x69, 0x20, 0xe7, 0x6, 0xba, 0xc2, 0x3, 0x29, 0x26, 0xfe, 0xbd, 0x9b, 0x32, 0xd3, 0x6e, 0x64, 0xfd, 0x5e, 0xe2, 0x9c, 0x95, 0x4, 0xb3, 0xa2, 0x44, 0xc8, 0xfa, 0x28, 0x5a, 0x80, 0x58} txOffsets= +peer1.org1.example.com | [3400 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [3773 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16140 gate 1574140975612094800 evaluation succeeds +peer0.org2.example.com | [35c1 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | txId=546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf locPointer=offset=71, bytesLength=37478 +peer1.org1.example.com | [3401 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3774 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35c2 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | ] +peer1.org1.example.com | [3402 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [3775 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35c3 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3759 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89506, bytesLength=37478] for tx ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to txid-index +peer1.org1.example.com | [3403 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3776 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35c4 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [375a 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89506, bytesLength=37478] for tx number:[0] ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to blockNumTranNum index +peer1.org1.example.com | [3404 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [3777 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35c5 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [375b 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3405 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 22 3d 38 0f 67 c7 35 90 8a 43 5d a7 2d 68 ae |."=8.g.5..C].-h.| +peer1.org2.example.com | [3778 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35c6 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [375c 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 3f 15 4b 53 32 2e 75 35 ab 6c bf 90 01 cb 8b 8b |?.KS2.u5.l......| +peer1.org2.example.com | [3779 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [377a 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [377b 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [377c 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [377d 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [377e 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [377f 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16d30 gate 1574140975619543400 evaluation starts +peer1.org2.example.com | [3780 11-19 05:22:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3781 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16d30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3782 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16d30 principal matched by identity 0 +peer1.org2.example.com | [3783 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3784 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3785 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16d30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3786 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16d30 gate 1574140975619543400 evaluation succeeds +peer1.org2.example.com | [3787 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3788 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3789 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [378a 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [375d 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org2.example.com | [35c7 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3406 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 4a 76 67 c5 09 e2 2c 41 40 dc |0E.!..Jvg...,A@.| +peer1.org2.example.com | [378b 11-19 05:22:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [375e 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org2.example.com | [35c8 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffbbf0 gate 1574140974220145300 evaluation starts +peer1.org1.example.com | 00000010 d4 9c 3e 7f 93 de dc 7f c1 33 dd 6c 4e aa 36 e1 |..>......3.lN.6.| +peer1.org2.example.com | [378c 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [375f 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:44814 +peer0.org2.example.com | [35c9 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffbbf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 00 e5 88 72 0a 02 20 42 3f 81 db 12 f7 a2 bc db |...r.. B?.......| +peer1.org2.example.com | [378d 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3760 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44814 +peer0.org2.example.com | [35ca 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffbbf0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000030 0d 7f a1 28 d0 1c 21 31 04 78 6c 0b e1 57 a8 b3 |...(..!1.xl..W..| +peer0.org1.example.com | [3761 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35cb 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffbbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [378e 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | 00000040 c7 ba 0d 71 0d fd 71 |...q..q| +peer0.org2.example.com | [35cc 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffbbf0 principal evaluation fails +peer0.org1.example.com | [3762 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:12617889285552745019 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | [378f 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3407 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35cd 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffbbf0 gate 1574140974220145300 evaluation fails +peer0.org1.example.com | [3763 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [3790 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3408 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [35ce 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3765 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3791 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3409 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer0.org2.example.com | [35cf 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3766 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3792 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [340a 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [35d0 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3767 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3793 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [340b 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5 6] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [35d1 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012160 gate 1574140974220467200 evaluation starts +peer0.org1.example.com | [3768 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [340c 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35d2 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3769 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3794 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35d3 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012160 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [340d 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [376a 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3795 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [35d4 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012160 principal matched by identity 0 +peer1.org1.example.com | [340e 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [376b 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3796 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35d5 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer1.org1.example.com | [340f 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [376c 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3797 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer1.org1.example.com | [3410 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3764 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3798 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [35d6 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer1.org1.example.com | [3411 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [376d 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.45Z grpc.peer_address=172.18.0.7:39242 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=98.5µs +peer1.org2.example.com | [3799 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer1.org1.example.com | [3412 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [376e 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [379a 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer1.org1.example.com | [3413 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [376f 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [379b 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer1.org1.example.com | [3414 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3770 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [379c 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer1.org1.example.com | [3415 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3771 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127957], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org2.example.com | [379d 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [35d7 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012160 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3416 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3772 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.467Z grpc.peer_address=172.18.0.8:41494 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=907.3µs +peer1.org2.example.com | [379e 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [35d8 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012160 gate 1574140974220467200 evaluation succeeds +peer1.org1.example.com | [3417 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3773 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [379f 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [35d9 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3418 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3777 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 gate 1574140974485492500 evaluation starts +peer1.org2.example.com | [37a0 11-19 05:22:55.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002932170 gate 1574140975769596800 evaluation starts +peer0.org2.example.com | [35da 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3419 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048620 gate 1574140979481806700 evaluation starts +peer0.org1.example.com | [3778 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [37a1 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002932170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35db 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [341a 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048620 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3779 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [37a2 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002932170 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [35dc 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [341b 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048620 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [377a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [37a3 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002932170 principal matched by identity 0 +peer1.org1.example.com | [341c 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048620 principal matched by identity 0 +peer0.org2.example.com | [35dd 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [377b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 principal evaluation fails +peer1.org2.example.com | [37a4 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 14 52 c0 8b 42 97 2e a9 56 e4 88 e5 b8 04 80 |..R..B...V......| +peer1.org1.example.com | [341d 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer0.org2.example.com | [35de 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [377c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 gate 1574140974485492500 evaluation fails +peer1.org2.example.com | 00000010 84 53 ee 2b fd 4b 8a 50 40 c2 cb 0b f5 83 e6 91 |.S.+.K.P@.......| +peer1.org1.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer0.org2.example.com | [35df 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [377d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [37a5 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 76 bf af b4 1f ec 9e 39 3f 48 1c |0D. .v......9?H.| +peer1.org1.example.com | [341e 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer0.org2.example.com | [35e0 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [377e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 c1 e6 be 43 c4 d7 1f 7b 37 35 10 6b cb 74 73 e3 |...C...{75.k.ts.| +peer1.org1.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer0.org2.example.com | [35e1 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [377f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 3b b9 33 81 02 20 31 e4 30 72 fb 76 48 eb 8c 04 |;.3.. 1.0r.vH...| +peer1.org1.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer0.org2.example.com | [35e2 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3780 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 gate 1574140974485739500 evaluation starts +peer1.org2.example.com | 00000030 83 64 6c 8c 67 10 94 cd ee d5 62 6b 75 bc 3b 37 |.dl.g.....bku.;7| +peer1.org1.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer0.org2.example.com | [35e3 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012ca0 gate 1574140974221262000 evaluation starts +peer0.org1.example.com | [3781 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 d1 b0 1b 75 a1 c7 |...u..| +peer1.org1.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer0.org2.example.com | [35e4 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3782 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [37a6 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002932170 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [341f 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048620 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [35e5 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012ca0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3783 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 principal matched by identity 0 +peer1.org2.example.com | [37a7 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002932170 gate 1574140975769596800 evaluation succeeds +peer1.org1.example.com | [3420 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048620 gate 1574140979481806700 evaluation succeeds +peer0.org2.example.com | [35e6 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3784 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3421 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [35e7 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012ca0 principal evaluation fails +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer1.org1.example.com | [3422 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37a9 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35e8 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012ca0 gate 1574140974221262000 evaluation fails +peer0.org1.example.com | [3785 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 8b 0a 5e 12 a0 58 86 da 04 59 e3 |0D. ...^..X...Y.| +peer1.org1.example.com | [3423 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [37aa 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35e9 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 19 4a de ab 72 a5 33 16 82 a2 7a c0 a8 17 43 b6 |.J..r.3...z...C.| +peer1.org1.example.com | [3424 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [37ab 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35ea 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 12 2b 56 ab 02 20 77 b4 f3 6a 52 af ac 51 12 3f |.+V.. w..jR..Q.?| +peer1.org1.example.com | [3425 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37ac 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [35eb 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 82 ef 02 7e 15 3f 0b d6 97 50 bf 9d a3 c0 8e e0 |...~.?...P......| +peer1.org2.example.com | [37ad 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [35ec 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013210 gate 1574140974221560900 evaluation starts +peer1.org1.example.com | [3426 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | 00000040 1e 61 8a b6 79 13 |.a..y.| +peer1.org2.example.com | [37ae 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [35ed 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013210 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3427 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3786 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [37af 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [35ee 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013210 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3428 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3787 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 gate 1574140974485739500 evaluation succeeds +peer1.org2.example.com | [37b0 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [35ef 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013210 principal matched by identity 0 +peer1.org1.example.com | [3429 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3788 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37b1 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f0 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer1.org1.example.com | [342a 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3789 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37b2 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer1.org1.example.com | [342b 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [378a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [37b3 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f1 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer1.org1.example.com | [342c 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [378b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [37b4 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer1.org1.example.com | [342d 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [378c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44814 +peer1.org2.example.com | [37b5 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer1.org1.example.com | [342e 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [378d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44814 +peer1.org2.example.com | [37b6 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer1.org1.example.com | [342f 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3774 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37b7 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer1.org1.example.com | [3430 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [378e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37b8 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f2 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013210 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3431 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [378f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [37b9 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f3 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013210 gate 1574140974221560900 evaluation succeeds +peer1.org1.example.com | [3432 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | [37ba 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [35f4 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3433 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [37bb 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f5 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3434 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | [37bc 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f6 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3435 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | [37bd 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [35f7 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3436 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | [37be 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [35f8 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3437 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer1.org2.example.com | [37bf 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f9 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3438 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer1.org2.example.com | [37c0 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [35fa 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [35fb 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer1.org2.example.com | [37c1 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35fc 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [3439 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [37c2 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [35fd 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013ca0 gate 1574140974230105400 evaluation starts +peer0.org1.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer1.org1.example.com | [343b 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37c3 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [35fe 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer1.org1.example.com | [343c 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [37c4 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35ff 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013ca0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer1.org1.example.com | [343d 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37c5 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3600 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013ca0 principal matched by identity 0 +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [343a 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37c6 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3601 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | [3790 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [343e 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [37c7 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [3791 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [343f 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37c8 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3602 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | [3792 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3440 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37c9 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | [3793 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3441 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37ca 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | [3794 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [3442 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [37cb 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | [3795 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3443 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [37cc 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [3796 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:44814 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:4833863781111185008 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [3444 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [37cd 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3603 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013ca0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3798 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3445 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [37ce 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [3604 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013ca0 gate 1574140974230105400 evaluation succeeds +peer0.org1.example.com | [3799 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org1.example.com | [3446 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [37cf 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3605 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [379a 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org1.example.com | [3447 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [37d0 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3606 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3797 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3448 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2b90 gate 1574140979599165200 evaluation starts +peer1.org2.example.com | [37d1 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3607 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [379b 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:39242 +peer1.org1.example.com | [3449 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2b90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [37d2 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3608 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [379c 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:39242 +peer1.org1.example.com | [344a 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2b90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [37d3 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3609 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org1.example.com | [379d 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [344b 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2b90 principal matched by identity 0 +peer1.org2.example.com | [37d4 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 09 ab be 7f b4 68 fe 58 15 ee c9 67 cf a9 f8 |......h.X...g...| +peer0.org2.example.com | [360a 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [379e 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:4833863781111185008 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [344c 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 25 58 4a 5e 05 21 2e 74 d5 71 7f 0b ca 0e 20 89 |%XJ^.!.t.q.... .| +peer0.org2.example.com | [360b 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org1.example.com | [379f 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [37d5 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 4c 8f 70 f4 18 25 6d 1c e9 78 c9 |0D. ~L.p..%m..x.| +peer0.org2.example.com | [360c 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org1.example.com | [37a0 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [344d 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 9b 56 7a b5 36 99 02 00 b0 e3 2f bc e5 14 33 f1 |.Vz.6...../...3.| +peer0.org1.example.com | [37a1 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [360d 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [360e 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer1.org2.example.com | 00000030 66 99 b9 40 7d 8b 2f e2 86 f2 0d 41 95 e3 b9 ff |f..@}./....A....| +peer0.org1.example.com | [37a3 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [360f 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 ed 74 eb 90 82 07 |.t....| +peer0.org1.example.com | [37a4 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3610 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [37d6 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3611 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [37a5 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [344e 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2b90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [37d7 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3613 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [37a6 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [344f 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe2b90 gate 1574140979599165200 evaluation succeeds +peer1.org2.example.com | [37d8 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3614 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org1.example.com | [37a7 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3450 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37d9 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3615 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [37a8 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3451 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37da 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3616 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003af8d80, CONNECTING +peer0.org1.example.com | [37a9 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3452 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [37db 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3612 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37aa 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3453 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [37dc 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3617 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [37ab 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3454 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | [37dd 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3618 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37ac 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [37de 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3619 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3455 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [37ad 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [37df 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [361a 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [3456 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | [37ae 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [37e0 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [361b 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003af8d80, READY +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | [37b1 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [37e1 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [361c 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | [37b2 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [37e2 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361d 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | [37b3 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 gate 1574140974512498700 evaluation starts +peer1.org2.example.com | [37e3 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [37b4 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [37e4 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361f 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [3457 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [37b5 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [37e5 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3620 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org1.example.com | [3458 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | [3776 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org2.example.com | [37e6 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3621 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [37af 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [37e8 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3622 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [3459 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | [3775 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [37e9 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3623 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 115ms +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | [37b0 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [37ea 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3624 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | [37b6 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [37e7 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3625 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | [37b7 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer1.org2.example.com | [37eb 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3626 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [37b8 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [37ec 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:>\024\321Qi\207\200\002=\323\314\002 @0\320\234/\360K\241\0169y\"A\346q,O\377\371\356\257\304\243\322E\3405\377\r\367J[" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [345a 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3627 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer0.org1.example.com | [37b9 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org2.example.com | [37ed 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [345b 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3628 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [37ba 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [37ee 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:>\024\321Qi\207\200\002=\323\314\002 @0\320\234/\360K\241\0169y\"A\346q,O\377\371\356\257\304\243\322E\3405\377\r\367J[" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [345c 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3629 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [37bc 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer1.org2.example.com | [37ef 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [345d 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [362a 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [37bd 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [37f0 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer1.org1.example.com | [345e 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [362b 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer0.org1.example.com | [37be 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer1.org2.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer1.org1.example.com | [345f 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [362c 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [37bf 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 gate 1574140974520402500 evaluation starts +peer1.org2.example.com | [37f1 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer1.org1.example.com | [3460 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [362d 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [37c0 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:41494 +peer1.org2.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer1.org1.example.com | [3461 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [362e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [37c1 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b9ee10, CONNECTING +peer1.org2.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer1.org1.example.com | [3462 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7aa20 gate 1574140979607485100 evaluation starts +peer0.org2.example.com | [362f 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [37c2 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer1.org1.example.com | [3463 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7aa20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3630 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [37bb 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 principal evaluation fails +peer1.org2.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer1.org1.example.com | [3464 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7aa20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3631 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [37c3 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [37f2 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [3465 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7aa20 principal matched by identity 0 +peer0.org2.example.com | [3632 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [37c4 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [3466 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | [37c8 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [37f3 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 0b 58 ac d9 fd c6 ec d2 07 1f |0E.!...X........| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3633 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [37c9 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | 00000010 43 43 c4 5b f4 9f 79 3a 19 3e 3e 14 d1 51 69 87 |CC.[..y:.>>..Qi.| +peer1.org1.example.com | [3467 11-19 05:22:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | [3634 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [37ca 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 principal evaluation fails +peer1.org2.example.com | 00000020 80 02 3d d3 cc 02 20 40 30 d0 9c 2f f0 4b a1 0e |..=... @0../.K..| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | [3635 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [37cb 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 gate 1574140974520402500 evaluation fails +peer0.org2.example.com | [3636 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | [37cc 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3637 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003808180)} +peer1.org2.example.com | 00000030 39 79 22 41 e6 71 2c 4f ff f9 ee af c4 a3 d2 45 |9y"A.q,O.......E| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | [37cd 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3638 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | 00000040 e0 35 ff 0d f7 4a 5b |.5...J[| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [37ce 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3639 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [37f4 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3468 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7aa20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [37cf 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 gate 1574140974528219900 evaluation starts +peer0.org2.example.com | [363a 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [37f5 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [3469 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7aa20 gate 1574140979607485100 evaluation succeeds +peer0.org1.example.com | [37d0 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [363b 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org2.example.com | [37f6 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [346a 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37d1 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [363c 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org2.example.com | [37f7 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [346b 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37d2 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 principal matched by identity 0 +peer0.org2.example.com | [363d 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org2.example.com | [37f8 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [346c 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [37d3 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 62 34 b9 23 38 2c b1 97 b1 6f 2f 16 8b e0 34 |.b4.#8,...o/...4| +peer0.org2.example.com | [363e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0033a27c0 env 0xc002796190 txn 0 +peer1.org2.example.com | [37f9 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [346d 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 99 68 ad 01 9f 37 5d 4d 28 f1 ca 80 69 6d bd 9a |.h...7]M(...im..| +peer0.org2.example.com | [363f 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org2.example.com | [37fa 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [346e 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37d4 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 75 94 96 e5 15 c3 ed 97 5a 93 66 |0D. Iu.......Z.f| +peer0.org2.example.com | [3641 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xa2, 0x69, 0x20, 0xe7, 0x6, 0xba, 0xc2, 0x3, 0x29, 0x26, 0xfe, 0xbd, 0x9b, 0x32, 0xd3, 0x6e, 0x64, 0xfd, 0x5e, 0xe2, 0x9c, 0x95, 0x4, 0xb3, 0xa2, 0x44, 0xc8, 0xfa, 0x28, 0x5a, 0x80, 0x58} txOffsets= +peer1.org2.example.com | [37fb 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [346f 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 7b 3b 58 bf 85 09 cf d8 42 1a 98 fb 9e b1 20 f8 |{;X.....B..... .| +peer0.org2.example.com | txId=546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf locPointer=offset=71, bytesLength=37478 +peer1.org2.example.com | [37fc 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [3470 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 d8 ce 01 e1 02 20 63 bd 05 d5 d0 67 da 21 de 3c |..... c....g.!.<| +peer0.org2.example.com | ] +peer1.org2.example.com | [37fd 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3471 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 3f c8 25 1d a1 f0 20 c7 8e 58 14 37 33 9b f9 7a |?.%... ..X.73..z| +peer0.org2.example.com | [3642 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89508, bytesLength=37478] for tx ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to txid-index +peer1.org2.example.com | [37fe 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3472 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 33 ae 24 46 14 0e |3.$F..| +peer0.org2.example.com | [3643 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89508, bytesLength=37478] for tx number:[0] ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to blockNumTranNum index +peer1.org2.example.com | [37ff 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3473 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [37d5 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3640 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3800 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:>\024\321Qi\207\200\002=\323\314\002 @0\320\234/\360K\241\0169y\"A\346q,O\377\371\356\257\304\243\322E\3405\377\r\367J[" > > alive: +peer1.org1.example.com | [3474 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37d6 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 gate 1574140974528219900 evaluation succeeds +peer0.org2.example.com | [3644 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127959], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org2.example.com | [3801 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3475 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37d7 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3645 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org2.example.com | [3802 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3476 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [37d8 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3646 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer1.org2.example.com | [3803 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3477 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [37d9 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3647 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer1.org2.example.com | [3804 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3478 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37da 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3648 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org2.example.com | [3805 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3479 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be20 gate 1574140979617417500 evaluation starts +peer0.org2.example.com | [3649 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer0.org1.example.com | [37db 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3806 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [347a 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [364a 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [37dc 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3807 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [347b 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [364b 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [37dd 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3808 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [364c 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [347c 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be20 principal matched by identity 0 +peer0.org1.example.com | [37de 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3809 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [364d 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [347d 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | [37df 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [380a 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [364e 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [37e0 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [364f 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [380b 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [347e 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | [37e1 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3650 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [380c 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | [37e2 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3651 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | [37e3 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org2.example.com | [3652 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [380d 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | [37e4 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3653 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Obtaining identity +peer0.org2.example.com | [3654 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org2.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer1.org1.example.com | [347f 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [37e6 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3655 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | [3480 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7be20 gate 1574140979617417500 evaluation succeeds +peer0.org1.example.com | [37e7 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 4833863781111185008, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3656 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [3481 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37e8 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +peer0.org2.example.com | [3658 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer1.org2.example.com | [380e 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3482 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37e9 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4833863781111185008, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes +peer0.org2.example.com | [3659 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 37ms (state_validation=3ms block_and_pvtdata_commit=20ms state_commit=8ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer1.org2.example.com | [380f 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3483 11-19 05:22:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [37c5 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41494 +peer0.org2.example.com | [365a 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3810 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3484 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [37ea 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org2.example.com | [365b 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C12140898B48782FE999EEC15...08071A0C0A0565787030321203312E30 +peer1.org2.example.com | [3811 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3485 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org2.example.com | [365c 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5154F85C71B4B580952C9CD0CD1892979C6F0EDE22AF03C13E5A7BF78BA8BF3C +peer1.org2.example.com | [3812 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [37eb 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f a2 48 e8 42 1f 03 bd ae f7 a4 17 |0D. ..H.B.......| +peer0.org2.example.com | [365d 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer1.org2.example.com | [3813 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3486 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 6d 0f 48 3b 47 8c a9 ca a7 aa bb 85 83 d0 78 f2 |m.H;G.........x.| +peer1.org2.example.com | [3814 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [3657 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 82 e8 c5 c9 02 20 60 9b 17 6d de da f5 86 66 76 |..... `..m....fv| +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [365e 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 69 6b 54 a4 58 44 d9 f8 9e 21 f2 bd b7 e2 6d 88 |ikT.XD...!....m.| +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [365f 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 1e 86 35 a8 6a 4e |..5.jN| +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [3660 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [37ec 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41494 +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | [3661 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [3487 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | [37ed 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41494 +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [3662 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [37ee 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b9ee10, READY +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org2.example.com | [3663 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:37228 disconnected +peer1.org1.example.com | [3488 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | [37ef 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12679499264910794022 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer0.org2.example.com | [3664 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:37228 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m4.0906888s +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | [37f0 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:12679499264910794022 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org2.example.com | [3665 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | [37f1 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | [3666 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | [37f2 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12679499264910794022 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [37f3 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [3489 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f4 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [348a 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f5 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | [348b 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [37f6 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3815 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282e930 gate 1574140975936727500 evaluation starts +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [348c 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37f7 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3816 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282e930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer1.org1.example.com | [348d 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37f8 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3817 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282e930 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer1.org1.example.com | [348e 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [37f9 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3818 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282e930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer1.org1.example.com | [348f 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [37fa 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3819 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282e930 principal evaluation fails +peer0.org2.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | [3490 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37fb 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 gate 1574140974540666900 evaluation starts +peer1.org2.example.com | [381a 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282e930 gate 1574140975936727500 evaluation fails +peer0.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer1.org1.example.com | [3491 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3dcd0 gate 1574140979624095500 evaluation starts +peer0.org1.example.com | [37fc 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [381b 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer1.org1.example.com | [3492 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3dcd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [37fd 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [381c 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer1.org1.example.com | [3493 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3dcd0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [37fe 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [381d 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3494 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3dcd0 principal matched by identity 0 +peer0.org1.example.com | [37ff 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 principal evaluation fails +peer1.org2.example.com | [381e 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282f740 gate 1574140975939207500 evaluation starts +peer0.org2.example.com | [3667 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3495 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | [3800 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 gate 1574140974540666900 evaluation fails +peer1.org2.example.com | [381f 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282f740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3668 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3801 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3820 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282f740 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3669 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3496 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | [3802 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3821 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [366a 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3822 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer0.org2.example.com | [366b 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3804 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 gate 1574140974543181300 evaluation starts +peer1.org2.example.com | [3823 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | [366c 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3805 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3824 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282f740 principal matched by identity 0 +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [366d 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3806 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3825 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | [366e 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3497 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3dcd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3807 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [366f 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3498 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3dcd0 gate 1574140979624095500 evaluation succeeds +peer0.org1.example.com | [3808 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [3826 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | [3670 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3499 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3809 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [349a 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [380a 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 principal matched by identity 0 +peer1.org2.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer0.org2.example.com | [3672 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [349b 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [380b 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e d9 25 9f 50 16 42 b0 18 ca 62 8b d2 7c 75 bb |..%.P.B...b..|u.| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | [3673 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6af0 gate 1574140974322752500 evaluation starts +peer1.org1.example.com | [349c 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 fa 30 dd 02 f4 6a 16 28 2c 54 b3 e0 2b a2 41 46 |.0...j.(,T..+.AF| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [3674 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6af0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [349d 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37c6 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [3827 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282f740 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3675 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6af0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [349e 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [37c7 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 gate 1574140974512498700 evaluation fails +peer1.org2.example.com | [3828 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282f740 gate 1574140975939207500 evaluation succeeds +peer0.org2.example.com | [3676 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [349f 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | [380c 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer1.org2.example.com | [3829 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3677 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6af0 principal evaluation fails +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [380d 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing +peer1.org2.example.com | [382a 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3678 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6af0 gate 1574140974322752500 evaluation fails +peer1.org1.example.com | [34a0 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | [380e 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [382b 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3679 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | [380f 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41494 disconnected +peer1.org2.example.com | [382c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [367a 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | [3810 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [382d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [367b 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | [382e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3811 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [367c 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a7080 gate 1574140974325739900 evaluation starts +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [382f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3812 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [367d 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.326Z grpc.peer_address=172.18.0.6:37376 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=313.9µs +peer1.org1.example.com | [34a1 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | [3830 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3814 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea ed 25 49 23 31 35 45 ab 54 5d |0E.!...%I#15E.T]| +peer0.org2.example.com | [367e 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a7080 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3831 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000010 8a c9 ac d6 4e bd 44 d5 2a e2 52 21 dc 6d 13 19 |....N.D.*.R!.m..| +peer0.org2.example.com | [367f 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a7080 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [34a2 11-19 05:22:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | [3832 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 11 63 6e e2 26 02 20 4c b9 1c 06 42 cd dd 9b c3 |.cn.&. L...B....| +peer0.org2.example.com | [3680 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | [3833 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000030 f7 c5 f4 63 34 7f fb 4d 9a 25 4b ec 69 01 c5 5f |...c4..M.%K.i.._| +peer0.org2.example.com | [3681 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | [3834 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 a1 c0 7d 06 a0 27 26 |..}..'&| +peer0.org2.example.com | [3682 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | [3835 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3813 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [3684 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3836 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3815 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3685 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer1.org1.example.com | [34a3 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3837 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3816 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.501Z grpc.peer_address=172.18.0.8:41494 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.1432ms +peer0.org2.example.com | [3686 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer1.org1.example.com | [34a4 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3838 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3817 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3683 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a7080 principal matched by identity 0 +peer1.org1.example.com | [34a5 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3839 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aee30 gate 1574140975950234200 evaluation starts +peer0.org1.example.com | [3818 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org2.example.com | [3687 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | [34a6 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [383a 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aee30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3819 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org1.example.com | [34a7 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [383b 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aee30 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [381a 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [3688 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 1c a6 ab f6 5b 03 8e ef ec 01 04 |0D. .....[......| +peer1.org1.example.com | [34a8 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [383c 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aee30 principal matched by identity 0 +peer0.org1.example.com | [381b 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000010 01 6a 71 bf af a7 9d fa ad 7b e8 1f 00 ee b0 b1 |.jq......{......| +peer1.org1.example.com | [34a9 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [383d 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer0.org1.example.com | [381c 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org2.example.com | 00000020 c4 ef 74 66 02 20 72 46 20 bc 0e 63 2c a4 9e 5a |..tf. rF ..c,..Z| +peer1.org1.example.com | [34aa 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer0.org1.example.com | [3820 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051 +peer0.org2.example.com | 00000030 5d 12 96 0d d7 e2 ed 6f ff 7c 51 a5 82 b7 f1 ea |]......o.|Q.....| +peer1.org1.example.com | [34ab 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef5e90 gate 1574140979631906800 evaluation starts +peer1.org2.example.com | [383e 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer0.org1.example.com | [3821 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +peer0.org2.example.com | 00000040 8f f6 26 ed 29 5b |..&.)[| +peer1.org1.example.com | [34ac 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef5e90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer0.org1.example.com | [3822 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3689 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a7080 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [34ad 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef5e90 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer0.org1.example.com | [3823 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [368a 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a7080 gate 1574140974325739900 evaluation succeeds +peer1.org1.example.com | [34ae 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef5e90 principal matched by identity 0 +peer1.org2.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer0.org1.example.com | [381d 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 gate 1574140974543181300 evaluation succeeds +peer1.org1.example.com | [34af 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | [368b 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer0.org1.example.com | [381e 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [368c 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [383f 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aee30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [381f 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [34b0 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | [368d 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3840 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aee30 gate 1574140975950234200 evaluation succeeds +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Obtaining identity +peer0.org2.example.com | [368e 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3841 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer0.org1.example.com | [3825 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [368f 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org2.example.com | [3842 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | [3826 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 gate 1574140974564432700 evaluation starts +peer0.org2.example.com | [3690 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3843 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3827 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3691 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3844 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [34b1 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef5e90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3828 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3692 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151032 +peer1.org2.example.com | [3845 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [34b2 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef5e90 gate 1574140979631906800 evaluation succeeds +peer0.org1.example.com | [3829 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3693 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 196234B923382CB197B16F2F168BE0349968AD019F375D4D28F1CA80696DBD9A +peer1.org2.example.com | [3846 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [34b3 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [382a 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3694 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3847 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [382b 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [34b4 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3695 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3848 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [382c 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [34b5 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3696 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [3849 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [382d 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [34b6 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3697 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [384a 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [382e 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44814 disconnected +peer1.org1.example.com | [34b7 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3698 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:4833863781111185008 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3832 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:44814 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=148.6403ms +peer1.org2.example.com | [384b 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34b8 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3699 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:4833863781111185008 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [382f 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [384c 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34b9 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [369a 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [3830 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [384d 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org1.example.com | [34ba 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [369b 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3831 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [384e 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34bb 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [369c 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [3833 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [384f 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34bc 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [369d 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org1.example.com | [3834 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3850 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34bd 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [369e 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3836 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [3851 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [34be 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [369f 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0045ffdb0, CONNECTING +peer0.org1.example.com | [3839 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org2.example.com | [3852 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [34bf 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1030 gate 1574140979637559400 evaluation starts +peer0.org2.example.com | [36a0 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:37376 +peer0.org1.example.com | [3835 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 principal matched by identity 0 +peer1.org2.example.com | [3853 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [34c0 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1030 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36a1 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:37376 +peer0.org1.example.com | [3837 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3854 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34c1 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1030 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [36a2 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3838 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3855 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34c2 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1030 principal matched by identity 0 +peer0.org2.example.com | [36a3 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [383e 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3856 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34c3 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | [383f 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [36a4 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3857 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [383b 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer0.org2.example.com | [36a5 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3858 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34c4 11-19 05:22:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | [383a 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [36a6 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3859 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | [383c 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org2.example.com | [36a7 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [385a 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer0.org2.example.com | [36a8 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [385b 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | [383d 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36aa 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [385c 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [3840 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [36a9 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0045ffdb0, READY +peer1.org2.example.com | [385d 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34c5 11-19 05:22:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1030 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3841 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer0.org2.example.com | [36ab 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [385e 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [34c6 11-19 05:22:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1030 gate 1574140979637559400 evaluation succeeds +peer0.org1.example.com | [3842 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer0.org2.example.com | [36ac 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [385f 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3860 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [3846 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer0.org2.example.com | [36ad 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3861 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34c7 11-19 05:22:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3843 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 83 24 7d 5a 72 f5 1a 5c 52 13 |0E.!...$}Zr..\R.| +peer1.org2.example.com | [3862 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34c8 11-19 05:22:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 06 d0 ac ab 9d 00 58 ab 40 a9 5b fa a5 9c 1a c6 |......X.@.[.....| +peer0.org2.example.com | [36ae 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3863 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34c9 11-19 05:22:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34ca 11-19 05:22:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 89 77 16 71 64 02 20 7c 96 d6 49 84 13 57 56 0f |.w.qd. |..I..WV.| +peer1.org2.example.com | [3864 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [34cb 11-19 05:22:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34cc 11-19 05:22:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 f5 4b 26 75 01 ab ca f4 eb 12 33 19 97 24 89 a2 |.K&u......3..$..| +peer1.org2.example.com | [3865 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34cd 11-19 05:22:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 b9 d6 6f 72 08 59 16 |..or.Y.| +peer0.org2.example.com | [36af 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3960 gate 1574140974365764700 evaluation starts +peer1.org2.example.com | [3866 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34ce 11-19 05:22:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [3847 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [36b0 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3867 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34cf 11-19 05:22:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3848 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36b1 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3960 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3868 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34d0 11-19 05:22:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34d1 11-19 05:22:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3849 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 gate 1574140974564432700 evaluation succeeds +peer1.org2.example.com | [3869 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34d2 11-19 05:22:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [384a 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [36b2 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [386a 11-19 05:22:56.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34d3 11-19 05:22:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [384b 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [36b3 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3960 principal evaluation fails +peer1.org1.example.com | [34d4 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [384c 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [36b4 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3960 gate 1574140974365764700 evaluation fails +peer1.org1.example.com | [34d5 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [384d 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36b5 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [386b 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [34d6 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [384e 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:39242 +peer0.org2.example.com | [36b6 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [34d7 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [386c 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [384f 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:39242 +peer0.org2.example.com | [36b7 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [34d8 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3844 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36b8 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3ed0 gate 1574140974369951700 evaluation starts +peer1.org1.example.com | [34d9 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [386d 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36b9 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34da 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3850 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [386e 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36ba 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3ed0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [34db 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3851 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [386f 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36bb 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3ed0 principal matched by identity 0 +peer1.org1.example.com | [34dc 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3852 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [3870 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36bc 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer1.org1.example.com | [34dd 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3854 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer1.org2.example.com | [3871 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer1.org1.example.com | [34de 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3855 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3872 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36bd 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 3b 36 f4 b4 58 21 59 2d 7d e1 a3 |0D. @;6..X!Y-}..| +peer1.org1.example.com | [34df 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 40 9e 06 5b 10 a0 04 7b 15 9f 58 4e 9f 2b 9a |.@..[...{..XN.+.| +peer0.org1.example.com | [3853 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 gate 1574140974579710500 evaluation starts +peer1.org2.example.com | [3873 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 b1 03 f4 78 bf 94 15 46 0f 42 54 fc 25 c3 79 bd |...x...F.BT.%.y.| +peer1.org1.example.com | 00000010 66 f3 41 5e 31 69 e6 70 53 f2 14 af fc 9d af 07 |f.A^1i.pS.......| +peer0.org1.example.com | [3856 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3874 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000020 a2 2f 6c f8 02 20 08 71 09 f4 8b 57 38 8c 19 3e |./l.. .q...W8..>| +peer1.org1.example.com | [34e0 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f6 f7 3b f0 2b 93 7f 4a d5 be eb |0D. c..;.+..J...| +peer0.org1.example.com | [3857 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3875 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8ace0 gate 1574140976167822500 evaluation starts +peer0.org2.example.com | 00000030 62 90 5b e8 86 19 04 f4 09 3e 66 b1 d5 d2 29 39 |b.[......>f...)9| +peer1.org1.example.com | 00000010 ac 4f 2c e0 8c 5b e0 8a 5e 6d 51 b0 4d 0b ef ed |.O,..[..^mQ.M...| +peer0.org1.example.com | [3858 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [3876 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8ace0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 e7 50 bd ec 00 db |.P....| +peer1.org1.example.com | 00000020 15 6b 93 0b 02 20 7c c0 c9 02 94 b7 6d 56 83 0b |.k... |.....mV..| +peer0.org1.example.com | [3859 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 principal evaluation fails +peer1.org2.example.com | [3877 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8ace0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [36be 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3ed0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 45 c0 08 07 c8 37 7f 40 06 d0 c8 db a2 6f 84 82 |E....7.@.....o..| +peer0.org1.example.com | [385a 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing +peer1.org2.example.com | [3878 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8ace0 principal matched by identity 0 +peer0.org2.example.com | [36bf 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3ed0 gate 1574140974369951700 evaluation succeeds +peer1.org1.example.com | 00000040 3c 36 44 67 f5 d5 |<6Dg..| +peer0.org1.example.com | [385b 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 gate 1574140974579710500 evaluation fails +peer1.org2.example.com | [3879 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | [36c0 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [34e1 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [385d 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:39242 disconnected +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [36c1 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [34e2 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [385f 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.465Z grpc.peer_address=172.18.0.7:39242 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=111.4284ms +peer1.org2.example.com | [387a 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | [36c2 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34e3 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [385e 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | [36c3 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [34e4 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3860 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | [36c4 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:37376 +peer1.org1.example.com | [34e5 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3845 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | [36c5 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:37376 +peer1.org1.example.com | [34e6 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3861 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [36c6 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.389Z grpc.peer_address=172.18.0.7:33126 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=107µs +peer1.org1.example.com | [34e7 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3862 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [387b 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8ace0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36c7 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [34e8 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [387c 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8ace0 gate 1574140976167822500 evaluation succeeds +peer0.org2.example.com | [36c8 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer1.org1.example.com | [34e9 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [387d 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3863 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36c9 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer1.org1.example.com | [34ea 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [387e 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3864 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36ca 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:33126 +peer1.org1.example.com | [34eb 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [387f 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3865 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [36cb 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:33126 +peer1.org1.example.com | [34ec 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3880 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3866 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [36cc 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [34ed 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3881 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36cd 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer1.org1.example.com | [34ee 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3867 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 gate 1574140974583482300 evaluation starts +peer1.org2.example.com | [3882 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36ce 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer1.org1.example.com | [34ef 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3869 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3883 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36cf 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [34f0 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [385c 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [3884 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36d0 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer1.org1.example.com | [34f1 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3868 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3885 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer1.org1.example.com | [34f3 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [386b 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3886 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [34f4 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36d1 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a f0 70 62 4d 02 29 66 8b f6 70 cd |0D. ..pbM.)f..p.| +peer0.org1.example.com | [386a 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3887 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 15 5f 59 d8 13 b8 78 47 64 ef 97 fa 66 3a b8 e1 |._Y...xGd...f:..| +peer1.org1.example.com | [34f5 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [386c 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3888 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000020 41 f0 03 1b 02 20 6b 25 e3 56 70 e2 ea 66 79 89 |A.... k%.Vp..fy.| +peer1.org1.example.com | [34f6 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [386e 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12679499264910794022, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3889 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8be70 gate 1574140976171244200 evaluation starts +peer0.org2.example.com | 00000030 43 fa a2 bc f0 16 53 2e b9 7b 39 98 bb e6 9e 76 |C.....S..{9....v| +peer1.org1.example.com | [34f2 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [386d 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 principal matched by identity 0 +peer1.org2.example.com | [388a 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8be70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 55 e0 a5 9b 43 99 |U...C.| +peer1.org1.example.com | [34f7 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [386f 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +peer1.org2.example.com | [388b 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8be70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [36d2 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org1.example.com | [34f8 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3870 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 0xc004c8be70 principal matched by identity 0 +peer0.org2.example.com | [36d3 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:33126 +peer1.org1.example.com | [34f9 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | 00000010 9b 14 d5 a9 20 be 88 88 e6 ca 5f 4b 94 3b d4 43 |.... ....._K.;.C| +peer1.org2.example.com | [388d 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | [36d4 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:33126 +peer1.org1.example.com | [34fa 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3871 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 f6 62 d6 20 4f e8 8d 96 3f 5e |0E.!...b. O...?^| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [36d5 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:37376 disconnected +peer1.org1.example.com | [34fb 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | 00000010 cb 17 72 20 e3 11 20 e8 f0 d8 57 44 73 26 1c 60 |..r .. ...WDs&.`| +peer1.org2.example.com | [388e 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | [36d6 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.332Z grpc.peer_address=172.18.0.6:37376 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=84.3368ms +peer1.org1.example.com | [34fc 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000020 07 b4 5c eb 33 02 20 12 2f f9 dc 94 c0 9d d6 83 |..\.3. ./.......| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | [36d7 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [34fd 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | 00000030 a9 81 e8 4c b5 72 dc d9 45 df 34 5a 2a 41 3c f0 |...L.r..E.4Z*A<.| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | [36d8 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer1.org1.example.com | [34fe 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000040 2b 14 90 f2 e1 4d df |+....M.| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | [36d9 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:32984 disconnected +peer1.org1.example.com | [34ff 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3872 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12679499264910794022, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [36da 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:32984 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m3.9402901s +peer1.org1.example.com | [3500 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3873 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org2.example.com | [388f 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8be70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36db 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [3501 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3874 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3891 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8be70 gate 1574140976171244200 evaluation succeeds +peer0.org2.example.com | [36dc 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [3502 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3875 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 gate 1574140974583482300 evaluation succeeds +peer1.org2.example.com | [3890 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36dd 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer1.org1.example.com | [3503 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3876 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3892 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36df 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:33126 disconnected +peer1.org1.example.com | [3504 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3877 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3894 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36e0 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.393Z grpc.peer_address=172.18.0.7:33126 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=26.7422ms +peer1.org1.example.com | [3505 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3878 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3893 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36de 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing +peer1.org1.example.com | [3506 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3879 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36e1 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [3507 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [387a 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +peer1.org2.example.com | [3895 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3508 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3509 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3897 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36e2 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [350a 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [387b 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3896 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [36e3 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [350b 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [387c 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [3898 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36e4 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:7051 +peer1.org1.example.com | [350c 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [387d 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3899 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36e5 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [350d 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [387e 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [389a 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [36e6 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [350e 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [387f 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12617889285552745019, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [389b 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36e7 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [350f 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3880 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3881 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 12617889285552745019, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [389c 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3510 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3511 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3882 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [3512 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3883 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36e8 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [389d 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3513 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3884 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12617889285552745019, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [36e9 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [389e 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [389f 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38a0 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | [3514 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [3515 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3885 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org2.example.com | [36ea 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38a1 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | [3516 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3886 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [36eb 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Obtaining identity +peer0.org1.example.com | [3887 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3888 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00417eca0, CONNECTING +peer0.org1.example.com | [3889 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer0.org1.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer0.org1.example.com | [388a 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer0.org1.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer0.org1.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer0.org1.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer0.org1.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer0.org1.example.com | [388b 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3518 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [388c 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36ec 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3519 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | [36ed 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36ee 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36ef 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [36f0 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f94c0 gate 1574140974442806300 evaluation starts +peer0.org2.example.com | [36f1 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f94c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36f2 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f94c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [36f3 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f94c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [36f4 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f94c0 principal evaluation fails +peer0.org2.example.com | [36f5 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f94c0 gate 1574140974442806300 evaluation fails +peer0.org2.example.com | [36f6 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [36f7 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [36f8 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [36f9 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9a30 gate 1574140974445652000 evaluation starts +peer0.org2.example.com | [36fa 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9a30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36fb 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9a30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [36fc 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9a30 principal matched by identity 0 +peer0.org2.example.com | [36fd 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org2.example.com | [36fe 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 95 af ef 1b 8b 55 67 f5 cc 0f |0E.!.......Ug...| +peer0.org2.example.com | 00000010 18 4a 1d cd 64 87 84 04 54 02 50 62 95 f4 ca 65 |.J..d...T.Pb...e| +peer0.org2.example.com | 00000020 c0 b1 3d c8 34 02 20 1a a8 3f 74 90 19 f0 f2 2a |..=.4. ..?t....*| +peer0.org2.example.com | 00000030 fd ce 6e 33 ef cc e4 03 0a ed 94 96 27 0f 90 48 |..n3........'..H| +peer0.org2.example.com | 00000040 72 42 f0 95 d8 d4 e0 |rB.....| +peer0.org2.example.com | [36ff 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9a30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3700 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9a30 gate 1574140974445652000 evaluation succeeds +peer1.org1.example.com | [351a 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [351b 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [351c 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [351d 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [351e 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [351f 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3520 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3521 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3522 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3523 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3524 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3525 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea0ef0 gate 1574140979845329200 evaluation starts +peer1.org1.example.com | [3526 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea0ef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3527 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea0ef0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3528 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea0ef0 principal matched by identity 0 +peer1.org1.example.com | [3529 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 48 fb 5f aa d8 07 cc 3e 3d 2b 75 f8 70 f4 96 |.H._....>=+u.p..| +peer1.org1.example.com | 00000010 ad 2f 7d 1f de d6 db bd f7 2a 94 8c a5 22 93 66 |./}......*...".f| +peer1.org1.example.com | [352a 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ec a5 52 1c 85 87 80 48 6a eb |0E.!....R....Hj.| +peer1.org1.example.com | 00000010 72 01 fa 4f eb 1c a0 b6 6e 17 43 62 cf 0b 02 19 |r..O....n.Cb....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [38a2 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [38a3 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [38a4 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [388d 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [388e 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 3a 5e 5f 74 3a 3e 8f 68 6c 43 21 0d fb 5a 83 |.:^_t:>.hlC!..Z.| +peer0.org1.example.com | 00000010 75 2f 92 7f d9 75 e5 e7 e8 b3 82 08 b2 b3 80 f5 |u/...u..........| +peer0.org1.example.com | [388f 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 ff 83 3d a4 9c 3d 6f bf 38 36 |0E.!....=..=o.86| +peer0.org1.example.com | 00000010 ca e2 0a c8 86 65 b6 81 ef 5f cb 18 a8 e7 38 6b |.....e..._....8k| +peer0.org1.example.com | 00000020 29 be dc b8 47 02 20 63 60 a5 8f 78 b2 01 a5 7f |)...G. c`..x....| +peer0.org1.example.com | 00000030 e9 07 fa df 9f 17 b6 da e2 ae 4b 1f 37 71 ac cb |..........K.7q..| +peer0.org1.example.com | 00000040 30 ca af ea 77 bd 54 |0...w.T| +peer0.org1.example.com | [3890 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3891 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3892 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3893 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [3894 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org1.example.com | [3895 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3896 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 252ms (state_validation=39ms block_and_pvtdata_commit=131ms state_commit=55ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org1.example.com | [3897 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3898 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3899 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [389a 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [389b 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08071A0C0A0565787030321203312E30 +peer0.org1.example.com | [389c 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 351AF27BB310AEDE53F5957AA1EF581566C03269E42AB147829AF953CC475235 +peer0.org1.example.com | [389d 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [389e 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [389f 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [38a0 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer0.org1.example.com | [38a1 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 gate 1574140974601473100 evaluation starts +peer0.org1.example.com | [38a2 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38a3 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [38a4 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [38a5 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 principal evaluation fails +peer0.org1.example.com | [38a6 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 gate 1574140974601473100 evaluation fails +peer0.org1.example.com | [38a7 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3701 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3702 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3703 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3704 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3705 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org2.example.com | [3706 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3707 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [3708 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3709 11-19 05:22:54.46 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.465Z grpc.peer_address=172.18.0.8:46350 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=300.7µs +peer0.org2.example.com | [370a 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [370b 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [370c 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [370d 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:46350 +peer0.org2.example.com | [370e 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:46350 +peer0.org2.example.com | [370f 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3710 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3711 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org2.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org2.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org2.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3712 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3713 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | 00000020 fa b6 07 c6 b9 02 20 17 1e 92 d4 fa 15 47 b8 b1 |...... ......G..| +peer1.org1.example.com | 00000030 af 1e cd 49 da 31 c3 88 09 cb bc 52 0e 54 58 46 |...I.1.....R.TXF| +peer1.org1.example.com | 00000040 3e d6 27 9f c9 8a 50 |>.'...P| +peer1.org1.example.com | [352b 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea0ef0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [352c 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea0ef0 gate 1574140979845329200 evaluation succeeds +peer1.org1.example.com | [352d 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [352e 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [352f 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3530 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3531 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3532 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3533 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3534 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3535 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3536 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3537 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3538 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3539 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [353a 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [353b 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [353c 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [353d 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [353e 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\326'\237\311\212P" > alive: alive: +peer1.org1.example.com | [353f 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3540 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3541 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3542 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3543 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3544 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3545 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3546 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3547 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15103A +peer1.org1.example.com | [3548 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C5395E360B9B3A1FA63F1400948E7460A4D70BD472AD9F6955A2C0CC28FBDDF2 +peer1.org1.example.com | [3549 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [354a 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [354b 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [354c 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\347\3756\301v" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [354d 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [354e 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [354f 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3550 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3551 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3552 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3553 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3554 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\347\3756\301v" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3555 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3556 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3557 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3558 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3559 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [355a 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [355b 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [355c 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 39 5e 36 0b 9b 3a 1f a6 3f 14 00 94 8e 74 60 |.9^6..:..?....t`| +peer1.org1.example.com | 00000010 a4 d7 0b d4 72 ad 9f 69 55 a2 c0 cc 28 fb dd f2 |....r..iU...(...| +peer1.org1.example.com | [355d 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 96 ec 0f 80 8a 44 f7 4b b7 9d |0E.!.......D.K..| +peer1.org1.example.com | 00000010 c6 74 e5 6e 72 4b 8e 7b ca a9 da 92 36 b3 a7 99 |.t.nrK.{....6...| +peer1.org1.example.com | 00000020 68 cd f5 04 1d 02 20 60 b8 52 28 04 0b 73 69 d5 |h..... `.R(..si.| +peer1.org1.example.com | 00000030 43 30 0d b1 7d 21 ab 4c 24 c7 64 d1 2e 1b 51 8c |C0..}!.L$.d...Q.| +peer1.org1.example.com | 00000040 e1 3e e7 fd 36 c1 76 |.>..6.v| +peer1.org1.example.com | [355e 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [355f 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 6d 72 a1 7f 89 ac 9b 2c e6 c3 bf |0D. 0mr.....,...| +peer1.org1.example.com | 00000010 5c fb 4c 11 c9 f0 73 f3 2b 6c 47 6c 8f 32 c5 5c |\.L...s.+lGl.2.\| +peer1.org1.example.com | 00000020 d2 82 b4 a9 02 20 1c 7a 6b df 2f 49 e5 29 c8 94 |..... .zk./I.)..| +peer1.org1.example.com | 00000030 92 b9 04 6f 59 8a c5 3f 37 27 93 85 d2 74 1b 38 |...oY..?7'...t.8| +peer1.org1.example.com | 00000040 0d f4 93 93 84 24 |.....$| +peer1.org1.example.com | [3560 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3562 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3563 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3564 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3561 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3565 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3566 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3567 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3568 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [3569 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [356a 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [356b 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [356c 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [356d 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [356e 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [356f 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3570 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e6560 gate 1574140979959812700 evaluation starts +peer1.org1.example.com | [3571 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e6560 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3572 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e6560 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3573 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e6560 principal matched by identity 0 +peer1.org1.example.com | [3574 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 48 fb 5f aa d8 07 cc 3e 3d 2b 75 f8 70 f4 96 |.H._....>=+u.p..| +peer1.org1.example.com | 00000010 ad 2f 7d 1f de d6 db bd f7 2a 94 8c a5 22 93 66 |./}......*...".f| +peer1.org1.example.com | [3575 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ec a5 52 1c 85 87 80 48 6a eb |0E.!....R....Hj.| +peer1.org1.example.com | 00000010 72 01 fa 4f eb 1c a0 b6 6e 17 43 62 cf 0b 02 19 |r..O....n.Cb....| +peer1.org1.example.com | 00000020 fa b6 07 c6 b9 02 20 17 1e 92 d4 fa 15 47 b8 b1 |...... ......G..| +peer1.org2.example.com | [38a5 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [38a6 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [38a7 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [38a8 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38a9 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38aa 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38ab 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38ac 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38ad 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [38ae 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38af 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [38b0 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c6b0 gate 1574140976194135400 evaluation starts +peer1.org2.example.com | [38b1 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c6b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38b2 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c6b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [38b3 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c6b0 principal matched by identity 0 +peer1.org2.example.com | [38b4 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [38b5 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [38b6 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c6b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [38b7 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c6b0 gate 1574140976194135400 evaluation succeeds +peer1.org2.example.com | [38b8 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38b9 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38ba 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [38bb 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [38bc 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38bd 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3714 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3715 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3716 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3717 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3718 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3719 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [371c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [371d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [371e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003958f80 gate 1574140974480168800 evaluation starts +peer0.org2.example.com | [371f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003958f80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3720 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003958f80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3721 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003958f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3722 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003958f80 principal evaluation fails +peer0.org2.example.com | [3723 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003958f80 gate 1574140974480168800 evaluation fails +peer0.org2.example.com | [3724 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3725 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3726 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3727 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959510 gate 1574140974480521400 evaluation starts +peer0.org2.example.com | [3728 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3729 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959510 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [372a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | 00000030 af 1e cd 49 da 31 c3 88 09 cb bc 52 0e 54 58 46 |...I.1.....R.TXF| +peer1.org1.example.com | 00000040 3e d6 27 9f c9 8a 50 |>.'...P| +peer1.org1.example.com | [3576 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e6560 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3577 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029e6560 gate 1574140979959812700 evaluation succeeds +peer1.org1.example.com | [3578 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3579 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [357a 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [357b 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [357c 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [357d 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [357e 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [357f 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 39 5e 36 0b 9b 3a 1f a6 3f 14 00 94 8e 74 60 |.9^6..:..?....t`| +peer1.org1.example.com | 00000010 a4 d7 0b d4 72 ad 9f 69 55 a2 c0 cc 28 fb dd f2 |....r..iU...(...| +peer1.org1.example.com | [3580 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 96 ec 0f 80 8a 44 f7 4b b7 9d |0E.!.......D.K..| +peer1.org1.example.com | 00000010 c6 74 e5 6e 72 4b 8e 7b ca a9 da 92 36 b3 a7 99 |.t.nrK.{....6...| +peer1.org1.example.com | 00000020 68 cd f5 04 1d 02 20 60 b8 52 28 04 0b 73 69 d5 |h..... `.R(..si.| +peer1.org1.example.com | 00000030 43 30 0d b1 7d 21 ab 4c 24 c7 64 d1 2e 1b 51 8c |C0..}!.L$.d...Q.| +peer1.org1.example.com | 00000040 e1 3e e7 fd 36 c1 76 |.>..6.v| +peer1.org1.example.com | [3581 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3582 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3583 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3584 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3585 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3586 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3587 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3588 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [3589 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 39 5e 36 0b 9b 3a 1f a6 3f 14 00 94 8e 74 60 |.9^6..:..?....t`| +peer1.org1.example.com | 00000010 a4 d7 0b d4 72 ad 9f 69 55 a2 c0 cc 28 fb dd f2 |....r..iU...(...| +peer1.org1.example.com | [358a 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 96 ec 0f 80 8a 44 f7 4b b7 9d |0E.!.......D.K..| +peer1.org1.example.com | 00000010 c6 74 e5 6e 72 4b 8e 7b ca a9 da 92 36 b3 a7 99 |.t.nrK.{....6...| +peer1.org1.example.com | 00000020 68 cd f5 04 1d 02 20 60 b8 52 28 04 0b 73 69 d5 |h..... `.R(..si.| +peer1.org1.example.com | 00000030 43 30 0d b1 7d 21 ab 4c 24 c7 64 d1 2e 1b 51 8c |C0..}!.L$.d...Q.| +peer1.org1.example.com | 00000040 e1 3e e7 fd 36 c1 76 |.>..6.v| +peer1.org1.example.com | [358b 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [358c 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [358d 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [358e 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [358f 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3590 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3591 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3592 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3593 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3594 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3595 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3596 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f38c0 gate 1574140979972316000 evaluation starts +peer1.org1.example.com | [3597 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f38c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3598 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f38c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3599 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f38c0 principal matched by identity 0 +peer1.org1.example.com | [359a 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer1.org1.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer1.org1.example.com | [359b 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer1.org1.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer1.org1.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer1.org1.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer1.org1.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer0.org2.example.com | [372b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [372c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [372d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959510 principal matched by identity 0 +peer0.org2.example.com | [372e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org2.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org2.example.com | [372f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 10 b8 89 2a d0 c6 3a ee 62 e5 |0E.!.....*..:.b.| +peer0.org2.example.com | 00000010 11 58 96 d6 c3 bb 35 c6 94 33 87 ab eb 21 25 13 |.X....5..3...!%.| +peer0.org2.example.com | 00000020 64 64 2c c9 0d 02 20 46 71 6e d5 39 f6 d1 60 a9 |dd,... Fqn.9..`.| +peer0.org2.example.com | 00000030 c5 19 f0 2a a3 93 9f 4d 3f 85 24 83 9b f9 de 94 |...*...M?.$.....| +peer0.org2.example.com | 00000040 fe c8 f8 cf d1 10 d4 |.......| +peer0.org2.example.com | [3730 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3731 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959510 gate 1574140974480521400 evaluation succeeds +peer0.org2.example.com | [3732 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3733 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3734 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3735 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3736 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:46350 +peer0.org2.example.com | [3737 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:46350 +peer0.org2.example.com | [3738 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org2.example.com | [3739 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:46178 disconnected +peer0.org2.example.com | [373a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:46178 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m4.8663004s +peer0.org2.example.com | [373b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [373c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org2.example.com | [373d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:46350 disconnected +peer0.org2.example.com | [373e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.474Z grpc.peer_address=172.18.0.8:46350 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=5.896ms +peer0.org2.example.com | [373f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing +peer0.org2.example.com | [3740 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3742 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3741 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3743 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.544Z grpc.peer_address=172.18.0.6:37388 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=783.1µs +peer0.org2.example.com | [3744 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3745 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [3746 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [3747 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:37388 +peer0.org2.example.com | [3748 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" tls_cert_hash:"\372.\010\346gwmyV(C^\273$\000\022\321\233\317V\256\007\251\317\270.`\206\327!\322\021" from 172.18.0.6:37388 +peer0.org2.example.com | [3749 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38be 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38bf 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38c0 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38c1 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [38c2 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38c3 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [38c4 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d840 gate 1574140976198328400 evaluation starts +peer1.org2.example.com | [38c5 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d840 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38c6 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d840 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [38c7 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d840 principal matched by identity 0 +peer1.org2.example.com | [38c8 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [38c9 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [38ca 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d840 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [38cb 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d840 gate 1574140976198328400 evaluation succeeds +peer1.org2.example.com | [38cc 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38cd 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38ce 11-19 05:22:56.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [38cf 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [38d0 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [38d1 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [38d2 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38d3 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [38d4 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d5 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d6 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38a8 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [38a9 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [38aa 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00417eca0, READY +peer0.org1.example.com | [38ab 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 gate 1574140974608764300 evaluation starts +peer0.org1.example.com | [38ac 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38ad 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [38ae 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 principal matched by identity 0 +peer0.org1.example.com | [38af 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer0.org1.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer0.org1.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer0.org1.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer0.org1.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer0.org1.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer0.org1.example.com | [38b1 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [38b2 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org1.example.com | [38b3 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org1.example.com | [38b5 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer0.org1.example.com | [38b4 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [38b6 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 gate 1574140974608764300 evaluation succeeds +peer0.org1.example.com | [38b7 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38b8 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38b9 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [38ba 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38bb 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [38bc 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 54 but got ts: inc_num:1574140895405208300 seq_num:47 +peer0.org1.example.com | [38bd 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38be 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38bf 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:7051 +peer0.org1.example.com | [38c0 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [359c 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f38c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [359d 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f38c0 gate 1574140979972316000 evaluation succeeds +peer1.org1.example.com | [359e 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [359f 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [35a0 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [35a1 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [35a2 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35a3 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35a4 11-19 05:22:59.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35a5 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [35a6 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [35a7 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35a8 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35a9 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35aa 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35ab 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35ac 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35ad 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35ae 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35af 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [35b0 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35b1 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [35b2 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35b3 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35b4 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [35b5 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [35b6 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [35b7 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d4710 gate 1574140980381000700 evaluation starts +peer1.org1.example.com | [35b8 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d4710 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [35b9 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d4710 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [35ba 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d4710 principal matched by identity 0 +peer1.org1.example.com | [35bb 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c ec b1 9a 47 f5 fd ef 14 df 31 14 a6 94 e5 70 |\...G.....1....p| +peer1.org2.example.com | [38d7 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38d8 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38d9 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38da 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [38db 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38dc 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [38dd 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a52a0 gate 1574140976202625800 evaluation starts +peer1.org2.example.com | [38de 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a52a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38df 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a52a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [38e0 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a52a0 principal matched by identity 0 +peer1.org2.example.com | [38e1 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [38e2 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [38e3 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a52a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [38e4 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a52a0 gate 1574140976202625800 evaluation succeeds +peer1.org2.example.com | [38e5 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38e6 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38e7 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [38e8 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [38e9 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38ea 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38eb 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38ec 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38ed 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38ee 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [38ef 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38f0 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [38f1 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468c430 gate 1574140976205881200 evaluation starts +peer1.org2.example.com | [38f2 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468c430 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38f3 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468c430 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [38f4 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468c430 principal matched by identity 0 +peer1.org2.example.com | [38f5 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [38f6 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [38f7 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468c430 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [38f8 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468c430 gate 1574140976205881200 evaluation succeeds +peer0.org2.example.com | [374a 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [374b 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [374c 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [374d 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [374e 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [374f 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3750 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3751 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3752 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3753 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3754 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397dff0 gate 1574140974563401300 evaluation starts +peer0.org2.example.com | [3755 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397dff0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38c1 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [38c2 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38c3 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [38c4 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38c5 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [38c6 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38c7 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38c8 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38c9 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [38ca 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [38cb 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 gate 1574140974625186700 evaluation starts +peer0.org1.example.com | [38cc 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38cd 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [38ce 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [38cf 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 principal evaluation fails +peer0.org1.example.com | [38d0 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 gate 1574140974625186700 evaluation fails +peer0.org1.example.com | [38d1 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [38d2 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [38d3 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [38d4 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 gate 1574140974627190300 evaluation starts +peer0.org1.example.com | [38d5 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38d6 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [38d7 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 principal matched by identity 0 +peer0.org1.example.com | [38d8 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer0.org1.example.com | [38d9 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 84 22 5f 91 3a a1 b4 f7 d9 69 c5 |0D. .."_.:....i.| +peer0.org1.example.com | 00000010 71 72 17 87 e4 85 36 20 15 ff 3e 6d 80 9a 34 8c |qr....6 ..>m..4.| +peer0.org1.example.com | 00000020 b9 26 14 b9 02 20 4c a4 61 d6 44 ec 59 92 42 11 |.&... L.a.D.Y.B.| +peer0.org1.example.com | 00000030 2f d9 5d b7 bf cc 8d 25 76 8c 64 bc 85 cf c0 38 |/.]....%v.d....8| +peer0.org1.example.com | 00000040 6e 99 45 31 2e 25 |n.E1.%| +peer0.org1.example.com | [38da 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [38db 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 gate 1574140974627190300 evaluation succeeds +peer0.org1.example.com | [38dc 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38dd 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38de 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [38df 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38e0 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | [38e1 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38e2 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [38e3 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38e4 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [38e5 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151031 +peer0.org1.example.com | [38e6 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 682C2A3A1F2F27F52FE63359481F2BB8807F48AC251B19A56DB5C84D984C1358 +peer0.org1.example.com | [38e7 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [38e8 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [38e9 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [38ea 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [38eb 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38ec 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38ed 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [38ee 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38ef 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [38f0 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [38f2 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [38f3 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [38f4 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38f5 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [38f6 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [38f7 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer0.org1.example.com | [38f8 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [38f9 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0033ccaa0, CONNECTING +peer0.org1.example.com | [38f1 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38fa 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [38fb 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [38fc 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38fd 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0033ccaa0, READY +peer0.org1.example.com | [38fe 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3756 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397dff0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3757 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397dff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3758 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397dff0 principal evaluation fails +peer0.org2.example.com | [3759 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397dff0 gate 1574140974563401300 evaluation fails +peer0.org2.example.com | [375a 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [375b 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [375c 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [375d 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8560 gate 1574140974565544700 evaluation starts +peer0.org2.example.com | [375e 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [375f 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8560 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3760 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8560 principal matched by identity 0 +peer0.org2.example.com | [3761 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 01 7c 36 0e f1 3a ea e9 de 5f f7 1d c6 f1 fb |..|6..:..._.....| +peer0.org2.example.com | 00000010 b8 ce ff 1d 8d a0 16 67 59 34 1f 2d 84 68 92 59 |.......gY4.-.h.Y| +peer0.org2.example.com | [3762 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 3e 6c d9 20 e2 7e d2 49 3d bc fd |0D. W>l. .~.I=..| +peer0.org2.example.com | 00000010 bd ec 44 04 10 6f 9e 9c ac 31 2c cb 1e 29 b0 f8 |..D..o...1,..)..| +peer0.org2.example.com | 00000020 16 f2 d8 98 02 20 20 6f 8e 81 b2 96 bf fc 30 cf |..... o......0.| +peer0.org2.example.com | 00000030 e9 6b 18 20 fd fe 47 2d 48 fe ee be d5 e8 bd 1c |.k. ..G-H.......| +peer0.org2.example.com | 00000040 f0 e9 2e 11 7a a3 |....z.| +peer0.org2.example.com | [3763 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3764 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8560 gate 1574140974565544700 evaluation succeeds +peer0.org2.example.com | [3765 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3766 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3767 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3768 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3769 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:37388 +peer0.org2.example.com | [376a 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:37388 +peer0.org2.example.com | [376c 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [376d 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f canceling read because closing +peer0.org2.example.com | [376b 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org2.example.com | [376e 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [376f 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: nonce:12617889285552745019 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org2.example.com | [3771 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12617889285552745019 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org2.example.com | [3772 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3773 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3774 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3770 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3775 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3777 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3776 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 4833863781111185008, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes +peer0.org2.example.com | [3778 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3779 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [377a 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [377b 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003919e90 gate 1574140974592480800 evaluation starts +peer0.org2.example.com | [377c 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003919e90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [377d 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003919e90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [377e 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003919e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [377f 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003919e90 principal evaluation fails +peer0.org2.example.com | [3780 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003919e90 gate 1574140974592480800 evaluation fails +peer0.org2.example.com | [3781 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3782 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3783 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3784 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e6400 gate 1574140974593313000 evaluation starts +peer0.org2.example.com | [3785 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e6400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3786 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e6400 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3787 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e6400 principal matched by identity 0 +peer0.org2.example.com | [3788 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 3a 5e 5f 74 3a 3e 8f 68 6c 43 21 0d fb 5a 83 |.:^_t:>.hlC!..Z.| +peer0.org2.example.com | 00000010 75 2f 92 7f d9 75 e5 e7 e8 b3 82 08 b2 b3 80 f5 |u/...u..........| +peer0.org2.example.com | [3789 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 ff 83 3d a4 9c 3d 6f bf 38 36 |0E.!....=..=o.86| +peer0.org2.example.com | 00000010 ca e2 0a c8 86 65 b6 81 ef 5f cb 18 a8 e7 38 6b |.....e..._....8k| +peer0.org2.example.com | 00000020 29 be dc b8 47 02 20 63 60 a5 8f 78 b2 01 a5 7f |)...G. c`..x....| +peer0.org2.example.com | 00000030 e9 07 fa df 9f 17 b6 da e2 ae 4b 1f 37 71 ac cb |..........K.7q..| +peer0.org2.example.com | 00000040 30 ca af ea 77 bd 54 |0...w.T| +peer0.org2.example.com | [378a 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e6400 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [378b 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e6400 gate 1574140974593313000 evaluation succeeds +peer0.org2.example.com | [378c 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [378d 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [378e 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [378f 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 d2 22 bc 74 b7 4d bf 54 1b ba aa 61 a5 fc 0f 59 |.".t.M.T...a...Y| +peer1.org1.example.com | [35bc 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 60 c1 72 ad b9 14 34 1b bb 6c e7 |0D. 7`.r...4..l.| +peer1.org1.example.com | 00000010 45 d6 3a de 5d 26 59 fd 91 f9 7a 89 a9 7b 3b ef |E.:.]&Y...z..{;.| +peer1.org1.example.com | 00000020 95 e8 c0 96 02 20 3b 4a b4 76 7d f5 16 92 02 82 |..... ;J.v}.....| +peer1.org1.example.com | 00000030 4d e4 0b dd 03 3c cf 9d 9c f5 8c ac 07 b2 d0 59 |M....<.........Y| +peer1.org1.example.com | 00000040 17 49 2f c1 07 79 |.I/..y| +peer1.org1.example.com | [35bd 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d4710 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [35be 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d4710 gate 1574140980381000700 evaluation succeeds +peer1.org1.example.com | [35bf 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [35c0 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [35c1 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [35c2 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [35c3 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35c4 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [35c5 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [35c6 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [35c7 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [35c8 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35c9 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35ca 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35cb 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35cc 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35cd 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35ce 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35cf 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d0 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d1 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d2 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d3 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d4 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d5 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d6 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [35d7 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d8 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [35d9 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35da 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35db 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35dc 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35dd 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35de 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35df 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38f9 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38fa 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38fb 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [38fc 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [38fd 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [38fe 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [38ff 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3900 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3901 11-19 05:22:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3902 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3903 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3904 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3905 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3906 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3907 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3908 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3909 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [390a 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [390b 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [390c 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [390d 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [390e 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [390f 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3910 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3911 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3912 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3913 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3914 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3915 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [3916 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3917 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3918 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3919 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [391a 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [391b 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [391c 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [391d 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [391e 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [391f 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3920 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3921 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3922 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a305b0 gate 1574140978879343500 evaluation starts +peer1.org2.example.com | [3923 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a305b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3924 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a305b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3925 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a305b0 principal matched by identity 0 +peer1.org2.example.com | [3926 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +peer1.org2.example.com | 00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +peer1.org2.example.com | [3927 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +peer1.org2.example.com | 00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +peer1.org2.example.com | 00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +peer1.org2.example.com | 00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +peer1.org2.example.com | 00000040 17 d6 e3 e0 b8 28 |.....(| +peer1.org2.example.com | [3928 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a305b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3929 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a305b0 gate 1574140978879343500 evaluation succeeds +peer1.org2.example.com | [392a 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [392b 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [392c 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [392d 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [392e 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [392f 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3930 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3931 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3932 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3933 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3934 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3935 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3936 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [3937 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3938 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3939 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [393a 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3790 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3791 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3792 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3793 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3794 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3795 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3796 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3797 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3798 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 4833863781111185008, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes +peer0.org2.example.com | [3799 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [379a 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [379b 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org1.example.com | [38ff 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3900 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3901 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3902 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3903 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3904 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3905 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3906 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3907 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3908 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3909 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [390a 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org1.example.com | [390b 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org1.example.com | [390c 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051 +peer0.org1.example.com | [390d 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [390e 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [390f 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3910 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3911 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3912 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3913 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3914 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35e0 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35e1 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35e2 11-19 05:23:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [35e3 11-19 05:23:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15103B +peer1.org1.example.com | [35e4 11-19 05:23:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AA114B5988A65667D3542783262915C81D11E9C60BE53F5CCFAD2737C8A15213 +peer1.org1.example.com | [35e5 11-19 05:23:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [35e6 11-19 05:23:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [35e7 11-19 05:23:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [35e8 11-19 05:23:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [35e9 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35ea 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35eb 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35ec 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [35ed 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [35ee 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35ef 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [35f0 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35f1 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f2 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35f3 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f4 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35f5 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f6 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35f7 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f8 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35f9 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [35fa 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35fb 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [35fc 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35fd 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35fe 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [35ff 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3600 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3601 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a6560 gate 1574140980809483300 evaluation starts +peer1.org1.example.com | [3602 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a6560 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3603 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a6560 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3604 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a6560 principal matched by identity 0 +peer1.org1.example.com | [3605 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 2c 5b 2b c6 2b 64 cb 71 d8 3d 1e 03 d0 8d 5a |.,[+.+d.q.=....Z| +peer1.org1.example.com | 00000010 a7 ec 9e c4 13 67 e6 b1 4e c2 75 d6 4e af ba 12 |.....g..N.u.N...| +peer1.org1.example.com | [3606 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 c7 87 1e 67 63 e9 60 f5 14 53 45 |0D. ....gc.`..SE| +peer1.org1.example.com | 00000010 b0 bc 31 7c 47 91 47 10 7e 8a ab 34 6c d9 0b e1 |..1|G.G.~..4l...| +peer1.org1.example.com | 00000020 71 be f1 80 02 20 1e 1e 49 15 51 45 f3 53 eb f2 |q.... ..I.QE.S..| +peer1.org1.example.com | 00000030 f5 be f7 64 ef 54 67 2e 87 79 ff af dd f7 6a 51 |...d.Tg..y....jQ| +peer1.org1.example.com | 00000040 86 97 b4 ed a1 ac |......| +peer1.org1.example.com | [3607 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a6560 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3608 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a6560 gate 1574140980809483300 evaluation succeeds +peer1.org1.example.com | [3609 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [360a 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [360b 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [360c 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [360d 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [360e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [360f 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3610 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3611 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3612 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3613 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3614 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [393b 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [393c 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [393d 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [393e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [393f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3940 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3941 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3942 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3943 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3944 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3945 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3947 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3946 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3948 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3949 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [394b 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [394a 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [394c 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [394d 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [394f 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [394e 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3950 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3951 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3952 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3953 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3954 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3955 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [379c 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [379d 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [379e 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [379f 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37a0 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [37a1 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [37a2 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [37a3 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37a4 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7b80 gate 1574140974594492300 evaluation starts +peer0.org2.example.com | [37a5 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7b80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [37a6 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37a9 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12617889285552745019, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [37aa 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [37ab 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12617889285552745019, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [37ac 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37a7 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7b80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [37ad 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [37ae 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7b80 principal evaluation fails +peer0.org2.example.com | [37af 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7b80 gate 1574140974594492300 evaluation fails +peer0.org2.example.com | [37b0 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [37b1 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [37b2 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [37b3 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9ad0 gate 1574140974596819400 evaluation starts +peer0.org2.example.com | [37b4 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [37b5 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9ad0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [37b6 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9ad0 principal matched by identity 0 +peer0.org2.example.com | [37b7 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer0.org2.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer0.org2.example.com | [37b8 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer0.org2.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer0.org2.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer0.org2.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer0.org2.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer0.org2.example.com | [37b9 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9ad0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [37ba 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9ad0 gate 1574140974596819400 evaluation succeeds +peer0.org2.example.com | [37bb 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [37bc 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [37bd 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [37be 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [37bf 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37c0 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37c1 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [37c2 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 62 34 b9 23 38 2c b1 97 b1 6f 2f 16 8b e0 34 |.b4.#8,...o/...4| +peer0.org2.example.com | 00000010 99 68 ad 01 9f 37 5d 4d 28 f1 ca 80 69 6d bd 9a |.h...7]M(...im..| +peer0.org2.example.com | [37c3 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 75 94 96 e5 15 c3 ed 97 5a 93 66 |0D. Iu.......Z.f| +peer0.org2.example.com | 00000010 7b 3b 58 bf 85 09 cf d8 42 1a 98 fb 9e b1 20 f8 |{;X.....B..... .| +peer0.org2.example.com | 00000020 d8 ce 01 e1 02 20 63 bd 05 d5 d0 67 da 21 de 3c |..... c....g.!.<| +peer0.org2.example.com | 00000030 3f c8 25 1d a1 f0 20 c7 8e 58 14 37 33 9b f9 7a |?.%... ..X.73..z| +peer0.org2.example.com | 00000040 33 ae 24 46 14 0e |3.$F..| +peer0.org2.example.com | [37c4 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37a8 11-19 05:22:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37c5 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37c6 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37c7 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [37c8 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer0.org2.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer0.org2.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer0.org2.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer0.org2.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer0.org2.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer0.org2.example.com | [37ca 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37cb 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37cc 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37cd 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37ce 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37cf 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37d0 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [37d1 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3956 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3957 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3958 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3959 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC151039 +peer1.org2.example.com | [395a 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5754B752D2887E26F96FF48949130338A854F6ABF23A470BA858E4C2685D137F +peer1.org2.example.com | [395b 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [395c 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [395d 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [395e 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\355\217z\240\233BL\021Z\345\224\006\256\263\343\304" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [395f 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3960 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3961 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3962 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3965 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3966 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3963 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\355\217z\240\233BL\021Z\345\224\006\256\263\343\304" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3967 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3964 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3968 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3969 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [396a 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [396b 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [396c 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [396d 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer1.org2.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer1.org2.example.com | [396e 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer1.org2.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer1.org2.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer1.org2.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer1.org2.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer1.org2.example.com | [396f 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3970 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 16 72 4f b4 56 4b e6 e3 ef 1c |0E.!...rO.VK....| +peer1.org2.example.com | 00000010 f0 dc c4 5c 6b 6c 7b 4c 95 90 59 ec de 07 09 d3 |...\kl{L..Y.....| +peer1.org2.example.com | 00000020 78 81 e8 44 8b 02 20 2b 5c 24 fc af db ab b9 15 |x..D.. +\$......| +peer1.org2.example.com | 00000030 c9 7d 64 41 e4 e4 3e ed 8f 7a a0 9b 42 4c 11 5a |.}dA..>..z..BL.Z| +peer1.org2.example.com | 00000040 e5 94 06 ae b3 e3 c4 |.......| +peer1.org2.example.com | [3971 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3972 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3973 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3974 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3975 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3976 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3978 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3979 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3977 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [397a 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [397b 11-19 05:22:59.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3915 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:7051 +peer0.org1.example.com | [3916 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org1.example.com | [3917 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 6a 60 c8 6b b1 1e 4b fb 2d 0e ca |0D. 5j`.k..K.-..| +peer0.org1.example.com | 00000010 b2 fd 15 32 f1 38 bc ca b8 22 8c 56 0a c1 56 11 |...2.8...".V..V.| +peer0.org1.example.com | 00000020 8c e0 0f d6 02 20 14 c5 14 11 27 20 e1 49 a6 f5 |..... ....' .I..| +peer0.org1.example.com | 00000030 56 c6 20 97 93 34 20 67 ad 2c bc 6c bb 91 52 e3 |V. ..4 g.,.l..R.| +peer0.org1.example.com | 00000040 ce 7c c0 61 af 4c |.|.a.L| +peer0.org1.example.com | [3918 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org1.example.com | [3919 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [391a 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [391b 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [391c 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [391d 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [391e 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [391f 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3920 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3921 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3922 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151032 +peer0.org1.example.com | [3923 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CD94316390E50731BBB8E8472782979A929BA02C3254EFD73F13D591D61C11C +peer0.org1.example.com | [3924 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3925 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3926 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3927 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3928 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3929 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392a 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [392b 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\241\251\342\031" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [392d 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\241\251\342\031" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [392e 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [392c 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3930 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [392f 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3931 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3932 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.861Z grpc.peer_address=172.18.0.8:41510 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=122.2µs +peer0.org1.example.com | [3933 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3934 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org1.example.com | [3935 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org1.example.com | [3936 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:41510 +peer0.org1.example.com | [3937 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41510 +peer0.org1.example.com | [3938 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org1.example.com | [3939 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 3f 82 7f d8 11 fa d3 86 61 46 |0D. DEBU Authenticated 172.18.0.8:41510 +peer0.org1.example.com | [393b 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41510 +peer0.org1.example.com | [393c 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +peer0.org1.example.com | [393d 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [393e 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [393f 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing +peer0.org1.example.com | [3940 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3941 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3942 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3943 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3944 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3945 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer0.org1.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer0.org1.example.com | [3946 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer0.org1.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer0.org1.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer0.org1.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer0.org1.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer0.org1.example.com | [3947 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3948 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3615 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3616 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3617 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3618 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3619 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [361a 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [361b 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [361c 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [361d 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [361e 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [361f 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3620 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3621 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3622 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3623 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3624 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3625 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3626 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3627 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3628 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3629 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [362a 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [362b 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [362c 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [362d 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [362e 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [362f 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3630 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3631 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3632 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3633 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3634 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3635 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3636 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [3637 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer1.org1.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer1.org1.example.com | [3638 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer1.org1.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer1.org1.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer1.org1.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer1.org1.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer1.org1.example.com | [3639 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [363a 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 e0 9f 37 b7 e4 c5 c5 5c 6b d1 |0E.!....7....\k.| +peer1.org1.example.com | 00000010 2f f7 6d e7 ba f7 13 ed fb 1c 56 fd 92 18 a1 16 |/.m.......V.....| +peer1.org1.example.com | 00000020 dc 6a 87 f0 20 02 20 3d 31 b9 4a a9 15 08 e9 9c |.j.. . =1.J.....| +peer1.org1.example.com | 00000030 62 b7 42 c0 0d c6 2b 7e 3d ea 2d c3 d9 1e ff 99 |b.B...+~=.-.....| +peer1.org1.example.com | 00000040 bc f0 a9 c2 86 63 39 |.....c9| +peer1.org2.example.com | [397c 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [397d 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [397e 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [397f 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3980 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd50 gate 1574140979491484000 evaluation starts +peer1.org2.example.com | [3981 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3982 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd50 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3983 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd50 principal matched by identity 0 +peer1.org2.example.com | [3984 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +peer1.org2.example.com | 00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +peer1.org2.example.com | [3985 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +peer1.org2.example.com | 00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +peer1.org2.example.com | 00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +peer1.org2.example.com | 00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +peer1.org2.example.com | 00000040 17 d6 e3 e0 b8 28 |.....(| +peer1.org2.example.com | [3986 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3987 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd50 gate 1574140979491484000 evaluation succeeds +peer1.org2.example.com | [3988 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3989 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [398a 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [398b 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [398c 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [398d 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [398e 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [398f 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer1.org2.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer1.org2.example.com | [3990 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer1.org2.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer1.org2.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer1.org2.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer1.org2.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer1.org2.example.com | [3991 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3992 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3993 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3994 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer1.org2.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer1.org2.example.com | [3995 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer1.org2.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer1.org2.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer1.org2.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer1.org2.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer1.org2.example.com | [3996 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3997 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3998 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3999 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [399a 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [399b 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [399c 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [399d 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [399e 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer1.org2.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer1.org2.example.com | [399f 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer1.org2.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer1.org2.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer1.org2.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer1.org2.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer1.org2.example.com | [39a0 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39a1 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39a2 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39a3 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [39a4 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [363b 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [363c 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [363d 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [363e 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [363f 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3640 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3641 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3642 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [3643 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3644 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3645 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3646 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [3647 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3648 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3649 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [364a 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [364b 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [364c 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [364d 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [364e 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [364f 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3650 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3651 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3652 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3653 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3654 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3655 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3656 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3657 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3658 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [3659 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [365a 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [365b 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [365c 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [365d 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5 6] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org1.example.com | [3949 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [394a 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer0.org1.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer0.org1.example.com | [394b 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer0.org1.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer0.org1.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer0.org1.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer0.org1.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer0.org1.example.com | [394c 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [394d 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [394e 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [394f 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [3950 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3951 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3952 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3953 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3954 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3955 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3956 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3957 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 gate 1574140974892843500 evaluation starts +peer0.org1.example.com | [3958 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3959 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [395a 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [395b 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 principal evaluation fails +peer0.org1.example.com | [395c 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 gate 1574140974892843500 evaluation fails +peer0.org1.example.com | [395d 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [395e 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [395f 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3960 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 gate 1574140974896223200 evaluation starts +peer0.org1.example.com | [3961 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3962 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3963 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 principal matched by identity 0 +peer0.org1.example.com | [3964 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +peer0.org1.example.com | 00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +peer0.org1.example.com | 00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +peer0.org1.example.com | 00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +peer0.org1.example.com | 00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +peer0.org1.example.com | 00000040 2b 06 37 2d 2a 45 |+.7-*E| +peer0.org1.example.com | [3966 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3967 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 gate 1574140974896223200 evaluation succeeds +peer0.org1.example.com | [3968 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3969 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [396a 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [396b 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [396c 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [396d 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 54 but got ts: inc_num:1574140895405208300 seq_num:47 +peer0.org1.example.com | [396e 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [396f 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3970 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3971 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3972 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3973 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3974 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3975 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer0.org1.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer0.org1.example.com | [3976 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer0.org1.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer0.org1.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer0.org1.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer0.org1.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer0.org1.example.com | [3977 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3978 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3979 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [397a 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [397b 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [397c 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [397d 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [397e 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [397f 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3980 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3981 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [365e 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [365f 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3660 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3661 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3662 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3663 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [3664 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3665 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3666 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3667 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3668 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3669 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [366a 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [366b 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018f660 gate 1574140983479296300 evaluation starts +peer1.org1.example.com | [366c 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018f660 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [366d 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018f660 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [366e 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018f660 principal matched by identity 0 +peer1.org1.example.com | [366f 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer1.org1.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer1.org1.example.com | [3670 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer1.org1.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer1.org1.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer1.org1.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer1.org1.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer1.org1.example.com | [3671 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018f660 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3672 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00018f660 gate 1574140983479296300 evaluation succeeds +peer1.org1.example.com | [3673 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3674 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3675 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3676 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3677 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3678 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3679 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [367a 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [367b 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [367c 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [367d 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [367e 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [367f 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [3680 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3681 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3682 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3683 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3684 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [3685 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3686 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3687 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3688 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3689 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [368a 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [368b 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [368c 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [368d 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [368e 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [368f 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3690 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3691 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3692 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3693 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3694 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3695 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3696 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3697 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3698 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3699 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [369a 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [369b 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7930 gate 1574140983592101000 evaluation starts +peer1.org1.example.com | [369c 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7930 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [369d 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7930 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [369e 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7930 principal matched by identity 0 +peer1.org1.example.com | [369f 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [36a0 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [36a1 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7930 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36a2 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7930 gate 1574140983592101000 evaluation succeeds +peer1.org1.example.com | [36a3 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36a4 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36a5 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36a6 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36a7 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [36a8 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [36a9 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [36aa 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | [37d2 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [37d3 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37d4 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37d5 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [37d6 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [37d7 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [37d8 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e1e0 gate 1574140974740408500 evaluation starts +peer0.org2.example.com | [37d9 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e1e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [37da 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e1e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [37db 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e1e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [37dc 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e1e0 principal evaluation fails +peer0.org2.example.com | [37dd 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e1e0 gate 1574140974740408500 evaluation fails +peer0.org2.example.com | [37de 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [37df 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [37e0 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [37e1 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e750 gate 1574140974741131700 evaluation starts +peer0.org2.example.com | [37e2 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [37e3 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e750 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [37e4 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e750 principal matched by identity 0 +peer0.org2.example.com | [37e5 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 2c 2a 3a 1f 2f 27 f5 2f e6 33 59 48 1f 2b b8 |h,*:./'./.3YH.+.| +peer0.org2.example.com | 00000010 80 7f 48 ac 25 1b 19 a5 6d b5 c8 4d 98 4c 13 58 |..H.%...m..M.L.X| +peer0.org2.example.com | [37e6 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 db 06 53 32 2a 8b 1f 1a ca 77 66 |0D. ...S2*....wf| +peer0.org2.example.com | 00000010 02 cf fb a1 20 1c de 53 00 37 f9 f5 45 f2 06 37 |.... ..S.7..E..7| +peer0.org2.example.com | 00000020 e9 72 2b b7 02 20 48 1a 2c 9b 64 d7 2f 6a b0 1f |.r+.. H.,.d./j..| +peer0.org2.example.com | 00000030 3f 5b 85 a6 89 70 16 e9 27 8c 61 fd b2 82 76 d3 |?[...p..'.a...v.| +peer0.org2.example.com | 00000040 74 27 b1 70 7b 43 |t'.p{C| +peer0.org2.example.com | [37e7 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e750 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [37e8 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e750 gate 1574140974741131700 evaluation succeeds +peer0.org2.example.com | [37e9 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [37ea 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [37eb 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [37ec 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [37ed 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37ee 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [37ef 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [37f0 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [37f1 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [37f2 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37f3 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37f4 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37f5 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37f6 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37f7 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37f8 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37f9 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37fa 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37fb 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37fc 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37fd 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39a5 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [39a6 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39a7 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39a8 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [39a9 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [39aa 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [39ab 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a2de0 gate 1574140979510876400 evaluation starts +peer1.org2.example.com | [39ac 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a2de0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39ad 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a2de0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [39ae 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a2de0 principal matched by identity 0 +peer1.org2.example.com | [39af 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer1.org2.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer1.org2.example.com | [39b0 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer1.org2.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer1.org2.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer1.org2.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer1.org2.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer1.org2.example.com | [39b1 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a2de0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [39b2 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a2de0 gate 1574140979510876400 evaluation succeeds +peer1.org2.example.com | [39b3 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39b4 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39b5 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [39b6 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [39b7 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39b8 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39b9 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [39ba 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer1.org2.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer1.org2.example.com | [39bb 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer1.org2.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer1.org2.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer1.org2.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer1.org2.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer1.org2.example.com | [39bc 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39bd 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39be 11-19 05:22:59.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39bf 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [39c0 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39c1 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39c2 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39c3 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39c4 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39c5 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39c6 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39c7 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [39c8 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39c9 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [39ca 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39cb 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39cc 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [39cd 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [39ce 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [39cf 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b8fc0 gate 1574140979733152400 evaluation starts +peer1.org2.example.com | [39d0 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b8fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39d1 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b8fc0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [39d2 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b8fc0 principal matched by identity 0 +peer1.org2.example.com | [39d3 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 40 9e 06 5b 10 a0 04 7b 15 9f 58 4e 9f 2b 9a |.@..[...{..XN.+.| +peer1.org2.example.com | 00000010 66 f3 41 5e 31 69 e6 70 53 f2 14 af fc 9d af 07 |f.A^1i.pS.......| +peer1.org2.example.com | [39d4 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f6 f7 3b f0 2b 93 7f 4a d5 be eb |0D. c..;.+..J...| +peer1.org2.example.com | 00000010 ac 4f 2c e0 8c 5b e0 8a 5e 6d 51 b0 4d 0b ef ed |.O,..[..^mQ.M...| +peer1.org2.example.com | 00000020 15 6b 93 0b 02 20 7c c0 c9 02 94 b7 6d 56 83 0b |.k... |.....mV..| +peer1.org2.example.com | 00000030 45 c0 08 07 c8 37 7f 40 06 d0 c8 db a2 6f 84 82 |E....7.@.....o..| +peer1.org2.example.com | 00000040 3c 36 44 67 f5 d5 |<6Dg..| +peer1.org2.example.com | [39d5 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b8fc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [39d6 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b8fc0 gate 1574140979733152400 evaluation succeeds +peer1.org2.example.com | [39d7 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39d8 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39d9 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [39da 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [39db 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39dc 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [39dd 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [39de 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [39df 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [39e0 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39e1 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39e2 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39e3 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39e4 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39e5 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39e6 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39e7 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39e8 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39e9 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [39ea 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39eb 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39ec 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [39ed 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39ef 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39ee 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [39f0 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39f1 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [39f2 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [39f3 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f4 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f5 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f6 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f7 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f8 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f9 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [39fa 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39fb 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [39fc 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [39fd 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [39fe 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39ff 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" secret_envelope:\323\303\022V'\202\260E > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a00 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a01 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" secret_envelope:\323\303\022V'\202\260E > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a02 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [3a03 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 48 fb 5f aa d8 07 cc 3e 3d 2b 75 f8 70 f4 96 |.H._....>=+u.p..| +peer1.org2.example.com | 00000010 ad 2f 7d 1f de d6 db bd f7 2a 94 8c a5 22 93 66 |./}......*...".f| +peer1.org2.example.com | [3a04 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ec a5 52 1c 85 87 80 48 6a eb |0E.!....R....Hj.| +peer1.org2.example.com | 00000010 72 01 fa 4f eb 1c a0 b6 6e 17 43 62 cf 0b 02 19 |r..O....n.Cb....| +peer1.org2.example.com | 00000020 fa b6 07 c6 b9 02 20 17 1e 92 d4 fa 15 47 b8 b1 |...... ......G..| +peer0.org1.example.com | [3982 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 gate 1574140974906098800 evaluation starts +peer0.org1.example.com | [3983 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3984 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3985 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3986 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 principal evaluation fails +peer0.org1.example.com | [3987 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 gate 1574140974906098800 evaluation fails +peer0.org1.example.com | [3988 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3989 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [398a 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [398b 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 gate 1574140974908238300 evaluation starts +peer0.org1.example.com | [398c 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [398d 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [398e 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 principal matched by identity 0 +peer0.org1.example.com | [398f 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 62 34 b9 23 38 2c b1 97 b1 6f 2f 16 8b e0 34 |.b4.#8,...o/...4| +peer0.org1.example.com | 00000010 99 68 ad 01 9f 37 5d 4d 28 f1 ca 80 69 6d bd 9a |.h...7]M(...im..| +peer0.org1.example.com | [3990 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 75 94 96 e5 15 c3 ed 97 5a 93 66 |0D. Iu.......Z.f| +peer0.org1.example.com | 00000010 7b 3b 58 bf 85 09 cf d8 42 1a 98 fb 9e b1 20 f8 |{;X.....B..... .| +peer0.org1.example.com | 00000020 d8 ce 01 e1 02 20 63 bd 05 d5 d0 67 da 21 de 3c |..... c....g.!.<| +peer0.org1.example.com | 00000030 3f c8 25 1d a1 f0 20 c7 8e 58 14 37 33 9b f9 7a |?.%... ..X.73..z| +peer0.org1.example.com | 00000040 33 ae 24 46 14 0e |3.$F..| +peer0.org1.example.com | [3991 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3992 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 gate 1574140974908238300 evaluation succeeds +peer0.org1.example.com | [3994 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3995 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3996 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3997 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3998 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3993 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [3999 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41510 disconnected +peer0.org1.example.com | [399b 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:41510 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=44.1735ms +peer0.org1.example.com | [399a 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [399d 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [399e 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [399c 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [399f 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +peer0.org1.example.com | 00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +peer0.org1.example.com | [39a0 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +peer0.org1.example.com | 00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +peer0.org1.example.com | 00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +peer0.org1.example.com | 00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +peer0.org1.example.com | 00000040 99 38 5b c7 0d 16 |.8[...| +peer0.org1.example.com | [39a1 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [39a2 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39a3 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39a4 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.916Z grpc.peer_address=172.18.0.8:41512 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=110.3µs +peer0.org1.example.com | [39a5 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [39a6 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +peer0.org1.example.com | [39a7 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +peer0.org1.example.com | [39a8 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:41512 +peer0.org1.example.com | [39a9 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41512 +peer0.org1.example.com | [39aa 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org1.example.com | [39ab 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 43 ea 1b f1 83 4c 82 9a 75 ec 85 |0D. .C....L..u..| +peer0.org1.example.com | 00000010 2f 17 57 8e d4 1d ac 8c a3 11 5e 6c af e3 e0 24 |/.W.......^l...$| +peer0.org1.example.com | 00000020 b1 b2 c8 7e 02 20 20 98 3e 09 67 f1 19 94 fa 46 |...~. .>.g....F| +peer0.org1.example.com | 00000030 4c 6b 4e 69 f2 71 d2 dc ac ec a0 bc bb 8c 6b ba |LkNi.q........k.| +peer0.org1.example.com | 00000040 62 e7 c0 cb f2 27 |b....'| +peer0.org1.example.com | [39ac 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41512 +peer0.org1.example.com | [39ad 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41512 +peer0.org1.example.com | [39ae 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [39af 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39b0 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [39b1 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [39b2 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer0.org1.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer0.org1.example.com | [39b3 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer0.org1.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer0.org1.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer0.org1.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer0.org1.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer0.org1.example.com | [39b4 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [39b5 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 c5 3d ea b9 fb dc ee 7d e7 4d ec |0D. `.=.....}.M.| +peer0.org1.example.com | 00000010 70 dc d8 58 43 fe 6f aa 62 c5 ce 57 99 e3 01 84 |p..XC.o.b..W....| +peer0.org1.example.com | 00000020 8b 9f f4 fa 02 20 6f 4c dc c7 33 b9 37 7b 4d 57 |..... oL..3.7{MW| +peer0.org1.example.com | 00000030 ac 7d cd 19 93 17 42 2b 70 fd 98 d7 45 4e f2 6a |.}....B+p...EN.j| +peer0.org1.example.com | 00000040 ad 3e a1 a9 e2 19 |.>....| +peer0.org1.example.com | [39b6 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [39b7 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [39b8 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39b9 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ba 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39bb 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39bc 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [39bd 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [39be 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39bf 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [39c0 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39c1 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [39c2 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39c3 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [39c6 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c7 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c9 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org1.example.com | [39ca 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39cc 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39cb 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [39ce 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39cf 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [39d0 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39c8 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [39d1 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [39d2 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39d3 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39d4 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [39d5 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39d6 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39d7 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [39cd 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [39c5 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [39c4 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [39d8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [39da 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [39db 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 gate 1574140975298258600 evaluation starts +peer0.org1.example.com | [39dc 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39dd 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [39de 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [39df 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 principal evaluation fails +peer0.org2.example.com | [37ff 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37fe 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3800 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [3801 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3802 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [3803 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3804 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3805 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer0.org2.example.com | [3806 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3807 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003a6db70, CONNECTING +peer0.org2.example.com | [3808 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3809 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [380a 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org2.example.com | [380b 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [380c 11-19 05:22:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003a8b580, CONNECTING +peer0.org2.example.com | [380d 11-19 05:22:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003a6db70, READY +peer0.org2.example.com | [380e 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [380f 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [3810 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [3811 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:7051 +peer0.org2.example.com | [3812 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:7051 +peer0.org2.example.com | [3813 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3814 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3815 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3816 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3817 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3818 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3819 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [381a 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [381b 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [381c 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [381d 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [381e 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add7a0 gate 1574140974769612400 evaluation starts +peer0.org2.example.com | [381f 11-19 05:22:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add7a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3820 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add7a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3821 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3822 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add7a0 principal evaluation fails +peer0.org2.example.com | [3823 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add7a0 gate 1574140974769612400 evaluation fails +peer0.org2.example.com | [3824 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3825 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3826 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3827 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003addd10 gate 1574140974772487800 evaluation starts +peer0.org2.example.com | [3828 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003addd10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3829 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003addd10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [382a 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003addd10 principal matched by identity 0 +peer0.org2.example.com | [382b 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org2.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +peer0.org2.example.com | [382c 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 cf 03 61 0e bc 5b 64 b2 5d 99 dd |0D. ...a..[d.]..| +peer0.org2.example.com | 00000010 50 da fc 08 0b 5b 48 d4 39 04 fb 44 39 9f 77 15 |P....[H.9..D9.w.| +peer0.org2.example.com | 00000020 fa 8e f4 9f 02 20 09 f2 87 fb 79 c8 5c 0d 1e 3d |..... ....y.\..=| +peer0.org2.example.com | 00000030 6b 3b 14 01 c6 13 0b 1e 5a 2e 37 ef 12 6c b3 e5 |k;......Z.7..l..| +peer0.org2.example.com | 00000040 0a 50 c3 79 ed af |.P.y..| +peer0.org2.example.com | [382d 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003addd10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [382e 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003addd10 gate 1574140974772487800 evaluation succeeds +peer0.org2.example.com | [382f 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3830 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3831 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3832 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3833 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org2.example.com | [3834 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3835 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [3836 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3837 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003a8b580, READY +peer0.org2.example.com | [3838 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3839 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [383a 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [383b 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [383c 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [383d 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [383e 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [383f 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3840 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [3841 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3842 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3843 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [3844 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [3845 11-19 05:22:54.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer0.org2.example.com | [3846 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:7051 +peer0.org2.example.com | [3847 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org2.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer0.org2.example.com | [3848 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 96 61 9e 26 b2 89 f5 2d 2d b6 1d |0D. ..a.&...--..| +peer0.org2.example.com | 00000010 0a 2c 8a 21 7f 0e 6a 9f d4 49 14 b7 8d f6 30 86 |.,.!..j..I....0.| +peer0.org2.example.com | 00000020 66 ea 5b a6 02 20 00 8a 7c e3 d4 42 e7 64 3e 52 |f.[.. ..|..B.d>R| +peer0.org2.example.com | 00000030 85 a0 6c c2 27 64 c3 48 1c 65 85 79 98 87 84 e2 |..l.'d.H.e.y....| +peer0.org2.example.com | 00000040 ef 06 6c d9 4f fb |..l.O.| +peer0.org2.example.com | [3849 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [384a 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [384b 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [384c 11-19 05:22:54.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [384d 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.831Z grpc.peer_address=172.18.0.7:33144 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=277.3µs +peer0.org2.example.com | [384e 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [384f 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [3850 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer0.org2.example.com | [3851 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:33144 +peer0.org2.example.com | [3852 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:33144 +peer0.org2.example.com | [3853 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org2.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer0.org2.example.com | [3854 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 c7 02 3a 13 06 d9 e5 0d 7a c1 e2 |0D. !..:.....z..| +peer0.org2.example.com | 00000010 c8 0d d8 de e4 da 15 e8 33 cf f7 75 de ea 41 5c |........3..u..A\| +peer0.org2.example.com | 00000020 50 10 20 c1 02 20 0a 90 e1 7b 6c a1 30 ba f0 75 |P. .. ...{l.0..u| +peer0.org2.example.com | 00000030 a1 51 29 d6 5a c5 1a 5e f6 89 31 a8 e5 27 d0 62 |.Q).Z..^..1..'.b| +peer0.org2.example.com | 00000040 43 39 b8 5d 27 62 |C9.]'b| +peer0.org2.example.com | [3856 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:33144 +peer0.org2.example.com | [3857 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:33144 +peer0.org2.example.com | [3855 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [385b 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing +peer0.org2.example.com | [385c 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [385d 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:33144 disconnected +peer0.org2.example.com | [385e 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:33144 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=7.5667ms +peer0.org2.example.com | [385f 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3858 11-19 05:22:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.9:7051->172.18.0.7:33144: read: connection reset by peer +peer0.org2.example.com | [3859 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [385a 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3860 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3861 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3862 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3863 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3864 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3865 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3866 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3867 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3868 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3869 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [386a 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [386b 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [386c 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [386d 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [386e 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [386f 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3870 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585090 gate 1574140974854197900 evaluation starts +peer0.org2.example.com | [3871 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3872 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585090 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3873 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3874 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585090 principal evaluation fails +peer0.org2.example.com | [3875 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585090 gate 1574140974854197900 evaluation fails +peer0.org2.example.com | [3876 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3877 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3878 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3879 11-19 05:22:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585600 gate 1574140974855910700 evaluation starts +peer0.org2.example.com | [387a 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [387b 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585600 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [387c 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585600 principal matched by identity 0 +peer0.org2.example.com | [387d 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer0.org2.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer0.org2.example.com | [387e 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer0.org2.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer0.org2.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer0.org2.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer0.org2.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer0.org2.example.com | [387f 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3880 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003585600 gate 1574140974855910700 evaluation succeeds +peer0.org2.example.com | [3881 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3882 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3883 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3884 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3885 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3886 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3887 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3888 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3889 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [388a 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [388b 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [388c 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [388d 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [388e 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [388f 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3890 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3891 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3892 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3893 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3894 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3895 11-19 05:22:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [3896 11-19 05:22:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [3897 11-19 05:22:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3898 11-19 05:22:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC15100F1801 +peer0.org2.example.com | [3899 11-19 05:22:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7D3073650373E292331CA75152B2197F06AF959C8C0FACF02AF23B135AE37D8E +peer0.org2.example.com | [389a 11-19 05:22:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [389b 11-19 05:22:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [389c 11-19 05:22:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [389d 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [389e 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [389f 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [38a0 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38a1 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38a2 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [38a3 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [38a4 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [38a5 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [38a6 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org2.example.com | [38a7 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [38a8 11-19 05:22:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035ec6e0, CONNECTING +peer0.org2.example.com | [38a9 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035ec6e0, READY +peer0.org2.example.com | [38aa 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [38ab 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A202A67A69F6BD29A892D...178602FB8D684BAF95A6183E78322A6E +peer0.org2.example.com | [38ac 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FFCC8C4A012AC38D4BB3C56939498259B14D5A920BE8888E6CA5F4B943BD443 +peer1.org2.example.com | 00000030 af 1e cd 49 da 31 c3 88 09 cb bc 52 0e 54 58 46 |...I.1.....R.TXF| +peer1.org2.example.com | 00000040 3e d6 27 9f c9 8a 50 |>.'...P| +peer1.org2.example.com | [3a05 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3a06 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 42 b2 22 25 57 48 b4 1c e7 dc 48 |0D. hB."%WH....H| +peer1.org2.example.com | 00000010 8c f4 12 3e d3 c3 12 56 27 82 b0 45 3c 55 23 77 |...>...V'..E DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3a08 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [3a09 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3a0a 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3a0b 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3a0c 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a0d 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a0e 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a0f 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [3a10 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a11 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a12 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a13 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\326'\237\311\212P" secret_envelope:\323\303\022V'\202\260E > alive: +peer1.org2.example.com | [3a14 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a15 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a16 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a17 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a18 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a19 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a1a 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a1b 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a1c 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a1d 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [3a1e 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a1f 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a20 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a21 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a22 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a23 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a24 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a25 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4620 gate 1574140979950201800 evaluation starts +peer1.org2.example.com | [3a26 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a27 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4620 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3a28 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4620 principal matched by identity 0 +peer1.org2.example.com | [3a29 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 39 5e 36 0b 9b 3a 1f a6 3f 14 00 94 8e 74 60 |.9^6..:..?....t`| +peer1.org2.example.com | 00000010 a4 d7 0b d4 72 ad 9f 69 55 a2 c0 cc 28 fb dd f2 |....r..iU...(...| +peer1.org2.example.com | [3a2a 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 96 ec 0f 80 8a 44 f7 4b b7 9d |0E.!.......D.K..| +peer1.org2.example.com | 00000010 c6 74 e5 6e 72 4b 8e 7b ca a9 da 92 36 b3 a7 99 |.t.nrK.{....6...| +peer1.org2.example.com | 00000020 68 cd f5 04 1d 02 20 60 b8 52 28 04 0b 73 69 d5 |h..... `.R(..si.| +peer1.org2.example.com | 00000030 43 30 0d b1 7d 21 ab 4c 24 c7 64 d1 2e 1b 51 8c |C0..}!.L$.d...Q.| +peer1.org2.example.com | 00000040 e1 3e e7 fd 36 c1 76 |.>..6.v| +peer1.org2.example.com | [3a2b 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4620 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a2c 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4620 gate 1574140979950201800 evaluation succeeds +peer1.org2.example.com | [3a2d 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a2e 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a2f 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3a30 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a31 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3a32 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3a33 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3a34 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3a35 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3a36 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a37 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a38 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [3a39 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a3a 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a3b 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a3c 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [38ad 11-19 05:22:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:x2*n" > , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer0.org2.example.com | [38ae 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:7051 +peer0.org2.example.com | [38af 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org2.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +peer0.org2.example.com | [38b0 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d fa 9d 53 fa 8e e8 ad 83 50 0e d2 |0D. =..S.....P..| +peer0.org2.example.com | 00000010 29 1b 0a 1c b8 40 80 66 90 34 40 33 81 1f bd 4f |)....@.f.4@3...O| +peer0.org2.example.com | 00000020 c2 95 85 7e 02 20 5c 4b be 2f bc 88 22 ee 9b 05 |...~. \K./.."...| +peer0.org2.example.com | 00000030 18 73 cc 05 9c 9e 4f 9e 77 03 67 f7 ad 94 a6 f4 |.s....O.w.g.....| +peer0.org2.example.com | 00000040 a1 75 c6 b3 1e 00 |.u....| +peer0.org2.example.com | [38b1 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [38b2 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38b3 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [38b4 11-19 05:22:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38b5 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [38b6 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38b7 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38b8 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38b9 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38ba 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [38bb 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38bc 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [38bd 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [38be 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [38bf 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [38c0 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [38c1 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [38c2 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036482f0 gate 1574140975291416400 evaluation starts +peer0.org2.example.com | [38c3 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036482f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38c4 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036482f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [38c5 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036482f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [38c6 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036482f0 principal evaluation fails +peer0.org2.example.com | [38c7 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036482f0 gate 1574140975291416400 evaluation fails +peer0.org2.example.com | [38c8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [38c9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [38ca 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [38cb 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003648860 gate 1574140975292124200 evaluation starts +peer0.org2.example.com | [38cc 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003648860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38cd 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003648860 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [38ce 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003648860 principal matched by identity 0 +peer0.org2.example.com | [38cf 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [38d0 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [38d1 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003648860 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [38d2 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003648860 gate 1574140975292124200 evaluation succeeds +peer0.org2.example.com | [38d3 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [38d4 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [38d5 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [38d6 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [38d7 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38d8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38d9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [38da 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [38db 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [38dc 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [38dd 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [38de 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649450 gate 1574140975293291900 evaluation starts +peer0.org2.example.com | [38df 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649450 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38e0 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649450 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [38e1 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [38e2 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649450 principal evaluation fails +peer0.org2.example.com | [38e3 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649450 gate 1574140975293291900 evaluation fails +peer0.org2.example.com | [38e4 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [38e5 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [38e6 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [38e7 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036499c0 gate 1574140975293548000 evaluation starts +peer0.org2.example.com | [38e8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036499c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38e9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036499c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [38ea 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036499c0 principal matched by identity 0 +peer0.org2.example.com | [38eb 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [38ec 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [38ed 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036499c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [38ee 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036499c0 gate 1574140975293548000 evaluation succeeds +peer0.org2.example.com | [38ef 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [38f0 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [38f1 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [38f2 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a3d 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\326'\237\311\212P" > alive:\347\3756\301v" > alive: +peer1.org2.example.com | [3a3e 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a3f 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a40 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a41 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a42 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a43 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [3a44 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a45 11-19 05:23:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [3a46 11-19 05:23:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 36 02 27 14 d8 27 00 5c c3 96 c5 82 e5 8f 48 |.6.'..'.\......H| +peer1.org2.example.com | 00000010 81 e3 e2 89 9c 12 d3 5e 92 ba ba ac 4d 04 01 2d |.......^....M..-| +peer1.org2.example.com | [3a47 11-19 05:23:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 b1 85 c1 a2 e2 24 c6 e0 11 23 |0E.!.......$...#| +peer1.org2.example.com | 00000010 a3 d4 36 87 db ca fe 4e 12 53 0e 56 e2 5e a7 1e |..6....N.S.V.^..| +peer1.org2.example.com | 00000020 d3 35 3f fb dc 02 20 64 74 63 50 27 7f af df 83 |.5?... dtcP'....| +peer1.org2.example.com | 00000030 21 8e 5c dc 67 15 d4 a0 22 dc b4 57 55 f1 0c 57 |!.\.g..."..WU..W| +peer1.org2.example.com | 00000040 7c 9f e0 5a 57 78 ca ||..ZWx.| +peer1.org2.example.com | [3a48 11-19 05:23:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a49 11-19 05:23:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [3a4a 11-19 05:23:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [3a4b 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a4c 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a4d 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3a4e 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a4f 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a50 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a51 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a52 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a53 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a54 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a55 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [3a56 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3a57 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a58 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | [36ab 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36ac 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39e0 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 gate 1574140975298258600 evaluation fails +peer0.org1.example.com | [39e1 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [39e2 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [39e3 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [39e4 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 gate 1574140975298499600 evaluation starts +peer0.org1.example.com | [39e5 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39e6 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [39e7 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 principal matched by identity 0 +peer0.org1.example.com | [39e8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [39e9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [39ea 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [39eb 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 gate 1574140975298499600 evaluation succeeds +peer0.org1.example.com | [39ec 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39ed 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39ee 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [39ef 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [39f0 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39f1 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39f2 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [39f3 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39f4 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39f5 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [39f6 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [39f7 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [39f8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 gate 1574140975299254000 evaluation starts +peer0.org1.example.com | [39f9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39fa 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [39fb 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [39fc 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 principal evaluation fails +peer0.org1.example.com | [39fd 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 gate 1574140975299254000 evaluation fails +peer0.org1.example.com | [39fe 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [39ff 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a00 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a01 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 gate 1574140975299483800 evaluation starts +peer0.org1.example.com | [3a02 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a03 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a04 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 principal matched by identity 0 +peer0.org2.example.com | [38f3 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38f4 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38f5 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38f6 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [38f7 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38f8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38f9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [38fa 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38fb 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [38fc 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38fd 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [38fe 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [38ff 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3900 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3901 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3902 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3903 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3904 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3905 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3906 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d380 gate 1574140975306940100 evaluation starts +peer0.org2.example.com | [3907 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d380 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3908 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d380 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3909 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [390a 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d380 principal evaluation fails +peer0.org2.example.com | [390b 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d380 gate 1574140975306940100 evaluation fails +peer0.org2.example.com | [390c 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [390d 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [390e 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [390f 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d8f0 gate 1574140975307757800 evaluation starts +peer0.org2.example.com | [3910 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d8f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3911 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d8f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3912 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d8f0 principal matched by identity 0 +peer0.org2.example.com | [3913 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3914 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3915 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d8f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3916 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366d8f0 gate 1574140975307757800 evaluation succeeds +peer0.org2.example.com | [3917 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3918 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3919 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [391a 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [391b 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [391c 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [391d 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [391e 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [391f 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3920 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3921 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 ae a1 5d 97 02 b5 c0 bb c9 2c 40 ec 1d 00 7f |...]......,@....| +peer0.org2.example.com | 00000010 b6 98 81 7d 8c 81 25 6e 11 cc b4 9e 9e 91 d9 07 |...}..%n........| +peer0.org2.example.com | [3922 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 4f f8 2d 69 74 14 7e 80 f1 2b |0E.!..O.-it.~..+| +peer0.org2.example.com | 00000010 74 a6 c1 79 3a c1 a6 a5 7b f7 95 f9 81 32 b2 ae |t..y:...{....2..| +peer0.org2.example.com | 00000020 d5 3a e4 9c c3 02 20 2e 8d c5 23 07 2b fe d6 1f |.:.... ...#.+...| +peer0.org2.example.com | 00000030 3b c0 0f 51 8e 4f 31 84 ab fc 84 29 28 13 99 7b |;..Q.O1....)(..{| +peer0.org2.example.com | 00000040 2b f4 12 e1 84 22 71 |+...."q| +peer0.org2.example.com | [3923 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3924 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3925 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3926 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3927 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3928 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3929 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [392a 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [392b 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [392c 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [392d 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [392e 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [392f 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3930 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3931 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3932 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3933 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3934 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3935 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3936 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3937 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3938 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3939 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [393a 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [393b 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [393c 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [393d 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [393e 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [393f 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3940 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3941 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3942 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3943 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer0.org2.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer0.org2.example.com | [3944 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer0.org2.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer0.org2.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer0.org2.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer0.org2.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer0.org2.example.com | [3945 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3946 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 37 11 3f 05 bd 9d ab a0 83 fd |0E.!..7.?.......| +peer0.org2.example.com | 00000010 19 85 c7 ce 18 b6 21 1e 3a 90 4e 9d 3f 1b dc b6 |......!.:.N.?...| +peer0.org2.example.com | 00000020 1c 94 bc 6b a6 02 20 79 10 bd b5 01 e4 42 3a 55 |...k.. y.....B:U| +peer0.org2.example.com | 00000030 51 22 f1 84 58 41 0c 23 f6 57 22 a3 ca 6c f2 a7 |Q"..XA.#.W"..l..| +peer0.org2.example.com | 00000040 e7 79 e0 14 1b 9e e8 |.y.....| +peer0.org2.example.com | [3947 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3948 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [3949 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [394a 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [394b 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [394c 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [394d 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [394e 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [394f 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [3950 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3951 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3952 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3953 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [3954 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3955 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3956 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3957 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3958 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3959 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [395a 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [395b 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a59 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a5a 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a5b 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a5c 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a5d 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a5e 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a5f 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285efc0 gate 1574140980162955500 evaluation starts +peer1.org2.example.com | [3a60 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285efc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a61 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285efc0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3a62 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285efc0 principal matched by identity 0 +peer1.org2.example.com | [3a63 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3a64 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3a65 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285efc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a66 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285efc0 gate 1574140980162955500 evaluation succeeds +peer1.org2.example.com | [3a67 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a68 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a69 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3a6a 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a6b 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a6c 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a6d 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a6e 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a6f 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a70 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a71 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a72 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a73 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a150 gate 1574140980165796200 evaluation starts +peer1.org2.example.com | [3a74 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a75 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a150 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3a76 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a150 principal matched by identity 0 +peer1.org2.example.com | [3a77 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3a78 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3a79 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a150 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a7a 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a150 gate 1574140980165796200 evaluation succeeds +peer1.org2.example.com | [3a7b 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a7c 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a7d 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3a7e 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a7f 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3a80 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3a81 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a82 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a83 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a84 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a85 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a86 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a87 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a88 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a89 11-19 05:23:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a8a 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a8b 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a8c 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495bbb0 gate 1574140980181154800 evaluation starts +peer1.org2.example.com | [3a8d 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495bbb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a8e 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495bbb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3a8f 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495bbb0 principal matched by identity 0 +peer1.org2.example.com | [3a90 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3a91 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3a92 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495bbb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a93 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495bbb0 gate 1574140980181154800 evaluation succeeds +peer1.org2.example.com | [3a94 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a95 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a96 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3a97 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a98 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a99 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a9a 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a9b 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a9c 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a9d 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a9e 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a9f 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3aa0 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004976d40 gate 1574140980183990000 evaluation starts +peer1.org2.example.com | [3aa1 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004976d40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3aa2 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004976d40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3aa3 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004976d40 principal matched by identity 0 +peer1.org2.example.com | [3aa4 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3aa5 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3aa6 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004976d40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3aa7 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004976d40 gate 1574140980183990000 evaluation succeeds +peer1.org2.example.com | [3aa8 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3aa9 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3aaa 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3aab 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3aac 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [3aad 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3aae 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3aaf 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3ab0 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ab1 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ab2 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ab3 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ab4 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ab5 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ab6 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ab7 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ab8 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ab9 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3aba 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3abb 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fae20 gate 1574140980188690500 evaluation starts +peer1.org2.example.com | [3abc 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fae20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3abd 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fae20 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3abe 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fae20 principal matched by identity 0 +peer1.org2.example.com | [3abf 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3ac0 11-19 05:23:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3ac1 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fae20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ac2 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fae20 gate 1574140980188690500 evaluation succeeds +peer1.org2.example.com | [3ac3 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ac4 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ac5 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ac6 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36ad 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [36ae 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36af 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36b0 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36b1 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [36b2 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [36b3 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ddb70 gate 1574140983593627200 evaluation starts +peer1.org1.example.com | [36b4 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ddb70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36b5 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ddb70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [36b6 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ddb70 principal matched by identity 0 +peer1.org1.example.com | [36b7 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [36b8 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [36b9 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [36ba 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ddb70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36bb 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ddb70 gate 1574140983593627200 evaluation succeeds +peer1.org1.example.com | [36bc 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36bd 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36be 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36bf 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36c0 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36c1 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [36c2 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [36c3 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [36c4 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [36c5 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | [36c6 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36c7 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a05 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [3a06 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [3a07 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a08 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 gate 1574140975299483800 evaluation succeeds +peer0.org1.example.com | [3a09 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a0a 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a0b 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a0c 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a0d 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3a0e 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3a0f 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a10 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a11 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a12 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a13 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [39d9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a14 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a15 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3a16 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 gate 1574140975306623600 evaluation starts +peer0.org1.example.com | [3a17 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a18 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a19 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [3a1a 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [3a1b 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [3a1c 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 principal matched by identity 0 +peer0.org1.example.com | [3a1d 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3a1e 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3a1f 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a20 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 gate 1574140975306623600 evaluation succeeds +peer0.org1.example.com | [3a21 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a22 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a23 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a24 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a25 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a26 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a27 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a28 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [3a29 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [3a2a 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [3a2b 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [3a2c 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a2d 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a2e 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3a2f 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a30 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a31 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a32 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a33 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3a34 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 gate 1574140975316419500 evaluation starts +peer0.org1.example.com | [3a35 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a36 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a37 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3a38 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 principal evaluation fails +peer0.org1.example.com | [3a39 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 gate 1574140975316419500 evaluation fails +peer0.org1.example.com | [3a3a 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a3b 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a3c 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a3d 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 gate 1574140975319444200 evaluation starts +peer0.org1.example.com | [3a3e 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a3f 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a40 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 principal matched by identity 0 +peer0.org1.example.com | [3a41 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +peer0.org1.example.com | 00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +peer0.org1.example.com | [3a42 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +peer0.org1.example.com | 00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +peer0.org1.example.com | 00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +peer0.org1.example.com | 00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +peer0.org1.example.com | 00000040 27 fd b2 b0 5f a1 |'..._.| +peer0.org1.example.com | [3a43 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a44 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 gate 1574140975319444200 evaluation succeeds +peer0.org1.example.com | [3a45 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a46 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a47 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a48 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a49 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a4a 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a4b 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3a4c 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a4d 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a4e 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a4f 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a50 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3a51 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 gate 1574140975325301100 evaluation starts +peer0.org1.example.com | [3a52 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a53 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a54 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3a55 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 principal evaluation fails +peer0.org1.example.com | [3a56 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 gate 1574140975325301100 evaluation fails +peer0.org1.example.com | [3a57 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a58 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a59 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a5a 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 gate 1574140975327133000 evaluation starts +peer0.org1.example.com | [3a5b 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a5c 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a5d 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 principal matched by identity 0 +peer0.org1.example.com | [3a5e 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3a5f 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3a60 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a61 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 gate 1574140975327133000 evaluation succeeds +peer0.org1.example.com | [3a62 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a63 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a64 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a65 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a66 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a67 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a68 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a69 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a6a 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a6b 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3a6c 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 gate 1574140975330934400 evaluation starts +peer0.org1.example.com | [3a6d 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a6e 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [395c 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [395d 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [395e 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [395f 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a9ff0 gate 1574140975633969400 evaluation starts +peer0.org2.example.com | [3960 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a9ff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3961 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a9ff0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3962 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a9ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3963 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a9ff0 principal evaluation fails +peer0.org2.example.com | [3964 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a9ff0 gate 1574140975633969400 evaluation fails +peer0.org2.example.com | [3965 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3966 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3967 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3968 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc560 gate 1574140975635309600 evaluation starts +peer0.org2.example.com | [3969 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [396a 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc560 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [396b 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc560 principal matched by identity 0 +peer0.org2.example.com | [396c 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [396d 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [396e 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [396f 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc560 gate 1574140975635309600 evaluation succeeds +peer0.org2.example.com | [3970 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3971 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3972 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3973 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3974 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3975 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3976 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3977 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3978 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3979 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [397a 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd0a0 gate 1574140975639214200 evaluation starts +peer0.org2.example.com | [397b 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd0a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [397c 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd0a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [397d 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [397e 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd0a0 principal evaluation fails +peer0.org2.example.com | [397f 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd0a0 gate 1574140975639214200 evaluation fails +peer0.org2.example.com | [3980 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3981 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3982 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3983 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd610 gate 1574140975639973600 evaluation starts +peer0.org2.example.com | [3984 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3985 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd610 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3986 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd610 principal matched by identity 0 +peer0.org2.example.com | [3987 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3988 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [3989 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd610 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [398a 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd610 gate 1574140975639973600 evaluation succeeds +peer0.org2.example.com | [398b 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [398c 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [398d 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ac7 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ac8 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ac9 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3aca 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3acb 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3acc 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3acd 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ace 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3acf 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fbfb0 gate 1574140980197411500 evaluation starts +peer1.org2.example.com | [3ad0 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fbfb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ad1 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fbfb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3ad2 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fbfb0 principal matched by identity 0 +peer1.org2.example.com | [3ad3 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3ad4 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3ad5 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fbfb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ad6 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fbfb0 gate 1574140980197411500 evaluation succeeds +peer1.org2.example.com | [3ad7 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ad8 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ad9 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ada 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3adb 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [3adc 11-19 05:23:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3add 11-19 05:23:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3ade 11-19 05:23:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3adf 11-19 05:23:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ae0 11-19 05:23:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ae1 11-19 05:23:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ae2 11-19 05:23:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3ae3 11-19 05:23:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ae4 11-19 05:23:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ae5 11-19 05:23:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3ae6 11-19 05:23:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ae7 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ae8 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ae9 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [3aea 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3aeb 11-19 05:23:00.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3aec 11-19 05:23:00.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15103A +peer1.org2.example.com | [3aed 11-19 05:23:00.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CECB19A47F5FDEF14DF3114A694E570D222BC74B74DBF541BBAAA61A5FC0F59 +peer0.org1.example.com | [3a6f 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3a70 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 principal evaluation fails +peer0.org1.example.com | [3a71 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 gate 1574140975330934400 evaluation fails +peer0.org1.example.com | [3a72 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a73 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a74 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a75 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 gate 1574140975332651700 evaluation starts +peer0.org1.example.com | [3a76 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a77 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a78 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 principal matched by identity 0 +peer0.org1.example.com | [3a79 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3a7a 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3a7b 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a7c 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 gate 1574140975332651700 evaluation succeeds +peer0.org1.example.com | [3a7d 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a7e 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a7f 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a80 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a81 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a82 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a83 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a84 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +peer0.org1.example.com | 00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +peer0.org1.example.com | [3a85 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +peer0.org1.example.com | 00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +peer0.org1.example.com | 00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +peer0.org1.example.com | 00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +peer0.org1.example.com | 00000040 1d 87 f5 89 16 2e a0 |.......| +peer0.org1.example.com | [3a86 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +peer0.org1.example.com | 00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +peer0.org1.example.com | [3a87 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +peer0.org1.example.com | 00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +peer0.org1.example.com | 00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +peer0.org1.example.com | 00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +peer0.org1.example.com | 00000040 25 4f 85 e4 fc 0b |%O....| +peer0.org1.example.com | [3a88 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a89 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a8a 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3a8b 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a8c 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a8d 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a8e 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a8f 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3a90 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 gate 1574140975338432300 evaluation starts +peer0.org1.example.com | [3a91 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a92 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a93 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3a94 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 principal evaluation fails +peer0.org1.example.com | [3a95 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 gate 1574140975338432300 evaluation fails +peer0.org1.example.com | [3a96 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a97 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a98 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a99 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 gate 1574140975339864600 evaluation starts +peer0.org1.example.com | [3a9a 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a9b 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3a9c 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 principal matched by identity 0 +peer0.org1.example.com | [3a9d 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org1.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org1.example.com | [3a9e 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org1.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org1.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org1.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org1.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org1.example.com | [3a9f 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3aa0 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 gate 1574140975339864600 evaluation succeeds +peer0.org1.example.com | [3aa1 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3aa2 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3aa3 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3aa4 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3aa5 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa6 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa7 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3aa8 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3aa9 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3aaa 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3aab 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3aac 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3aad 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 gate 1574140975344177200 evaluation starts +peer0.org1.example.com | [3aae 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3aaf 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3ab0 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3ab1 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 principal evaluation fails +peer0.org1.example.com | [3ab2 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 gate 1574140975344177200 evaluation fails +peer0.org1.example.com | [3ab3 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ab4 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ab5 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ab6 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 gate 1574140975345671500 evaluation starts +peer0.org1.example.com | [3ab7 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ab8 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3ab9 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 principal matched by identity 0 +peer0.org1.example.com | [3aba 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [3abb 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [3abc 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3abd 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 gate 1574140975345671500 evaluation succeeds +peer0.org1.example.com | [3abe 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3abf 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ac0 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3ac1 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3ac2 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ac3 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ac4 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ac5 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ac6 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ac7 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ac8 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 gate 1574140975349048500 evaluation starts +peer0.org1.example.com | [3ac9 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3aca 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3acb 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3acc 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 principal evaluation fails +peer0.org1.example.com | [3acd 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 gate 1574140975349048500 evaluation fails +peer0.org1.example.com | [3ace 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3acf 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ad0 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ad1 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 gate 1574140975350585400 evaluation starts +peer0.org1.example.com | [3ad2 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ad3 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3aee 11-19 05:23:00.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3aef 11-19 05:23:00.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3af0 11-19 05:23:00.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3af1 11-19 05:23:00.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3af2 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3af3 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3af4 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3af5 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3af6 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3af7 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3af8 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3af9 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3afa 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3afb 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3afc 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3afd 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3afe 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3aff 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b00 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b01 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b02 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [3b03 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b04 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3b05 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b06 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b07 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3b08 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3b09 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3b0a 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027d42a0 gate 1574140980776640800 evaluation starts +peer1.org2.example.com | [3b0b 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027d42a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b0c 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027d42a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3b0d 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027d42a0 principal matched by identity 0 +peer1.org2.example.com | [3b0e 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 11 4b 59 88 a6 56 67 d3 54 27 83 26 29 15 c8 |..KY..Vg.T'.&)..| +peer1.org2.example.com | 00000010 1d 11 e9 c6 0b e5 3f 5c cf ad 27 37 c8 a1 52 13 |......?\..'7..R.| +peer1.org2.example.com | [3b0f 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 4a d8 cc cd f2 2a 90 f6 17 a3 25 |0D. .J....*....%| +peer1.org2.example.com | 00000010 25 dc cb f4 c7 ea d3 6d 2c 8d 74 5c 8d f6 10 ef |%......m,.t\....| +peer1.org2.example.com | 00000020 57 03 1c 90 02 20 28 3a d7 ae a3 47 41 04 9d 28 |W.... (:...GA..(| +peer1.org2.example.com | 00000030 46 1f 9a 91 13 75 30 75 78 f8 05 ac cc 13 b9 11 |F....u0ux.......| +peer1.org2.example.com | 00000040 73 ac a9 d8 6c df |s...l.| +peer1.org2.example.com | [3b10 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027d42a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3b11 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027d42a0 gate 1574140980776640800 evaluation succeeds +peer1.org2.example.com | [3b12 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b13 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b14 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b15 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b16 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b17 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3b18 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [398e 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [398f 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3990 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3991 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3992 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [3993 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3994 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3995 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3996 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3997 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3998 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3999 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [399a 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [399b 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [399c 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [399d 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [399e 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [399f 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39a0 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39a1 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39a2 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [39a3 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [39a4 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [39a5 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb1c0 gate 1574140975778559900 evaluation starts +peer0.org2.example.com | [39a6 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb1c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39a7 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb1c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [39a8 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [36c8 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [36c9 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36ca 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36cb 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36cc 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [36cd 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [36ce 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efc90 gate 1574140983598266500 evaluation starts +peer1.org1.example.com | [36cf 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efc90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36d0 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efc90 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [36d1 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efc90 principal matched by identity 0 +peer1.org1.example.com | [36d2 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [36d3 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [36d4 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efc90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36d5 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001efc90 gate 1574140983598266500 evaluation succeeds +peer1.org1.example.com | [36d6 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36d7 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36d8 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36d9 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36da 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36db 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36dc 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [36dd 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36de 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36df 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36e0 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [36e1 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [36e2 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038ee20 gate 1574140983598991400 evaluation starts +peer1.org1.example.com | [36e3 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038ee20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36e4 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038ee20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [36e5 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038ee20 principal matched by identity 0 +peer1.org1.example.com | [36e6 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [3ad4 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 principal matched by identity 0 +peer0.org1.example.com | [3ad5 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [3ad6 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [3ad7 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3ad8 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 gate 1574140975350585400 evaluation succeeds +peer0.org1.example.com | [3ad9 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ada 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3adb 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3adc 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3add 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ade 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [39a9 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb1c0 principal evaluation fails +peer0.org2.example.com | [39aa 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb1c0 gate 1574140975778559900 evaluation fails +peer0.org2.example.com | [39ab 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [39ac 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [39ad 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [39ae 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb730 gate 1574140975778808000 evaluation starts +peer0.org2.example.com | [39af 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39b0 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb730 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [39b1 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb730 principal matched by identity 0 +peer0.org2.example.com | [39b2 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 14 52 c0 8b 42 97 2e a9 56 e4 88 e5 b8 04 80 |..R..B...V......| +peer0.org2.example.com | 00000010 84 53 ee 2b fd 4b 8a 50 40 c2 cb 0b f5 83 e6 91 |.S.+.K.P@.......| +peer0.org2.example.com | [39b3 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 76 bf af b4 1f ec 9e 39 3f 48 1c |0D. .v......9?H.| +peer0.org2.example.com | 00000010 c1 e6 be 43 c4 d7 1f 7b 37 35 10 6b cb 74 73 e3 |...C...{75.k.ts.| +peer0.org2.example.com | 00000020 3b b9 33 81 02 20 31 e4 30 72 fb 76 48 eb 8c 04 |;.3.. 1.0r.vH...| +peer0.org2.example.com | 00000030 83 64 6c 8c 67 10 94 cd ee d5 62 6b 75 bc 3b 37 |.dl.g.....bku.;7| +peer0.org2.example.com | 00000040 d1 b0 1b 75 a1 c7 |...u..| +peer0.org2.example.com | [39b4 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39b5 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb730 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [39b6 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb730 gate 1574140975778808000 evaluation succeeds +peer0.org2.example.com | [39b7 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39b8 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39b9 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [39ba 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [39bb 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39bc 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [39bd 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [39be 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [39bf 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [39c0 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c1 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c2 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c3 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c4 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39c5 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c6 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39c7 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39c8 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39c9 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39ca 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39cb 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39cc 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39cd 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [39ce 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39cf 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39d0 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [39d1 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39d2 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36e7 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [36e8 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038ee20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36e9 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038ee20 gate 1574140983598991400 evaluation succeeds +peer1.org1.example.com | [36ea 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36eb 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36ec 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36ed 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36ee 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36ef 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [36f0 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36f1 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36f2 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36f3 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [36f4 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36f5 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36f6 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36f7 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [36f8 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [36f9 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4310 gate 1574140983600495700 evaluation starts +peer1.org1.example.com | [36fa 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4310 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36fb 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4310 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [36fc 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4310 principal matched by identity 0 +peer1.org1.example.com | [36fd 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [36fe 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [36ff 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4310 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3700 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4310 gate 1574140983600495700 evaluation succeeds +peer1.org1.example.com | [3701 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3702 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3703 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3704 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3705 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [3706 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | [3adf 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [3ae0 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [3ae1 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ae2 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ae3 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ae4 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ae5 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ae6 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [3ae7 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ae8 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ae9 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3aea 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3aeb 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3aec 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3aed 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3aee 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 gate 1574140975362544400 evaluation starts +peer0.org1.example.com | [3aef 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3af0 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3af1 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3af2 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 principal evaluation fails +peer0.org1.example.com | [3af3 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 gate 1574140975362544400 evaluation fails +peer0.org1.example.com | [3af4 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3af5 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3af6 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3af7 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 gate 1574140975369601500 evaluation starts +peer0.org1.example.com | [3af8 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3af9 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3afa 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 principal matched by identity 0 +peer0.org1.example.com | [3afb 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 ae a1 5d 97 02 b5 c0 bb c9 2c 40 ec 1d 00 7f |...]......,@....| +peer0.org1.example.com | 00000010 b6 98 81 7d 8c 81 25 6e 11 cc b4 9e 9e 91 d9 07 |...}..%n........| +peer0.org1.example.com | [3afc 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 4f f8 2d 69 74 14 7e 80 f1 2b |0E.!..O.-it.~..+| +peer1.org2.example.com | [3b19 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b1a 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3b1b 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b1c 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b1d 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b1e 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b1f 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b20 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b21 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b22 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b23 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b24 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b25 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3b26 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b27 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3b28 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b29 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b2a 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b2b 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b2c 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b2d 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b2e 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b2f 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39d3 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39d4 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39d5 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [39d6 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151033 +peer0.org2.example.com | [39d7 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FF09ABBE7FB468FE5815EEC967CFA9F825584A5E05212E74D5717F0BCA0E2089 +peer0.org2.example.com | [39d8 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [39d9 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [39da 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [39db 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [39dc 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [39dd 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [39de 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [39df 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [39e0 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [39e1 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [39e2 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [39e3 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39e4 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [39e5 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39e6 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [39e7 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39e8 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [39e9 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [39ea 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [39eb 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39ec 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39ed 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39ee 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39ef 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [39f0 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [39f1 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39f2 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [39f3 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39f4 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39f5 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39f6 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b30 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b31 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b32 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b33 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b34 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b35 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b36 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b37 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [3b38 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 2c 5b 2b c6 2b 64 cb 71 d8 3d 1e 03 d0 8d 5a |.,[+.+d.q.=....Z| +peer1.org2.example.com | 00000010 a7 ec 9e c4 13 67 e6 b1 4e c2 75 d6 4e af ba 12 |.....g..N.u.N...| +peer1.org2.example.com | [3b39 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 c7 87 1e 67 63 e9 60 f5 14 53 45 |0D. ....gc.`..SE| +peer1.org2.example.com | 00000010 b0 bc 31 7c 47 91 47 10 7e 8a ab 34 6c d9 0b e1 |..1|G.G.~..4l...| +peer1.org2.example.com | 00000020 71 be f1 80 02 20 1e 1e 49 15 51 45 f3 53 eb f2 |q.... ..I.QE.S..| +peer1.org2.example.com | 00000030 f5 be f7 64 ef 54 67 2e 87 79 ff af dd f7 6a 51 |...d.Tg..y....jQ| +peer1.org2.example.com | 00000040 86 97 b4 ed a1 ac |......| +peer1.org2.example.com | [3b3a 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b3b 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3b3c 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3b3d 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b3e 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3b3f 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b40 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b41 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b42 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b43 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b44 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b45 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3b46 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b47 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3b48 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b49 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b4a 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b4b 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b4c 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b4d 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b4e 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b4f 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 74 a6 c1 79 3a c1 a6 a5 7b f7 95 f9 81 32 b2 ae |t..y:...{....2..| +peer0.org1.example.com | 00000020 d5 3a e4 9c c3 02 20 2e 8d c5 23 07 2b fe d6 1f |.:.... ...#.+...| +peer0.org1.example.com | 00000030 3b c0 0f 51 8e 4f 31 84 ab fc 84 29 28 13 99 7b |;..Q.O1....)(..{| +peer0.org1.example.com | 00000040 2b f4 12 e1 84 22 71 |+...."q| +peer0.org1.example.com | [3afd 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3afe 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 gate 1574140975369601500 evaluation succeeds +peer0.org1.example.com | [3aff 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b00 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b01 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3b02 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3b03 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b04 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3b05 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3b06 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3b07 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3b08 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b09 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b0a 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b0b 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b0c 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b0d 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b0e 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b0f 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b10 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b11 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b12 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b14 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b13 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b15 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b16 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b17 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3b18 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b19 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3b1b 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b1a 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b1c 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b1d 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b1e 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b1f 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b50 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b51 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b52 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b53 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b54 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b55 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b56 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b57 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b58 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b59 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b5a 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b5b 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b5c 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [3b5d 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b5e 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b5f 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b60 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b61 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3b62 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b63 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3b64 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b65 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b66 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3b67 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3b68 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3b69 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368eb0 gate 1574140982864865200 evaluation starts +peer1.org2.example.com | [3b6a 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b6b 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368eb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3b6c 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368eb0 principal matched by identity 0 +peer1.org2.example.com | [3b6d 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer1.org2.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer0.org2.example.com | [39f7 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39f8 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39f9 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [39fa 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [39fb 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39fc 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [39fd 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [39fe 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [39ff 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a00 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3a01 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151034 +peer0.org2.example.com | [3a02 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B661EF93DA690590FDF6A3089B9284839D8642492A783C92A2698A1A56662D48 +peer0.org2.example.com | [3a03 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3a04 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3a05 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3a06 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a07 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a08 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a09 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a0a 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:>\024\321Qi\207\200\002=\323\314\002 @0\320\234/\360K\241\0169y\"A\346q,O\377\371\356\257\304\243\322E\3405\377\r\367J[" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a0b 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:>\024\321Qi\207\200\002=\323\314\002 @0\320\234/\360K\241\0169y\"A\346q,O\377\371\356\257\304\243\322E\3405\377\r\367J[" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a0c 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3707 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [3708 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | [3709 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [370a 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [370b 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [370c 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [370d 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [370e 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [370f 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3710 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3711 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004141c0 gate 1574140983601849500 evaluation starts +peer1.org1.example.com | [3712 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004141c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3713 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004141c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3714 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004141c0 principal matched by identity 0 +peer1.org1.example.com | [3715 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [3716 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3717 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004141c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3718 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004141c0 gate 1574140983601849500 evaluation succeeds +peer1.org1.example.com | [3719 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [371a 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [371b 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [371c 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [371d 11-19 05:23:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [371e 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [371f 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3720 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3721 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3722 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3723 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3724 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3725 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b20 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b21 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b22 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b23 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b24 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b25 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b26 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b27 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b28 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b29 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b2a 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b2b 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [3b2c 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b2d 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b2e 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b2f 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3b30 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b31 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b32 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b33 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b34 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b35 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b36 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b37 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b38 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b39 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b3a 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b3b 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b3c 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [3b3d 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a0d 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a0e 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a0f 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a10 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a11 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a12 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a13 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a14 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a15 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3a16 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer0.org2.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer0.org2.example.com | [3a17 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer0.org2.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer0.org2.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer0.org2.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer0.org2.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer0.org2.example.com | [3a18 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3a19 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 0b 58 ac d9 fd c6 ec d2 07 1f |0E.!...X........| +peer0.org2.example.com | 00000010 43 43 c4 5b f4 9f 79 3a 19 3e 3e 14 d1 51 69 87 |CC.[..y:.>>..Qi.| +peer0.org2.example.com | 00000020 80 02 3d d3 cc 02 20 40 30 d0 9c 2f f0 4b a1 0e |..=... @0../.K..| +peer0.org2.example.com | 00000030 39 79 22 41 e6 71 2c 4f ff f9 ee af c4 a3 d2 45 |9y"A.q,O.......E| +peer0.org2.example.com | 00000040 e0 35 ff 0d f7 4a 5b |.5...J[| +peer0.org2.example.com | [3a1a 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3a1b 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3a1c 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a1d 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a1e 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a1f 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a20 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a21 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3a22 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer0.org2.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer0.org2.example.com | [3a23 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer0.org2.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer0.org2.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer0.org2.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer0.org2.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer0.org2.example.com | [3a24 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a25 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a26 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a27 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3a28 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer0.org2.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer0.org2.example.com | [3a29 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer0.org2.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer0.org2.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer0.org2.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer0.org2.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer0.org2.example.com | [3a2a 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a2b 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a2c 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a2d 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a2e 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a2f 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a30 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a31 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3a32 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a33 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3a34 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a35 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a36 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a37 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a38 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3a39 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b530 gate 1574140975879709200 evaluation starts +peer0.org2.example.com | [3a3a 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a3b 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b530 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3a3c 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3a3d 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b530 principal evaluation fails +peer0.org2.example.com | [3a3e 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b530 gate 1574140975879709200 evaluation fails +peer0.org2.example.com | [3a3f 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a40 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a41 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a42 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371baa0 gate 1574140975882451000 evaluation starts +peer0.org2.example.com | [3a43 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371baa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a44 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371baa0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3a45 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371baa0 principal matched by identity 0 +peer0.org2.example.com | [3a46 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +peer0.org2.example.com | 00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +peer0.org2.example.com | [3a47 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +peer0.org2.example.com | 00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +peer0.org2.example.com | 00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +peer0.org2.example.com | 00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +peer0.org2.example.com | 00000040 af 25 40 35 ce 35 4d |.%@5.5M| +peer0.org2.example.com | [3a48 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371baa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a49 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371baa0 gate 1574140975882451000 evaluation succeeds +peer0.org1.example.com | [3b3e 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3b3f 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3b40 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3b41 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3b42 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3b43 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3b44 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 gate 1574140975466812000 evaluation starts +peer0.org1.example.com | [3b45 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3b46 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3b47 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3b48 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 principal evaluation fails +peer0.org1.example.com | [3b49 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 gate 1574140975466812000 evaluation fails +peer0.org1.example.com | [3b4a 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3b4b 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3b4c 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3b4d 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 gate 1574140975471881900 evaluation starts +peer0.org1.example.com | [3b4e 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3b4f 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3b50 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 principal matched by identity 0 +peer0.org1.example.com | [3b51 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer0.org1.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer0.org1.example.com | [3b52 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer0.org1.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer0.org1.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer0.org1.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer0.org1.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer0.org1.example.com | [3b53 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3b54 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 gate 1574140975471881900 evaluation succeeds +peer0.org1.example.com | [3b55 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b56 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b57 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3b58 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3b59 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b5a 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3b5b 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3b5c 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3b5d 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3b5e 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b5f 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b60 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b61 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [3b62 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b63 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b64 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b65 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3b6e 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer1.org2.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer1.org2.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer1.org2.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer1.org2.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer1.org2.example.com | [3b6f 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368eb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3b70 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368eb0 gate 1574140982864865200 evaluation succeeds +peer1.org2.example.com | [3b71 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b72 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b73 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b74 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b75 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b76 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3b77 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3b78 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b79 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3b7a 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b7b 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b7c 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b7d 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [3b7e 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b7f 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b80 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b81 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3b82 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [3b83 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b84 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b85 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b86 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b87 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b88 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b89 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b8a 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3b8b 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3b8c 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3b8d 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3b8e 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3b8f 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a4a 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a4b 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a4c 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a4d 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a4e 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a4f 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a50 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3a51 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer0.org2.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer0.org2.example.com | [3a52 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer0.org2.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer0.org2.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer0.org2.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer0.org2.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer0.org2.example.com | [3a53 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a54 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a55 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a56 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3a57 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer0.org2.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer0.org2.example.com | [3a58 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer0.org2.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer0.org2.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer0.org2.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer0.org2.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer0.org2.example.com | [3a59 11-19 05:22:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a5a 11-19 05:22:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a5b 11-19 05:22:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a5c 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a5d 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a5e 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3a5f 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a60 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a61 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a62 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a63 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a64 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a65 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a66 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a67 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [3a68 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a69 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a6a 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a6b 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b66 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3b67 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b68 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b69 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b6a 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b6b 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b6c 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b6d 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b6e 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3b6f 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3b70 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b71 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b72 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b73 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3b74 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3b75 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b76 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b77 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b78 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b79 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3b7a 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3b7b 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b7c 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b7d 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b7e 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b7f 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [3b80 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b81 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b82 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b83 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b84 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b85 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3b86 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 14 52 c0 8b 42 97 2e a9 56 e4 88 e5 b8 04 80 |..R..B...V......| +peer0.org1.example.com | 00000010 84 53 ee 2b fd 4b 8a 50 40 c2 cb 0b f5 83 e6 91 |.S.+.K.P@.......| +peer0.org1.example.com | [3b87 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 76 bf af b4 1f ec 9e 39 3f 48 1c |0D. .v......9?H.| +peer0.org1.example.com | 00000010 c1 e6 be 43 c4 d7 1f 7b 37 35 10 6b cb 74 73 e3 |...C...{75.k.ts.| +peer0.org1.example.com | 00000020 3b b9 33 81 02 20 31 e4 30 72 fb 76 48 eb 8c 04 |;.3.. 1.0r.vH...| +peer0.org1.example.com | 00000030 83 64 6c 8c 67 10 94 cd ee d5 62 6b 75 bc 3b 37 |.dl.g.....bku.;7| +peer0.org1.example.com | 00000040 d1 b0 1b 75 a1 c7 |...u..| +peer0.org1.example.com | [3b88 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b89 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3b8a 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3b8b 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3b8c 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3b8d 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b8e 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b8f 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b90 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b91 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b92 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3b93 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b94 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3b95 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b96 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b97 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b98 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b99 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b9a 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b9b 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b9c 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b9d 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b9e 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b9f 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [3ba0 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ba1 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3ba2 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3ba3 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ba4 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3ba5 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ba6 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ba7 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ba8 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ba9 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3baa 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bab 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bac 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bad 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bae 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3baf 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [3bb0 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bb1 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3bb2 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3bb3 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bb4 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3bb5 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [3bb6 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bb7 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3bb8 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bb9 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bba 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3bbb 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3bbc 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3bbd 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 gate 1574140975815619700 evaluation starts +peer0.org1.example.com | [3bbe 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bbf 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3bc0 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3bc1 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 principal evaluation fails +peer0.org1.example.com | [3bc2 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 gate 1574140975815619700 evaluation fails +peer0.org1.example.com | [3bc3 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3bc4 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3bc5 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3bc6 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 gate 1574140975816850000 evaluation starts +peer0.org1.example.com | [3bc7 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bc8 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3bc9 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 principal matched by identity 0 +peer0.org1.example.com | [3bca 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 09 ab be 7f b4 68 fe 58 15 ee c9 67 cf a9 f8 |......h.X...g...| +peer0.org1.example.com | 00000010 25 58 4a 5e 05 21 2e 74 d5 71 7f 0b ca 0e 20 89 |%XJ^.!.t.q.... .| +peer0.org1.example.com | [3bcb 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 4c 8f 70 f4 18 25 6d 1c e9 78 c9 |0D. ~L.p..%m..x.| +peer0.org1.example.com | 00000010 9b 56 7a b5 36 99 02 00 b0 e3 2f bc e5 14 33 f1 |.Vz.6...../...3.| +peer0.org1.example.com | 00000020 e3 42 59 cf 02 20 5f dd d2 1a e5 6b 82 c5 39 9e |.BY.. _....k..9.| +peer0.org1.example.com | 00000030 66 99 b9 40 7d 8b 2f e2 86 f2 0d 41 95 e3 b9 ff |f..@}./....A....| +peer0.org1.example.com | 00000040 ed 74 eb 90 82 07 |.t....| +peer0.org1.example.com | [3bcc 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3bcd 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 gate 1574140975816850000 evaluation succeeds +peer0.org1.example.com | [3bce 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bcf 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bd0 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3bd1 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3bd2 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3bd3 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3bd4 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3bd5 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3bd6 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3bd7 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bd8 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bd9 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bda 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bdb 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bdc 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bdd 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bde 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bdf 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3be0 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3be1 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3be2 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3be3 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3be4 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3be5 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3be6 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3be7 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3be8 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3be9 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3bea 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3beb 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3bec 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bed 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3bee 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3bef 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bf0 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3bf1 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [3bf2 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bf3 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3bf4 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bf5 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bf6 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3bf7 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3bf8 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3b90 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b91 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b92 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b93 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b94 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b95 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b96 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b97 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b98 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b99 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b9a 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b9b 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b9c 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b9d 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b9e 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b9f 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3ba0 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15103B +peer1.org2.example.com | [3ba1 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3CAFE92C2FD26C101EF28FF01464A70BFC41CD097E0EDDA45FF0909EF64F0455 +peer1.org2.example.com | [3ba2 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3ba3 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3ba4 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3ba5 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ba6 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3ba7 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3ba8 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a6c 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a6d 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a6e 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a6f 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a70 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a71 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a72 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +peer0.org2.example.com | 00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +peer0.org2.example.com | [3a73 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +peer0.org2.example.com | 00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +peer0.org2.example.com | 00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +peer0.org2.example.com | 00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +peer0.org2.example.com | 00000040 0c ce 3f 12 14 7d 3b |..?..};| +peer0.org2.example.com | [3a74 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3a75 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3a76 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a77 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a78 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a7a 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a79 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a7b 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3a7c 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a7d 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer0.org2.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer0.org2.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer0.org2.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3a7e 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003767b90 gate 1574140975939737400 evaluation starts +peer0.org2.example.com | [3a7f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003767b90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a80 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003767b90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3a81 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003767b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [3a82 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003767b90 principal evaluation fails +peer0.org2.example.com | [3a83 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003767b90 gate 1574140975939737400 evaluation fails +peer0.org2.example.com | [3a84 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a85 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a86 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a87 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c009a0 gate 1574140975947224900 evaluation starts +peer0.org2.example.com | [3a88 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c009a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a89 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c009a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3a8a 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c009a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [3a8b 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c009a0 principal evaluation fails +peer0.org2.example.com | [3a8c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c009a0 gate 1574140975947224900 evaluation fails +peer0.org2.example.com | [3a8d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a8e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a8f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3a90 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c00f30 gate 1574140975947485600 evaluation starts +peer1.org1.example.com | [3726 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3727 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3728 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3729 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [372a 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [372b 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [372c 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [372d 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [372e 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [372f 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3730 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3731 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3732 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3733 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3734 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3735 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3736 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3737 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3738 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3739 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [373a 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [373b 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [373c 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bf9 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 gate 1574140975841044400 evaluation starts +peer0.org1.example.com | [3bfa 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bfb 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3bfc 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3bfd 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 principal evaluation fails +peer0.org1.example.com | [3bfe 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 gate 1574140975841044400 evaluation fails +peer0.org1.example.com | [3bff 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c00 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c01 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c02 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 gate 1574140975843388900 evaluation starts +peer0.org1.example.com | [3c03 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c04 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3c05 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 principal matched by identity 0 +peer0.org1.example.com | [3c06 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer0.org1.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer0.org1.example.com | [3c07 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer0.org1.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer0.org1.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer0.org1.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer0.org1.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer0.org1.example.com | [3c08 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c09 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 gate 1574140975843388900 evaluation succeeds +peer0.org1.example.com | [3c0a 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c0b 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c0c 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c0d 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c0e 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c0f 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3c10 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3c11 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3c12 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3c13 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c14 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c15 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c16 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [3c17 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c18 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c19 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c1a 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3c1b 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c1c 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ba9 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3baa 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3bab 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bac 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bad 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bae 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3baf 11-19 05:23:03.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bb0 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bb1 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bb2 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bb3 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3bb4 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer1.org2.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer1.org2.example.com | [3bb5 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer1.org2.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer1.org2.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer1.org2.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer1.org2.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer1.org2.example.com | [3bb6 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3bb7 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 8c 38 dc 06 b5 61 88 33 ba 9a |0E.!...8...a.3..| +peer1.org2.example.com | 00000010 13 b9 f8 ac b4 55 85 6c 81 19 23 77 3f 52 c1 83 |.....U.l..#w?R..| +peer1.org2.example.com | 00000020 66 07 ce 20 af 02 20 25 70 24 3d e4 6f 84 74 a1 |f.. .. %p$=.o.t.| +peer1.org2.example.com | 00000030 32 64 6d 2a 6a 2f 01 99 d3 46 48 1b b4 98 5c 19 |2dm*j/...FH...\.| +peer1.org2.example.com | 00000040 02 e9 34 cb f1 f0 2a |..4...*| +peer1.org2.example.com | [3bb8 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3bb9 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3bba 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bbb 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bbc 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bbd 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bbe 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bbf 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3bc0 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a91 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c00f30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a92 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c00f30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3a93 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a94 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [3a95 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [3a96 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [3a97 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c00f30 principal matched by identity 0 +peer0.org2.example.com | [3a98 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3a99 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3a9a 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c00f30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a9b 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c00f30 gate 1574140975947485600 evaluation succeeds +peer0.org2.example.com | [3a9c 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a9d 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a9e 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a9f 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3aa0 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa1 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa2 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3aa3 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3aa4 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3aa5 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3aa6 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3aa7 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3aa8 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c350 gate 1574140975958002600 evaluation starts +peer0.org2.example.com | [3aa9 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3aaa 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c350 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3aab 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3aac 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c350 principal evaluation fails +peer0.org2.example.com | [3aad 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c350 gate 1574140975958002600 evaluation fails +peer0.org2.example.com | [3aae 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3aaf 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3ab0 11-19 05:22:55.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ab1 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c8c0 gate 1574140975958514500 evaluation starts +peer0.org2.example.com | [3ab2 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c8c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ab3 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c8c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3ab4 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c8c0 principal matched by identity 0 +peer0.org2.example.com | [3ab5 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3ab6 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3ab7 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c8c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3ab8 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c8c0 gate 1574140975958514500 evaluation succeeds +peer0.org2.example.com | [3ab9 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3aba 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3abb 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3abc 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3abd 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3abe 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3abf 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ac0 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ac1 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ac2 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ac3 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ac4 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3ac5 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1da50 gate 1574140975967653200 evaluation starts +peer0.org2.example.com | [3ac6 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1da50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ac7 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1da50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3ac8 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1da50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3ac9 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1da50 principal evaluation fails +peer0.org2.example.com | [3aca 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1da50 gate 1574140975967653200 evaluation fails +peer0.org2.example.com | [3acb 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3acc 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3acd 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ace 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dfc0 gate 1574140975969128100 evaluation starts +peer0.org2.example.com | [3acf 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dfc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ad0 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dfc0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3ad1 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dfc0 principal matched by identity 0 +peer0.org2.example.com | [3ad2 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3ad3 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3c1d 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3c1e 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c1f 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c20 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c21 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c22 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c23 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c24 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c25 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c26 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c27 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c28 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c29 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c2a 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c2b 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3c2c 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer0.org1.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer0.org1.example.com | [3c2d 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer0.org1.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer0.org1.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer0.org1.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer0.org1.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer0.org1.example.com | [3c2e 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3c2f 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 10 e1 a3 82 e7 0f f0 42 d5 8b |0E.!.........B..| +peer0.org1.example.com | 00000010 a6 5c 50 11 b3 23 7c 8a 3b 56 f7 48 bc 49 74 e6 |.\P..#|.;V.H.It.| +peer0.org1.example.com | 00000020 95 14 73 0b 18 02 20 01 c5 ec 67 7e a7 dd 27 de |..s... ...g~..'.| +peer0.org1.example.com | 00000030 a4 ad ab fd 81 41 ed 0b f7 0a 6e 10 2c 4c 20 03 |.....A....n.,L .| +peer0.org1.example.com | 00000040 1a 4f 2d 36 f3 6a d2 |.O-6.j.| +peer0.org1.example.com | [3c30 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3c31 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [3bc1 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3bc2 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3bc3 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3bc4 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3bc5 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3bc6 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3bc7 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522660 gate 1574140983496970000 evaluation starts +peer1.org2.example.com | [3bc8 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3bc9 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522660 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3bca 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522660 principal matched by identity 0 +peer1.org2.example.com | [3bcb 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer1.org2.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer1.org2.example.com | [3bcc 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer1.org2.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer1.org2.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer1.org2.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer1.org2.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer1.org2.example.com | [3bcd 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522660 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3bce 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522660 gate 1574140983496970000 evaluation succeeds +peer1.org2.example.com | [3bcf 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bd0 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bd1 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3bd2 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3bd3 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3bd4 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bd5 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3bd6 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer1.org2.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer1.org2.example.com | [3bd7 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer1.org2.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer1.org2.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer1.org2.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer1.org2.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer1.org2.example.com | [3bd8 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bd9 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bda 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bdb 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bdc 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bdd 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bde 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bdf 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3be0 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer1.org2.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer1.org1.example.com | [373d 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [373e 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [373f 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3740 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3741 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3742 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3743 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3744 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3745 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3746 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3747 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3748 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3749 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [374a 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [374b 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [374c 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [374d 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [374e 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [374f 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3750 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3751 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3752 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3753 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ad4 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dfc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3ad5 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dfc0 gate 1574140975969128100 evaluation succeeds +peer0.org2.example.com | [3ad6 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ad7 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ad8 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ad9 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ada 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3adb 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3adc 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3add 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ade 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3adf 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ae0 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ae1 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ae2 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ae3 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ae4 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3ae5 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c313a0 gate 1574140975970598000 evaluation starts +peer0.org2.example.com | [3ae6 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c313a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ae7 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c313a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3ae8 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c313a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3ae9 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c313a0 principal evaluation fails +peer0.org2.example.com | [3aea 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c313a0 gate 1574140975970598000 evaluation fails +peer0.org2.example.com | [3aeb 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3aec 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3aed 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3aee 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c31910 gate 1574140975970900800 evaluation starts +peer0.org2.example.com | [3aef 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c31910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3af0 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c31910 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3af1 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c31910 principal matched by identity 0 +peer0.org2.example.com | [3af2 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3af3 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3af4 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c31910 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3af5 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c31910 gate 1574140975970900800 evaluation succeeds +peer0.org2.example.com | [3af6 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3af7 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3af8 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3af9 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3afa 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3afb 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3afc 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3afd 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3afe 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3aff 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3b00 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3b01 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3b02 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c56aa0 gate 1574140975971905200 evaluation starts +peer0.org2.example.com | [3b03 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c56aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b04 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c56aa0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3b05 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c56aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3b06 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c56aa0 principal evaluation fails +peer0.org2.example.com | [3b07 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c56aa0 gate 1574140975971905200 evaluation fails +peer0.org2.example.com | [3b08 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b09 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b0a 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3b0b 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57010 gate 1574140975972203800 evaluation starts +peer0.org2.example.com | [3b0c 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57010 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b0d 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57010 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3b0e 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57010 principal matched by identity 0 +peer0.org2.example.com | [3b0f 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3b10 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [3b11 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57010 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b12 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57010 gate 1574140975972203800 evaluation succeeds +peer0.org2.example.com | [3b13 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b14 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b15 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b16 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b17 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [3b18 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3be1 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer1.org2.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer1.org2.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer1.org2.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer1.org2.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer1.org2.example.com | [3be2 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be3 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be4 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3be5 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3be6 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3be7 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3be8 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3be9 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bea 11-19 05:23:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3beb 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bec 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bed 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bee 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bef 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf0 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf1 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf2 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf3 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [3bf4 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bf5 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bf6 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bf7 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [3bf8 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bf9 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bfa 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bfb 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bfc 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [3bfd 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 60 70 e4 6b 1e ad 31 eb 3b b6 66 c8 6b af f0 |?`p.k..1.;.f.k..| +peer1.org2.example.com | 00000010 20 22 30 fa be 1f 2e 3e 93 be 9b 60 32 31 2c 23 | "0....>...`21,#| +peer1.org2.example.com | [3bfe 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 ae 73 2c 02 92 e1 72 1d 98 |0E.!....s,...r..| +peer1.org2.example.com | 00000010 4c 93 ba 1e 48 b1 e2 f1 65 a5 f3 ba 57 1e 6b e3 |L...H...e...W.k.| +peer1.org2.example.com | 00000020 33 fd 3f b2 af 02 20 15 a5 d8 89 a7 0b 37 17 e9 |3.?... ......7..| +peer1.org2.example.com | 00000030 77 91 59 e8 3b c9 43 8d 89 01 54 d9 c2 23 8d ef |w.Y.;.C...T..#..| +peer1.org2.example.com | 00000040 24 67 ad 34 ca be b8 |$g.4...| +peer1.org2.example.com | [3bff 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [3754 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3755 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3756 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000451560 gate 1574140983863362500 evaluation starts +peer1.org1.example.com | [3757 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000451560 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3758 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000451560 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3759 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000451560 principal matched by identity 0 +peer1.org1.example.com | [375a 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 60 70 e4 6b 1e ad 31 eb 3b b6 66 c8 6b af f0 |?`p.k..1.;.f.k..| +peer1.org1.example.com | 00000010 20 22 30 fa be 1f 2e 3e 93 be 9b 60 32 31 2c 23 | "0....>...`21,#| +peer1.org1.example.com | [375b 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 ae 73 2c 02 92 e1 72 1d 98 |0E.!....s,...r..| +peer1.org1.example.com | 00000010 4c 93 ba 1e 48 b1 e2 f1 65 a5 f3 ba 57 1e 6b e3 |L...H...e...W.k.| +peer1.org1.example.com | 00000020 33 fd 3f b2 af 02 20 15 a5 d8 89 a7 0b 37 17 e9 |3.?... ......7..| +peer1.org1.example.com | 00000030 77 91 59 e8 3b c9 43 8d 89 01 54 d9 c2 23 8d ef |w.Y.;.C...T..#..| +peer1.org1.example.com | 00000040 24 67 ad 34 ca be b8 |$g.4...| +peer1.org1.example.com | [375c 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000451560 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [375d 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000451560 gate 1574140983863362500 evaluation succeeds +peer1.org1.example.com | [375e 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [375f 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3760 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3761 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3762 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3763 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3764 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3765 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3766 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3767 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3768 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3769 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [376a 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [376b 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [376c 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [376d 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [376e 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [376f 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [3770 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3771 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3772 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3773 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3774 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3775 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3776 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c32 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3c33 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3c34 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3c35 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c36 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c37 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c38 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [3c39 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c3a 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c3b 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3c3c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [3c3d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c3e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c3f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3c40 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3c41 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c42 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c43 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c44 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c45 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c46 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c47 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3c48 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 gate 1574140975945406100 evaluation starts +peer0.org1.example.com | [3c49 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c4a 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3c4b 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3c4c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 principal evaluation fails +peer0.org1.example.com | [3c4d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 gate 1574140975945406100 evaluation fails +peer0.org1.example.com | [3c4e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c4f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c50 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c51 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 gate 1574140975945792100 evaluation starts +peer0.org1.example.com | [3c52 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c53 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3c54 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 principal matched by identity 0 +peer0.org1.example.com | [3c55 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3c56 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3c57 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c58 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 gate 1574140975945792100 evaluation succeeds +peer0.org1.example.com | [3c59 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c5a 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c5b 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c5c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c5d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c5e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c5f 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3c60 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3c61 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c62 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c63 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c64 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c65 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c66 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c00 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 cb 35 df ae d5 9b 47 93 14 b6 a4 |0D. U.5....G....| +peer1.org2.example.com | 00000010 b8 e2 0a 62 66 88 94 94 83 f6 23 ce 41 d2 2a cf |...bf.....#.A.*.| +peer1.org2.example.com | 00000020 8c dd 34 a0 02 20 52 6d bd 1d 9c 35 4b fa 52 f7 |..4.. Rm...5K.R.| +peer1.org2.example.com | 00000030 15 3d ba 83 25 70 e6 88 3d d5 7e 5d 77 98 c3 36 |.=..%p..=.~]w..6| +peer1.org2.example.com | 00000040 b4 7b 06 84 19 d4 |.{....| +peer1.org2.example.com | [3c01 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3c02 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [3c03 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3c04 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3c05 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3c06 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c07 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c08 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c09 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [3c0a 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c0b 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c0c 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3c0d 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c0e 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c0f 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [3c10 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c11 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c12 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c13 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c14 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c15 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c16 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c17 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [3c18 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3777 11-19 05:23:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3778 11-19 05:23:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15103C +peer1.org1.example.com | [3779 11-19 05:23:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F6F96ECED1BF7B6D63EED184D5C99B8E90C1503AC7E3C21653114BFD3356511C +peer1.org1.example.com | [377a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [377b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [377c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [377d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\356O\377*hL\257\032U\2535\251e\362kT\021:2D\333\006l\004\345\r\323fs\223\354" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [377e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [377f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3780 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3781 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3782 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3783 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3784 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\356O\377*hL\257\032U\2535\251e\362kT\021:2D\333\006l\004\345\r\323fs\223\354" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [3785 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3786 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3787 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3788 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3789 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [378a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [378b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [378c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [378d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer1.org1.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer1.org1.example.com | [378e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer1.org1.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer1.org1.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer1.org1.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer1.org1.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer1.org1.example.com | [378f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3790 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3791 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [3792 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b19 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3b1a 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3b1b 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b1c 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b1d 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b1e 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b1f 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b20 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b21 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b22 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b23 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3b24 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3b25 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3b26 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b0f0 gate 1574140975975978300 evaluation starts +peer0.org2.example.com | [3b27 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b0f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b28 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b0f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3b29 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3b2a 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b0f0 principal evaluation fails +peer0.org2.example.com | [3b2b 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b0f0 gate 1574140975975978300 evaluation fails +peer0.org2.example.com | [3b2c 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b2d 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b2e 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3b2f 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b660 gate 1574140975977479700 evaluation starts +peer0.org2.example.com | [3b30 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b31 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b660 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3b32 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b660 principal matched by identity 0 +peer0.org2.example.com | [3b33 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3b34 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [3b35 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b660 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b36 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6b660 gate 1574140975977479700 evaluation succeeds +peer0.org2.example.com | [3b37 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b38 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b39 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c67 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3c68 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 gate 1574140975960824600 evaluation starts +peer0.org1.example.com | [3c69 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c6a 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3c6b 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3c6c 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 principal evaluation fails +peer0.org1.example.com | [3c6d 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 gate 1574140975960824600 evaluation fails +peer0.org1.example.com | [3c6e 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c6f 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c70 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c71 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 gate 1574140975961193900 evaluation starts +peer0.org1.example.com | [3c72 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c73 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3c74 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 principal matched by identity 0 +peer0.org1.example.com | [3c75 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3c76 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3c77 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c78 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 gate 1574140975961193900 evaluation succeeds +peer0.org1.example.com | [3c79 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c7a 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c7b 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c7c 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c7d 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c7e 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c7f 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c80 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c81 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c82 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c83 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c84 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c85 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3c86 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3c87 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c88 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c89 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c8a 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c8b 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c8c 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c8d 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3c8e 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 gate 1574140976181508100 evaluation starts +peer0.org1.example.com | [3c8f 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c90 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3c91 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3c92 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 principal evaluation fails +peer0.org1.example.com | [3c93 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 gate 1574140976181508100 evaluation fails +peer0.org1.example.com | [3c94 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c95 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c96 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c97 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 gate 1574140976182398800 evaluation starts +peer0.org1.example.com | [3c98 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c99 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3c9a 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 principal matched by identity 0 +peer0.org1.example.com | [3c9b 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [3c9c 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [3c9d 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c9e 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 gate 1574140976182398800 evaluation succeeds +peer0.org1.example.com | [3c9f 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ca0 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ca1 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3ca2 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3ca3 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ca4 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ca5 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3ca6 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3ca7 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3ca9 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3ca8 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3caa 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cab 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3cac 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3cad 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3caf 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cae 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cb0 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cb1 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3793 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3794 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3795 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3796 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3797 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3798 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3799 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024da050 gate 1574140984944949000 evaluation starts +peer1.org1.example.com | [379a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024da050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [379b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024da050 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [379c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024da050 principal matched by identity 0 +peer1.org1.example.com | [379d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 60 70 e4 6b 1e ad 31 eb 3b b6 66 c8 6b af f0 |?`p.k..1.;.f.k..| +peer1.org1.example.com | 00000010 20 22 30 fa be 1f 2e 3e 93 be 9b 60 32 31 2c 23 | "0....>...`21,#| +peer1.org1.example.com | [379e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 ae 73 2c 02 92 e1 72 1d 98 |0E.!....s,...r..| +peer1.org1.example.com | 00000010 4c 93 ba 1e 48 b1 e2 f1 65 a5 f3 ba 57 1e 6b e3 |L...H...e...W.k.| +peer1.org1.example.com | 00000020 33 fd 3f b2 af 02 20 15 a5 d8 89 a7 0b 37 17 e9 |3.?... ......7..| +peer1.org1.example.com | 00000030 77 91 59 e8 3b c9 43 8d 89 01 54 d9 c2 23 8d ef |w.Y.;.C...T..#..| +peer1.org1.example.com | 00000040 24 67 ad 34 ca be b8 |$g.4...| +peer1.org1.example.com | [379f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024da050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37a0 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024da050 gate 1574140984944949000 evaluation succeeds +peer1.org1.example.com | [37a1 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37a2 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37a3 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [37a4 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [37a5 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [37a6 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37a7 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [37a8 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 f9 6e ce d1 bf 7b 6d 63 ee d1 84 d5 c9 9b 8e |..n...{mc.......| +peer1.org1.example.com | 00000010 90 c1 50 3a c7 e3 c2 16 53 11 4b fd 33 56 51 1c |..P:....S.K.3VQ.| +peer1.org1.example.com | [37a9 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 9b be c5 4b 01 21 4c e2 58 ba 31 |0D. )...K.!L.X.1| +peer1.org1.example.com | 00000010 71 9f 0e c6 44 1d b4 c9 72 74 4a e9 5f 6f 12 b3 |q...D...rtJ._o..| +peer1.org1.example.com | 00000020 cd f0 51 75 02 20 47 09 d2 e0 7c 8a 57 e5 1c 2f |..Qu. G...|.W../| +peer1.org1.example.com | 00000030 2e e6 5c af 50 dc 82 10 33 ef 80 2a 36 ec 5a 3b |..\.P...3..*6.Z;| +peer1.org1.example.com | 00000040 7e bb 03 75 c2 d1 |~..u..| +peer1.org1.example.com | [37aa 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37ab 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37ac 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37ad 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37ae 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [37af 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [37b0 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37b1 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37b2 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37b3 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37b4 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [37b5 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [37b6 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37b7 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [37b8 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [37b9 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 f9 6e ce d1 bf 7b 6d 63 ee d1 84 d5 c9 9b 8e |..n...{mc.......| +peer1.org1.example.com | 00000010 90 c1 50 3a c7 e3 c2 16 53 11 4b fd 33 56 51 1c |..P:....S.K.3VQ.| +peer1.org1.example.com | [37ba 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 9b be c5 4b 01 21 4c e2 58 ba 31 |0D. )...K.!L.X.1| +peer1.org1.example.com | 00000010 71 9f 0e c6 44 1d b4 c9 72 74 4a e9 5f 6f 12 b3 |q...D...rtJ._o..| +peer1.org1.example.com | 00000020 cd f0 51 75 02 20 47 09 d2 e0 7c 8a 57 e5 1c 2f |..Qu. G...|.W../| +peer1.org1.example.com | 00000030 2e e6 5c af 50 dc 82 10 33 ef 80 2a 36 ec 5a 3b |..\.P...3..*6.Z;| +peer1.org1.example.com | 00000040 7e bb 03 75 c2 d1 |~..u..| +peer1.org1.example.com | [37bb 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [37bc 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d c6 e0 10 09 6b c1 8a 20 11 c9 65 |0D. .....k.. ..e| +peer1.org1.example.com | 00000010 c6 9d 43 73 73 1e c2 a7 27 c9 0b a3 34 01 9f c3 |..Css...'...4...| +peer1.org1.example.com | 00000020 b7 66 7f 24 02 20 3e ee 4f ff 2a 68 4c af 1a 55 |.f.$. >.O.*hL..U| +peer1.org1.example.com | 00000030 ab 35 a9 65 f2 6b 54 11 3a 32 44 db 06 6c 04 e5 |.5.e.kT.:2D..l..| +peer1.org1.example.com | 00000040 0d d3 66 73 93 ec |..fs..| +peer1.org1.example.com | [37bd 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [37be 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [37bf 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37c0 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37c1 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [37c2 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [37c3 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [37c4 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e e8 0f 32 1d d6 34 c6 90 98 5a ab 83 38 57 92 |...2..4...Z..8W.| +peer1.org1.example.com | 00000010 9e ca 14 bc 55 a5 ca 17 f2 45 31 72 9f 04 8c 2d |....U....E1r...-| +peer1.org1.example.com | [37c5 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 84 a9 07 8e f2 7c cf 2d c0 b7 b0 |0D. Z.....|.-...| +peer1.org1.example.com | 00000010 50 1e fe eb 69 8c 2f 60 0e f4 9d 51 8e a2 30 5d |P...i./`...Q..0]| +peer1.org1.example.com | 00000020 33 e1 03 50 02 20 01 bf 17 6d e1 46 e9 34 5e 6d |3..P. ...m.F.4^m| +peer1.org1.example.com | 00000030 cb 16 55 53 ad 66 f7 81 37 99 9f f6 b7 59 81 c1 |..US.f..7....Y..| +peer1.org1.example.com | 00000040 29 c1 3e 4b 21 80 |).>K!.| +peer1.org1.example.com | [37c6 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37c7 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [37c8 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37c9 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [37ca 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [37cb 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c b0 bb f9 8f 58 14 5d 83 52 b2 96 e0 e2 0b cf |l....X.].R......| +peer1.org1.example.com | 00000010 a1 b3 8e f1 d3 f1 60 39 d3 16 54 20 d8 d3 9b 66 |......`9..T ...f| +peer1.org1.example.com | [37cc 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 00 33 ab a5 9a 70 97 2e 12 7b |0E.!...3...p...{| +peer1.org1.example.com | 00000010 11 44 f3 44 83 82 70 e2 78 54 a9 f3 76 d0 82 91 |.D.D..p.xT..v...| +peer1.org1.example.com | 00000020 50 43 02 c3 78 02 20 2c fe ec 47 d2 19 b7 0d 72 |PC..x. ,..G....r| +peer1.org1.example.com | 00000030 d8 60 08 2c 2f 8e ea a4 74 ee e8 ab 5e e3 cf a6 |.`.,/...t...^...| +peer1.org1.example.com | 00000040 e2 92 c1 e6 a2 ec d3 |.......| +peer1.org1.example.com | [37cd 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [37ce 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [37cf 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [37d0 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [37d1 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [37d2 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [37d3 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37d4 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37d6 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37d7 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [37d8 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [37d9 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37da 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 f9 6e ce d1 bf 7b 6d 63 ee d1 84 d5 c9 9b 8e |..n...{mc.......| +peer1.org1.example.com | 00000010 90 c1 50 3a c7 e3 c2 16 53 11 4b fd 33 56 51 1c |..P:....S.K.3VQ.| +peer1.org1.example.com | [37dc 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 9b be c5 4b 01 21 4c e2 58 ba 31 |0D. )...K.!L.X.1| +peer1.org1.example.com | 00000010 71 9f 0e c6 44 1d b4 c9 72 74 4a e9 5f 6f 12 b3 |q...D...rtJ._o..| +peer1.org1.example.com | 00000020 cd f0 51 75 02 20 47 09 d2 e0 7c 8a 57 e5 1c 2f |..Qu. G...|.W../| +peer1.org1.example.com | 00000030 2e e6 5c af 50 dc 82 10 33 ef 80 2a 36 ec 5a 3b |..\.P...3..*6.Z;| +peer1.org1.example.com | 00000040 7e bb 03 75 c2 d1 |~..u..| +peer1.org1.example.com | [37dd 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37db 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37d5 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [37de 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37e0 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [37df 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37e1 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37e2 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [37e3 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37e4 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [37e5 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37e6 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37e7 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [37e8 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [37e9 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [37ea 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002504720 gate 1574140984979377400 evaluation starts +peer1.org1.example.com | [37eb 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002504720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37ec 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002504720 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [37ed 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002504720 principal matched by identity 0 +peer1.org1.example.com | [37ee 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer1.org1.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer1.org1.example.com | [37ef 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer1.org1.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer1.org1.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer1.org1.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer1.org1.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer1.org1.example.com | [37f0 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002504720 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37f1 11-19 05:23:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002504720 gate 1574140984979377400 evaluation succeeds +peer1.org1.example.com | [37f2 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37f3 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37f4 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [37f5 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [37f6 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37f7 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37f8 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37f9 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b3a 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b3b 11-19 05:22:55.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b3c 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b3d 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b3e 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b3f 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b40 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3b41 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3b42 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3b43 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c887f0 gate 1574140975981504800 evaluation starts +peer0.org2.example.com | [3b44 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c887f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b45 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c887f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3b46 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c887f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3b47 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c887f0 principal evaluation fails +peer0.org2.example.com | [3b48 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c887f0 gate 1574140975981504800 evaluation fails +peer0.org2.example.com | [3b49 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b4a 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b4b 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3b4c 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c88d60 gate 1574140975983322800 evaluation starts +peer0.org2.example.com | [3b4d 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c88d60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b4e 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c88d60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3b4f 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c88d60 principal matched by identity 0 +peer0.org2.example.com | [3b50 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3b51 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3b52 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c88d60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b53 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c88d60 gate 1574140975983322800 evaluation succeeds +peer0.org2.example.com | [3b54 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b55 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b56 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b57 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b58 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [3b59 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [3b5a 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3b5b 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3b5c 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b5d 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b5e 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b5f 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b60 11-19 05:22:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [3b61 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b62 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b63 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b64 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b65 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3b66 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3b67 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3b68 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8df0 gate 1574140975991954900 evaluation starts +peer0.org2.example.com | [3b69 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8df0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b6a 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8df0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3b6b 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3b6c 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8df0 principal evaluation fails +peer0.org2.example.com | [3b6d 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8df0 gate 1574140975991954900 evaluation fails +peer0.org2.example.com | [3b6e 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b6f 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b70 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3b71 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca9360 gate 1574140975993598700 evaluation starts +peer0.org2.example.com | [3b72 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca9360 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b73 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca9360 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3b74 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca9360 principal matched by identity 0 +peer0.org2.example.com | [3b75 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer0.org2.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer0.org2.example.com | [3b76 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer0.org2.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer0.org2.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer0.org2.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer0.org2.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer0.org2.example.com | [3b77 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca9360 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b78 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca9360 gate 1574140975993598700 evaluation succeeds +peer0.org2.example.com | [3b79 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b7a 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b7b 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b7c 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b7d 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b7e 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3b7f 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3b80 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3b81 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3b82 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b83 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b84 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b85 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [3b86 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b87 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b88 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b89 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b8a 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3b8b 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b8c 11-19 05:22:55.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b8d 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b8e 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b8f 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3b90 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b91 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b92 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b93 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b94 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b95 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b96 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b97 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b98 11-19 05:22:56.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b99 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b9a 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b9b 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9c 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9d 11-19 05:22:56.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b9e 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b9f 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ba0 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3ba1 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3ba2 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ba3 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ba4 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ba5 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ba6 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [3ba7 11-19 05:22:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ba8 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ba9 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3baa 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bab 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bac 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bad 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bae 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3baf 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bb0 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [3bb1 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bb2 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bb3 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bb4 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bb5 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3bb6 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bb7 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3bb8 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bb9 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bba 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3bbb 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3bbc 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3bbd 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cddc60 gate 1574140978867510600 evaluation starts +peer0.org2.example.com | [3bbe 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cddc60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bbf 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cddc60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3bc0 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cddc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3bc1 11-19 05:22:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cddc60 principal evaluation fails +peer0.org2.example.com | [3bc2 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cddc60 gate 1574140978867510600 evaluation fails +peer0.org2.example.com | [3bc3 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3bc4 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3bc5 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3bc6 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d021d0 gate 1574140978872540800 evaluation starts +peer0.org2.example.com | [3bc7 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d021d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bc8 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d021d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3bc9 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d021d0 principal matched by identity 0 +peer0.org2.example.com | [3bca 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +peer0.org2.example.com | 00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +peer0.org2.example.com | [3bcb 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +peer0.org2.example.com | 00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +peer0.org2.example.com | 00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +peer0.org2.example.com | 00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +peer0.org2.example.com | 00000040 17 d6 e3 e0 b8 28 |.....(| +peer0.org2.example.com | [3bcc 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d021d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3bcd 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d021d0 gate 1574140978872540800 evaluation succeeds +peer0.org2.example.com | [3bce 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3bcf 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3bd0 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3bd1 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3bd2 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3bd3 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3bd4 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3bd5 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3bd6 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3bd7 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bd8 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bd9 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bda 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [3bdb 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bdc 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bdd 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bde 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3bdf 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3be0 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3be1 11-19 05:22:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3be2 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3be3 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3be4 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3be5 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3be6 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3be7 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3be8 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3be9 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bea 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [3beb 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bec 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\355\217z\240\233BL\021Z\345\224\006\256\263\343\304" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bed 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\355\217z\240\233BL\021Z\345\224\006\256\263\343\304" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bee 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bef 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\355\217z\240\233BL\021Z\345\224\006\256\263\343\304" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bf0 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3bf1 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer0.org2.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer0.org2.example.com | [3bf2 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer0.org2.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer0.org2.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer0.org2.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer0.org2.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer0.org2.example.com | [3bf3 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3bf4 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 16 72 4f b4 56 4b e6 e3 ef 1c |0E.!...rO.VK....| +peer0.org2.example.com | 00000010 f0 dc c4 5c 6b 6c 7b 4c 95 90 59 ec de 07 09 d3 |...\kl{L..Y.....| +peer0.org2.example.com | 00000020 78 81 e8 44 8b 02 20 2b 5c 24 fc af db ab b9 15 |x..D.. +\$......| +peer0.org2.example.com | 00000030 c9 7d 64 41 e4 e4 3e ed 8f 7a a0 9b 42 4c 11 5a |.}dA..>..z..BL.Z| +peer0.org2.example.com | 00000040 e5 94 06 ae b3 e3 c4 |.......| +peer0.org2.example.com | [3bf5 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3bf6 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [3bf7 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3bf8 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [37fa 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37fb 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37fc 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37fd 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [37fe 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3800 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [37ff 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3801 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3802 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3803 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3804 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3805 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3806 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3807 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3808 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3809 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3c19 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c1a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c1b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c1c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c1d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c1e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c1f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d690 gate 1574140984941870200 evaluation starts +peer1.org2.example.com | [3c20 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c21 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d690 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3c22 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d690 principal matched by identity 0 +peer1.org2.example.com | [3c23 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 f9 6e ce d1 bf 7b 6d 63 ee d1 84 d5 c9 9b 8e |..n...{mc.......| +peer1.org2.example.com | 00000010 90 c1 50 3a c7 e3 c2 16 53 11 4b fd 33 56 51 1c |..P:....S.K.3VQ.| +peer1.org2.example.com | [3c24 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 9b be c5 4b 01 21 4c e2 58 ba 31 |0D. )...K.!L.X.1| +peer1.org2.example.com | 00000010 71 9f 0e c6 44 1d b4 c9 72 74 4a e9 5f 6f 12 b3 |q...D...rtJ._o..| +peer1.org2.example.com | 00000020 cd f0 51 75 02 20 47 09 d2 e0 7c 8a 57 e5 1c 2f |..Qu. G...|.W../| +peer1.org2.example.com | 00000030 2e e6 5c af 50 dc 82 10 33 ef 80 2a 36 ec 5a 3b |..\.P...3..*6.Z;| +peer1.org2.example.com | 00000040 7e bb 03 75 c2 d1 |~..u..| +peer1.org2.example.com | [3c25 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d690 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c26 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d690 gate 1574140984941870200 evaluation succeeds +peer1.org2.example.com | [3c27 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c28 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c29 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c2a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c2b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3c2c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3c2d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3c2e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3c2f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3c30 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c31 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c32 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c33 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [3c34 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c35 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c36 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c37 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [380a 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [380b 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [380c 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [380d 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [380e 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [380f 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3810 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3811 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3812 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3813 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3814 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002510b20 gate 1574140985384273300 evaluation starts +peer1.org1.example.com | [3815 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002510b20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3816 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002510b20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3817 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002510b20 principal matched by identity 0 +peer1.org1.example.com | [3818 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 26 a1 56 2b 9f f3 38 74 39 c9 30 b8 04 ae ec |.&.V+..8t9.0....| +peer1.org1.example.com | 00000010 46 cf 86 f9 f9 0b 7a 6a bb e0 be 82 8b f1 9e f9 |F.....zj........| +peer1.org1.example.com | [3819 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 e7 50 6c e2 48 56 8c 18 12 7c bb |0D. 6.Pl.HV...|.| +peer1.org1.example.com | 00000010 d2 07 3b b6 a2 f7 f9 53 8b 8e 2d a7 0d 88 07 8c |..;....S..-.....| +peer1.org1.example.com | 00000020 57 50 f7 0b 02 20 6e 00 5b f4 95 b4 15 a1 8a cc |WP... n.[.......| +peer1.org1.example.com | 00000030 5f 5c 9e 38 ee c0 d3 88 80 1a f6 2f 2f 81 d8 77 |_\.8.......//..w| +peer1.org1.example.com | 00000040 a1 f8 9e cd ce 43 |.....C| +peer1.org1.example.com | [381a 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002510b20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [381b 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002510b20 gate 1574140985384273300 evaluation succeeds +peer1.org1.example.com | [381c 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [381d 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [381e 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [381f 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3820 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3821 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3822 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3823 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3cb2 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cb3 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cb4 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cb5 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cb6 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cb7 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cb8 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cb9 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cba 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cbb 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cbc 11-19 05:22:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3cbd 11-19 05:22:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151033 +peer0.org1.example.com | [3cbe 11-19 05:22:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E6878FCD10BED3D5CB069BF5A658100592E0DEF701EC2BF74F2B3CF89B92ED31 +peer0.org1.example.com | [3cbf 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3cc0 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3cc1 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3cc2 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3cc3 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cc5 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3cc6 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cc4 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c38 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [3c39 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c3a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c3b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c3c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c3d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3c3e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c3f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c40 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c41 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c42 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3c43 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c44 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c45 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3c46 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c47 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c48 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c49 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c4a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c4b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c4c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c4d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c4e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c4f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c50 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c51 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c52 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c53 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c54 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c55 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3824 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3825 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3826 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3827 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3828 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3829 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [382a 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [382b 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [382c 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [382d 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [382e 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [382f 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3830 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3831 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3832 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3833 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3834 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3835 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3836 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3837 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3838 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3839 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [383a 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [383b 11-19 05:23:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [383c 11-19 05:23:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [383d 11-19 05:23:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [383e 11-19 05:23:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3840 11-19 05:23:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [383f 11-19 05:23:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3841 11-19 05:23:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3842 11-19 05:23:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15103D +peer1.org1.example.com | [3843 11-19 05:23:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5EF638DC7F49487E5365AE5A549DF35A1080203ECF0D6170D83C8F2A9EF8F0C3 +peer1.org1.example.com | [3844 11-19 05:23:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3845 11-19 05:23:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3846 11-19 05:23:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3847 11-19 05:23:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3848 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3849 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [384a 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [384b 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [384c 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [384d 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3bf9 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3bfa 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bfb 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bfc 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bfd 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [3bfe 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bff 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c00 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c01 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\355\217z\240\233BL\021Z\345\224\006\256\263\343\304" > > alive: +peer0.org2.example.com | [3c02 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c03 11-19 05:22:59.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c04 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cc7 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cc9 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cc8 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3cca 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ccb 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ccc 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ccd 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ccf 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cce 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cd0 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cd1 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cd2 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cd3 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3cd4 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +peer0.org1.example.com | 00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +peer0.org1.example.com | [3cd5 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +peer0.org1.example.com | 00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +peer0.org1.example.com | 00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +peer0.org1.example.com | 00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +peer0.org1.example.com | 00000040 17 d6 e3 e0 b8 28 |.....(| +peer0.org1.example.com | [3cd6 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [3cd7 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 4a 87 68 33 71 50 f2 8b 5c fb 2c |0D. CJ.h3qP..\.,| +peer0.org1.example.com | 00000010 0c e9 a2 bb d6 1c ae e0 28 f1 dc ce 71 20 91 75 |........(...q .u| +peer0.org1.example.com | 00000020 59 84 39 46 02 20 17 fc 12 98 75 82 1b 28 40 be |Y.9F. ....u..(@.| +peer0.org1.example.com | 00000030 e0 de 5e 9f 83 f6 e9 ee c9 ee ef b3 8d 78 93 9f |..^..........x..| +peer0.org1.example.com | 00000040 16 1d c8 84 a4 62 |.....b| +peer0.org1.example.com | [3cd8 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3cd9 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3cda 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cdb 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cdc 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cdd 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3cde 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer0.org1.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer0.org1.example.com | [3cdf 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer0.org1.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer0.org1.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer0.org1.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer0.org1.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer0.org1.example.com | [3ce0 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3ce1 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ce2 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3ce3 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +peer0.org1.example.com | 00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +peer1.org2.example.com | [3c56 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a310 gate 1574140984949613800 evaluation starts +peer1.org2.example.com | [3c57 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a310 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c58 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a310 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3c59 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a310 principal matched by identity 0 +peer1.org2.example.com | [3c5a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3c5b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3c5c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a310 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c5d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a310 gate 1574140984949613800 evaluation succeeds +peer1.org2.example.com | [3c5e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c5f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c60 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c61 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c62 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c63 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c64 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c65 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c66 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c67 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c68 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c69 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c6a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376b4a0 gate 1574140984950405900 evaluation starts +peer1.org2.example.com | [3c6b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376b4a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c6c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376b4a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3c6d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376b4a0 principal matched by identity 0 +peer1.org2.example.com | [3c6e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3c6f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3c70 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376b4a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c71 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376b4a0 gate 1574140984950405900 evaluation succeeds +peer1.org2.example.com | [3c72 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c73 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c74 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c75 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c76 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [384e 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [384f 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3850 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3851 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3852 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3853 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3854 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3855 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3856 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3857 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3858 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3859 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [385a 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [385b 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [385c 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [385d 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [385e 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [385f 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3860 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3861 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ba7b0 gate 1574140985818752000 evaluation starts +peer1.org1.example.com | [3862 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ba7b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3863 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ba7b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3864 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ba7b0 principal matched by identity 0 +peer1.org1.example.com | [3865 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 1a 1a 57 9c 7e 17 8e 27 dd 4d 8f 1c 13 40 68 |...W.~..'.M...@h| +peer1.org1.example.com | 00000010 fd 9f df d6 7f ac 09 c0 66 42 08 38 44 f8 bb 02 |........fB.8D...| +peer1.org1.example.com | [3866 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 82 cf 91 e4 e0 ca 0f 6f 9c e4 b1 |0D. 6.......o...| +peer1.org1.example.com | 00000010 e6 56 4d 3d 09 5f a7 67 0c 33 74 af c9 28 9c dd |.VM=._.g.3t..(..| +peer1.org1.example.com | 00000020 ef df d4 34 02 20 37 f8 fb a5 76 70 b6 93 cd 3b |...4. 7...vp...;| +peer1.org1.example.com | 00000030 23 b2 27 cd 88 dc b8 0a 1f 03 ba e9 72 be 90 a7 |#.'.........r...| +peer1.org1.example.com | 00000040 80 b4 f7 d3 92 9d |......| +peer1.org1.example.com | [3867 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ba7b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c05 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c06 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c07 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c08 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c09 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c0a 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c0b 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c0c 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c0d 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c0e 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3c0f 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c10 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c11 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c12 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c13 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c14 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c15 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3c16 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ada0 gate 1574140979740503600 evaluation starts +peer0.org2.example.com | [3c17 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ada0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c18 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ada0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3c19 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ada0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3c1a 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ada0 principal evaluation fails +peer0.org2.example.com | [3c1b 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ada0 gate 1574140979740503600 evaluation fails +peer0.org2.example.com | [3c1c 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c1d 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c1e 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c1f 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4b310 gate 1574140979740747800 evaluation starts +peer0.org2.example.com | [3c20 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4b310 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c21 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4b310 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3c22 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4b310 principal matched by identity 0 +peer0.org2.example.com | [3c23 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 40 9e 06 5b 10 a0 04 7b 15 9f 58 4e 9f 2b 9a |.@..[...{..XN.+.| +peer0.org2.example.com | 00000010 66 f3 41 5e 31 69 e6 70 53 f2 14 af fc 9d af 07 |f.A^1i.pS.......| +peer0.org2.example.com | [3c24 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f6 f7 3b f0 2b 93 7f 4a d5 be eb |0D. c..;.+..J...| +peer0.org2.example.com | 00000010 ac 4f 2c e0 8c 5b e0 8a 5e 6d 51 b0 4d 0b ef ed |.O,..[..^mQ.M...| +peer0.org2.example.com | 00000020 15 6b 93 0b 02 20 7c c0 c9 02 94 b7 6d 56 83 0b |.k... |.....mV..| +peer0.org2.example.com | 00000030 45 c0 08 07 c8 37 7f 40 06 d0 c8 db a2 6f 84 82 |E....7.@.....o..| +peer0.org2.example.com | 00000040 3c 36 44 67 f5 d5 |<6Dg..| +peer1.org2.example.com | [3c77 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3c78 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3c79 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3c7a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c7b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c7c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c7d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c7e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c7f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c80 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c81 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c82 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c83 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c84 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c85 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd5b0 gate 1574140984951865500 evaluation starts +peer1.org2.example.com | [3c86 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c87 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd5b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3c88 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd5b0 principal matched by identity 0 +peer1.org2.example.com | [3c89 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3c8a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3c8b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd5b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c8c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd5b0 gate 1574140984951865500 evaluation succeeds +peer1.org2.example.com | [3c8d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c8e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c8f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c90 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c91 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c92 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3868 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ba7b0 gate 1574140985818752000 evaluation succeeds +peer1.org1.example.com | [3869 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [386a 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [386b 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [386c 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [386d 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [386e 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [386f 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3870 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3871 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3872 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3873 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3874 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3875 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3876 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3877 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3878 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3879 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [387a 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [387b 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [387c 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [387d 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [387e 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [387f 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3880 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3881 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3882 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3883 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3884 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3885 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3886 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3887 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3888 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3889 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [388a 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [388b 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [388c 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [388d 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c25 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4b310 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c26 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4b310 gate 1574140979740747800 evaluation succeeds +peer0.org2.example.com | [3c27 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c28 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c29 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c2a 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c2b 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c2c 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3c2d 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3c2e 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3c2f 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3c30 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c31 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c32 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c33 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c34 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c35 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c36 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c37 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c38 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c39 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3a 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3b 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3c 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3d 11-19 05:22:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3e 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3c3f 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c40 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c41 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c42 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c43 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3c44 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c45 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c46 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c47 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c48 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c49 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c4a 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c4b 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c93 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c94 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c95 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c96 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c97 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c98 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c99 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd4740 gate 1574140984952812200 evaluation starts +peer1.org2.example.com | [3c9a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd4740 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c9b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd4740 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3c9c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd4740 principal matched by identity 0 +peer1.org2.example.com | [3c9d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3c9e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3c9f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd4740 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ca0 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd4740 gate 1574140984952812200 evaluation succeeds +peer1.org2.example.com | [3ca1 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ca2 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ca3 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ca4 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ca5 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [3ca6 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3ca7 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3ca8 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3ca9 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3caa 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cab 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cac 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cad 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3cae 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ce4 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +peer0.org1.example.com | 00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +peer0.org1.example.com | 00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +peer0.org1.example.com | 00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +peer0.org1.example.com | 00000040 17 d6 e3 e0 b8 28 |.....(| +peer0.org1.example.com | [3ce5 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3ce6 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3ce7 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ce8 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [3ce9 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cea 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ceb 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3cec 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ced 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3cee 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3cef 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3cf0 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 gate 1574140978886162600 evaluation starts +peer0.org1.example.com | [3cf1 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3cf2 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3cf3 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3cf4 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 principal evaluation fails +peer0.org1.example.com | [3cf5 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 gate 1574140978886162600 evaluation fails +peer0.org1.example.com | [3cf6 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3cf7 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3cf8 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3cf9 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 gate 1574140978886571200 evaluation starts +peer0.org1.example.com | [3cfa 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3cfb 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3cfc 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 principal matched by identity 0 +peer0.org1.example.com | [3cfd 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +peer0.org1.example.com | 00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +peer0.org1.example.com | [3cfe 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +peer0.org1.example.com | 00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +peer0.org1.example.com | 00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +peer0.org1.example.com | 00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +peer0.org1.example.com | 00000040 f3 06 8a 77 a7 f3 |...w..| +peer0.org1.example.com | [3cff 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d00 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 gate 1574140978886571200 evaluation succeeds +peer0.org1.example.com | [3d01 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d02 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d03 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d04 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d05 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d06 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d07 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d08 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d09 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d0a 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d0b 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d0c 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3d0d 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +peer0.org1.example.com | 00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +peer0.org1.example.com | [3d0e 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +peer0.org1.example.com | 00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +peer0.org1.example.com | 00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +peer0.org1.example.com | 00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +peer0.org1.example.com | 00000040 17 d6 e3 e0 b8 28 |.....(| +peer0.org1.example.com | [3d0f 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d10 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d11 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d12 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [3d13 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d14 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d15 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d16 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d17 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d18 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d19 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3d1a 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 gate 1574140978888309000 evaluation starts +peer0.org1.example.com | [3d1b 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d1c 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3d1d 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3d1e 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 principal evaluation fails +peer0.org1.example.com | [3d1f 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 gate 1574140978888309000 evaluation fails +peer1.org2.example.com | [3caf 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3cb0 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cb1 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cb2 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3cb3 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3cb4 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3cb5 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198870 gate 1574140984957359500 evaluation starts +peer1.org2.example.com | [3cb6 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cb7 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198870 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3cb8 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198870 principal matched by identity 0 +peer1.org2.example.com | [3cb9 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c b0 bb f9 8f 58 14 5d 83 52 b2 96 e0 e2 0b cf |l....X.].R......| +peer1.org2.example.com | 00000010 a1 b3 8e f1 d3 f1 60 39 d3 16 54 20 d8 d3 9b 66 |......`9..T ...f| +peer1.org2.example.com | [3cba 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 00 33 ab a5 9a 70 97 2e 12 7b |0E.!...3...p...{| +peer1.org2.example.com | 00000010 11 44 f3 44 83 82 70 e2 78 54 a9 f3 76 d0 82 91 |.D.D..p.xT..v...| +peer1.org2.example.com | 00000020 50 43 02 c3 78 02 20 2c fe ec 47 d2 19 b7 0d 72 |PC..x. ,..G....r| +peer1.org2.example.com | 00000030 d8 60 08 2c 2f 8e ea a4 74 ee e8 ab 5e e3 cf a6 |.`.,/...t...^...| +peer1.org2.example.com | 00000040 e2 92 c1 e6 a2 ec d3 |.......| +peer1.org2.example.com | [3cbb 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198870 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3cbc 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198870 gate 1574140984957359500 evaluation succeeds +peer1.org2.example.com | [3cbd 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cbe 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cbf 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3cc0 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3cc1 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cc2 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3cc3 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3cc4 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3cc5 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3cc6 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cc7 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cc8 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cc9 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cca 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ccb 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [3ccc 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ccd 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cce 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ccf 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cd0 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cd1 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [3cd2 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3cd3 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cd4 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cd5 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3cd6 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cd7 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cd8 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3cd9 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3cda 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3cdb 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b600 gate 1574140984964082600 evaluation starts +peer1.org2.example.com | [3cdc 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cdd 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b600 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3cde 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b600 principal matched by identity 0 +peer1.org2.example.com | [3cdf 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3ce0 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3ce1 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ce2 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ce3 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ce4 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ce5 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ce6 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ce7 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ce8 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3ce9 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cea 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3ceb 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cec 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ced 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cee 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cef 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Exiting +peer1.org2.example.com | [3cf0 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [3cf1 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Entering +peer1.org2.example.com | [3cf2 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b600 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3cf3 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b600 gate 1574140984964082600 evaluation succeeds +peer1.org2.example.com | [3cf4 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cf5 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cf6 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3cf7 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3cf8 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cf9 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cfa 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3cfb 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cfc 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cfd 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3cfe 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3cff 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3d00 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156790 gate 1574140984995819800 evaluation starts +peer1.org2.example.com | [3d01 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156790 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d02 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156790 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3d03 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156790 principal matched by identity 0 +peer1.org2.example.com | [3d04 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3d05 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3d06 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156790 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3d07 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156790 gate 1574140984995819800 evaluation succeeds +peer1.org2.example.com | [3d08 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d09 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d0a 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3d0b 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3d0c 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3d0d 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3d0e 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d0f 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d10 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d11 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d12 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d13 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d14 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d15 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d16 11-19 05:23:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d17 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d18 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 3e ff 2e d7 f1 e0 d1 0f d4 ec 5b 01 9d f4 7b |D>.........[...{| +peer1.org2.example.com | 00000010 b2 73 c9 92 6b 3c 75 be 40 02 ff 57 05 8f b9 fb |.s..k DEBU Verify: sig = 00000000 30 44 02 20 18 46 4f 99 1d dd 51 fa ff db 63 1e |0D. .FO...Q...c.| +peer1.org2.example.com | 00000010 df 50 c8 c2 32 35 31 f7 e2 57 0a 13 9c 9c 01 2c |.P..251..W.....,| +peer1.org2.example.com | 00000020 19 3f b7 35 02 20 40 6c ec 20 2f 11 e7 09 28 f3 |.?.5. @l. /...(.| +peer1.org2.example.com | 00000030 2e 82 5f 03 3f d1 63 17 6c 82 ab 99 cf f5 e7 d2 |.._.?.c.l.......| +peer1.org2.example.com | 00000040 ca 98 30 c9 54 37 |..0.T7| +peer1.org2.example.com | [3d1a 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d1b 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [3d1c 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [3d1d 11-19 05:23:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3d1e 11-19 05:23:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15103C +peer1.org2.example.com | [3d1f 11-19 05:23:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9C26A1562B9FF3387439C930B804AEEC46CF86F9F90B7A6ABBE0BE828BF19EF9 +peer1.org2.example.com | [3d20 11-19 05:23:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3d21 11-19 05:23:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3d22 11-19 05:23:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3d23 11-19 05:23:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3d24 11-19 05:23:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d25 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d26 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d27 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3d28 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d2a 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d29 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3d2b 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d2d 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3d2c 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d2e 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d2f 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d30 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d31 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d32 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d33 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d34 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3d35 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 26 a1 56 2b 9f f3 38 74 39 c9 30 b8 04 ae ec |.&.V+..8t9.0....| +peer1.org2.example.com | 00000010 46 cf 86 f9 f9 0b 7a 6a bb e0 be 82 8b f1 9e f9 |F.....zj........| +peer1.org2.example.com | [3d36 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 e7 50 6c e2 48 56 8c 18 12 7c bb |0D. 6.Pl.HV...|.| +peer1.org2.example.com | 00000010 d2 07 3b b6 a2 f7 f9 53 8b 8e 2d a7 0d 88 07 8c |..;....S..-.....| +peer1.org2.example.com | 00000020 57 50 f7 0b 02 20 6e 00 5b f4 95 b4 15 a1 8a cc |WP... n.[.......| +peer1.org2.example.com | 00000030 5f 5c 9e 38 ee c0 d3 88 80 1a f6 2f 2f 81 d8 77 |_\.8.......//..w| +peer1.org2.example.com | 00000040 a1 f8 9e cd ce 43 |.....C| +peer1.org2.example.com | [3d37 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d38 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d39 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d3a 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d3b 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d3c 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [3d3d 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d3e 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3d3f 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d40 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d41 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3d42 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3d43 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3d44 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031739b0 gate 1574140985778451400 evaluation starts +peer1.org2.example.com | [3d45 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031739b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d46 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031739b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3d47 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031739b0 principal matched by identity 0 +peer1.org2.example.com | [3d48 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e f6 38 dc 7f 49 48 7e 53 65 ae 5a 54 9d f3 5a |^.8..IH~Se.ZT..Z| +peer1.org2.example.com | 00000010 10 80 20 3e cf 0d 61 70 d8 3c 8f 2a 9e f8 f0 c3 |.. >..ap.<.*....| +peer1.org2.example.com | [3d49 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 c9 ef 71 5f 4d 4f c3 b3 95 07 |0E.!....q_MO....| +peer1.org2.example.com | 00000010 97 82 bb 70 b3 2e 97 32 81 c2 cb 2f 70 51 42 7e |...p...2.../pQB~| +peer1.org2.example.com | 00000020 8d 83 d5 42 ca 02 20 10 75 87 31 59 07 0b 80 32 |...B.. .u.1Y...2| +peer1.org2.example.com | 00000030 6b c2 b5 98 82 75 bc 16 e5 27 e7 cd 41 7c 8d 86 |k....u...'..A|..| +peer1.org2.example.com | 00000040 e0 9a ba b0 1e ba 9c |.......| +peer1.org2.example.com | [3d4a 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031739b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3d4b 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031739b0 gate 1574140985778451400 evaluation succeeds +peer1.org2.example.com | [3d4c 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d4d 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d4e 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c4c 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c4d 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c4e 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c4f 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c50 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c51 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c52 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c53 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c54 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [3c55 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c56 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3c57 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c58 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3c5a 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c59 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c5b 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3c5e 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c5c 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c5d 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c5f 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c60 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c61 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c62 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c63 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c64 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c65 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c66 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c67 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c68 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c69 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d20 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d21 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d22 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d23 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 gate 1574140978889240500 evaluation starts +peer0.org1.example.com | [3d24 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d25 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3d26 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 principal matched by identity 0 +peer0.org1.example.com | [3d27 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +peer0.org1.example.com | 00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +peer0.org1.example.com | [3d28 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +peer0.org1.example.com | 00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +peer0.org1.example.com | 00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +peer0.org1.example.com | 00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +peer0.org1.example.com | 00000040 98 ab b8 75 24 ae |...u$.| +peer0.org1.example.com | [3d29 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d2a 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 gate 1574140978889240500 evaluation succeeds +peer0.org1.example.com | [3d2b 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d2c 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d2d 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d2e 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d2f 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d30 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d31 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3d32 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer0.org1.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer0.org1.example.com | [3d33 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer0.org1.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer0.org1.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer0.org1.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer0.org1.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer0.org1.example.com | [3d34 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d35 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d36 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d37 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d38 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d39 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3d3a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d3b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d3c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d3d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d3e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d3f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d40 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d42 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d43 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3d44 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3d41 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d45 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | [3c6a 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c6b 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c6c 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c6d 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3c6e 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151035 +peer0.org2.example.com | [3c6f 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8548FB5FAAD807CC3E3D2B75F870F496AD2F7D1FDED6DBBDF72A948CA5229366 +peer0.org2.example.com | [3c70 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3c71 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3c72 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3c73 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c74 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c75 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c76 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c77 11-19 05:22:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c78 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c79 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" secret_envelope:\323\303\022V'\202\260E > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c7a 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c7b 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c7c 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" secret_envelope:\323\303\022V'\202\260E > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [388e 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [388f 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3890 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3891 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3892 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" secret_envelope: \253" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3893 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" secret_envelope: \253" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3894 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3895 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" secret_envelope: \253" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3896 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [3897 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer1.org1.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer1.org1.example.com | [3898 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer1.org1.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer1.org1.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer1.org1.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer1.org1.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer1.org1.example.com | [3899 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [389a 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 97 8e f0 3d a3 8b 26 f0 2f 42 |0E.!.....=..&./B| +peer1.org1.example.com | 00000010 dd 4e cb d9 68 37 75 da db 93 17 d8 c4 81 ca a7 |.N..h7u.........| +peer1.org1.example.com | 00000020 41 72 08 1a 76 02 20 38 52 5b 04 a2 5f ea ee cd |Ar..v. 8R[.._...| +peer1.org1.example.com | 00000030 7c 4b 7e 8b 93 61 4c 0e 93 8a 73 9c 99 e2 c7 06 ||K~..aL...s.....| +peer1.org1.example.com | 00000040 46 ba fd ab 3e 20 ab |F...> .| +peer1.org1.example.com | [389b 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [389c 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [389d 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [389e 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [389f 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [38a0 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38a1 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38a2 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38a3 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [38a4 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38a5 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [3d46 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [3d47 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d48 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d49 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d4a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d4b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d4c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d4d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d4e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3d4f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 gate 1574140979274908100 evaluation starts +peer0.org1.example.com | [3d50 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d51 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3d52 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3d53 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 principal evaluation fails +peer0.org1.example.com | [3d54 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 gate 1574140979274908100 evaluation fails +peer0.org1.example.com | [3d55 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d56 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d57 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d58 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 gate 1574140979275218300 evaluation starts +peer0.org1.example.com | [3d59 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d5a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3d5b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 principal matched by identity 0 +peer0.org1.example.com | [3d5c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3d5d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3d5e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d5f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 gate 1574140979275218300 evaluation succeeds +peer0.org1.example.com | [3d60 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d61 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d62 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d63 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d64 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d65 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d4f 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3d50 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d51 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3d52 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3d53 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3d54 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3d55 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d56 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d57 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d58 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d59 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d5a 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d5b 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d5c 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d5d 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d5e 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d5f 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d60 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d61 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d62 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d63 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d64 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d65 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d66 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d67 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d68 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d69 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d6a 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d6b 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d6c 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d6d 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c7d 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c7e 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c7f 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c80 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c81 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c82 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3c83 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 48 fb 5f aa d8 07 cc 3e 3d 2b 75 f8 70 f4 96 |.H._....>=+u.p..| +peer0.org2.example.com | 00000010 ad 2f 7d 1f de d6 db bd f7 2a 94 8c a5 22 93 66 |./}......*...".f| +peer0.org2.example.com | [3c84 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ec a5 52 1c 85 87 80 48 6a eb |0E.!....R....Hj.| +peer0.org2.example.com | 00000010 72 01 fa 4f eb 1c a0 b6 6e 17 43 62 cf 0b 02 19 |r..O....n.Cb....| +peer0.org2.example.com | 00000020 fa b6 07 c6 b9 02 20 17 1e 92 d4 fa 15 47 b8 b1 |...... ......G..| +peer0.org2.example.com | 00000030 af 1e cd 49 da 31 c3 88 09 cb bc 52 0e 54 58 46 |...I.1.....R.TXF| +peer0.org2.example.com | 00000040 3e d6 27 9f c9 8a 50 |>.'...P| +peer0.org2.example.com | [3c85 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3c86 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 42 b2 22 25 57 48 b4 1c e7 dc 48 |0D. hB."%WH....H| +peer0.org2.example.com | 00000010 8c f4 12 3e d3 c3 12 56 27 82 b0 45 3c 55 23 77 |...>...V'..E DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3c88 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3c89 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c8a 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c8b 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c8c 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c8d 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c8e 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [3c8f 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c90 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c91 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c92 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c93 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c94 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c95 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3d6e 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d6f 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d70 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d71 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [3d72 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 1a 1a 57 9c 7e 17 8e 27 dd 4d 8f 1c 13 40 68 |...W.~..'.M...@h| +peer1.org2.example.com | 00000010 fd 9f df d6 7f ac 09 c0 66 42 08 38 44 f8 bb 02 |........fB.8D...| +peer1.org2.example.com | [3d73 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 82 cf 91 e4 e0 ca 0f 6f 9c e4 b1 |0D. 6.......o...| +peer1.org2.example.com | 00000010 e6 56 4d 3d 09 5f a7 67 0c 33 74 af c9 28 9c dd |.VM=._.g.3t..(..| +peer1.org2.example.com | 00000020 ef df d4 34 02 20 37 f8 fb a5 76 70 b6 93 cd 3b |...4. 7...vp...;| +peer1.org2.example.com | 00000030 23 b2 27 cd 88 dc b8 0a 1f 03 ba e9 72 be 90 a7 |#.'.........r...| +peer1.org2.example.com | 00000040 80 b4 f7 d3 92 9d |......| +peer1.org2.example.com | [3d74 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d75 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3d76 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3d77 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3d78 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3d79 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d7a 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d7b 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d7c 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d7d 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d7e 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d7f 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d80 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d81 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d82 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3d83 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d84 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3d85 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d86 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d87 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d88 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d89 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d8a 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d8b 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d8c 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d66 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d67 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d68 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d69 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d6a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d6b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3d6c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 gate 1574140979276250900 evaluation starts +peer0.org1.example.com | [3d6d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d6e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3d6f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3d70 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 principal evaluation fails +peer0.org1.example.com | [3d71 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 gate 1574140979276250900 evaluation fails +peer0.org1.example.com | [3d72 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d73 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d74 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d75 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 gate 1574140979276539400 evaluation starts +peer0.org1.example.com | [3d76 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d77 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3d78 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 principal matched by identity 0 +peer0.org1.example.com | [3d79 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [3d7a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [3d7b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d7c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 gate 1574140979276539400 evaluation succeeds +peer0.org1.example.com | [3d7d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d7e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d7f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d80 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d81 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d82 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d83 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d84 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d85 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d8d 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d8e 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d8f 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d90 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d91 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d92 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d93 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d94 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d95 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [3d96 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d97 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d98 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d99 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d9a 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3d9b 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d9c 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3d9d 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d9e 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d9f 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3da0 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3da1 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3da2 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003889fb0 gate 1574140986862781200 evaluation starts +peer1.org2.example.com | [3da3 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003889fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3da4 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003889fb0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3da5 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003889fb0 principal matched by identity 0 +peer1.org2.example.com | [3da6 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer1.org2.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer1.org2.example.com | [3da7 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer1.org2.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer1.org2.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer1.org2.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer1.org2.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer1.org2.example.com | [3da8 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003889fb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [38a6 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [38a7 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" secret_envelope: \253" > > alive: +peer1.org1.example.com | [38a8 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [38a9 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38aa 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [38ab 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [38ac 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38ad 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38ae 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38af 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [38b0 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [38b1 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [38b2 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b3 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b4 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b5 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b6 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b7 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b8 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [38b9 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38ba 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [38bb 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [38bc 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [38bd 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 2 1 3] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [38be 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38bf 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [38c0 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [38c1 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38c2 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [38c3 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [38c4 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3da9 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003889fb0 gate 1574140986862781200 evaluation succeeds +peer1.org2.example.com | [3daa 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3dab 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3dac 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3dad 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3dae 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3daf 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3db0 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3db1 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3db2 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3db3 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3db4 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3db5 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3db6 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [3db7 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3db8 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3db9 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dba 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3dbb 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > alive: alive: alive: +peer1.org2.example.com | [3dbc 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dbd 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dbe 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dbf 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc0 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc1 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc2 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dc3 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3dc4 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3dc5 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3dc6 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3dc7 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3dc8 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dc9 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dca 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3dcb 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dcc 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c96 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dca750 gate 1574140979864434100 evaluation starts +peer0.org2.example.com | [3c97 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dca750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c98 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dca750 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3c99 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dca750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3c9a 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dca750 principal evaluation fails +peer0.org2.example.com | [3c9b 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dca750 gate 1574140979864434100 evaluation fails +peer0.org2.example.com | [3c9c 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c9d 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c9e 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c9f 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcacc0 gate 1574140979864983700 evaluation starts +peer0.org2.example.com | [3ca0 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcacc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ca1 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcacc0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3ca2 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcacc0 principal matched by identity 0 +peer0.org2.example.com | [3ca3 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +peer0.org2.example.com | 00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +peer0.org2.example.com | [3ca4 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +peer0.org2.example.com | 00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +peer0.org2.example.com | 00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +peer0.org2.example.com | 00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +peer0.org2.example.com | 00000040 80 d9 95 74 7d 96 |...t}.| +peer0.org2.example.com | [3ca5 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcacc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3ca6 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcacc0 gate 1574140979864983700 evaluation succeeds +peer0.org2.example.com | [3ca7 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ca8 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ca9 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3caa 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3cab 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3cac 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cad 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3cae 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 48 fb 5f aa d8 07 cc 3e 3d 2b 75 f8 70 f4 96 |.H._....>=+u.p..| +peer0.org2.example.com | 00000010 ad 2f 7d 1f de d6 db bd f7 2a 94 8c a5 22 93 66 |./}......*...".f| +peer0.org2.example.com | [3caf 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ec a5 52 1c 85 87 80 48 6a eb |0E.!....R....Hj.| +peer0.org2.example.com | 00000010 72 01 fa 4f eb 1c a0 b6 6e 17 43 62 cf 0b 02 19 |r..O....n.Cb....| +peer0.org2.example.com | 00000020 fa b6 07 c6 b9 02 20 17 1e 92 d4 fa 15 47 b8 b1 |...... ......G..| +peer0.org2.example.com | 00000030 af 1e cd 49 da 31 c3 88 09 cb bc 52 0e 54 58 46 |...I.1.....R.TXF| +peer0.org2.example.com | 00000040 3e d6 27 9f c9 8a 50 |>.'...P| +peer0.org2.example.com | [3cb0 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3cb1 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3cb2 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb3 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3cb4 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer0.org2.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer0.org2.example.com | [3cb5 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer0.org2.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer0.org2.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer0.org2.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer0.org2.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer0.org2.example.com | [3cb6 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3cb7 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb8 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb9 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cba 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cbb 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cbc 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d86 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d87 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d88 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d89 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d8a 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d8b 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3d8c 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 gate 1574140979281932200 evaluation starts +peer0.org1.example.com | [3d8d 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d8e 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3d8f 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3d90 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 principal evaluation fails +peer0.org1.example.com | [3d91 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 gate 1574140979281932200 evaluation fails +peer0.org1.example.com | [3d92 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d93 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d94 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d95 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 gate 1574140979282634800 evaluation starts +peer0.org1.example.com | [3d96 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d97 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3d98 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 principal matched by identity 0 +peer0.org1.example.com | [3d99 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3d9a 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3d9b 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d9c 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 gate 1574140979282634800 evaluation succeeds +peer0.org1.example.com | [3d9d 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d9e 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d9f 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3da0 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3da1 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [3da2 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [3da3 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3da4 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3da5 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da6 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dcd 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dce 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dcf 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dd0 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dd1 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dd2 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dd3 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dd4 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dd5 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dd6 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dd7 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dd8 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3dd9 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15103D +peer1.org2.example.com | [3dda 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 28634C0E48CF615D15B56A6BA8AB03E35C60B4BE32361E3C3A65156A02CABB11 +peer1.org2.example.com | [3ddb 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3ddc 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3ddd 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3dde 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" secret_envelope:^(\004\333>\335\212\237\002 P99K\225\312\253\320\357U\201\203\n\366\037\225\305\325\367\257\321L\177\0207\234\200\326ik,Z" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3ddf 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3de0 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3de1 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3de2 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3cbd 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3cbe 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 48 fb 5f aa d8 07 cc 3e 3d 2b 75 f8 70 f4 96 |.H._....>=+u.p..| +peer0.org2.example.com | 00000010 ad 2f 7d 1f de d6 db bd f7 2a 94 8c a5 22 93 66 |./}......*...".f| +peer0.org2.example.com | [3cbf 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ec a5 52 1c 85 87 80 48 6a eb |0E.!....R....Hj.| +peer0.org2.example.com | 00000010 72 01 fa 4f eb 1c a0 b6 6e 17 43 62 cf 0b 02 19 |r..O....n.Cb....| +peer0.org2.example.com | 00000020 fa b6 07 c6 b9 02 20 17 1e 92 d4 fa 15 47 b8 b1 |...... ......G..| +peer0.org2.example.com | 00000030 af 1e cd 49 da 31 c3 88 09 cb bc 52 0e 54 58 46 |...I.1.....R.TXF| +peer0.org2.example.com | 00000040 3e d6 27 9f c9 8a 50 |>.'...P| +peer0.org2.example.com | [3cc0 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3cc1 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3cc2 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cc3 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3cc4 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer0.org2.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer0.org2.example.com | [3cc5 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer0.org2.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer0.org2.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer0.org2.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer0.org2.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer0.org2.example.com | [3cc6 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3cc7 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cc8 11-19 05:22:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cc9 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cca 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ccb 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3ccc 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ccd 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cce 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ccf 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cd0 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cd1 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cd2 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cd3 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cd4 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3cd5 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3cd6 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cd7 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38c5 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [38c6 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38c7 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38c8 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [38c9 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [38ca 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [38cb 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c59d0 gate 1574140987484950200 evaluation starts +peer1.org1.example.com | [38cc 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c59d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38cd 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c59d0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [38ce 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c59d0 principal matched by identity 0 +peer1.org1.example.com | [38cf 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer1.org1.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer1.org1.example.com | [38d0 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer1.org1.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer1.org1.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer1.org1.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer1.org1.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer1.org1.example.com | [38d1 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c59d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [38d2 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c59d0 gate 1574140987484950200 evaluation succeeds +peer1.org1.example.com | [38d3 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38d4 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38d5 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [38d6 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [38d7 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [38d8 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [38d9 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [38da 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [38db 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [38dc 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38dd 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38de 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38df 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [38e0 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38e1 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38e2 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38e3 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [38e4 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > alive: alive:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > alive: +peer1.org1.example.com | [38e5 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [38e6 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38e7 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38e8 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38e9 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [38ea 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [38eb 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38ec 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [38ed 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38ee 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [38ef 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38f0 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [38f1 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [38f2 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [38f3 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38f4 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38f5 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38f6 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [38f7 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38f8 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38f9 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [38fa 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [38fb 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [38fc 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265cda0 gate 1574140987590815300 evaluation starts +peer1.org1.example.com | [38fd 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265cda0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38fe 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265cda0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [38ff 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265cda0 principal matched by identity 0 +peer1.org1.example.com | [3900 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [3901 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3902 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265cda0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3903 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265cda0 gate 1574140987590815300 evaluation succeeds +peer1.org1.example.com | [3904 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3905 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3906 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3907 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3908 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [3909 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [390a 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [390b 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | [390c 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [390d 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [390e 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [390f 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3910 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3911 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3912 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3913 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3914 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ab20 gate 1574140987592833300 evaluation starts +peer1.org1.example.com | [3915 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ab20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3916 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ab20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3917 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ab20 principal matched by identity 0 +peer1.org1.example.com | [3918 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [3919 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [391a 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ab20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [391b 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ab20 gate 1574140987592833300 evaluation succeeds +peer1.org1.example.com | [391c 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [391d 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [391e 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [391f 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3920 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3921 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3922 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [3923 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3924 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [3925 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | [3926 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3927 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3928 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3929 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [392a 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [392b 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [392c 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [392d 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [392e 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64b70 gate 1574140987595783300 evaluation starts +peer1.org1.example.com | [392f 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3930 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64b70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3931 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64b70 principal matched by identity 0 +peer1.org1.example.com | [3932 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [3933 11-19 05:23:07.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | [3da7 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3da8 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3da9 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3daa 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3dab 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3dac 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3dad 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 gate 1574140979283860300 evaluation starts +peer0.org1.example.com | [3dae 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3daf 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3db0 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3db1 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 principal evaluation fails +peer0.org1.example.com | [3db2 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 gate 1574140979283860300 evaluation fails +peer0.org1.example.com | [3db3 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3db4 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3db5 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3db6 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 gate 1574140979284101900 evaluation starts +peer0.org1.example.com | [3db7 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3db8 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3db9 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 principal matched by identity 0 +peer0.org1.example.com | [3dba 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [3dbb 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [3dbc 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3dbd 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 gate 1574140979284101900 evaluation succeeds +peer0.org1.example.com | [3dbe 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3dbf 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3dc0 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3dc1 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3dc2 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dc3 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dc4 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dc5 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dc6 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dc7 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3dc8 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3dc9 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3dca 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3dcb 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3dcc 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3dcd 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 gate 1574140979298387600 evaluation starts +peer0.org1.example.com | [3dce 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3dcf 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3dd0 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3dd1 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 principal evaluation fails +peer0.org1.example.com | [3dd2 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 gate 1574140979298387600 evaluation fails +peer0.org1.example.com | [3dd3 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3dd4 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3dd5 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3dd6 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 gate 1574140979301891400 evaluation starts +peer0.org1.example.com | [3dd7 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3dd8 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3dd9 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 principal matched by identity 0 +peer0.org1.example.com | [3dda 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [3ddb 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [3ddc 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3ddd 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 gate 1574140979301891400 evaluation succeeds +peer0.org1.example.com | [3dde 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ddf 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3de0 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3de1 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3de2 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [3de3 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [3de4 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3de5 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3de6 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3de7 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3de8 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3de9 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3dea 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3deb 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3dec 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ded 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3dee 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 gate 1574140979305369600 evaluation starts +peer0.org1.example.com | [3def 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3df0 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3df1 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3df2 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 principal evaluation fails +peer0.org1.example.com | [3df3 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 gate 1574140979305369600 evaluation fails +peer0.org1.example.com | [3df4 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3df5 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3df6 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3df7 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 gate 1574140979305620800 evaluation starts +peer0.org1.example.com | [3df8 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3df9 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3dfa 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 principal matched by identity 0 +peer0.org1.example.com | [3dfb 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3dfc 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3dfd 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3dfe 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 gate 1574140979305620800 evaluation succeeds +peer0.org1.example.com | [3dff 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e00 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e01 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e02 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e03 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e04 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [3e05 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [3e06 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e07 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510101801 +peer0.org1.example.com | [3e08 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5223D380F67C735908A435DA72D68AE3F154B53322E7535AB6CBF9001CB8B8B +peer0.org1.example.com | [3e09 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [3e0a 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e0b 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e0c 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e0d 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e0e 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3e0f 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e10 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e11 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [3e12 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e13 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e14 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e15 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e16 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e17 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e18 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e19 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e1a 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e1b 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e1c 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [3e1d 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e1e 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e1f 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e20 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3e21 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e22 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e23 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e24 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e25 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e26 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e27 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e28 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e29 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e2a 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e2b 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e2c 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e2d 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [3e2e 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e2f 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e30 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e31 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e32 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3e33 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3e34 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3e35 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 gate 1574140979493692900 evaluation starts +peer0.org1.example.com | [3e36 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e37 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3e38 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3e39 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 principal evaluation fails +peer0.org1.example.com | [3e3a 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 gate 1574140979493692900 evaluation fails +peer0.org1.example.com | [3e3b 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e3c 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e3d 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3e3e 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 gate 1574140979494817500 evaluation starts +peer0.org1.example.com | [3e3f 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e40 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3e41 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 principal matched by identity 0 +peer0.org1.example.com | [3e42 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +peer0.org1.example.com | 00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +peer0.org1.example.com | [3e43 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +peer0.org1.example.com | 00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +peer0.org1.example.com | 00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +peer0.org1.example.com | 00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +peer0.org1.example.com | 00000040 5b 36 a7 48 57 10 |[6.HW.| +peer0.org1.example.com | [3e44 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e45 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 gate 1574140979494817500 evaluation succeeds +peer0.org1.example.com | [3e46 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e47 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e48 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e49 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e4a 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e4b 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3e4c 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3e4d 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3e4e 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3e4f 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e50 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e51 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e52 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [3e53 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e54 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e55 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e56 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e57 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3e58 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e59 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e5a 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e5b 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e5c 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e5d 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e5e 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e5f 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e60 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [3e61 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e62 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e63 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151034 +peer0.org1.example.com | [3e64 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BF409E065B10A0047B159F584E9F2B9A66F3415E3169E67053F214AFFC9DAF07 +peer0.org1.example.com | [3e65 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e66 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3e67 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3e68 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3e69 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e6a 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e6b 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e6c 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3e6d 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e6f 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e6e 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3e70 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e71 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e72 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e73 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3e74 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e75 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e76 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e77 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e78 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e79 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e7a 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3e7b 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 40 9e 06 5b 10 a0 04 7b 15 9f 58 4e 9f 2b 9a |.@..[...{..XN.+.| +peer0.org1.example.com | 00000010 66 f3 41 5e 31 69 e6 70 53 f2 14 af fc 9d af 07 |f.A^1i.pS.......| +peer0.org1.example.com | [3e7c 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f6 f7 3b f0 2b 93 7f 4a d5 be eb |0D. c..;.+..J...| +peer0.org1.example.com | 00000010 ac 4f 2c e0 8c 5b e0 8a 5e 6d 51 b0 4d 0b ef ed |.O,..[..^mQ.M...| +peer0.org1.example.com | 00000020 15 6b 93 0b 02 20 7c c0 c9 02 94 b7 6d 56 83 0b |.k... |.....mV..| +peer0.org1.example.com | 00000030 45 c0 08 07 c8 37 7f 40 06 d0 c8 db a2 6f 84 82 |E....7.@.....o..| +peer0.org1.example.com | 00000040 3c 36 44 67 f5 d5 |<6Dg..| +peer0.org1.example.com | [3e7d 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e7e 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e7f 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e80 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e81 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e82 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3e83 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 40 9e 06 5b 10 a0 04 7b 15 9f 58 4e 9f 2b 9a |.@..[...{..XN.+.| +peer0.org1.example.com | 00000010 66 f3 41 5e 31 69 e6 70 53 f2 14 af fc 9d af 07 |f.A^1i.pS.......| +peer0.org1.example.com | [3e84 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f6 f7 3b f0 2b 93 7f 4a d5 be eb |0D. c..;.+..J...| +peer0.org1.example.com | 00000010 ac 4f 2c e0 8c 5b e0 8a 5e 6d 51 b0 4d 0b ef ed |.O,..[..^mQ.M...| +peer0.org1.example.com | 00000020 15 6b 93 0b 02 20 7c c0 c9 02 94 b7 6d 56 83 0b |.k... |.....mV..| +peer0.org1.example.com | 00000030 45 c0 08 07 c8 37 7f 40 06 d0 c8 db a2 6f 84 82 |E....7.@.....o..| +peer0.org1.example.com | 00000040 3c 36 44 67 f5 d5 |<6Dg..| +peer0.org1.example.com | [3e85 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e86 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e87 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e88 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e89 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [3e8a 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e8b 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e8c 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e8d 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e8e 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e8f 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e90 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e91 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e92 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e93 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e94 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [3e95 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e96 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e97 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e98 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e99 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e9a 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [3e9b 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e9c 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e9d 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e9e 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e9f 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ea0 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ea1 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ea2 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 gate 1574140979856092900 evaluation starts +peer0.org1.example.com | [3ea3 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ea4 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3ea5 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3ea6 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 principal evaluation fails +peer0.org1.example.com | [3ea7 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 gate 1574140979856092900 evaluation fails +peer0.org1.example.com | [3ea8 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ea9 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3eaa 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3eab 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 gate 1574140979858944100 evaluation starts +peer0.org1.example.com | [3eac 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ead 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3eae 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 principal matched by identity 0 +peer0.org1.example.com | [3eaf 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 48 fb 5f aa d8 07 cc 3e 3d 2b 75 f8 70 f4 96 |.H._....>=+u.p..| +peer0.org1.example.com | 00000010 ad 2f 7d 1f de d6 db bd f7 2a 94 8c a5 22 93 66 |./}......*...".f| +peer0.org1.example.com | [3eb0 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ec a5 52 1c 85 87 80 48 6a eb |0E.!....R....Hj.| +peer0.org1.example.com | 00000010 72 01 fa 4f eb 1c a0 b6 6e 17 43 62 cf 0b 02 19 |r..O....n.Cb....| +peer0.org1.example.com | 00000020 fa b6 07 c6 b9 02 20 17 1e 92 d4 fa 15 47 b8 b1 |...... ......G..| +peer0.org1.example.com | 00000030 af 1e cd 49 da 31 c3 88 09 cb bc 52 0e 54 58 46 |...I.1.....R.TXF| +peer0.org1.example.com | 00000040 3e d6 27 9f c9 8a 50 |>.'...P| +peer0.org1.example.com | [3eb1 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3eb2 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 gate 1574140979858944100 evaluation succeeds +peer0.org1.example.com | [3eb3 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3eb4 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3eb5 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3eb6 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3eb7 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3eb8 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3eb9 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3eba 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3ebb 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3ebc 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ebd 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ebe 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ebf 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [3ec0 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ec1 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ec2 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ec3 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3ec4 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\326'\237\311\212P" > alive: alive: +peer0.org1.example.com | [3ec5 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ec6 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ec7 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ec8 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ec9 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3eca 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ecb 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ecc 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ecd 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\347\3756\301v" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ece 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de3 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3de4 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" secret_envelope:^(\004\333>\335\212\237\002 P99K\225\312\253\320\357U\201\203\n\366\037\225\305\325\367\257\321L\177\0207\234\200\326ik,Z" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3de5 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de6 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de7 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3de8 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de9 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dea 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3deb 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dec 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3ded 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer1.org2.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer1.org2.example.com | [3dee 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer1.org2.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer1.org2.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer1.org2.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer1.org2.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer1.org2.example.com | [3def 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3df0 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 bb 03 85 59 df 4e a1 d4 0e 8b 05 |0D. p...Y.N.....| +peer1.org2.example.com | 00000010 da c7 6c 8a 5b 90 a8 0f 9d ac 24 3e 5e 28 04 db |..l.[.....$>^(..| +peer1.org2.example.com | 00000020 3e dd 8a 9f 02 20 50 39 39 4b 95 ca ab d0 ef 55 |>.... P99K.....U| +peer1.org2.example.com | 00000030 81 83 0a f6 1f 95 c5 d5 f7 af d1 4c 7f 10 37 9c |...........L..7.| +peer1.org2.example.com | 00000040 80 d6 69 6b 2c 5a |..ik,Z| +peer1.org2.example.com | [3df1 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3df2 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3df3 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3df4 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3df5 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3df6 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3df7 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3df8 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cd8 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3cd9 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3cda 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3cdb 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3cdc 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3cdd 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3cde 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06990 gate 1574140979917498200 evaluation starts +peer0.org2.example.com | [3cdf 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06990 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ce0 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06990 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3ce1 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3ce2 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06990 principal evaluation fails +peer0.org2.example.com | [3ce3 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06990 gate 1574140979917498200 evaluation fails +peer0.org2.example.com | [3ce4 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3ce5 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3ce6 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ce7 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06f00 gate 1574140979917835400 evaluation starts +peer0.org2.example.com | [3ce8 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06f00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ce9 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06f00 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3cea 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06f00 principal matched by identity 0 +peer0.org2.example.com | [3ceb 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3cec 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3ced 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06f00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3cee 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06f00 gate 1574140979917835400 evaluation succeeds +peer0.org2.example.com | [3cef 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3cf0 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3cf1 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3cf2 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3cf3 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cf4 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ecf 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\347\3756\301v" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ed0 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3ed1 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 39 5e 36 0b 9b 3a 1f a6 3f 14 00 94 8e 74 60 |.9^6..:..?....t`| +peer0.org1.example.com | 00000010 a4 d7 0b d4 72 ad 9f 69 55 a2 c0 cc 28 fb dd f2 |....r..iU...(...| +peer0.org1.example.com | [3ed2 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 96 ec 0f 80 8a 44 f7 4b b7 9d |0E.!.......D.K..| +peer0.org1.example.com | 00000010 c6 74 e5 6e 72 4b 8e 7b ca a9 da 92 36 b3 a7 99 |.t.nrK.{....6...| +peer0.org1.example.com | 00000020 68 cd f5 04 1d 02 20 60 b8 52 28 04 0b 73 69 d5 |h..... `.R(..si.| +peer0.org1.example.com | 00000030 43 30 0d b1 7d 21 ab 4c 24 c7 64 d1 2e 1b 51 8c |C0..}!.L$.d...Q.| +peer0.org1.example.com | 00000040 e1 3e e7 fd 36 c1 76 |.>..6.v| +peer0.org1.example.com | [3ed3 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3ed4 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 6d 72 a1 7f 89 ac 9b 2c e6 c3 bf |0D. 0mr.....,...| +peer0.org1.example.com | 00000010 5c fb 4c 11 c9 f0 73 f3 2b 6c 47 6c 8f 32 c5 5c |\.L...s.+lGl.2.\| +peer0.org1.example.com | 00000020 d2 82 b4 a9 02 20 1c 7a 6b df 2f 49 e5 29 c8 94 |..... .zk./I.)..| +peer0.org1.example.com | 00000030 92 b9 04 6f 59 8a c5 3f 37 27 93 85 d2 74 1b 38 |...oY..?7'...t.8| +peer0.org1.example.com | 00000040 0d f4 93 93 84 24 |.....$| +peer0.org1.example.com | [3ed5 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3ed6 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3ed7 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3ed8 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3ed9 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3eda 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3edb 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3edc 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3edd 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [3ede 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3edf 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee0 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3ee1 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\347\3756\301v" secret_envelope: > alive: +peer0.org1.example.com | [3ee2 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ee3 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ee4 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ee5 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ee6 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee7 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee8 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee9 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3eea 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3eeb 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3eec 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3eed 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3eee 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [3eef 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ef0 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ef1 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ef2 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ef3 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ef4 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ef5 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ef6 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 gate 1574140980379402100 evaluation starts +peer0.org1.example.com | [3ef7 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ef8 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3ef9 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3efa 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 principal evaluation fails +peer0.org1.example.com | [3efb 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 gate 1574140980379402100 evaluation fails +peer0.org1.example.com | [3efc 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3efd 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3efe 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3eff 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 gate 1574140980379780000 evaluation starts +peer0.org1.example.com | [3f00 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f01 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3f02 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 principal matched by identity 0 +peer0.org1.example.com | [3f03 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c ec b1 9a 47 f5 fd ef 14 df 31 14 a6 94 e5 70 |\...G.....1....p| +peer0.org1.example.com | 00000010 d2 22 bc 74 b7 4d bf 54 1b ba aa 61 a5 fc 0f 59 |.".t.M.T...a...Y| +peer0.org1.example.com | [3f04 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 60 c1 72 ad b9 14 34 1b bb 6c e7 |0D. 7`.r...4..l.| +peer0.org1.example.com | 00000010 45 d6 3a de 5d 26 59 fd 91 f9 7a 89 a9 7b 3b ef |E.:.]&Y...z..{;.| +peer0.org1.example.com | 00000020 95 e8 c0 96 02 20 3b 4a b4 76 7d f5 16 92 02 82 |..... ;J.v}.....| +peer0.org1.example.com | 00000030 4d e4 0b dd 03 3c cf 9d 9c f5 8c ac 07 b2 d0 59 |M....<.........Y| +peer0.org1.example.com | 00000040 17 49 2f c1 07 79 |.I/..y| +peer0.org1.example.com | [3f05 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f06 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 gate 1574140980379780000 evaluation succeeds +peer0.org1.example.com | [3f07 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f08 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f09 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f0a 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f0b 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f0c 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f0d 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f0e 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3f0f 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3f10 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3f11 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3f12 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f13 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f14 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f15 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f16 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f17 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f18 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f19 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f1a 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f1b 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f1c 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f1d 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f1e 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f1f 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f20 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f21 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f22 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f23 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3f24 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f25 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3f26 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f28 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f27 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f29 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f2a 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f2b 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f2c 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f2d 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [3f2e 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 11 4b 59 88 a6 56 67 d3 54 27 83 26 29 15 c8 |..KY..Vg.T'.&)..| +peer0.org1.example.com | 00000010 1d 11 e9 c6 0b e5 3f 5c cf ad 27 37 c8 a1 52 13 |......?\..'7..R.| +peer0.org1.example.com | [3f2f 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 4a d8 cc cd f2 2a 90 f6 17 a3 25 |0D. .J....*....%| +peer0.org1.example.com | 00000010 25 dc cb f4 c7 ea d3 6d 2c 8d 74 5c 8d f6 10 ef |%......m,.t\....| +peer0.org1.example.com | 00000020 57 03 1c 90 02 20 28 3a d7 ae a3 47 41 04 9d 28 |W.... (:...GA..(| +peer0.org1.example.com | 00000030 46 1f 9a 91 13 75 30 75 78 f8 05 ac cc 13 b9 11 |F....u0ux.......| +peer0.org1.example.com | 00000040 73 ac a9 d8 6c df |s...l.| +peer0.org1.example.com | [3f30 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f31 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3f32 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3f33 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3f34 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3f35 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f36 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f37 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f38 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f39 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f3a 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f3b 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3f3c 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f3d 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3f3e 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f3f 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f40 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f41 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f42 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f43 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f44 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f45 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f46 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f47 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f48 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f49 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f4a 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f4b 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f4c 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f4d 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f4e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f4f 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f50 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [3f51 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f52 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f53 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f54 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f55 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f56 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f57 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3f58 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 gate 1574140980807297200 evaluation starts +peer0.org1.example.com | [3f59 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f5a 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3f5b 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3f5c 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 principal evaluation fails +peer0.org1.example.com | [3f5d 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 gate 1574140980807297200 evaluation fails +peer0.org1.example.com | [3f5e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f5f 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f60 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f61 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 gate 1574140980807672400 evaluation starts +peer0.org1.example.com | [3f62 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f63 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3f64 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 principal matched by identity 0 +peer0.org1.example.com | [3f65 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 2c 5b 2b c6 2b 64 cb 71 d8 3d 1e 03 d0 8d 5a |.,[+.+d.q.=....Z| +peer0.org1.example.com | 00000010 a7 ec 9e c4 13 67 e6 b1 4e c2 75 d6 4e af ba 12 |.....g..N.u.N...| +peer0.org1.example.com | [3f66 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 c7 87 1e 67 63 e9 60 f5 14 53 45 |0D. ....gc.`..SE| +peer0.org1.example.com | 00000010 b0 bc 31 7c 47 91 47 10 7e 8a ab 34 6c d9 0b e1 |..1|G.G.~..4l...| +peer0.org1.example.com | 00000020 71 be f1 80 02 20 1e 1e 49 15 51 45 f3 53 eb f2 |q.... ..I.QE.S..| +peer0.org1.example.com | 00000030 f5 be f7 64 ef 54 67 2e 87 79 ff af dd f7 6a 51 |...d.Tg..y....jQ| +peer0.org1.example.com | 00000040 86 97 b4 ed a1 ac |......| +peer0.org1.example.com | [3f67 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f68 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 gate 1574140980807672400 evaluation succeeds +peer0.org1.example.com | [3f69 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f6a 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f6b 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f6c 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f6d 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f6e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3f6f 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3f70 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3f71 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3f72 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f73 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f74 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f75 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f76 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f77 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f78 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f79 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7a 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7b 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7c 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3f7d 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7e 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3f7f 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f80 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f81 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f82 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f83 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f84 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f85 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f86 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f87 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f88 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f89 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8a 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f8b 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8c 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3f8d 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f8e 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3f8f 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f90 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3cf5 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3cf6 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3cf7 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3cf8 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3cf9 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3cfa 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3cfb 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20090 gate 1574140979918833300 evaluation starts +peer0.org2.example.com | [3cfc 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3cfd 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20090 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3cfe 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3cff 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20090 principal evaluation fails +peer0.org2.example.com | [3d00 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20090 gate 1574140979918833300 evaluation fails +peer0.org2.example.com | [3d01 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d02 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d03 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d04 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20600 gate 1574140979919140900 evaluation starts +peer0.org2.example.com | [3d05 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d06 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20600 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d07 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20600 principal matched by identity 0 +peer0.org2.example.com | [3d08 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3d09 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [3d0a 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d0b 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e20600 gate 1574140979919140900 evaluation succeeds +peer0.org2.example.com | [3d0c 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d0d 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d0e 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d0f 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d10 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [3d11 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [3d12 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d13 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d14 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d15 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d16 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d17 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d18 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d19 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d1a 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d1b 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d1c 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3d1d 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3d1e 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf480 gate 1574140979922107000 evaluation starts +peer0.org2.example.com | [3d1f 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf480 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d20 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf480 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d21 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3d22 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf480 principal evaluation fails +peer0.org2.example.com | [3d23 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf480 gate 1574140979922107000 evaluation fails +peer0.org2.example.com | [3d24 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d25 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d26 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d27 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf9f0 gate 1574140979923148000 evaluation starts +peer0.org2.example.com | [3d28 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf9f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d29 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf9f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d2a 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf9f0 principal matched by identity 0 +peer0.org2.example.com | [3d2b 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3d2c 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [3d2d 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf9f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d2e 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddf9f0 gate 1574140979923148000 evaluation succeeds +peer0.org2.example.com | [3d2f 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d30 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d31 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d32 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d33 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d34 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d35 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d36 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d37 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d38 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d39 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3df9 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3dfa 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3dfb 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3dfc 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3dfd 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3dfe 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3dff 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a48d0 gate 1574140987491525800 evaluation starts +peer1.org2.example.com | [3e00 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a48d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e01 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a48d0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3e02 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a48d0 principal matched by identity 0 +peer1.org2.example.com | [3e03 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer1.org2.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer1.org2.example.com | [3e04 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer1.org2.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer1.org2.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer1.org2.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer1.org2.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer1.org2.example.com | [3e05 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a48d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e06 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a48d0 gate 1574140987491525800 evaluation succeeds +peer1.org2.example.com | [3e07 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e09 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e08 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e0a 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e0b 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e0c 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e0d 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e0e 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e0f 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3e10 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer1.org2.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer1.org2.example.com | [3e11 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer1.org2.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer1.org2.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer1.org2.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer1.org2.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer1.org2.example.com | [3e12 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e13 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e14 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e15 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e16 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e17 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3e18 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer1.org2.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer1.org2.example.com | [3e19 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer1.org2.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer1.org2.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer1.org2.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer1.org2.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer1.org2.example.com | [3e1a 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d3a 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3d3b 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e48b80 gate 1574140979926379500 evaluation starts +peer0.org2.example.com | [3d3c 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e48b80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d3d 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e48b80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d3e 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e48b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3d3f 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e48b80 principal evaluation fails +peer0.org2.example.com | [3d40 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e48b80 gate 1574140979926379500 evaluation fails +peer0.org2.example.com | [3d41 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d42 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d43 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d44 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e490f0 gate 1574140979928079100 evaluation starts +peer0.org2.example.com | [3d45 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e490f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d46 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e490f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d47 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e490f0 principal matched by identity 0 +peer0.org2.example.com | [3d48 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3d49 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3d4a 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e490f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d4b 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e490f0 gate 1574140979928079100 evaluation succeeds +peer0.org2.example.com | [3d4c 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d4d 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d4e 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d4f 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d50 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [3d51 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [3d52 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3d53 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3d54 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d55 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d56 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d57 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d58 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e1b 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e1c 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e1d 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e1e 11-19 05:23:07.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e1f 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e20 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e21 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e22 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e23 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e24 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e25 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e26 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e27 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e28 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e29 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e2a 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e2b 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e2c 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [3e2d 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e2e 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e2f 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e30 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [3e31 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e32 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e33 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e34 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e35 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [3e36 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 7e ba 35 e2 56 b6 37 64 56 45 51 0f 24 7d a3 |.~.5.V.7dVEQ.$}.| +peer1.org2.example.com | 00000010 4f 7c db 5c 8f fe 61 22 ba fb f7 84 87 8f eb 7f |O|.\..a"........| +peer1.org2.example.com | [3e37 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b c7 da 1d 4c 2f 53 2d f8 25 9d 00 |0D. K...L/S-.%..| +peer1.org2.example.com | 00000010 b2 be 4f 35 19 b6 3c f5 b1 33 2e c4 16 69 62 ef |..O5..<..3...ib.| +peer1.org2.example.com | 00000020 bc 01 d5 17 02 20 68 eb 07 98 1b 84 a1 17 79 eb |..... h.......y.| +peer1.org2.example.com | 00000030 c5 40 da 93 42 9a b9 f5 c2 88 76 16 7a 7a 9e 8c |.@..B.....v.zz..| +peer1.org2.example.com | 00000040 4a 8e 9d 82 0e 93 |J.....| +peer1.org2.example.com | [3e38 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3e39 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 80 98 e8 a9 da de c8 52 f5 98 |0E.!.........R..| +peer1.org2.example.com | 00000010 ff 5e 2c f1 c6 3f d2 2b d1 a5 7e df 7d 33 0b 7d |.^,..?.+..~.}3.}| +peer1.org2.example.com | 00000020 47 e9 f8 9b 15 02 20 5a 45 2a 20 fc be 84 44 ef |G..... ZE* ...D.| +peer1.org2.example.com | 00000030 7e 10 e6 26 1b 29 8a d7 2b b4 17 06 8e d0 e0 b5 |~..&.)..+.......| +peer1.org2.example.com | 00000040 08 a1 02 bb 7f dc bc |.......| +peer0.org1.example.com | [3f91 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f92 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [3934 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64b70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3935 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f64b70 gate 1574140987595783300 evaluation succeeds +peer1.org1.example.com | [3936 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3937 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3938 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3939 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [393a 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [393b 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [393c 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [393d 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [393e 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [393f 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3940 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3941 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3942 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65d20 gate 1574140987601117900 evaluation starts +peer1.org1.example.com | [3943 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65d20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3944 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65d20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3945 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65d20 principal matched by identity 0 +peer1.org1.example.com | [3946 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [3947 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3948 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65d20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3949 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f65d20 gate 1574140987601117900 evaluation succeeds +peer1.org1.example.com | [394a 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [394b 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [394c 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [394d 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [394e 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [394f 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3950 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3951 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3952 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e3a 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3e3b 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [3e3c 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3e3d 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3e3e 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3e3f 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e40 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e41 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e42 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [3e43 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e44 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e45 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e46 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [3e47 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e48 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e49 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e4a 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e4b 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e4c 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e4d 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e4e 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e4f 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3e50 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e51 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e52 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e53 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e54 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e55 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e56 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e57 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [3e58 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [3953 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3954 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3955 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3956 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3957 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3958 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3959 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313d100 gate 1574140987603695500 evaluation starts +peer1.org1.example.com | [395a 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313d100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [395b 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313d100 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [395c 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313d100 principal matched by identity 0 +peer1.org1.example.com | [395d 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [395e 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [395f 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313d100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3960 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00313d100 gate 1574140987603695500 evaluation succeeds +peer1.org1.example.com | [3961 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3962 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3963 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3964 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3965 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [3966 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3967 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [3968 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | [3969 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [396a 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f93 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f94 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f95 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f96 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f97 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f98 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f99 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f9a 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f9b 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f9c 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f9d 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f9e 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f9f 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fa0 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fa1 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fa2 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fa3 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3fa4 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151035 +peer0.org1.example.com | [3fa5 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 178AD78C42CBD5E20D9A3A2C9B259ADA36B44253D2BC9B3B45F71293DAA29776 +peer0.org1.example.com | [3fa6 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3fa7 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3fa8 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3fa9 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3faa 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [396b 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [396c 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [396d 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [396e 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [396f 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3970 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3971 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671010 gate 1574140987605218900 evaluation starts +peer1.org1.example.com | [3972 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671010 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3973 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671010 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3974 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671010 principal matched by identity 0 +peer1.org1.example.com | [3975 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [3976 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3977 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671010 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3978 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671010 gate 1574140987605218900 evaluation succeeds +peer1.org1.example.com | [3979 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [397a 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [397b 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [397c 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [397d 11-19 05:23:07.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [397e 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [397f 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3980 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3981 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3982 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3983 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3984 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3985 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3986 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [3987 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [3988 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [3989 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [398a 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [398b 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [398c 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [398d 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [398e 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [398f 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3990 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d59 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d5a 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d5b 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d5c 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d5d 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3d5e 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3d5f 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e711d0 gate 1574140979938470000 evaluation starts +peer0.org2.example.com | [3d60 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e711d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d61 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e711d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d62 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e711d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3d63 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e711d0 principal evaluation fails +peer0.org2.example.com | [3d64 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e711d0 gate 1574140979938470000 evaluation fails +peer0.org2.example.com | [3d65 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d66 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d67 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d68 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71740 gate 1574140979939161000 evaluation starts +peer0.org2.example.com | [3d69 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d6a 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71740 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d6b 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71740 principal matched by identity 0 +peer0.org2.example.com | [3d6c 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3d6d 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3d6e 11-19 05:22:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71740 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d6f 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71740 gate 1574140979939161000 evaluation succeeds +peer0.org2.example.com | [3d70 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d71 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d72 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d73 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d74 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d75 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d76 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d77 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d78 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d79 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d7a 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e59 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e5a 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e5b 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e5c 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e5d 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e5e 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e5f 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e60 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e61 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c0af0 gate 1574140988159028400 evaluation starts +peer1.org2.example.com | [3e62 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c0af0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e63 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c0af0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3e64 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c0af0 principal matched by identity 0 +peer1.org2.example.com | [3e65 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3e66 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3e67 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c0af0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e68 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c0af0 gate 1574140988159028400 evaluation succeeds +peer1.org2.example.com | [3e69 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e6a 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e6b 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e6c 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e6d 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e6e 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fab 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3fac 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fad 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3fae 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3faf 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fb0 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fb1 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fb2 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fb3 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fb4 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3fb5 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer0.org1.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer0.org1.example.com | [3fb6 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer0.org1.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer0.org1.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer0.org1.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer0.org1.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer0.org1.example.com | [3fb7 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fb8 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fb9 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fba 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fbb 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fbc 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fbd 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fbe 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fbf 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fc0 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fc2 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fc1 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fc4 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3fc3 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fc5 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer0.org1.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer0.org1.example.com | [3fc6 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer0.org1.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer0.org1.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer0.org1.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer0.org1.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer0.org1.example.com | [3fc7 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fc8 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fc9 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fca 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fcb 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fcc 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fcd 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [3fce 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer0.org1.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer0.org1.example.com | [3fcf 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer0.org1.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer0.org1.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer0.org1.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer0.org1.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer0.org1.example.com | [3fd0 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [3fd1 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 e0 9f 37 b7 e4 c5 c5 5c 6b d1 |0E.!....7....\k.| +peer0.org1.example.com | 00000010 2f f7 6d e7 ba f7 13 ed fb 1c 56 fd 92 18 a1 16 |/.m.......V.....| +peer0.org1.example.com | 00000020 dc 6a 87 f0 20 02 20 3d 31 b9 4a a9 15 08 e9 9c |.j.. . =1.J.....| +peer0.org1.example.com | 00000030 62 b7 42 c0 0d c6 2b 7e 3d ea 2d c3 d9 1e ff 99 |b.B...+~=.-.....| +peer0.org1.example.com | 00000040 bc f0 a9 c2 86 63 39 |.....c9| +peer0.org1.example.com | [3fd2 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3fd3 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3fd4 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fd5 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fd6 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fd7 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fd8 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3fd9 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fda 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fdb 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fdc 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fdd 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fde 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fdf 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fe0 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [3fe1 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [3fe2 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fe3 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fe4 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3d7b 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3d7c 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e888d0 gate 1574140979943021500 evaluation starts +peer0.org2.example.com | [3d7d 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e888d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d7e 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e888d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d7f 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e888d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3d80 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e888d0 principal evaluation fails +peer0.org2.example.com | [3d81 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e888d0 gate 1574140979943021500 evaluation fails +peer0.org2.example.com | [3d82 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d83 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d84 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d85 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88e40 gate 1574140979943362800 evaluation starts +peer0.org2.example.com | [3d86 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88e40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d87 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88e40 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3d88 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88e40 principal matched by identity 0 +peer0.org2.example.com | [3d89 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3d8a 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [3d8b 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88e40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d8c 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88e40 gate 1574140979943362800 evaluation succeeds +peer0.org2.example.com | [3d8d 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d8e 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d8f 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d90 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d91 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [3d92 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [3d93 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3d94 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3d95 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d96 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d97 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d98 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d99 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\347\3756\301v" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d9a 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [3d9b 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d9c 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d9d 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d9e 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d9f 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3da0 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3da1 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3da2 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea2f70 gate 1574140979965229200 evaluation starts +peer0.org2.example.com | [3da3 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea2f70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3da4 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea2f70 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3da5 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea2f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3da6 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea2f70 principal evaluation fails +peer0.org2.example.com | [3da7 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea2f70 gate 1574140979965229200 evaluation fails +peer0.org2.example.com | [3da8 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3da9 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3daa 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3dab 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea34e0 gate 1574140979965663900 evaluation starts +peer0.org2.example.com | [3dac 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea34e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3dad 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea34e0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3dae 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea34e0 principal matched by identity 0 +peer0.org2.example.com | [3daf 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 39 5e 36 0b 9b 3a 1f a6 3f 14 00 94 8e 74 60 |.9^6..:..?....t`| +peer0.org2.example.com | 00000010 a4 d7 0b d4 72 ad 9f 69 55 a2 c0 cc 28 fb dd f2 |....r..iU...(...| +peer0.org2.example.com | [3db0 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 96 ec 0f 80 8a 44 f7 4b b7 9d |0E.!.......D.K..| +peer0.org2.example.com | 00000010 c6 74 e5 6e 72 4b 8e 7b ca a9 da 92 36 b3 a7 99 |.t.nrK.{....6...| +peer0.org2.example.com | 00000020 68 cd f5 04 1d 02 20 60 b8 52 28 04 0b 73 69 d5 |h..... `.R(..si.| +peer0.org2.example.com | 00000030 43 30 0d b1 7d 21 ab 4c 24 c7 64 d1 2e 1b 51 8c |C0..}!.L$.d...Q.| +peer0.org2.example.com | 00000040 e1 3e e7 fd 36 c1 76 |.>..6.v| +peer0.org2.example.com | [3db1 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea34e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3db2 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea34e0 gate 1574140979965663900 evaluation succeeds +peer0.org2.example.com | [3db3 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3db4 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3db5 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3db6 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3db7 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3db8 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3db9 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3dba 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3dbb 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3dbc 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dbd 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dbe 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [3dbf 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dc0 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dc1 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dc2 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3dc3 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\347\3756\301v" > alive: alive: alive: +peer0.org2.example.com | [3dc4 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dc5 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dc6 11-19 05:22:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dc7 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [3dc8 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [3dc9 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3dca 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510101801 +peer0.org2.example.com | [3dcb 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C436022714D827005CC396C582E58F4881E3E2899C12D35E92BABAAC4D04012D +peer0.org2.example.com | [3dcc 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [3dcd 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dce 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dcf 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3dd0 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dd1 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dd2 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3dd3 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd4 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dd5 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dd6 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dd7 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dd8 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd9 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dda 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3ddb 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ddd 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [3dde 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ddf 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de0 11-19 05:23:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ddc 11-19 05:23:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de1 11-19 05:23:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de2 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de3 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de4 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de5 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de6 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3de7 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de8 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de9 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dea 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [3deb 11-19 05:23:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dec 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ded 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dee 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3def 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3df0 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3df1 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c ec b1 9a 47 f5 fd ef 14 df 31 14 a6 94 e5 70 |\...G.....1....p| +peer0.org2.example.com | 00000010 d2 22 bc 74 b7 4d bf 54 1b ba aa 61 a5 fc 0f 59 |.".t.M.T...a...Y| +peer0.org2.example.com | [3df2 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 60 c1 72 ad b9 14 34 1b bb 6c e7 |0D. 7`.r...4..l.| +peer0.org2.example.com | 00000010 45 d6 3a de 5d 26 59 fd 91 f9 7a 89 a9 7b 3b ef |E.:.]&Y...z..{;.| +peer0.org2.example.com | 00000020 95 e8 c0 96 02 20 3b 4a b4 76 7d f5 16 92 02 82 |..... ;J.v}.....| +peer0.org2.example.com | 00000030 4d e4 0b dd 03 3c cf 9d 9c f5 8c ac 07 b2 d0 59 |M....<.........Y| +peer0.org2.example.com | 00000040 17 49 2f c1 07 79 |.I/..y| +peer0.org2.example.com | [3df3 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3df4 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3df5 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3df6 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3e6f 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e70 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e71 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e72 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e73 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e74 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e75 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1c80 gate 1574140988170236400 evaluation starts +peer1.org2.example.com | [3e76 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1c80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e77 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1c80 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3e78 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1c80 principal matched by identity 0 +peer1.org2.example.com | [3e79 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3e7a 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3e7b 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1c80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e7c 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1c80 gate 1574140988170236400 evaluation succeeds +peer1.org2.example.com | [3e7d 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e7e 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e7f 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e80 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e81 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3e82 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3e83 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e84 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e85 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e86 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e87 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e88 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e89 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e8a 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e8b 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3df7 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3df8 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3df9 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dfa 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dfb 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dfc 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dfd 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dfe 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3dff 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e00 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e01 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e02 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e03 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e04 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3991 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3992 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3993 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3994 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3995 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3996 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3997 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3998 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3999 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [399a 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [399b 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [399c 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [399d 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [399e 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [399f 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [39a0 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39a1 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [39a2 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [39a3 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a4 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a5 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a6 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a7 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a8 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a9 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org1.example.com | [39aa 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fe5 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [3fe6 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fe7 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fe8 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3fe9 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fea 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3feb 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3fec 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3fed 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3fee 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 gate 1574140983283159800 evaluation starts +peer0.org1.example.com | [3fef 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ff0 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3ff1 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3ff2 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 principal evaluation fails +peer0.org1.example.com | [3ff3 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 gate 1574140983283159800 evaluation fails +peer0.org1.example.com | [3ff4 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ff5 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ff6 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ff7 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 gate 1574140983284567900 evaluation starts +peer0.org1.example.com | [3ff8 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ff9 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [3ffa 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 principal matched by identity 0 +peer0.org1.example.com | [3ffb 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [3ffc 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [3ffd 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3ffe 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 gate 1574140983284567900 evaluation succeeds +peer0.org1.example.com | [3fff 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4000 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4001 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4002 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4003 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4004 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e8c 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e8d 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e8e 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044db6e0 gate 1574140988177961600 evaluation starts +peer1.org2.example.com | [3e8f 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044db6e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e90 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044db6e0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3e91 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044db6e0 principal matched by identity 0 +peer1.org2.example.com | [3e92 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3e93 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3e94 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044db6e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e95 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044db6e0 gate 1574140988177961600 evaluation succeeds +peer1.org2.example.com | [3e96 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e97 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e98 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e99 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e9a 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e9b 11-19 05:23:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e9c 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e9d 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e9e 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e9f 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ea0 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ea1 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ea2 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe870 gate 1574140988180826100 evaluation starts +peer1.org2.example.com | [3ea3 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ea4 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe870 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3ea5 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe870 principal matched by identity 0 +peer1.org2.example.com | [3ea6 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3ea7 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3ea8 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe870 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ea9 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe870 gate 1574140988180826100 evaluation succeeds +peer1.org2.example.com | [3eaa 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3eab 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3eac 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e05 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e06 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e07 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e08 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e09 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e0a 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e0b 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e0c 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e0d 11-19 05:23:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e0e 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e0f 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e10 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e11 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e12 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [3e13 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e14 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e15 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e16 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e17 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e18 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e19 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3e1a 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18920 gate 1574140980773507600 evaluation starts +peer0.org2.example.com | [3e1b 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18920 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e1c 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18920 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3e1d 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3e1e 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18920 principal evaluation fails +peer1.org1.example.com | [39ab 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [39ac 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ad 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [39ae 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [39af 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39b0 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [39b1 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39b2 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39b3 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [39b4 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [39b5 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [39b6 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027751b0 gate 1574140987846609600 evaluation starts +peer1.org1.example.com | [39b7 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027751b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39b8 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027751b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [39b9 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027751b0 principal matched by identity 0 +peer1.org1.example.com | [39ba 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 7e ba 35 e2 56 b6 37 64 56 45 51 0f 24 7d a3 |.~.5.V.7dVEQ.$}.| +peer1.org1.example.com | 00000010 4f 7c db 5c 8f fe 61 22 ba fb f7 84 87 8f eb 7f |O|.\..a"........| +peer1.org1.example.com | [39bb 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b c7 da 1d 4c 2f 53 2d f8 25 9d 00 |0D. K...L/S-.%..| +peer1.org1.example.com | 00000010 b2 be 4f 35 19 b6 3c f5 b1 33 2e c4 16 69 62 ef |..O5..<..3...ib.| +peer1.org1.example.com | 00000020 bc 01 d5 17 02 20 68 eb 07 98 1b 84 a1 17 79 eb |..... h.......y.| +peer1.org1.example.com | 00000030 c5 40 da 93 42 9a b9 f5 c2 88 76 16 7a 7a 9e 8c |.@..B.....v.zz..| +peer1.org1.example.com | 00000040 4a 8e 9d 82 0e 93 |J.....| +peer1.org1.example.com | [39bc 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027751b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [39bd 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027751b0 gate 1574140987846609600 evaluation succeeds +peer1.org1.example.com | [39be 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39bf 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39c0 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [39c1 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [39c2 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [39c3 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [39c4 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [39c5 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [39c6 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [39c7 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39c8 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39c9 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ca 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [39cb 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39cc 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39cd 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39ce 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [39cf 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [39d0 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39d1 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > alive: alive:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > alive: +peer1.org1.example.com | [39d2 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [39d3 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d4 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d5 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d6 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39d7 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [39d8 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [39d9 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39da 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39db 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39dc 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39dd 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [39de 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15103E +peer1.org1.example.com | [39df 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5F165C4D6AEB102429B90FA0D90C1E509F5723F2BDF03DDFE7E705455ECA59B +peer1.org1.example.com | [39e0 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [39e1 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [39e2 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [39e3 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" secret_envelope:|\254$\264N&t\326N\275 \306\222\322\376Ra\265\255\315=\231Y\302\276Yg\321\3632\353" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [39e4 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39e6 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [39e7 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39e9 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [39e5 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" secret_envelope:|\254$\264N&t\326N\275 \306\222\322\376Ra\265\255\315=\231Y\302\276Yg\321\3632\353" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [39e8 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [39ea 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39eb 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ec 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [39ed 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ee 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [39ef 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [39f0 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39f1 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [39f2 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [39f3 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 f1 65 c4 d6 ae b1 02 42 9b 90 fa 0d 90 c1 e5 |..e.....B.......| +peer1.org1.example.com | 00000010 09 f5 72 3f 2b df 03 dd fe 7e 70 54 55 ec a5 9b |..r?+....~pTU...| +peer1.org1.example.com | [39f4 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 d0 ba e6 d9 d5 a7 bd cc 56 79 f6 |0D. y........Vy.| +peer1.org1.example.com | 00000010 47 76 c8 55 4e 5e 54 cf 7a 26 ab 4b d6 ac 3b 7e |Gv.UN^T.z&.K..;~| +peer1.org1.example.com | 00000020 d0 99 b1 d3 02 20 2a 1c ae d1 1a ad c3 a9 45 d7 |..... *.......E.| +peer1.org1.example.com | 00000030 6c 61 fd 14 68 e0 4e d3 f2 81 ec 56 44 63 00 fd |la..h.N....VDc..| +peer1.org1.example.com | 00000040 d1 86 09 64 92 a1 |...d..| +peer1.org1.example.com | [39f5 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [39f6 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [39f7 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [39f8 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 88 2a 18 bb 28 9e b8 5d 28 4c 17 |0D. Y.*..(..](L.| +peer1.org1.example.com | 00000010 bb 43 65 82 04 13 16 cb d6 97 2f 1d c5 7b 69 8e |.Ce......./..{i.| +peer1.org1.example.com | 00000020 58 48 7e a2 02 20 3e 7c ac 24 b4 4e 26 74 d6 4e |XH~.. >|.$.N&t.N| +peer1.org1.example.com | 00000030 bd 20 c6 92 d2 fe 52 61 b5 ad cd 3d 99 59 c2 be |. ....Ra...=.Y..| +peer1.org1.example.com | 00000040 59 67 d1 f3 32 eb |Yg..2.| +peer1.org1.example.com | [39f9 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [39fa 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [39fb 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39fc 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39fd 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [39fe 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ff 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [3a00 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer1.org1.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer1.org1.example.com | [3a01 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer1.org1.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer1.org1.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer1.org1.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer1.org1.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer1.org1.example.com | [3a02 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a03 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a04 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [3a05 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a06 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3a07 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a08 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a09 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3a0a 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3a0b 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a0c 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069ac0 gate 1574140988967905300 evaluation starts +peer1.org1.example.com | [3a0d 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a0e 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069ac0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3a0f 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069ac0 principal matched by identity 0 +peer1.org1.example.com | [3a10 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 7e ba 35 e2 56 b6 37 64 56 45 51 0f 24 7d a3 |.~.5.V.7dVEQ.$}.| +peer1.org1.example.com | 00000010 4f 7c db 5c 8f fe 61 22 ba fb f7 84 87 8f eb 7f |O|.\..a"........| +peer1.org1.example.com | [3a11 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a12 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b c7 da 1d 4c 2f 53 2d f8 25 9d 00 |0D. K...L/S-.%..| +peer1.org1.example.com | 00000010 b2 be 4f 35 19 b6 3c f5 b1 33 2e c4 16 69 62 ef |..O5..<..3...ib.| +peer1.org1.example.com | 00000020 bc 01 d5 17 02 20 68 eb 07 98 1b 84 a1 17 79 eb |..... h.......y.| +peer1.org1.example.com | 00000030 c5 40 da 93 42 9a b9 f5 c2 88 76 16 7a 7a 9e 8c |.@..B.....v.zz..| +peer1.org1.example.com | 00000040 4a 8e 9d 82 0e 93 |J.....| +peer1.org1.example.com | [3a13 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069ac0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a14 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069ac0 gate 1574140988967905300 evaluation succeeds +peer1.org1.example.com | [3a15 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a16 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a17 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3a18 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a19 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a1a 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a1b 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [3a1c 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 f1 65 c4 d6 ae b1 02 42 9b 90 fa 0d 90 c1 e5 |..e.....B.......| +peer1.org1.example.com | 00000010 09 f5 72 3f 2b df 03 dd fe 7e 70 54 55 ec a5 9b |..r?+....~pTU...| +peer1.org1.example.com | [3a1d 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 d0 ba e6 d9 d5 a7 bd cc 56 79 f6 |0D. y........Vy.| +peer1.org1.example.com | 00000010 47 76 c8 55 4e 5e 54 cf 7a 26 ab 4b d6 ac 3b 7e |Gv.UN^T.z&.K..;~| +peer1.org1.example.com | 00000020 d0 99 b1 d3 02 20 2a 1c ae d1 1a ad c3 a9 45 d7 |..... *.......E.| +peer1.org1.example.com | 00000030 6c 61 fd 14 68 e0 4e d3 f2 81 ec 56 44 63 00 fd |la..h.N....VDc..| +peer1.org1.example.com | 00000040 d1 86 09 64 92 a1 |...d..| +peer1.org1.example.com | [3a1e 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a1f 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a20 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a21 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a22 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a23 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a24 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [3a25 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 f1 65 c4 d6 ae b1 02 42 9b 90 fa 0d 90 c1 e5 |..e.....B.......| +peer1.org1.example.com | 00000010 09 f5 72 3f 2b df 03 dd fe 7e 70 54 55 ec a5 9b |..r?+....~pTU...| +peer1.org1.example.com | [3a26 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 d0 ba e6 d9 d5 a7 bd cc 56 79 f6 |0D. y........Vy.| +peer1.org1.example.com | 00000010 47 76 c8 55 4e 5e 54 cf 7a 26 ab 4b d6 ac 3b 7e |Gv.UN^T.z&.K..;~| +peer1.org1.example.com | 00000020 d0 99 b1 d3 02 20 2a 1c ae d1 1a ad c3 a9 45 d7 |..... *.......E.| +peer1.org1.example.com | 00000030 6c 61 fd 14 68 e0 4e d3 f2 81 ec 56 44 63 00 fd |la..h.N....VDc..| +peer1.org1.example.com | 00000040 d1 86 09 64 92 a1 |...d..| +peer1.org1.example.com | [3a27 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a28 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a29 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a2a 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [3a2b 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer1.org1.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer1.org1.example.com | [3a2c 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer1.org1.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer1.org1.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer1.org1.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer1.org1.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer1.org1.example.com | [3a2d 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a2e 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a2f 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [3a30 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4005 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4006 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4007 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4008 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4009 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [400a 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [400b 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 gate 1574140983286994000 evaluation starts +peer0.org1.example.com | [400c 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [400d 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [400e 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [400f 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 principal evaluation fails +peer0.org1.example.com | [4010 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 gate 1574140983286994000 evaluation fails +peer0.org1.example.com | [4011 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4012 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4013 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4014 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 gate 1574140983287650300 evaluation starts +peer0.org1.example.com | [4015 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4016 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4017 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 principal matched by identity 0 +peer0.org1.example.com | [4018 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [4019 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [401a 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [401b 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 gate 1574140983287650300 evaluation succeeds +peer0.org1.example.com | [401c 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [401d 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [401e 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [401f 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4020 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4021 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4022 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4023 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4024 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4025 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4026 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4027 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4028 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4029 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [402a 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [402b 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 gate 1574140983295169200 evaluation starts +peer0.org1.example.com | [402c 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [402d 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [402e 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [402f 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 principal evaluation fails +peer0.org1.example.com | [4030 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 gate 1574140983295169200 evaluation fails +peer0.org1.example.com | [4031 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4032 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4033 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4034 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 gate 1574140983296355100 evaluation starts +peer0.org1.example.com | [4035 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4036 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4037 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 principal matched by identity 0 +peer0.org1.example.com | [4038 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [4039 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [403a 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [403b 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 gate 1574140983296355100 evaluation succeeds +peer0.org1.example.com | [403c 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [403d 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [403e 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [403f 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4040 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [4041 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [4042 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [4043 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [4044 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4045 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4046 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4047 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4048 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4049 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [404a 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [404b 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [404c 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 gate 1574140983303170600 evaluation starts +peer0.org1.example.com | [404d 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [404e 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [404f 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4050 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 principal evaluation fails +peer0.org1.example.com | [4051 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 gate 1574140983303170600 evaluation fails +peer0.org1.example.com | [4052 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4053 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4054 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4055 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 gate 1574140983304509500 evaluation starts +peer0.org1.example.com | [4056 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4057 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4058 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 principal matched by identity 0 +peer0.org1.example.com | [4059 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [405a 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [405b 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [405c 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 gate 1574140983304509500 evaluation succeeds +peer0.org1.example.com | [405d 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [405e 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [405f 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4060 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4061 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4062 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4063 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4064 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4065 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4066 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4067 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4068 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4069 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [406a 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [406b 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [406c 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 gate 1574140983308412400 evaluation starts +peer0.org1.example.com | [406d 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [406e 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [406f 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4070 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 principal evaluation fails +peer0.org1.example.com | [4071 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 gate 1574140983308412400 evaluation fails +peer0.org1.example.com | [4072 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4073 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4074 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4075 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 gate 1574140983309545700 evaluation starts +peer0.org1.example.com | [4076 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4077 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4078 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 principal matched by identity 0 +peer0.org1.example.com | [4079 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [407a 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [407b 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [407c 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 gate 1574140983309545700 evaluation succeeds +peer0.org1.example.com | [407d 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [407e 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [407f 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4080 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4081 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [4082 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | [3ead 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3eae 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [3eaf 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3eb0 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3eb1 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3eb2 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eb3 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3eb4 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3eb5 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3eb6 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3eb7 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3eb8 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3eb9 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3eba 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ebb 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ebc 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ebd 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710950 gate 1574140988184325700 evaluation starts +peer1.org2.example.com | [3ebe 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ebf 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710950 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3ec0 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710950 principal matched by identity 0 +peer1.org2.example.com | [3ec1 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org2.example.com | [3ec2 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [3ec3 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710950 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ec4 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710950 gate 1574140988184325700 evaluation succeeds +peer1.org2.example.com | [3ec5 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ec6 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ec7 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ec8 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ec9 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3eca 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ecb 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ecc 11-19 05:23:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ecd 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ece 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ecf 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ed0 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ed1 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711ae0 gate 1574140988191486100 evaluation starts +peer1.org2.example.com | [3ed2 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ed3 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711ae0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3ed4 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711ae0 principal matched by identity 0 +peer1.org2.example.com | [3ed5 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [3ed6 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [3ed7 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711ae0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ed8 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711ae0 gate 1574140988191486100 evaluation succeeds +peer1.org2.example.com | [3ed9 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3eda 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3edb 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3edc 11-19 05:23:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3edd 11-19 05:23:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [3ede 11-19 05:23:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [3edf 11-19 05:23:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | [3ee0 11-19 05:23:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [3ee1 11-19 05:23:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ee2 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ee3 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ee4 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3ee5 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ee6 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ee7 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3ee8 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ee9 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eea 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3eeb 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eec 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3eed 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [3eee 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3eef 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ef0 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ef1 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ef2 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ef3 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ef4 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ef5 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472fc40 gate 1574140988954703500 evaluation starts +peer1.org2.example.com | [3ef6 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472fc40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ef7 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472fc40 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3ef8 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472fc40 principal matched by identity 0 +peer1.org2.example.com | [3ef9 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 f1 65 c4 d6 ae b1 02 42 9b 90 fa 0d 90 c1 e5 |..e.....B.......| +peer1.org2.example.com | 00000010 09 f5 72 3f 2b df 03 dd fe 7e 70 54 55 ec a5 9b |..r?+....~pTU...| +peer1.org2.example.com | [3efa 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 d0 ba e6 d9 d5 a7 bd cc 56 79 f6 |0D. y........Vy.| +peer1.org2.example.com | 00000010 47 76 c8 55 4e 5e 54 cf 7a 26 ab 4b d6 ac 3b 7e |Gv.UN^T.z&.K..;~| +peer1.org2.example.com | 00000020 d0 99 b1 d3 02 20 2a 1c ae d1 1a ad c3 a9 45 d7 |..... *.......E.| +peer1.org2.example.com | 00000030 6c 61 fd 14 68 e0 4e d3 f2 81 ec 56 44 63 00 fd |la..h.N....VDc..| +peer1.org2.example.com | 00000040 d1 86 09 64 92 a1 |...d..| +peer1.org2.example.com | [3efb 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472fc40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3efc 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472fc40 gate 1574140988954703500 evaluation succeeds +peer1.org2.example.com | [3efd 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3efe 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3eff 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f00 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f01 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f02 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3f03 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3f04 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3f05 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3f06 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f07 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f08 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f09 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | [3f0a 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f0b 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f0c 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f0d 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3f0e 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > alive: alive:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > alive: +peer1.org2.example.com | [3f0f 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f10 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f11 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f12 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f13 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f14 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f15 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f16 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [3f17 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f18 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f19 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f1a 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f1b 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3f1c 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f1d 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f1e 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f1f 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f20 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f21 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f22 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f23 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d5b30 gate 1574140989971944400 evaluation starts +peer1.org2.example.com | [3f24 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d5b30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f25 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d5b30 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3f26 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d5b30 principal matched by identity 0 +peer1.org2.example.com | [3f27 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa ed 80 99 b6 6f 41 67 08 02 5a d5 7c 06 95 |......oAg..Z.|..| +peer1.org2.example.com | 00000010 0f 59 3d 1b e0 52 b0 70 1e 61 67 fe ef 89 cc 28 |.Y=..R.p.ag....(| +peer1.org2.example.com | [3f28 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 cd 4c 54 ee fc 5a 32 90 d8 65 |0E.!...LT..Z2..e| +peer1.org2.example.com | 00000010 01 4a c0 14 c8 e7 3f a3 8d ce 7e 0e 54 f1 79 77 |.J....?...~.T.yw| +peer1.org2.example.com | 00000020 a9 e7 24 54 64 02 20 76 b9 eb d3 07 b7 a2 7e 82 |..$Td. v......~.| +peer1.org2.example.com | 00000030 68 65 29 27 9d 05 02 61 ea 14 69 34 c9 74 6e cf |he)'...a..i4.tn.| +peer1.org2.example.com | 00000040 4f 3a c4 94 0e 63 9f |O:...c.| +peer1.org2.example.com | [3f29 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d5b30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f2a 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d5b30 gate 1574140989971944400 evaluation succeeds +peer1.org2.example.com | [3f2b 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f2c 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f2d 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f2e 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f2f 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f30 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3f31 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e1f 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18920 gate 1574140980773507600 evaluation fails +peer0.org2.example.com | [3e20 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3e21 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3e22 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e23 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18e90 gate 1574140980773809000 evaluation starts +peer0.org2.example.com | [3e24 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18e90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e25 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18e90 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3e26 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18e90 principal matched by identity 0 +peer0.org2.example.com | [3e27 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 11 4b 59 88 a6 56 67 d3 54 27 83 26 29 15 c8 |..KY..Vg.T'.&)..| +peer0.org2.example.com | 00000010 1d 11 e9 c6 0b e5 3f 5c cf ad 27 37 c8 a1 52 13 |......?\..'7..R.| +peer0.org2.example.com | [3e28 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 4a d8 cc cd f2 2a 90 f6 17 a3 25 |0D. .J....*....%| +peer0.org2.example.com | 00000010 25 dc cb f4 c7 ea d3 6d 2c 8d 74 5c 8d f6 10 ef |%......m,.t\....| +peer0.org2.example.com | 00000020 57 03 1c 90 02 20 28 3a d7 ae a3 47 41 04 9d 28 |W.... (:...GA..(| +peer0.org2.example.com | 00000030 46 1f 9a 91 13 75 30 75 78 f8 05 ac cc 13 b9 11 |F....u0ux.......| +peer0.org2.example.com | 00000040 73 ac a9 d8 6c df |s...l.| +peer0.org2.example.com | [3e29 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18e90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e2a 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f18e90 gate 1574140980773809000 evaluation succeeds +peer0.org2.example.com | [3e2b 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e2c 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e2d 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e2e 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e2f 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e30 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3e31 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e32 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3e33 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3e34 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e35 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e36 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e37 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e38 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e39 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e3a 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e3b 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e3c 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e3d 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e3e 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e3f 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e40 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e41 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e42 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e43 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e44 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e45 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e46 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e47 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e48 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e49 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e4a 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e4b 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e4c 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e4d 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e4e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3e4f 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151036 +peer0.org2.example.com | [3e50 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 952C5B2BC62B64CB71D83D1E03D08D5AA7EC9EC41367E6B14EC275D64EAFBA12 +peer0.org2.example.com | [3e51 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3e52 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3e53 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3e54 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [3e55 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e56 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e57 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e58 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e59 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e5a 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e5b 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e5c 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e5d 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e5e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e5f 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e60 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e61 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e62 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e63 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e64 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e65 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e66 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e67 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e68 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e69 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e6a 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [3e6b 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e6c 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e6d 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e6e 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e6f 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3e70 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e71 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e72 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e73 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e74 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e75 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e76 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3e77 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51250 gate 1574140982878541600 evaluation starts +peer0.org2.example.com | [3e78 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e79 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3e7a 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3e7b 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51250 principal evaluation fails +peer0.org2.example.com | [3e7c 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51250 gate 1574140982878541600 evaluation fails +peer0.org2.example.com | [3e7d 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3e7e 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3e7f 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e80 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f517c0 gate 1574140982880121900 evaluation starts +peer0.org2.example.com | [3e81 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f517c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e82 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f517c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3e83 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f517c0 principal matched by identity 0 +peer0.org2.example.com | [3e84 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer0.org2.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer0.org2.example.com | [3e85 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer0.org2.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer0.org2.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer0.org2.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer0.org2.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer0.org2.example.com | [3e86 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f517c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e87 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f517c0 gate 1574140982880121900 evaluation succeeds +peer0.org2.example.com | [3e88 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e89 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e8a 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e8b 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e8c 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3e8d 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3e8e 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e8f 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3e90 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3e91 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e92 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e93 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [3e94 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e95 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e96 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e97 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3e98 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3e99 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e9a 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e9b 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e9c 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e9d 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e9e 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e9f 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ea0 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ea1 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea2 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea3 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea4 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [3ea5 11-19 05:23:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ea6 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea7 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea8 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ea9 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3eaa 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3eab 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer0.org2.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer0.org2.example.com | [3eac 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer0.org2.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer0.org2.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer0.org2.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer0.org2.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer0.org2.example.com | [3ead 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3eae 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 8c 38 dc 06 b5 61 88 33 ba 9a |0E.!...8...a.3..| +peer0.org2.example.com | 00000010 13 b9 f8 ac b4 55 85 6c 81 19 23 77 3f 52 c1 83 |.....U.l..#w?R..| +peer0.org2.example.com | 00000020 66 07 ce 20 af 02 20 25 70 24 3d e4 6f 84 74 a1 |f.. .. %p$=.o.t.| +peer0.org2.example.com | 00000030 32 64 6d 2a 6a 2f 01 99 d3 46 48 1b b4 98 5c 19 |2dm*j/...FH...\.| +peer0.org2.example.com | 00000040 02 e9 34 cb f1 f0 2a |..4...*| +peer0.org2.example.com | [3eaf 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3eb0 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [3eb1 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3eb2 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3eb3 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3eb4 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3eb5 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3eb6 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3eb7 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [3eb8 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eb9 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eba 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ebb 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [3ebc 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ebd 11-19 05:23:03.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ebe 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ebf 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ec0 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec1 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec2 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec3 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ec4 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ec5 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ec6 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ec7 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec8 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec9 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eca 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ecb 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ecc 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ecd 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [3ece 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ecf 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3ed0 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ed1 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3ed2 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ed3 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3ed4 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ed5 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ed6 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ed7 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ed8 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ed9 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3eda 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3edb 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3edc 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3edd 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ede 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3edf 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ee0 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ee1 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ee2 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ee3 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ee4 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ee5 11-19 05:23:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ee6 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3ee7 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151037 +peer0.org2.example.com | [3ee8 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3F6070E46B1EAD31EB3BB666C86BAFF0202230FABE1F2E3E93BE9B6032312C23 +peer0.org2.example.com | [3ee9 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3eea 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3eeb 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3eec 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eed 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3eee 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eef 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ef0 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ef1 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ef2 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ef3 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ef4 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ef5 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ef6 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ef7 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ef8 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ef9 11-19 05:23:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3efa 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3efc 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 60 70 e4 6b 1e ad 31 eb 3b b6 66 c8 6b af f0 |?`p.k..1.;.f.k..| +peer0.org2.example.com | 00000010 20 22 30 fa be 1f 2e 3e 93 be 9b 60 32 31 2c 23 | "0....>...`21,#| +peer0.org2.example.com | [3efd 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 ae 73 2c 02 92 e1 72 1d 98 |0E.!....s,...r..| +peer0.org2.example.com | 00000010 4c 93 ba 1e 48 b1 e2 f1 65 a5 f3 ba 57 1e 6b e3 |L...H...e...W.k.| +peer0.org2.example.com | 00000020 33 fd 3f b2 af 02 20 15 a5 d8 89 a7 0b 37 17 e9 |3.?... ......7..| +peer0.org2.example.com | 00000030 77 91 59 e8 3b c9 43 8d 89 01 54 d9 c2 23 8d ef |w.Y.;.C...T..#..| +peer0.org2.example.com | 00000040 24 67 ad 34 ca be b8 |$g.4...| +peer0.org2.example.com | [3efb 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3efe 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3eff 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f00 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f01 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f02 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3f03 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer0.org2.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer0.org2.example.com | [3f04 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer0.org2.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer0.org2.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer0.org2.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer0.org2.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer0.org2.example.com | [3f05 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3f06 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f07 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f08 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f09 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f0a 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3f0b 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 60 70 e4 6b 1e ad 31 eb 3b b6 66 c8 6b af f0 |?`p.k..1.;.f.k..| +peer0.org2.example.com | 00000010 20 22 30 fa be 1f 2e 3e 93 be 9b 60 32 31 2c 23 | "0....>...`21,#| +peer0.org2.example.com | [3f0c 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 ae 73 2c 02 92 e1 72 1d 98 |0E.!....s,...r..| +peer0.org2.example.com | 00000010 4c 93 ba 1e 48 b1 e2 f1 65 a5 f3 ba 57 1e 6b e3 |L...H...e...W.k.| +peer0.org2.example.com | 00000020 33 fd 3f b2 af 02 20 15 a5 d8 89 a7 0b 37 17 e9 |3.?... ......7..| +peer0.org2.example.com | 00000030 77 91 59 e8 3b c9 43 8d 89 01 54 d9 c2 23 8d ef |w.Y.;.C...T..#..| +peer0.org2.example.com | 00000040 24 67 ad 34 ca be b8 |$g.4...| +peer0.org2.example.com | [3f0d 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3f0e 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 cb 35 df ae d5 9b 47 93 14 b6 a4 |0D. U.5....G....| +peer0.org2.example.com | 00000010 b8 e2 0a 62 66 88 94 94 83 f6 23 ce 41 d2 2a cf |...bf.....#.A.*.| +peer0.org2.example.com | 00000020 8c dd 34 a0 02 20 52 6d bd 1d 9c 35 4b fa 52 f7 |..4.. Rm...5K.R.| +peer0.org2.example.com | 00000030 15 3d ba 83 25 70 e6 88 3d d5 7e 5d 77 98 c3 36 |.=..%p..=.~]w..6| +peer0.org2.example.com | 00000040 b4 7b 06 84 19 d4 |.{....| +peer0.org2.example.com | [3f0f 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3f10 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3a31 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3a32 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a33 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a34 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3a35 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3a36 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a37 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea9b0 gate 1574140988986881800 evaluation starts +peer1.org1.example.com | [3a38 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea9b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a39 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea9b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3a3a 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea9b0 principal matched by identity 0 +peer1.org1.example.com | [3a3b 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer1.org1.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer1.org1.example.com | [3a3c 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer1.org1.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer1.org1.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer1.org1.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer1.org1.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer1.org1.example.com | [3a3d 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea9b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a3e 11-19 05:23:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea9b0 gate 1574140988986881800 evaluation succeeds +peer1.org1.example.com | [3a3f 11-19 05:23:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a40 11-19 05:23:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a41 11-19 05:23:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3a42 11-19 05:23:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a43 11-19 05:23:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a44 11-19 05:23:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a45 11-19 05:23:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a46 11-19 05:23:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Exiting +peer1.org1.example.com | [3a47 11-19 05:23:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Returning false +peer1.org1.example.com | [3a48 11-19 05:23:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Entering +peer1.org1.example.com | [3a49 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a4a 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a4b 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 39 ee 89 42 2a 49 04 7c 60 33 8d 20 f5 8f 0e |.9..B*I.|`3. ...| +peer1.org1.example.com | 00000010 d6 fc ee eb 10 18 3a da c1 b9 71 d8 2f f3 f7 54 |......:...q./..T| +peer1.org1.example.com | [3a4c 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 ea 1a bf 79 16 9c 70 2b ae f0 9a |0D. r...y..p+...| +peer1.org1.example.com | 00000010 dc 83 ef 56 28 07 8f 04 bb 72 a6 ba b9 4b f3 dc |...V(....r...K..| +peer1.org1.example.com | 00000020 a9 23 12 e0 02 20 10 cf 86 e0 0c 3c 70 39 88 e4 |.#... ..... DEBU Exiting +peer1.org1.example.com | [3a4e 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us declaration +peer1.org1.example.com | [3a4f 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a50 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a51 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a52 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a53 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [3a54 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa ed 80 99 b6 6f 41 67 08 02 5a d5 7c 06 95 |......oAg..Z.|..| +peer1.org1.example.com | 00000010 0f 59 3d 1b e0 52 b0 70 1e 61 67 fe ef 89 cc 28 |.Y=..R.p.ag....(| +peer1.org1.example.com | [3a55 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 cd 4c 54 ee fc 5a 32 90 d8 65 |0E.!...LT..Z2..e| +peer1.org1.example.com | 00000010 01 4a c0 14 c8 e7 3f a3 8d ce 7e 0e 54 f1 79 77 |.J....?...~.T.yw| +peer1.org1.example.com | 00000020 a9 e7 24 54 64 02 20 76 b9 eb d3 07 b7 a2 7e 82 |..$Td. v......~.| +peer1.org1.example.com | 00000030 68 65 29 27 9d 05 02 61 ea 14 69 34 c9 74 6e cf |he)'...a..i4.tn.| +peer1.org1.example.com | 00000040 4f 3a c4 94 0e 63 9f |O:...c.| +peer1.org1.example.com | [3a56 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a57 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3a58 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3a59 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3a5a 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3a5b 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a5c 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a5d 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a5e 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a5f 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a60 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a61 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3a62 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a63 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3a64 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a65 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a66 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a67 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a68 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a6a 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a69 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a6c 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a6b 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a6d 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a6e 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a70 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a6f 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a71 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:57630 +peer1.org1.example.com | [3a72 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002eccff0 +peer1.org1.example.com | [3a73 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [3a74 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3a75 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org1.example.com | [3a76 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3a77 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 95 34 29 1d 07 1a 00 ae c0 aa 31 b6 80 30 92 |'.4).......1..0.| +peer1.org1.example.com | 00000010 57 2b 36 f3 d0 85 86 b9 ef d2 a1 4b 7b f6 b4 7c |W+6........K{..|| +peer1.org1.example.com | [3a78 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 74 d5 5c 4f 87 1d 14 7e 31 42 |0E.!..t.\O...~1B| +peer1.org1.example.com | 00000010 6c c0 77 20 26 22 f4 b0 a4 4a 50 08 7c b0 3e 2c |l.w &"...JP.|.>,| +peer1.org1.example.com | 00000020 e6 65 df 80 fe 02 20 03 92 07 be 10 e6 8a 72 75 |.e.... .......ru| +peer1.org1.example.com | 00000030 96 da 14 85 69 06 80 cf 9d af 5a 34 9e b2 13 69 |....i.....Z4...i| +peer1.org1.example.com | 00000040 c0 a6 5d a4 5e 81 db |..].^..| +peer1.org1.example.com | [3a79 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3a7a 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003815f80, header 0xc002ecd400 +peer1.org1.example.com | [3a7b 11-19 05:23:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [3a7c 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU [][520af339] processing txid: 520af339ee5262d31ac963c5999fbdbfc49dd14b3f0d7449223022277acad9be +peer1.org1.example.com | [3a7d 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU [][520af339] Entry chaincode: name:"cscc" +peer1.org1.example.com | [3a7e 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> INFO [][520af339] Entry chaincode: name:"cscc" +peer1.org1.example.com | [3a7f 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [3a80 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org1.example.com | [3a81 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 95 34 29 1d 07 1a 00 ae c0 aa 31 b6 80 30 92 |'.4).......1..0.| +peer1.org1.example.com | 00000010 57 2b 36 f3 d0 85 86 b9 ef d2 a1 4b 7b f6 b4 7c |W+6........K{..|| +peer1.org1.example.com | [3a82 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 74 d5 5c 4f 87 1d 14 7e 31 42 |0E.!..t.\O...~1B| +peer1.org1.example.com | 00000010 6c c0 77 20 26 22 f4 b0 a4 4a 50 08 7c b0 3e 2c |l.w &"...JP.|.>,| +peer1.org1.example.com | 00000020 e6 65 df 80 fe 02 20 03 92 07 be 10 e6 8a 72 75 |.e.... .......ru| +peer1.org1.example.com | 00000030 96 da 14 85 69 06 80 cf 9d af 5a 34 9e b2 13 69 |....i.....Z4...i| +peer1.org1.example.com | 00000040 c0 a6 5d a4 5e 81 db |..].^..| +peer1.org1.example.com | [3a83 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU [520af339] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [3a84 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU [520af339] notifying Txid:520af339ee5262d31ac963c5999fbdbfc49dd14b3f0d7449223022277acad9be, channelID: +peer1.org1.example.com | [3a85 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3a86 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> INFO [][520af339] Exit chaincode: name:"cscc" (1ms) +peer1.org1.example.com | [3a87 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU [][520af339] Exit +peer1.org1.example.com | [3a88 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:57630 +peer1.org1.example.com | [3a89 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:57630 grpc.code=OK grpc.call_duration=4.8697ms +peer1.org1.example.com | [3a8a 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.8:7051->172.18.0.5:57630: read: connection reset by peer +peer1.org1.example.com | [3a8b 11-19 05:23:10.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3a8c 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a8d 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a8e 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a8f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a90 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [3a91 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a92 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3a93 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a94 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a95 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3a96 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3a97 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a98 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045221a0 gate 1574140990380821200 evaluation starts +peer1.org1.example.com | [3a99 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045221a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a9a 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045221a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3a9b 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045221a0 principal matched by identity 0 +peer1.org1.example.com | [3a9c 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 10 c2 41 01 11 56 a1 91 b3 87 7f 5a 4f ae c8 |...A..V.....ZO..| +peer1.org1.example.com | 00000010 5d dc 05 04 e3 76 02 e9 90 6b b6 ff 44 9a 08 81 |]....v...k..D...| +peer1.org1.example.com | [3a9d 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f9 d7 3e 66 3c e1 27 bd f6 dc 9a |0D. X..>f<.'....| +peer1.org1.example.com | 00000010 9f 7b 75 1d 03 3f 7a 9c 23 ec 39 86 cf 63 37 34 |.{u..?z.#.9..c74| +peer1.org1.example.com | 00000020 14 c1 3a 4e 02 20 62 18 3b 5e 7e 95 0d 85 96 86 |..:N. b.;^~.....| +peer1.org1.example.com | 00000030 ce 60 21 cc 5d db 0f d0 b8 cf 28 55 31 e2 e5 bc |.`!.].....(U1...| +peer1.org1.example.com | 00000040 ed 4e 99 9c c5 1e |.N....| +peer1.org1.example.com | [3a9e 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045221a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a9f 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045221a0 gate 1574140990380821200 evaluation succeeds +peer1.org1.example.com | [3aa0 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3aa1 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3aa2 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [4083 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [4084 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [4085 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4086 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4087 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4088 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4089 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [408a 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [408b 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [408c 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [408d 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 gate 1574140983313199900 evaluation starts +peer0.org1.example.com | [408e 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [408f 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4090 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4091 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 principal evaluation fails +peer0.org1.example.com | [4092 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 gate 1574140983313199900 evaluation fails +peer0.org1.example.com | [4093 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4094 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4095 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4096 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 gate 1574140983314751700 evaluation starts +peer0.org1.example.com | [4097 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4098 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4099 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 principal matched by identity 0 +peer0.org1.example.com | [409a 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [409b 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [409c 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [409d 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 gate 1574140983314751700 evaluation succeeds +peer0.org1.example.com | [409e 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [409f 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40a0 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [40a1 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [40a2 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40a3 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40a4 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40a5 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40a6 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40a8 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40a9 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40aa 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40ab 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40ac 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40ad 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [40ae 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40a7 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40af 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40b0 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [40b1 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40b2 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40b3 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [40b4 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [40b5 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40b6 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [40b7 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [40b8 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40b9 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [40ba 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [40bb 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40bc 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [40bd 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [40be 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40bf 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [40c0 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40c1 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40c2 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [40c3 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [40c4 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [40c5 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 gate 1574140983482164900 evaluation starts +peer0.org1.example.com | [40c6 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40c7 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [40c8 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [40c9 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 principal evaluation fails +peer0.org1.example.com | [40ca 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 gate 1574140983482164900 evaluation fails +peer0.org1.example.com | [40cb 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40cc 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40cd 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [40ce 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 gate 1574140983482411000 evaluation starts +peer0.org1.example.com | [40cf 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40d0 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [40d1 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 principal matched by identity 0 +peer0.org1.example.com | [40d2 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer0.org1.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer0.org1.example.com | [40d3 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer0.org1.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer0.org1.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer0.org1.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer0.org1.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer0.org1.example.com | [40d4 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [40d5 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 gate 1574140983482411000 evaluation succeeds +peer0.org1.example.com | [40d6 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40d7 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40d8 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [40d9 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [40da 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [40db 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [40dc 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [40dd 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [40de 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [40df 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e0 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e1 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e2 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [40e3 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e4 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e5 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e6 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [40e7 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [40e8 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [40e9 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40ea 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [40eb 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40ec 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40ed 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40ee 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [40ef 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f0 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [40f1 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40f2 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f3 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f4 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [40f5 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40f6 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f7 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f8 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f9 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40fa 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40fb 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40fc 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40fd 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40fe 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40ff 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [4100 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4101 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4102 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4103 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4104 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4105 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [4106 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4107 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4108 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4109 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [410a 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [410b 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [410c 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [410d 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 gate 1574140983846140800 evaluation starts +peer0.org1.example.com | [410e 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [410f 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4110 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4111 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 principal evaluation fails +peer0.org1.example.com | [4112 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 gate 1574140983846140800 evaluation fails +peer0.org1.example.com | [4113 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4114 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4115 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4116 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 gate 1574140983846597000 evaluation starts +peer0.org1.example.com | [4117 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4118 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4119 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 principal matched by identity 0 +peer0.org1.example.com | [411a 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 60 70 e4 6b 1e ad 31 eb 3b b6 66 c8 6b af f0 |?`p.k..1.;.f.k..| +peer0.org1.example.com | 00000010 20 22 30 fa be 1f 2e 3e 93 be 9b 60 32 31 2c 23 | "0....>...`21,#| +peer0.org1.example.com | [411b 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 ae 73 2c 02 92 e1 72 1d 98 |0E.!....s,...r..| +peer0.org1.example.com | 00000010 4c 93 ba 1e 48 b1 e2 f1 65 a5 f3 ba 57 1e 6b e3 |L...H...e...W.k.| +peer0.org1.example.com | 00000020 33 fd 3f b2 af 02 20 15 a5 d8 89 a7 0b 37 17 e9 |3.?... ......7..| +peer0.org1.example.com | 00000030 77 91 59 e8 3b c9 43 8d 89 01 54 d9 c2 23 8d ef |w.Y.;.C...T..#..| +peer0.org1.example.com | 00000040 24 67 ad 34 ca be b8 |$g.4...| +peer0.org1.example.com | [411c 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [411d 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 gate 1574140983846597000 evaluation succeeds +peer0.org1.example.com | [411e 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [411f 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4120 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4121 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4122 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4123 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4124 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4125 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4126 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4127 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4128 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4129 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [412a 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [412b 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [412c 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [412d 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [412e 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [412f 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [4130 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4131 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4132 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4133 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4134 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4135 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4136 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4137 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4138 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\356O\377*hL\257\032U\2535\251e\362kT\021:2D\333\006l\004\345\r\323fs\223\354" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [4139 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [413a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\356O\377*hL\257\032U\2535\251e\362kT\021:2D\333\006l\004\345\r\323fs\223\354" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [413b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [413c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org1.example.com | [413d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 f9 6e ce d1 bf 7b 6d 63 ee d1 84 d5 c9 9b 8e |..n...{mc.......| +peer0.org1.example.com | 00000010 90 c1 50 3a c7 e3 c2 16 53 11 4b fd 33 56 51 1c |..P:....S.K.3VQ.| +peer0.org1.example.com | [413e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org1.example.com | [413f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 9b be c5 4b 01 21 4c e2 58 ba 31 |0D. )...K.!L.X.1| +peer0.org1.example.com | 00000010 71 9f 0e c6 44 1d b4 c9 72 74 4a e9 5f 6f 12 b3 |q...D...rtJ._o..| +peer0.org1.example.com | 00000020 cd f0 51 75 02 20 47 09 d2 e0 7c 8a 57 e5 1c 2f |..Qu. G...|.W../| +peer0.org1.example.com | 00000030 2e e6 5c af 50 dc 82 10 33 ef 80 2a 36 ec 5a 3b |..\.P...3..*6.Z;| +peer0.org1.example.com | 00000040 7e bb 03 75 c2 d1 |~..u..| +peer0.org1.example.com | [4140 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4141 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510111801 +peer0.org1.example.com | [4142 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2EE80F321DD634C690985AAB833857929ECA14BC55A5CA17F24531729F048C2D +peer0.org1.example.com | [4143 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org1.example.com | [4144 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [4145 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d c6 e0 10 09 6b c1 8a 20 11 c9 65 |0D. .....k.. ..e| +peer0.org1.example.com | 00000010 c6 9d 43 73 73 1e c2 a7 27 c9 0b a3 34 01 9f c3 |..Css...'...4...| +peer0.org1.example.com | 00000020 b7 66 7f 24 02 20 3e ee 4f ff 2a 68 4c af 1a 55 |.f.$. >.O.*hL..U| +peer0.org1.example.com | 00000030 ab 35 a9 65 f2 6b 54 11 3a 32 44 db 06 6c 04 e5 |.5.e.kT.:2D..l..| +peer0.org1.example.com | 00000040 0d d3 66 73 93 ec |..fs..| +peer0.org1.example.com | [4146 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4147 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [4148 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4149 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [414a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [414b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [414c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [414d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [414e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [414f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4150 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4151 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4152 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4153 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4154 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [4155 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4156 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4157 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4158 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\356O\377*hL\257\032U\2535\251e\362kT\021:2D\333\006l\004\345\r\323fs\223\354" > > alive: +peer0.org1.example.com | [4159 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [415a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f32 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3f33 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3f34 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f35 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f36 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f37 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f38 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f39 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f3a 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f3b 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f3c 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f3d 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f3e 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3f3f 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f40 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3f11 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f12 11-19 05:23:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f13 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f14 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f15 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f16 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f17 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [3f18 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f19 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f1a 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f1b 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f1c 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f1d 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f1e 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f1f 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004168250 gate 1574140983876919400 evaluation starts +peer0.org2.example.com | [3f20 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004168250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f21 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004168250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3f22 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004168250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f23 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004168250 principal evaluation fails +peer0.org2.example.com | [3f24 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004168250 gate 1574140983876919400 evaluation fails +peer0.org2.example.com | [3f25 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f26 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f27 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f28 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041687c0 gate 1574140983877457500 evaluation starts +peer0.org2.example.com | [3f29 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041687c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f2a 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041687c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3f2b 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041687c0 principal matched by identity 0 +peer0.org2.example.com | [3f2c 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +peer0.org2.example.com | 00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +peer0.org2.example.com | [3f2d 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +peer0.org2.example.com | 00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +peer0.org2.example.com | 00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +peer0.org2.example.com | 00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +peer0.org2.example.com | 00000040 b4 a9 dc cd 76 a1 ff |....v..| +peer0.org2.example.com | [3f2e 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041687c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f2f 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041687c0 gate 1574140983877457500 evaluation succeeds +peer0.org2.example.com | [3f30 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f31 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f32 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f33 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f34 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f35 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f36 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [3f37 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 60 70 e4 6b 1e ad 31 eb 3b b6 66 c8 6b af f0 |?`p.k..1.;.f.k..| +peer0.org2.example.com | 00000010 20 22 30 fa be 1f 2e 3e 93 be 9b 60 32 31 2c 23 | "0....>...`21,#| +peer0.org2.example.com | [3f38 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 ae 73 2c 02 92 e1 72 1d 98 |0E.!....s,...r..| +peer0.org2.example.com | 00000010 4c 93 ba 1e 48 b1 e2 f1 65 a5 f3 ba 57 1e 6b e3 |L...H...e...W.k.| +peer0.org2.example.com | 00000020 33 fd 3f b2 af 02 20 15 a5 d8 89 a7 0b 37 17 e9 |3.?... ......7..| +peer0.org2.example.com | 00000030 77 91 59 e8 3b c9 43 8d 89 01 54 d9 c2 23 8d ef |w.Y.;.C...T..#..| +peer0.org2.example.com | 00000040 24 67 ad 34 ca be b8 |$g.4...| +peer0.org2.example.com | [3f39 11-19 05:23:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f3a 11-19 05:23:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f3b 11-19 05:23:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f3c 11-19 05:23:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [3f3d 11-19 05:23:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +peer0.org2.example.com | 00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +peer0.org2.example.com | [3f3e 11-19 05:23:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +peer0.org2.example.com | 00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +peer0.org2.example.com | 00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +peer0.org2.example.com | 00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +peer0.org2.example.com | 00000040 55 5d 54 ae a8 28 |U]T..(| +peer0.org2.example.com | [3f3f 11-19 05:23:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3f40 11-19 05:23:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f41 11-19 05:23:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f42 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f43 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f44 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3f45 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f46 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f47 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f48 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f49 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f4a 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f4b 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f4c 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f4d 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f4e 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f4f 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f50 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f51 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f52 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f53 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f54 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f41 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f42 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f43 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f44 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f45 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f46 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f47 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f48 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f49 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f4a 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f4b 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f4c 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f4d 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f4e 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 74 3f 4e 8b 75 c6 8d 30 6b 1d 03 63 76 8a f6 |.t?N.u..0k..cv..| +peer1.org2.example.com | 00000010 fc fe e2 ee 8d 00 66 ec 87 e4 69 83 ae c0 3b 71 |......f...i...;q| +peer1.org2.example.com | [3f4f 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 94 8e ec d6 4b 83 3d 2c 08 e2 20 |0D. /....K.=,.. | +peer1.org2.example.com | 00000010 87 ba 0a e0 d6 23 8e 59 55 cb ae c1 c4 18 92 86 |.....#.YU.......| +peer1.org2.example.com | 00000020 79 e5 bb a8 02 20 1d b7 f1 85 b1 0b 52 ff ca 5b |y.... ......R..[| +peer1.org2.example.com | 00000030 f9 f2 50 54 6c 37 3d f7 e9 cc cf 44 6d 94 84 c7 |..PTl7=....Dm...| +peer1.org2.example.com | 00000040 2f 30 a2 4f fa f9 |/0.O..| +peer1.org2.example.com | [3f50 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f51 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us declaration +peer1.org2.example.com | [3f52 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Returning false +peer1.org2.example.com | [3f53 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:35586 +peer1.org2.example.com | [3f54 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00030aa50 +peer1.org2.example.com | [3f55 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [3f56 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [3f57 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer1.org2.example.com | [3f58 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [3f59 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 52 fc 84 2a ae ce 00 5c de 20 99 c1 7e 8e 2b |.R..*...\. ..~.+| +peer1.org2.example.com | 00000010 7c 8e f3 a8 24 78 d8 ec 88 4d 72 1b fd 84 60 43 ||...$x...Mr...`C| +peer1.org2.example.com | [3f5a 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 d3 f0 53 04 d4 b8 28 26 d3 bc |0E.!....S...(&..| +peer1.org2.example.com | 00000010 00 b5 46 32 d8 31 bb 0d f3 d8 ea 05 8e 67 b7 62 |..F2.1.......g.b| +peer1.org2.example.com | 00000020 2b d6 de 9f 46 02 20 1a 34 da b8 75 b8 68 22 8d |+...F. .4..u.h".| +peer1.org2.example.com | 00000030 d4 39 ed 52 bb 34 4f f2 57 58 70 0c 67 08 73 80 |.9.R.4O.WXp.g.s.| +peer1.org2.example.com | 00000040 66 76 4f 4a 32 8d b4 |fvOJ2..| +peer1.org2.example.com | [3f5b 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [3f5c 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004a79ce0, header 0xc00030ae60 +peer1.org2.example.com | [3f5d 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [3f5e 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU [][9e7ea100] processing txid: 9e7ea10032a88ce528893d2395e3c7e010afc895f7aa2ec60d7b726bab7f6c6c +peer1.org2.example.com | [3f5f 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU [][9e7ea100] Entry chaincode: name:"cscc" +peer1.org2.example.com | [3f60 11-19 05:23:10.35 UTC] [%{longpkg}] %{callpath} -> INFO [][9e7ea100] Entry chaincode: name:"cscc" +peer1.org2.example.com | [3f61 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [3f62 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [3f63 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 52 fc 84 2a ae ce 00 5c de 20 99 c1 7e 8e 2b |.R..*...\. ..~.+| +peer1.org2.example.com | 00000010 7c 8e f3 a8 24 78 d8 ec 88 4d 72 1b fd 84 60 43 ||...$x...Mr...`C| +peer1.org2.example.com | [3f64 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 d3 f0 53 04 d4 b8 28 26 d3 bc |0E.!....S...(&..| +peer1.org2.example.com | 00000010 00 b5 46 32 d8 31 bb 0d f3 d8 ea 05 8e 67 b7 62 |..F2.1.......g.b| +peer1.org2.example.com | 00000020 2b d6 de 9f 46 02 20 1a 34 da b8 75 b8 68 22 8d |+...F. .4..u.h".| +peer1.org2.example.com | 00000030 d4 39 ed 52 bb 34 4f f2 57 58 70 0c 67 08 73 80 |.9.R.4O.WXp.g.s.| +peer1.org2.example.com | 00000040 66 76 4f 4a 32 8d b4 |fvOJ2..| +peer1.org2.example.com | [3f65 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU [9e7ea100] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [3f66 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU [9e7ea100] notifying Txid:9e7ea10032a88ce528893d2395e3c7e010afc895f7aa2ec60d7b726bab7f6c6c, channelID: +peer1.org1.example.com | [3aa3 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3aa4 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3aa5 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3aa6 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3aa7 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3aa8 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3aa9 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aaa 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aab 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aac 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3aae 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3aaf 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ab0 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ab1 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aad 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ab2 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ab3 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ab4 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ab5 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ab6 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ab7 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ab8 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3ab9 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3aba 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3abb 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3abc 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3abd 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3abe 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3abf 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ac0 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ac1 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ac2 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ac3 11-19 05:23:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3ac4 11-19 05:23:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC15103F +peer1.org1.example.com | [3ac5 11-19 05:23:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2EAB4D2544BE7941278D64517E1002BD48E0122FB8346331E4897F67C01CCD38 +peer1.org1.example.com | [3ac6 11-19 05:23:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3ac7 11-19 05:23:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3ac8 11-19 05:23:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3ac9 11-19 05:23:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3aca 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3acb 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3acc 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3acd 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3ace 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ad0 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ad1 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3acf 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3ad2 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3ad3 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ad4 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ad5 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ad6 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ad7 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ad8 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ad9 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ada 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3adb 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3adc 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3add 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ade 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3adf 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [3ae0 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ae1 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ae2 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ae3 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ae4 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ae5 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ae6 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ae7 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046569c0 gate 1574140990819924000 evaluation starts +peer1.org1.example.com | [3ae8 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046569c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ae9 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046569c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3aea 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046569c0 principal matched by identity 0 +peer1.org1.example.com | [3aeb 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fa 22 f8 cc 26 3e 3a 42 9f e3 0e ba b1 ce 5f |E."..&>:B......_| +peer1.org1.example.com | 00000010 be 5d 6a 8a 4a 17 6c 01 16 8f 49 db dc 13 fc 4e |.]j.J.l...I....N| +peer1.org1.example.com | [3aec 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b bb 10 b1 72 e5 49 9e 39 67 bf |0E.!.....r.I.9g.| +peer1.org1.example.com | 00000010 ef 3d 27 6f b8 06 63 b4 64 23 8c dd f0 cf 2c b3 |.='o..c.d#....,.| +peer1.org1.example.com | 00000020 9a 98 09 f4 37 02 20 28 71 7b 35 93 91 85 81 99 |....7. (q{5.....| +peer1.org1.example.com | 00000030 d8 0b 55 fd 23 bc 98 c3 6b bc df 79 41 94 8e dc |..U.#...k..yA...| +peer1.org1.example.com | 00000040 8e 8e 92 57 6a 4a 1e |...WjJ.| +peer1.org1.example.com | [3aed 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046569c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3aee 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046569c0 gate 1574140990819924000 evaluation succeeds +peer1.org1.example.com | [3aef 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3af0 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3af1 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3af2 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3af3 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3af4 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3af5 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3af6 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3af7 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3af8 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3af9 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3afa 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3afb 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3afc 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3afe 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3aff 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b00 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b01 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f67 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [3f68 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> INFO [][9e7ea100] Exit chaincode: name:"cscc" (2ms) +peer1.org2.example.com | [3f69 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU [][9e7ea100] Exit +peer1.org2.example.com | [3f6a 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:35586 +peer1.org2.example.com | [3f6b 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:35586 grpc.code=OK grpc.call_duration=6.9301ms +peer1.org2.example.com | [3f6c 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3f6d 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15103E +peer1.org2.example.com | [3f6e 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DC10C241011156A191B3877F5A4FAEC85DDC0504E37602E9906BB6FF449A0881 +peer1.org2.example.com | [3f6f 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3f70 11-19 05:23:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3f71 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3f72 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3f73 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f74 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f75 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f76 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3f77 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3f78 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f79 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3f7a 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f7b 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f7c 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f7d 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f7e 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f7f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f80 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3f81 11-19 05:23:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f82 11-19 05:23:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f83 11-19 05:23:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f84 11-19 05:23:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [3f85 11-19 05:23:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 10 c2 41 01 11 56 a1 91 b3 87 7f 5a 4f ae c8 |...A..V.....ZO..| +peer1.org2.example.com | 00000010 5d dc 05 04 e3 76 02 e9 90 6b b6 ff 44 9a 08 81 |]....v...k..D...| +peer1.org2.example.com | [3f86 11-19 05:23:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f9 d7 3e 66 3c e1 27 bd f6 dc 9a |0D. X..>f<.'....| +peer1.org2.example.com | 00000010 9f 7b 75 1d 03 3f 7a 9c 23 ec 39 86 cf 63 37 34 |.{u..?z.#.9..c74| +peer1.org2.example.com | 00000020 14 c1 3a 4e 02 20 62 18 3b 5e 7e 95 0d 85 96 86 |..:N. b.;^~.....| +peer1.org2.example.com | 00000030 ce 60 21 cc 5d db 0f d0 b8 cf 28 55 31 e2 e5 bc |.`!.].....(U1...| +peer1.org2.example.com | 00000040 ed 4e 99 9c c5 1e |.N....| +peer1.org2.example.com | [3f87 11-19 05:23:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f88 11-19 05:23:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f89 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f8a 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [415b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [415c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151036 +peer0.org1.example.com | [415d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6CB0BBF98F58145D8352B296E0E20BCFA1B38EF1D3F16039D3165420D8D39B66 +peer0.org1.example.com | [415e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [415f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4160 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4161 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [4162 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4163 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4164 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4165 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4166 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4167 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4168 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4169 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [416a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [416b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [416c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [416d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [416e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [416f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4170 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4171 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4172 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4173 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4174 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4175 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4176 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4177 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4178 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4179 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [417a 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [417b 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [417c 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [417d 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [417e 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [417f 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4180 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4181 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4182 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 gate 1574140985375218800 evaluation starts +peer0.org1.example.com | [4183 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4184 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4185 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4186 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 principal evaluation fails +peer0.org1.example.com | [4187 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 gate 1574140985375218800 evaluation fails +peer0.org1.example.com | [4188 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4189 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [418a 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [418b 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 gate 1574140985375705800 evaluation starts +peer0.org1.example.com | [418c 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [418d 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [418e 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 principal matched by identity 0 +peer0.org1.example.com | [418f 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 26 a1 56 2b 9f f3 38 74 39 c9 30 b8 04 ae ec |.&.V+..8t9.0....| +peer0.org1.example.com | 00000010 46 cf 86 f9 f9 0b 7a 6a bb e0 be 82 8b f1 9e f9 |F.....zj........| +peer0.org1.example.com | [4190 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 e7 50 6c e2 48 56 8c 18 12 7c bb |0D. 6.Pl.HV...|.| +peer0.org1.example.com | 00000010 d2 07 3b b6 a2 f7 f9 53 8b 8e 2d a7 0d 88 07 8c |..;....S..-.....| +peer0.org1.example.com | 00000020 57 50 f7 0b 02 20 6e 00 5b f4 95 b4 15 a1 8a cc |WP... n.[.......| +peer0.org1.example.com | 00000030 5f 5c 9e 38 ee c0 d3 88 80 1a f6 2f 2f 81 d8 77 |_\.8.......//..w| +peer0.org1.example.com | 00000040 a1 f8 9e cd ce 43 |.....C| +peer0.org1.example.com | [4191 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4192 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 gate 1574140985375705800 evaluation succeeds +peer0.org1.example.com | [4193 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4194 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4195 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4196 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4197 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4198 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4199 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [419a 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [419b 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [419c 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [419d 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [419e 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [419f 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a0 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a1 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a2 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a3 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a4 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a5 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [41a6 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a8 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a7 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41a9 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41aa 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3f8b 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f8c 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org2.example.com | [3f8d 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f8e 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f8f 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f90 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f91 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f92 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f93 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f94 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e31f0 gate 1574140990796334500 evaluation starts +peer1.org2.example.com | [3f95 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e31f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f96 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e31f0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3f97 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e31f0 principal matched by identity 0 +peer1.org2.example.com | [3f98 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e ab 4d 25 44 be 79 41 27 8d 64 51 7e 10 02 bd |..M%D.yA'.dQ~...| +peer1.org2.example.com | 00000010 48 e0 12 2f b8 34 63 31 e4 89 7f 67 c0 1c cd 38 |H../.4c1...g...8| +peer1.org2.example.com | [3f99 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 f0 53 a4 96 9d f4 da 16 9a 24 5c |0D. Y.S.......$\| +peer1.org2.example.com | 00000010 1f 91 4a e6 1f 04 00 5e a1 ca b0 36 63 26 cc 2b |..J....^...6c&.+| +peer1.org2.example.com | 00000020 25 ff 8e ec 02 20 5d 60 ae 8e 94 07 9f 79 de 0a |%.... ]`.....y..| +peer1.org2.example.com | 00000030 30 63 5d bd a7 84 26 5a c4 b9 e4 03 d2 79 76 a5 |0c]...&Z.....yv.| +peer1.org2.example.com | 00000040 81 6d f2 fd 19 4d |.m...M| +peer1.org2.example.com | [3f9a 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e31f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f9c 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e31f0 gate 1574140990796334500 evaluation succeeds +peer1.org2.example.com | [3f9d 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f9e 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f9f 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3fa0 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3fa1 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3fa2 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3fa3 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3fa4 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3fa5 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3fa6 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fa7 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fa8 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b02 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b03 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b04 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3b05 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b06 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3b07 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b08 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3afd 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b09 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b0a 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b0b 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b0c 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b0d 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b0e 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b0f 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b10 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b11 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b12 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b13 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b14 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b15 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b16 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b17 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | [3b18 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer1.org1.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer1.org1.example.com | [3b19 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer1.org1.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer1.org1.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer1.org1.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer0.org1.example.com | [41ab 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41ac 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ad 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41ae 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41af 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41b0 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41b1 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41b2 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41b3 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41b4 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41b5 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [41b6 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e f6 38 dc 7f 49 48 7e 53 65 ae 5a 54 9d f3 5a |^.8..IH~Se.ZT..Z| +peer0.org1.example.com | 00000010 10 80 20 3e cf 0d 61 70 d8 3c 8f 2a 9e f8 f0 c3 |.. >..ap.<.*....| +peer0.org1.example.com | [41b7 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 c9 ef 71 5f 4d 4f c3 b3 95 07 |0E.!....q_MO....| +peer0.org1.example.com | 00000010 97 82 bb 70 b3 2e 97 32 81 c2 cb 2f 70 51 42 7e |...p...2.../pQB~| +peer0.org1.example.com | 00000020 8d 83 d5 42 ca 02 20 10 75 87 31 59 07 0b 80 32 |...B.. .u.1Y...2| +peer0.org1.example.com | 00000030 6b c2 b5 98 82 75 bc 16 e5 27 e7 cd 41 7c 8d 86 |k....u...'..A|..| +peer0.org1.example.com | 00000040 e0 9a ba b0 1e ba 9c |.......| +peer0.org1.example.com | [41b8 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41b9 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [41ba 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [41bb 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [41bc 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [41bd 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41be 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41bf 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41c0 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41c1 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41c2 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41c3 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [41c4 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41c5 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [41c6 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41c7 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41c8 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41c9 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f55 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f56 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f57 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d130 gate 1574140983916645600 evaluation starts +peer0.org2.example.com | [3f58 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d130 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f59 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d130 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3f5a 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f5b 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d130 principal evaluation fails +peer0.org2.example.com | [3f5c 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d130 gate 1574140983916645600 evaluation fails +peer0.org2.example.com | [3f5d 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f5e 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f5f 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f60 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d6a0 gate 1574140983916982900 evaluation starts +peer0.org2.example.com | [3f61 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d6a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f62 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d6a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3f63 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d6a0 principal matched by identity 0 +peer0.org2.example.com | [3f64 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3f65 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [3f66 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d6a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f67 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d6a0 gate 1574140983916982900 evaluation succeeds +peer0.org2.example.com | [3f68 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f69 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f6a 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f6b 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f6c 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f6d 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f6e 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f6f 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f70 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f71 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f72 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f73 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f74 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4830 gate 1574140983917824400 evaluation starts +peer0.org2.example.com | [3f75 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f76 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4830 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3f77 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f78 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4830 principal evaluation fails +peer1.org2.example.com | [3f9b 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fa9 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3faa 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fab 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fac 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fad 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fae 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3faf 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fb0 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org2.example.com | [3fb1 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fb2 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3fb3 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fb4 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3fb5 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fb6 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3fb8 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fb7 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fb9 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fba 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbb 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbc 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbd 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbe 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbf 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3fc0 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fc1 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3fc2 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3fc3 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fc4 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3fc5 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fc6 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3fc7 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fc8 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fc9 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fca 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fcb 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [3fcc 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fa 22 f8 cc 26 3e 3a 42 9f e3 0e ba b1 ce 5f |E."..&>:B......_| +peer1.org2.example.com | 00000010 be 5d 6a 8a 4a 17 6c 01 16 8f 49 db dc 13 fc 4e |.]j.J.l...I....N| +peer1.org2.example.com | [3fcd 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b bb 10 b1 72 e5 49 9e 39 67 bf |0E.!.....r.I.9g.| +peer1.org2.example.com | 00000010 ef 3d 27 6f b8 06 63 b4 64 23 8c dd f0 cf 2c b3 |.='o..c.d#....,.| +peer1.org2.example.com | 00000020 9a 98 09 f4 37 02 20 28 71 7b 35 93 91 85 81 99 |....7. (q{5.....| +peer1.org2.example.com | 00000030 d8 0b 55 fd 23 bc 98 c3 6b bc df 79 41 94 8e dc |..U.#...k..yA...| +peer1.org2.example.com | 00000040 8e 8e 92 57 6a 4a 1e |...WjJ.| +peer0.org1.example.com | [41ca 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41cb 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41cc 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41cd 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ce 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41cf 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41d0 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d1 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d2 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41d3 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d4 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41d5 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41d6 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d7 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41d8 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [41d9 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41da 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [41db 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41dc 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41dd 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [41de 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f79 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4830 gate 1574140983917824400 evaluation fails +peer0.org2.example.com | [3f7a 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f7b 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f7c 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f7d 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4da0 gate 1574140983918535500 evaluation starts +peer0.org2.example.com | [3f7e 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4da0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f7f 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4da0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3f80 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4da0 principal matched by identity 0 +peer0.org2.example.com | [3f81 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3f82 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3f83 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4da0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f84 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a4da0 gate 1574140983918535500 evaluation succeeds +peer0.org2.example.com | [3f85 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f86 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f87 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f88 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f89 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [3f8a 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [3f8b 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3f8c 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3f8d 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f8e 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f8f 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f90 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f91 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f92 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f93 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f94 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f95 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f96 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer1.org1.example.com | [3b1a 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3b1b 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a6 8a 8f 61 5c f3 5e 77 d7 f2 19 |0D. &...a\.^w...| +peer1.org1.example.com | 00000010 82 40 d2 28 c7 52 85 5b 21 e7 b0 c2 64 39 75 8d |.@.(.R.[!...d9u.| +peer1.org1.example.com | 00000020 0b 58 33 20 02 20 2c 6d 95 89 23 4a d0 af f0 92 |.X3 . ,m..#J....| +peer1.org1.example.com | 00000030 e8 17 af e2 db b5 fd e8 24 ad 50 33 9b 43 14 1d |........$.P3.C..| +peer1.org1.example.com | 00000040 43 7b b0 6d 74 11 |C{.mt.| +peer1.org1.example.com | [3b1c 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3b1d 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [3b1e 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3b1f 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3b20 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3b21 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b22 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b23 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b24 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [3b25 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b26 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b27 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3b28 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [3b29 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b2a 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b2b 11-19 05:23:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:57638 +peer1.org1.example.com | [3b2c 11-19 05:23:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002912d20 +peer1.org1.example.com | [3b2d 11-19 05:23:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [3b2e 11-19 05:23:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3b2f 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer1.org1.example.com | [3b30 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3b31 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 2e d0 ff 15 ba 6a 6c 42 7b bf b4 e4 20 5a 8e |......jlB{... Z.| +peer1.org1.example.com | 00000010 4f 41 1a 87 44 68 f5 9a 76 f0 ec 31 27 1c 46 a8 |OA..Dh..v..1'.F.| +peer1.org1.example.com | [3b32 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 fa 83 4f 1a dd 21 b2 19 bc e5 a4 |0D. ...O..!.....| +peer1.org1.example.com | 00000010 bd 94 15 b2 a3 e2 2c 08 f5 c0 19 a5 31 0f d6 a8 |......,.....1...| +peer1.org1.example.com | 00000020 e7 b0 f3 17 02 20 79 f3 f5 db 6c e8 be 58 0b 0d |..... y...l..X..| +peer1.org1.example.com | 00000030 b6 4b b4 e8 ba 4a aa c7 7e b9 1f c5 1d cd 97 3b |.K...J..~......;| +peer1.org1.example.com | 00000040 e2 8d 30 4b 00 05 |..0K..| +peer1.org1.example.com | [3b33 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3b34 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003010930, header 0xc002913130 +peer1.org1.example.com | [3b35 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org1.example.com | [3b36 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU [][c17c8f24] processing txid: c17c8f24039f42ec32031c6e0fe88a1c6c26025862a3d13a14e98235f8c25c61 +peer1.org1.example.com | [3b37 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU [][c17c8f24] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3b38 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> INFO [][c17c8f24] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3b39 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [3b3a 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org1.example.com | [3b3b 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org1.example.com | [3b3c 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [3b3d 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3fce 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fcf 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3fd0 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3fd1 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3fd2 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3fd3 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fd4 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fd5 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fd6 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fd7 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fd8 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fd9 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3fda 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fdc 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3fde 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fdd 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fdb 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fdf 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fe0 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fe1 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fe2 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fe3 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fe4 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fe5 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fe6 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fe7 11-19 05:23:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fe8 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fe9 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fea 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3feb 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [3fec 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41df 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [41e0 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 gate 1574140985805150900 evaluation starts +peer0.org1.example.com | [41e1 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41e2 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [41e3 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [41e4 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 principal evaluation fails +peer0.org1.example.com | [41e5 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 gate 1574140985805150900 evaluation fails +peer0.org1.example.com | [41e6 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [41e7 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [41e8 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [41e9 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 gate 1574140985805465700 evaluation starts +peer0.org1.example.com | [41ea 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41eb 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [41ec 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 principal matched by identity 0 +peer0.org1.example.com | [41ed 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 1a 1a 57 9c 7e 17 8e 27 dd 4d 8f 1c 13 40 68 |...W.~..'.M...@h| +peer0.org1.example.com | 00000010 fd 9f df d6 7f ac 09 c0 66 42 08 38 44 f8 bb 02 |........fB.8D...| +peer0.org1.example.com | [41ee 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 82 cf 91 e4 e0 ca 0f 6f 9c e4 b1 |0D. 6.......o...| +peer0.org1.example.com | 00000010 e6 56 4d 3d 09 5f a7 67 0c 33 74 af c9 28 9c dd |.VM=._.g.3t..(..| +peer0.org1.example.com | 00000020 ef df d4 34 02 20 37 f8 fb a5 76 70 b6 93 cd 3b |...4. 7...vp...;| +peer0.org1.example.com | 00000030 23 b2 27 cd 88 dc b8 0a 1f 03 ba e9 72 be 90 a7 |#.'.........r...| +peer0.org1.example.com | 00000040 80 b4 f7 d3 92 9d |......| +peer0.org1.example.com | [41ef 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [41f0 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 gate 1574140985805465700 evaluation succeeds +peer0.org1.example.com | [41f1 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41f2 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41f3 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [41f4 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [41f5 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41f6 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [41f7 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [41f8 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [41f9 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [41fa 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41fb 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41fc 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41fd 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41fe 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41ff 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4200 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4201 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4202 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4203 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4204 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4205 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4206 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4207 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4208 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4209 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [420a 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [420b 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [420c 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [420d 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [420e 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [420f 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4210 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4211 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4212 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4213 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4214 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4215 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4216 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4217 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4218 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [421a 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [421b 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [421c 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4219 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [421d 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [421e 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [421f 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4220 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4221 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4222 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4223 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151037 +peer0.org1.example.com | [4224 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D4A352F16D148CE14FAE4D668B6ACA2DC19D4BBA253B7240222C9F9591E8363E +peer0.org1.example.com | [4225 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4226 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4227 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4228 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4229 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [422a 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" secret_envelope: \253" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [422b 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [422c 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [422d 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [422e 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [422f 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4230 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4231 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" secret_envelope: \253" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [4232 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4233 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [4234 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4235 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [4236 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [4237 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer0.org1.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer0.org1.example.com | [4238 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer0.org1.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer0.org1.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer0.org1.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer0.org1.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer0.org1.example.com | [4239 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [423a 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 97 8e f0 3d a3 8b 26 f0 2f 42 |0E.!.....=..&./B| +peer0.org1.example.com | 00000010 dd 4e cb d9 68 37 75 da db 93 17 d8 c4 81 ca a7 |.N..h7u.........| +peer0.org1.example.com | 00000020 41 72 08 1a 76 02 20 38 52 5b 04 a2 5f ea ee cd |Ar..v. 8R[.._...| +peer0.org1.example.com | 00000030 7c 4b 7e 8b 93 61 4c 0e 93 8a 73 9c 99 e2 c7 06 ||K~..aL...s.....| +peer0.org1.example.com | 00000040 46 ba fd ab 3e 20 ab |F...> .| +peer0.org1.example.com | [423b 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [423c 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [423d 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [423e 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [423f 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4240 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4241 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4242 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4243 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [4244 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer0.org1.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer0.org1.example.com | [4245 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer0.org1.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer0.org1.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer0.org1.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer0.org1.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer0.org1.example.com | [4246 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4247 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4248 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4249 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [424a 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [424b 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [424c 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [424d 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [424e 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [424f 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer0.org1.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer0.org1.example.com | [4250 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer0.org1.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer0.org1.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer0.org1.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer0.org1.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer0.org1.example.com | [4251 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4252 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4253 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4254 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f97 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f98 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c2e80 gate 1574140983920694800 evaluation starts +peer0.org2.example.com | [3f99 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c2e80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f9a 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c2e80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3f9b 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c2e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f9c 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c2e80 principal evaluation fails +peer0.org2.example.com | [3f9d 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c2e80 gate 1574140983920694800 evaluation fails +peer0.org2.example.com | [3f9e 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f9f 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fa0 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3fa1 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c33f0 gate 1574140983921253900 evaluation starts +peer0.org2.example.com | [3fa2 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c33f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fa3 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c33f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3fa4 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c33f0 principal matched by identity 0 +peer0.org2.example.com | [3fa5 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3fa6 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3fa7 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c33f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3fa8 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c33f0 gate 1574140983921253900 evaluation succeeds +peer0.org2.example.com | [3fa9 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3faa 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fab 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3fac 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3fad 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fae 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3faf 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3fb0 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fb1 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fb2 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3fb3 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3fb4 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3fb5 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0580 gate 1574140983922925100 evaluation starts +peer0.org2.example.com | [3fb6 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fb7 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0580 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3fb8 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3fb9 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0580 principal evaluation fails +peer0.org2.example.com | [3fba 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0580 gate 1574140983922925100 evaluation fails +peer0.org2.example.com | [3fbb 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fbc 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fbd 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3fbe 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0af0 gate 1574140983925114500 evaluation starts +peer0.org2.example.com | [3fbf 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fc0 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0af0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3fc1 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0af0 principal matched by identity 0 +peer0.org2.example.com | [3fc2 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [3fc3 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [3fc4 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0af0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3fc5 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e0af0 gate 1574140983925114500 evaluation succeeds +peer0.org2.example.com | [3fc6 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fc7 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fc8 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3fc9 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3fca 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [3fcb 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [3fcc 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3fcd 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3fce 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fcf 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fd0 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [3fd1 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [3fd2 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fd3 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fd4 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3fd5 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fd6 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fd7 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3fd8 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3fd9 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3fda 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f51a0 gate 1574140983926674700 evaluation starts +peer0.org2.example.com | [3fdb 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f51a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fdc 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f51a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3fdd 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f51a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3fde 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f51a0 principal evaluation fails +peer0.org2.example.com | [3fdf 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f51a0 gate 1574140983926674700 evaluation fails +peer0.org2.example.com | [3fe0 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fe1 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fe2 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3fe3 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5710 gate 1574140983926904100 evaluation starts +peer0.org2.example.com | [3fe4 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5710 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fe5 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5710 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [3fe6 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5710 principal matched by identity 0 +peer0.org2.example.com | [3fe7 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [3fe8 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [3fe9 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5710 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3fea 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5710 gate 1574140983926904100 evaluation succeeds +peer0.org2.example.com | [3feb 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fec 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fed 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3fee 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3fef 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ff0 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ff1 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ff2 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ff3 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ff4 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ff5 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ff6 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3ff7 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421c8a0 gate 1574140983929568100 evaluation starts +peer0.org2.example.com | [3ff8 11-19 05:23:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421c8a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fed 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3fee 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fef 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ff0 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ff1 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ff2 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ff3 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107560 gate 1574140990878925600 evaluation starts +peer1.org2.example.com | [3ff4 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107560 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ff5 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107560 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [3ff6 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107560 principal matched by identity 0 +peer1.org2.example.com | [3ff7 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer1.org2.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer1.org2.example.com | [3ff8 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer1.org2.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer1.org2.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer1.org2.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer1.org2.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer1.org2.example.com | [3ff9 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107560 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ffa 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107560 gate 1574140990878925600 evaluation succeeds +peer1.org2.example.com | [3ffb 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ffc 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ffd 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ffe 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3fff 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4000 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4001 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4002 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4003 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4004 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4005 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4006 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4007 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org2.example.com | [4008 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4009 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [400a 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [400b 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3b3e 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3b3f 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3b40 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b41 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer1.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer1.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer1.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3b42 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ddf0 gate 1574140991034043100 evaluation starts +peer1.org1.example.com | [3b43 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ddf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b44 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ddf0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3b45 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ddf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3b46 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ddf0 principal evaluation fails +peer1.org1.example.com | [3b47 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ddf0 gate 1574140991034043100 evaluation fails +peer1.org1.example.com | [3b48 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b49 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b4a 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3b4b 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004860d20 gate 1574140991035004100 evaluation starts +peer1.org1.example.com | [3b4c 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004860d20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b4d 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004860d20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3b4e 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004860d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [3b4f 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004860d20 principal evaluation fails +peer1.org1.example.com | [3b50 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004860d20 gate 1574140991035004100 evaluation fails +peer1.org1.example.com | [3b51 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3b52 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3b53 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b54 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048612f0 gate 1574140991035970000 evaluation starts +peer1.org1.example.com | [3b55 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048612f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b56 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048612f0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3b57 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [3b58 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3b59 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3b5a 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048612f0 principal matched by identity 0 +peer1.org1.example.com | [3b5b 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 2e d0 ff 15 ba 6a 6c 42 7b bf b4 e4 20 5a 8e |......jlB{... Z.| +peer1.org1.example.com | 00000010 4f 41 1a 87 44 68 f5 9a 76 f0 ec 31 27 1c 46 a8 |OA..Dh..v..1'.F.| +peer1.org1.example.com | [3b5c 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 fa 83 4f 1a dd 21 b2 19 bc e5 a4 |0D. ...O..!.....| +peer1.org1.example.com | 00000010 bd 94 15 b2 a3 e2 2c 08 f5 c0 19 a5 31 0f d6 a8 |......,.....1...| +peer1.org1.example.com | 00000020 e7 b0 f3 17 02 20 79 f3 f5 db 6c e8 be 58 0b 0d |..... y...l..X..| +peer1.org1.example.com | 00000030 b6 4b b4 e8 ba 4a aa c7 7e b9 1f c5 1d cd 97 3b |.K...J..~......;| +peer1.org1.example.com | 00000040 e2 8d 30 4b 00 05 |..0K..| +peer1.org1.example.com | [3b5d 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048612f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3b5e 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048612f0 gate 1574140991035970000 evaluation succeeds +peer1.org1.example.com | [3b5f 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b60 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b61 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b62 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b63 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU [c17c8f24] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [3b64 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU [c17c8f24] notifying Txid:c17c8f24039f42ec32031c6e0fe88a1c6c26025862a3d13a14e98235f8c25c61, channelID: +peer1.org1.example.com | [3b65 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3b66 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> INFO [][c17c8f24] Exit chaincode: name:"qscc" (7ms) +peer1.org1.example.com | [3b67 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU [][c17c8f24] Exit +peer1.org1.example.com | [3b68 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:57638 +peer1.org1.example.com | [3b69 11-19 05:23:11.03 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:57638 grpc.code=OK grpc.call_duration=10.3001ms +peer1.org1.example.com | [3b6a 11-19 05:23:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3b6b 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b6c 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b6d 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b6e 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b6f 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b70 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b71 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b72 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b73 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b74 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b75 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b76 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b77 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b78 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b79 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer1.org1.example.com | [3b7a 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b7b 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b7c 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b7d 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b7e 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5 6] to 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3b7f 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b80 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b81 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b82 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b83 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b84 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [3b85 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b86 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b87 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b88 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b89 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3b8a 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3b8b 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3b8c 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899620 gate 1574140991482662300 evaluation starts +peer1.org1.example.com | [3b8d 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899620 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b8e 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899620 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3b8f 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899620 principal matched by identity 0 +peer1.org1.example.com | [3b90 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer1.org1.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer1.org1.example.com | [3b91 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer1.org1.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer1.org1.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer1.org1.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU 0xc004899620 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3b93 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899620 gate 1574140991482662300 evaluation succeeds +peer1.org1.example.com | [3b94 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b95 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b96 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b97 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b98 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b99 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3b9a 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3b9b 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3b9c 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3b9d 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b9e 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b9f 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ba0 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [3ba1 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ba2 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ba3 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ba4 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ba5 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ba6 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ba7 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [4006 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421ce10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4007 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421ce10 gate 1574140983929954700 evaluation succeeds +peer0.org2.example.com | [4008 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4009 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [400a 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [400b 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [400c 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [400d 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [400e 11-19 05:23:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [400f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4010 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4011 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4012 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4013 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [4014 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4255 11-19 05:23:07.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4256 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4257 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [4258 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4259 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [425a 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [425b 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [425c 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [425d 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [425e 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [400c 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer1.org2.example.com | [400d 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [400e 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [400f 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4010 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4011 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4012 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4013 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4014 11-19 05:23:11.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:35594 +peer1.org2.example.com | [4015 11-19 05:23:11.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004012870 +peer1.org2.example.com | [4016 11-19 05:23:11.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [4017 11-19 05:23:11.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [4018 11-19 05:23:11.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer1.org2.example.com | [4019 11-19 05:23:11.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [401a 11-19 05:23:11.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 61 e9 6b 3a cb 5d b8 fa 85 e1 7e ca 39 51 7c |.a.k:.]....~.9Q|| +peer1.org2.example.com | 00000010 52 4a 1d ff f7 0d 0a ed a0 17 28 70 3a ae 7b 38 |RJ........(p:.{8| +peer1.org2.example.com | [401b 11-19 05:23:11.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 9b 12 2b f1 bf 04 9c 6a 7f d2 |0E.!....+....j..| +peer1.org2.example.com | 00000010 d7 1b 42 da 8a ea ba bd e8 38 59 7f a7 b2 78 0c |..B......8Y...x.| +peer1.org2.example.com | 00000020 4b da 9b 5d 2b 02 20 07 cc 30 d8 5e 97 e3 09 40 |K..]+. ..0.^...@| +peer1.org2.example.com | 00000030 dd 25 39 b0 43 65 62 56 fc eb 80 67 27 85 2d 7d |.%9.CebV...g'.-}| +peer1.org2.example.com | 00000040 de 70 af 7e 63 bd 5c |.p.~c.\| +peer1.org2.example.com | [401c 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [401d 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00031acb0, header 0xc0040df9a0 +peer1.org2.example.com | [401e 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org2.example.com | [401f 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU [][ce925822] processing txid: ce9258221f435245af4e61f79961d826cc6e22064642c9e90e166611eaeff941 +peer1.org2.example.com | [4020 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU [][ce925822] Entry chaincode: name:"qscc" +peer1.org2.example.com | [4021 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> INFO [][ce925822] Entry chaincode: name:"qscc" +peer1.org2.example.com | [4022 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [4023 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org2.example.com | [4024 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org2.example.com | [4025 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [4026 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4027 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4028 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4029 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [402a 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer1.org2.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer1.org2.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer1.org2.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer1.org2.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [402b 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004007640 gate 1574140991404293000 evaluation starts +peer1.org2.example.com | [402c 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004007640 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [402d 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004007640 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [402e 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004007640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [402f 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004007640 principal evaluation fails +peer1.org2.example.com | [4030 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004007640 gate 1574140991404293000 evaluation fails +peer1.org2.example.com | [4031 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4032 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4033 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4034 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074450 gate 1574140991406261600 evaluation starts +peer1.org2.example.com | [4035 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4036 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074450 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [4037 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [4038 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [4039 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [403a 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074450 principal matched by identity 0 +peer1.org2.example.com | [403b 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 61 e9 6b 3a cb 5d b8 fa 85 e1 7e ca 39 51 7c |.a.k:.]....~.9Q|| +peer1.org2.example.com | 00000010 52 4a 1d ff f7 0d 0a ed a0 17 28 70 3a ae 7b 38 |RJ........(p:.{8| +peer1.org2.example.com | [403c 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 9b 12 2b f1 bf 04 9c 6a 7f d2 |0E.!....+....j..| +peer1.org2.example.com | 00000010 d7 1b 42 da 8a ea ba bd e8 38 59 7f a7 b2 78 0c |..B......8Y...x.| +peer1.org2.example.com | 00000020 4b da 9b 5d 2b 02 20 07 cc 30 d8 5e 97 e3 09 40 |K..]+. ..0.^...@| +peer1.org2.example.com | 00000030 dd 25 39 b0 43 65 62 56 fc eb 80 67 27 85 2d 7d |.%9.CebV...g'.-}| +peer1.org2.example.com | 00000040 de 70 af 7e 63 bd 5c |.p.~c.\| +peer1.org2.example.com | [403d 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074450 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [403e 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074450 gate 1574140991406261600 evaluation succeeds +peer1.org2.example.com | [403f 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4040 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4041 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4042 11-19 05:23:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4043 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU [ce925822] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [4044 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU [ce925822] notifying Txid:ce9258221f435245af4e61f79961d826cc6e22064642c9e90e166611eaeff941, channelID: +peer1.org2.example.com | [4045 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [4046 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> INFO [][ce925822] Exit chaincode: name:"qscc" (9ms) +peer1.org2.example.com | [4047 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU [][ce925822] Exit +peer1.org2.example.com | [4048 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:35594 +peer1.org2.example.com | [4049 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:35594 grpc.code=OK grpc.call_duration=13.5412ms +peer1.org2.example.com | [404a 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [404b 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [404c 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [404d 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [404e 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [404f 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [4050 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4051 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4052 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4053 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4054 11-19 05:23:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4055 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4056 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4057 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4058 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4059 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [405a 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [405b 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [405c 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [405d 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [405e 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [405f 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4060 11-19 05:23:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4061 11-19 05:23:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...18F7120C08ECE5AB88DE999EEC15103F +peer1.org2.example.com | [4062 11-19 05:23:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BFC8E682D6D8C6682298BC25974D508B1EE52F92ED851D6263E210E283CC1413 +peer1.org2.example.com | [4063 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4064 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4065 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4066 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4067 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4068 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4069 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [406a 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [406b 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [406c 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [406d 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [406e 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [406f 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [4070 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4071 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4072 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4073 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4074 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [4075 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4076 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer1.org2.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer1.org2.example.com | [4077 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer1.org2.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer1.org2.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer1.org2.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [4079 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 65 b1 a2 41 32 63 89 d9 6c e4 |0E.!..e..A2c..l.| +peer1.org2.example.com | 00000010 29 d1 1e b8 bf a8 65 75 85 b2 76 71 9f 3d 71 ca |).....eu..vq.=q.| +peer1.org2.example.com | 00000020 7a ce 76 36 cc 02 20 45 70 bf 0b 30 c6 98 75 cf |z.v6.. Ep..0..u.| +peer1.org2.example.com | 00000030 ba 82 6f ad 37 a7 b9 ea 84 c1 81 ef 43 ad d1 8d |..o.7.......C...| +peer1.org2.example.com | 00000040 27 b9 d7 e4 31 4e 61 |'...1Na| +peer1.org2.example.com | [407a 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [407b 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [407c 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [407d 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [407e 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [407f 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4080 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [4081 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer1.org2.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer1.org2.example.com | [4082 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer1.org2.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer1.org2.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer1.org2.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4084 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4085 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4086 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org2.example.com | [4087 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4088 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4089 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [408a 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [408b 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [408c 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [408d 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [408e 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9420 gate 1574140991502808300 evaluation starts +peer1.org2.example.com | [408f 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9420 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4090 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9420 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [4091 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9420 principal matched by identity 0 +peer1.org2.example.com | [4092 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer1.org2.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer1.org2.example.com | [4093 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer1.org2.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer1.org2.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer1.org2.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer1.org2.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer1.org2.example.com | [4094 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9420 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4095 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9420 gate 1574140991502808300 evaluation succeeds +peer1.org2.example.com | [4096 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4097 11-19 05:23:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4099 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [409a 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [409b 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [409c 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [409d 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4098 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [409e 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [409f 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [40a0 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [40a1 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer1.org2.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer1.org2.example.com | [40a2 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer1.org2.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer1.org2.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer1.org2.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [40a4 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [40a5 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40a6 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40a7 11-19 05:23:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40a8 11-19 05:23:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40a9 11-19 05:23:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40aa 11-19 05:23:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ab 11-19 05:23:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ac 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [40ad 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [40ae 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40af 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b0 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b1 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b2 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b3 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b4 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer1.org2.example.com | [40b5 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40b6 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [40b7 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [40b8 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer1.org2.example.com | [40b9 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ba 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [40bb 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40bc 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [40bd 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org2.example.com | [40be 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e0 a2 fa cb 47 0a b5 7a 5b 9c 92 8d 7e 08 a4 |.....G..z[...~..| +peer1.org2.example.com | 00000010 92 76 fc 7f 1a 1f e4 0f 00 32 da af a1 dc 8c 54 |.v.......2.....T| +peer1.org2.example.com | [40bf 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 72 cd 43 d4 2c ed 46 dd 83 26 90 |0D. .r.C.,.F..&.| +peer1.org2.example.com | 00000010 14 b4 87 28 b9 23 83 61 3c f9 ee b4 cd fe 4e 7a |...(.#.a<.....Nz| +peer1.org2.example.com | 00000020 bb ed 9c 0e 02 20 17 4e 4c 34 4f 80 10 27 6d 68 |..... .NL4O..'mh| +peer1.org2.example.com | 00000030 33 64 93 d0 90 22 f2 af 8e b3 e9 e2 0e 99 53 fa |3d..."........S.| +peer1.org2.example.com | 00000040 c5 f6 ff eb 1c cb |......| +peer1.org2.example.com | [40c0 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [40c1 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 c7 b2 9e 82 bd 8d a7 f3 3c 30 ad |0D. 4........<0.| +peer1.org2.example.com | 00000010 aa da c7 3f 3f ca 6b 0a 28 a9 70 35 aa 5e d9 7f |...??.k.(.p5.^..| +peer1.org2.example.com | 00000020 67 f0 cb 14 02 20 10 c2 d9 80 d8 73 90 89 bb d0 |g.... .....s....| +peer1.org2.example.com | 00000030 bb d7 f2 fc cc 2b 5a d5 ff aa 04 72 e3 f3 71 f7 |.....+Z....r..q.| +peer1.org2.example.com | 00000040 4e a5 1a b4 da 38 |N....8| +peer1.org2.example.com | [40c2 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [40c3 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [40c4 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [40c5 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [40c6 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [40c7 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c8 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c9 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ca 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [425f 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4260 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4261 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4262 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4263 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4264 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4265 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4266 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4267 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4268 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4269 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [426a 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 gate 1574140987277135300 evaluation starts +peer0.org1.example.com | [426b 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [426c 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [426d 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [426e 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 principal evaluation fails +peer0.org1.example.com | [426f 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 gate 1574140987277135300 evaluation fails +peer0.org1.example.com | [4270 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4271 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4272 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4273 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 gate 1574140987278456100 evaluation starts +peer0.org1.example.com | [4274 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4275 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4276 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 principal matched by identity 0 +peer0.org1.example.com | [4277 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [4278 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [4279 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [427a 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 gate 1574140987278456100 evaluation succeeds +peer0.org1.example.com | [427b 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [427c 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [427d 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [427e 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [427f 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [4280 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [4281 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [4282 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [4283 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4284 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4285 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4286 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4287 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4288 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4289 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [428a 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [428b 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 gate 1574140987285672000 evaluation starts +peer0.org1.example.com | [428c 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [428d 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [428e 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [428f 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 principal evaluation fails +peer0.org1.example.com | [4290 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 gate 1574140987285672000 evaluation fails +peer0.org1.example.com | [4291 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4292 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4293 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4294 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 gate 1574140987289106100 evaluation starts +peer0.org1.example.com | [4295 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4296 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4297 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 principal matched by identity 0 +peer0.org1.example.com | [4298 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [4299 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [429a 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [429b 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 gate 1574140987289106100 evaluation succeeds +peer0.org1.example.com | [429c 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [429d 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [429e 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [429f 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [42a0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42a1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [42a2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [42a3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [42a4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [42a5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [42a6 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42a7 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42a8 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42a9 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42aa 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42ab 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42ac 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [42ad 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [42ae 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 gate 1574140987295333200 evaluation starts +peer0.org1.example.com | [42af 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42b0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [42b1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [42b2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 principal evaluation fails +peer0.org1.example.com | [42b3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 gate 1574140987295333200 evaluation fails +peer0.org1.example.com | [42b4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42b5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42b6 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [42b7 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 gate 1574140987295580600 evaluation starts +peer0.org1.example.com | [42b8 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42b9 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [42ba 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 principal matched by identity 0 +peer0.org1.example.com | [42bb 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [42bc 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [42bd 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42be 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 gate 1574140987295580600 evaluation succeeds +peer0.org1.example.com | [42bf 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42c0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42c1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [42c2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [42c3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42c4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42c5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42c6 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42c7 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42c8 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42c9 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3bc7 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4015 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [40cb 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42ca 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3bc8 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | [4016 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40cc 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42cb 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 gate 1574140987296343300 evaluation starts +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [4017 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40cd 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [42cc 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bc9 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | [4018 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [40ce 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:" signature:"0D\002 X\371\327>f<\341'\275\366\334\232\237{u\035\003?z\234#\3549\206\317c74\024\301:N\002 b\030;^~\225\r\205\226\206\316`!\314]\333\017\320\270\317(U1\342\345\274\355N\231\234\305\036" > +peer0.org1.example.com | [42cd 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | [4019 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [40cf 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [42ce 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | [401a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [40d0 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42cf 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 principal evaluation fails +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | [401b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423a980 gate 1574140984952521000 evaluation starts +peer1.org2.example.com | [40d1 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [42d0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 gate 1574140987296343300 evaluation fails +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [401c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423a980 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40d2 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bca 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | [401d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423a980 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [42d1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40d3 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [401e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423a980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [42d2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40d4 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bcb 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | [401f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423a980 principal evaluation fails +peer0.org1.example.com | [42d3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | [4020 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423a980 gate 1574140984952521000 evaluation fails +peer0.org1.example.com | [42d4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 gate 1574140987296581100 evaluation starts +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | [40d5 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4021 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [42d5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | [40d6 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4022 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [42d6 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [40d7 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [4023 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [42d7 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 principal matched by identity 0 +peer1.org1.example.com | [3bcc 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [40d8 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4024 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423aef0 gate 1574140984952956700 evaluation starts +peer0.org1.example.com | [42d8 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | [3bcd 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40d9 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4025 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423aef0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [3bce 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40da 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4026 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423aef0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [42d9 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | [3bcf 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [40db 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4027 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423aef0 principal matched by identity 0 +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | [3bd0 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40dc 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4028 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 f9 6e ce d1 bf 7b 6d 63 ee d1 84 d5 c9 9b 8e |..n...{mc.......| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | [3bd1 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40dd 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 90 c1 50 3a c7 e3 c2 16 53 11 4b fd 33 56 51 1c |..P:....S.K.3VQ.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | [3bd2 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [40de 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:41034 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [4029 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 9b be c5 4b 01 21 4c e2 58 ba 31 |0D. )...K.!L.X.1| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3bd3 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [40df 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 71 9f 0e c6 44 1d b4 c9 72 74 4a e9 5f 6f 12 b3 |q...D...rtJ._o..| +peer0.org1.example.com | [42da 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3bd4 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [40e0 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 cd f0 51 75 02 20 47 09 d2 e0 7c 8a 57 e5 1c 2f |..Qu. G...|.W../| +peer0.org1.example.com | [42db 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 gate 1574140987296581100 evaluation succeeds +peer1.org1.example.com | [3bd5 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048c98b0 gate 1574140991598744800 evaluation starts +peer1.org2.example.com | [40e1 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 2e e6 5c af 50 dc 82 10 33 ef 80 2a 36 ec 5a 3b |..\.P...3..*6.Z;| +peer0.org1.example.com | [42dc 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3bd6 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048c98b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40e2 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 7e bb 03 75 c2 d1 |~..u..| +peer0.org1.example.com | [42dd 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3bd7 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048c98b0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [40e3 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [402a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423aef0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42de 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3bd8 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048c98b0 principal matched by identity 0 +peer1.org2.example.com | [40e4 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [402b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423aef0 gate 1574140984952956700 evaluation succeeds +peer0.org1.example.com | [42df 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3bd9 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | [40e5 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [402c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42e0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [40e6 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [402d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3bda 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | [42e1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [40e7 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [402e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Obtaining identity +peer1.org2.example.com | [40e8 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038103a0 gate 1574140992155102100 evaluation starts +peer0.org2.example.com | [402f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer0.org1.example.com | [42e3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4030 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [40e9 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038103a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | [42e4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4031 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [40ea 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038103a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [42e5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4032 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [40eb 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038103a0 principal matched by identity 0 +peer1.org1.example.com | [3bdb 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048c98b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42e6 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4033 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [40ec 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | [3bdc 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048c98b0 gate 1574140991598744800 evaluation succeeds +peer0.org1.example.com | [42e7 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4034 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [3bdd 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42e8 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4035 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ed 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | [3bde 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42e9 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4036 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | [3bdf 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [42ea 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4037 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | [3be0 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [42eb 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 gate 1574140987300359500 evaluation starts +peer0.org2.example.com | [4038 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | [3be1 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42ec 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4039 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3be2 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [42ed 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [403a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ee 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038103a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42ee 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3be3 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | [403b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ef 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038103a0 gate 1574140992155102100 evaluation succeeds +peer0.org1.example.com | [42ef 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 principal evaluation fails +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [403c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [40f0 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42f0 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 gate 1574140987300359500 evaluation fails +peer1.org1.example.com | [3be4 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org2.example.com | [40f1 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [403d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [42f1 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org2.example.com | [40f2 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [403e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [42f2 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org2.example.com | [40f3 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [403f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42f3 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org2.example.com | [40f4 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4040 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42f4 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 gate 1574140987300867300 evaluation starts +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org2.example.com | [40f5 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4041 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42f5 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3be5 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org2.example.com | [40f6 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4042 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [42f6 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org2.example.com | [40f7 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4043 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42f7 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 principal matched by identity 0 +peer1.org1.example.com | [3be6 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org2.example.com | [40f8 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4044 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42f8 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org2.example.com | [40f9 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4045 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | [40fa 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4046 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [42f9 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | [40fb 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4047 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | [40fc 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003811530 gate 1574140992156382800 evaluation starts +peer0.org2.example.com | [4048 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | [3be7 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40fd 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003811530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4049 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | [3be8 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40fe 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003811530 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [404a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3be9 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [40ff 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003811530 principal matched by identity 0 +peer0.org2.example.com | [404b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [42fa 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3bea 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4100 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | [404c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42fb 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 gate 1574140987300867300 evaluation succeeds +peer1.org1.example.com | [3beb 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [404d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42fc 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3bec 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4101 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | [404e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42fd 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3bed 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | [404f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42fe 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3bee 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | [4050 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42ff 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3bef 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1970 gate 1574140991601146300 evaluation starts +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | [4051 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4300 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer1.org1.example.com | [3bf0 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1970 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [4052 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer1.org1.example.com | [3bf1 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1970 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [4102 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003811530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4053 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d470 gate 1574140984959190100 evaluation starts +peer0.org1.example.com | [4301 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer1.org1.example.com | [3bf2 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1970 principal matched by identity 0 +peer1.org2.example.com | [4103 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003811530 gate 1574140992156382800 evaluation succeeds +peer0.org2.example.com | [4054 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d470 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer1.org1.example.com | [3bf3 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org2.example.com | [4104 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4055 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d470 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org2.example.com | [4105 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4056 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | [3bf4 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org2.example.com | [4106 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [4057 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d470 principal evaluation fails +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4302 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | [4058 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d470 gate 1574140984959190100 evaluation fails +peer1.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer1.org2.example.com | [4108 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [4059 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [4303 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | [405a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org2.example.com | [4109 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | [405b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3bf5 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1970 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU 0xc00425d9e0 gate 1574140984959614700 evaluation starts +peer1.org1.example.com | [3bf6 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1970 gate 1574140991601146300 evaluation succeeds +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org2.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer0.org2.example.com | [405d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bf7 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | [405e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d9e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3bf8 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4304 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [405f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d9e0 principal matched by identity 0 +peer1.org1.example.com | [3bf9 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4305 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [410a 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | [4060 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c b0 bb f9 8f 58 14 5d 83 52 b2 96 e0 e2 0b cf |l....X.].R......| +peer1.org1.example.com | [3bfa 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4306 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | 00000010 a1 b3 8e f1 d3 f1 60 39 d3 16 54 20 d8 d3 9b 66 |......`9..T ...f| +peer1.org1.example.com | [3bfb 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4307 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [410b 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | [4061 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 00 33 ab a5 9a 70 97 2e 12 7b |0E.!...3...p...{| +peer1.org1.example.com | [3bfc 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4308 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000010 11 44 f3 44 83 82 70 e2 78 54 a9 f3 76 d0 82 91 |.D.D..p.xT..v...| +peer0.org1.example.com | [4309 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3bfd 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000020 50 43 02 c3 78 02 20 2c fe ec 47 d2 19 b7 0d 72 |PC..x. ,..G....r| +peer0.org1.example.com | [430a 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3bfe 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000030 d8 60 08 2c 2f 8e ea a4 74 ee e8 ab 5e e3 cf a6 |.`.,/...t...^...| +peer0.org1.example.com | [430b 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3bff 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | 00000040 e2 92 c1 e6 a2 ec d3 |.......| +peer0.org1.example.com | [430c 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 gate 1574140987319108900 evaluation starts +peer1.org1.example.com | [3c00 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [410c 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4062 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d9e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [430d 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c01 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [410d 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [4063 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425d9e0 gate 1574140984959614700 evaluation succeeds +peer0.org1.example.com | [430e 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3c02 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [410e 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | [4064 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [430f 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c03 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fab00 gate 1574140991602818500 evaluation starts +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [4065 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4310 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 principal evaluation fails +peer1.org1.example.com | [3c04 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fab00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [410f 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | [4066 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4311 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 gate 1574140987319108900 evaluation fails +peer1.org1.example.com | [3c05 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fab00 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4312 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c06 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fab00 principal matched by identity 0 +peer1.org2.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer0.org2.example.com | [4068 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4313 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c07 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | [4069 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4314 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [406a 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4315 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 gate 1574140987320011000 evaluation starts +peer1.org1.example.com | [3c08 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org2.example.com | [4110 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [406b 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4316 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org2.example.com | [4111 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [406c 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4317 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org2.example.com | [4112 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [406d 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4318 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 principal matched by identity 0 +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org2.example.com | [4113 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [406e 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4319 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org2.example.com | [4114 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [406f 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [3c09 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fab00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4115 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4070 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [431a 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | [3c0a 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fab00 gate 1574140991602818500 evaluation succeeds +peer1.org2.example.com | [4116 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4071 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4117 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4072 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer1.org1.example.com | [3c0c 11-19 05:23:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4118 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383cf10 gate 1574140992159285300 evaluation starts +peer0.org2.example.com | [4073 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | [3c0d 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4119 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383cf10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4074 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [3c0e 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [411a 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383cf10 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4075 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [431b 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c0f 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [411b 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383cf10 principal matched by identity 0 +peer0.org2.example.com | [4076 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [431c 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 gate 1574140987320011000 evaluation succeeds +peer1.org1.example.com | [3c10 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [411c 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | [4077 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [431d 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c11 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [4078 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [431e 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c12 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [411d 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | [4079 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [431f 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c13 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | [407a 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4320 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c14 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | [407b 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4321 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer1.org1.example.com | [3c15 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [407c 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4322 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer1.org1.example.com | [3c16 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [407d 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4323 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [411e 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383cf10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c17 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [407e 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4324 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [411f 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383cf10 gate 1574140992159285300 evaluation succeeds +peer1.org1.example.com | [3c18 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [407f 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4325 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4120 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c19 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4326 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4080 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4121 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c1a 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fbf00 gate 1574140991619096300 evaluation starts +peer0.org1.example.com | [4327 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4081 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4122 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c1b 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fbf00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4328 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4082 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4123 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c1c 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fbf00 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4329 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4083 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4124 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c1d 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fbf00 principal matched by identity 0 +peer0.org1.example.com | [432a 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4084 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4125 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c1e 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | [432b 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [4085 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4126 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [432c 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4086 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4127 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c1f 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | [432d 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4087 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4128 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Obtaining identity +peer0.org2.example.com | [4088 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4129 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer0.org1.example.com | [432f 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4089 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [412a 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | [4330 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [408a 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [412b 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [4331 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [408b 11-19 05:23:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [412c 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041540a0 gate 1574140992160337700 evaluation starts +peer1.org1.example.com | [3c20 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fbf00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4332 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [408c 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [412d 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041540a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c21 11-19 05:23:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fbf00 gate 1574140991619096300 evaluation succeeds +peer0.org1.example.com | [4333 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [408d 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [412e 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041540a0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3c22 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4334 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [408e 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [412f 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041540a0 principal matched by identity 0 +peer1.org1.example.com | [3c23 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4335 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [408f 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4130 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | [3c24 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4336 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4090 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [3c25 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4337 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4091 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4131 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | [3c26 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | [4338 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4092 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [4339 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4093 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | [3c27 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | [433a 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4094 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | [433b 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4095 11-19 05:23:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | [433c 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [4096 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer1.org2.example.com | [4132 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041540a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | [433d 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4097 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer1.org2.example.com | [4133 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041540a0 gate 1574140992160337700 evaluation succeeds +peer1.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [4098 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [433e 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4134 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c28 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | [4099 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510111801 +peer0.org1.example.com | [433f 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4135 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [409a 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 443EFF2ED7F1E0D10FD4EC5B019DF47BB273C9926B3C75BE4002FF57058FB9FB +peer0.org1.example.com | [4340 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4136 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c29 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | [409b 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org1.example.com | [4341 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4137 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | [409c 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4342 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4138 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | [409d 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4343 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | [409e 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4344 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 gate 1574140987481915800 evaluation starts +peer1.org2.example.com | [4139 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [409f 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4345 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | [3c2a 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a0 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4346 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | [3c2b 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a1 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4347 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | [3c2c 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [40a2 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4348 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 principal evaluation fails +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3c2d 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40a3 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [4349 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 gate 1574140987481915800 evaluation fails +peer1.org2.example.com | [413a 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c2e 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40a4 11-19 05:23:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [434a 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [413b 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c2f 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [40a5 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [434b 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [413c 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c30 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [434c 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [40a6 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [413d 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c31 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [434d 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 gate 1574140987482484100 evaluation starts +peer0.org2.example.com | [40a7 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [413e 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c32 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b5fd0 gate 1574140991622309300 evaluation starts +peer0.org1.example.com | [434e 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40a8 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [413f 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c33 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b5fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [434f 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [40a9 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org2.example.com | [4140 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c34 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b5fd0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4350 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 principal matched by identity 0 +peer0.org2.example.com | [40aa 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 26 a1 56 2b 9f f3 38 74 39 c9 30 b8 04 ae ec |.&.V+..8t9.0....| +peer1.org2.example.com | [4141 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c35 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b5fd0 principal matched by identity 0 +peer0.org1.example.com | [4351 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer0.org2.example.com | 00000010 46 cf 86 f9 f9 0b 7a 6a bb e0 be 82 8b f1 9e f9 |F.....zj........| +peer1.org2.example.com | [4142 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c36 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer0.org2.example.com | [40ab 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 e7 50 6c e2 48 56 8c 18 12 7c bb |0D. 6.Pl.HV...|.| +peer1.org2.example.com | [4143 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [4352 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer0.org2.example.com | 00000010 d2 07 3b b6 a2 f7 f9 53 8b 8e 2d a7 0d 88 07 8c |..;....S..-.....| +peer1.org2.example.com | [4144 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c37 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer0.org2.example.com | 00000020 57 50 f7 0b 02 20 6e 00 5b f4 95 b4 15 a1 8a cc |WP... n.[.......| +peer1.org2.example.com | [4145 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155b30 gate 1574140992161879900 evaluation starts +peer1.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer0.org2.example.com | 00000030 5f 5c 9e 38 ee c0 d3 88 80 1a f6 2f 2f 81 d8 77 |_\.8.......//..w| +peer1.org2.example.com | [4146 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155b30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer0.org2.example.com | 00000040 a1 f8 9e cd ce 43 |.....C| +peer1.org2.example.com | [4147 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155b30 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer0.org2.example.com | [40ac 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4148 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155b30 principal matched by identity 0 +peer1.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [4353 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [40ad 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4149 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer1.org1.example.com | [3c38 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b5fd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4354 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 gate 1574140987482484100 evaluation succeeds +peer0.org2.example.com | [40ae 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer1.org1.example.com | [3c39 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b5fd0 gate 1574140991622309300 evaluation succeeds +peer0.org1.example.com | [4355 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [40af 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [414a 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer1.org1.example.com | [3c3a 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4356 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [40b0 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer1.org1.example.com | [3c3b 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4357 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [40b1 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer1.org1.example.com | [3c3c 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4358 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [40b2 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer1.org1.example.com | [3c3d 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4359 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40b3 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer1.org1.example.com | [3c3e 11-19 05:23:11.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [435a 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [40b4 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [414b 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155b30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c3f 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [435b 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [40b5 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [414c 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155b30 gate 1574140992161879900 evaluation succeeds +peer1.org1.example.com | [3c40 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [435c 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [40b6 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [414d 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c41 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [435d 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [40b7 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [414e 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c42 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [435e 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b8 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [414f 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c43 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [435f 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b9 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4150 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c44 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4360 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40ba 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4151 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c45 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4361 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [40bb 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4152 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c46 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4362 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40bc 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c47 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [4153 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4363 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40bd 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3c48 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [4154 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4364 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40be 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3c49 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [4155 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4365 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [40bf 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c4a 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4156 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [40c0 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4366 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > alive: +peer1.org1.example.com | [3c4b 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [4157 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [40c1 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4367 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c4c 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4158 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [40c2 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4368 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c4d 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [4159 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ecc0 gate 1574140992167652000 evaluation starts +peer0.org2.example.com | [40c3 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4369 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c4e 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [415a 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ecc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40c4 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [436a 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c4f 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [415b 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ecc0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [436b 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40c5 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3c50 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [415c 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ecc0 principal matched by identity 0 +peer0.org1.example.com | [436c 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40c6 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c51 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [415d 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | [436d 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [40c7 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c52 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [436e 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [40c8 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c53 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [415e 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | [436f 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [40c9 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c54 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | [4370 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40ca 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c55 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | [4371 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [40cb 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer1.org1.example.com | [3c56 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | [4372 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [40cc 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c57 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [4373 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org2.example.com | [40cd 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c58 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [415f 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ecc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4374 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40ce 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c59 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4160 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ecc0 gate 1574140992167652000 evaluation succeeds +peer0.org1.example.com | [4375 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [40cf 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4161 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c5a 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4376 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d0 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4162 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c5b 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4377 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d1 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4163 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c5c 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4378 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d2 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4164 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c5d 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4379 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d3 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042de9a0 gate 1574140985782252900 evaluation starts +peer1.org2.example.com | [4165 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer1.org1.example.com | [3c5e 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [437a 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d4 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042de9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer1.org1.example.com | [3c5f 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [437b 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d5 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042de9a0 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [4166 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer1.org1.example.com | [3c60 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [437c 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d6 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042de9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP. DEBU Exiting +peer0.org1.example.com | [437d 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d7 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042de9a0 principal evaluation fails +peer1.org2.example.com | 00000020 cb b3 a9 15 1f 02 20 3b 3e a8 9e 2d 79 ba fd 5a |...... ;>..-y..Z| +peer1.org1.example.com | [3c62 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [437e 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [40d8 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042de9a0 gate 1574140985782252900 evaluation fails +peer1.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer1.org1.example.com | [3c63 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [437f 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40d9 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer1.org1.example.com | [3c64 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4380 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [40da 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4167 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer1.org1.example.com | [3c65 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4381 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [40db 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer1.org1.example.com | [3c66 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4382 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40dc 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042def10 gate 1574140985782787900 evaluation starts +peer1.org2.example.com | [4168 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer1.org1.example.com | [3c67 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4383 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [40dd 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042def10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer1.org1.example.com | [3c68 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4384 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [40de 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042def10 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer1.org1.example.com | [3c69 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4385 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40df 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042def10 principal matched by identity 0 +peer1.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer1.org1.example.com | [3c6a 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [4386 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [40e0 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e f6 38 dc 7f 49 48 7e 53 65 ae 5a 54 9d f3 5a |^.8..IH~Se.ZT..Z| +peer1.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer1.org1.example.com | [3c6b 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4387 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 10 80 20 3e cf 0d 61 70 d8 3c 8f 2a 9e f8 f0 c3 |.. >..ap.<.*....| +peer1.org2.example.com | [4169 11-19 05:23:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c6c 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4388 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40e1 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 c9 ef 71 5f 4d 4f c3 b3 95 07 |0E.!....q_MO....| +peer1.org2.example.com | [416a 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c6d 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4389 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 97 82 bb 70 b3 2e 97 32 81 c2 cb 2f 70 51 42 7e |...p...2.../pQB~| +peer1.org2.example.com | [416b 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c6e 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [438a 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 8d 83 d5 42 ca 02 20 10 75 87 31 59 07 0b 80 32 |...B.. .u.1Y...2| +peer1.org2.example.com | [416c 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3c6f 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [438b 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000030 6b c2 b5 98 82 75 bc 16 e5 27 e7 cd 41 7c 8d 86 |k....u...'..A|..| +peer1.org2.example.com | [416d 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c70 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [438c 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 gate 1574140987844630400 evaluation starts +peer0.org2.example.com | 00000040 e0 9a ba b0 1e ba 9c |.......| +peer1.org2.example.com | [416e 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [438d 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c71 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [40e2 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042def10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [416f 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [438e 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3c72 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40e3 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042def10 gate 1574140985782787900 evaluation succeeds +peer1.org2.example.com | [4170 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [438f 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c73 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4171 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40e4 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4390 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 principal evaluation fails +peer1.org1.example.com | [3c74 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4172 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [40e5 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4391 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 gate 1574140987844630400 evaluation fails +peer1.org1.example.com | [3c75 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4173 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [40e6 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4392 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c76 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4174 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40e7 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4393 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c77 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c380 gate 1574140991855217200 evaluation starts +peer1.org2.example.com | [4175 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:38162 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [40e8 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4394 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c78 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c380 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4176 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40e9 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4395 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 gate 1574140987844893400 evaluation starts +peer1.org1.example.com | [3c79 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c380 processing identity 0 with bytes of 1151ae0 +peer1.org2.example.com | [4177 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [40ea 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4396 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c7a 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c380 principal matched by identity 0 +peer1.org2.example.com | [4178 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [40eb 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4397 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3c7b 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e0 a2 fa cb 47 0a b5 7a 5b 9c 92 8d 7e 08 a4 |.....G..z[...~..| +peer1.org2.example.com | [4179 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40ec 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4398 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 principal matched by identity 0 +peer1.org1.example.com | 00000010 92 76 fc 7f 1a 1f e4 0f 00 32 da af a1 dc 8c 54 |.v.......2.....T| +peer1.org2.example.com | [417a 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [40ed 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4399 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 7e ba 35 e2 56 b6 37 64 56 45 51 0f 24 7d a3 |.~.5.V.7dVEQ.$}.| +peer1.org1.example.com | [3c7c 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 72 cd 43 d4 2c ed 46 dd 83 26 90 |0D. .r.C.,.F..&.| +peer1.org2.example.com | [417b 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40ee 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 4f 7c db 5c 8f fe 61 22 ba fb f7 84 87 8f eb 7f |O|.\..a"........| +peer1.org1.example.com | 00000010 14 b4 87 28 b9 23 83 61 3c f9 ee b4 cd fe 4e 7a |...(.#.a<.....Nz| +peer1.org2.example.com | [417c 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40ef 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [439a 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b c7 da 1d 4c 2f 53 2d f8 25 9d 00 |0D. K...L/S-.%..| +peer1.org1.example.com | 00000020 bb ed 9c 0e 02 20 17 4e 4c 34 4f 80 10 27 6d 68 |..... .NL4O..'mh| +peer1.org2.example.com | [417d 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [40f0 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 b2 be 4f 35 19 b6 3c f5 b1 33 2e c4 16 69 62 ef |..O5..<..3...ib.| +peer1.org1.example.com | 00000030 33 64 93 d0 90 22 f2 af 8e b3 e9 e2 0e 99 53 fa |3d..."........S.| +peer1.org2.example.com | [417e 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [40f1 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 bc 01 d5 17 02 20 68 eb 07 98 1b 84 a1 17 79 eb |..... h.......y.| +peer1.org1.example.com | 00000040 c5 f6 ff eb 1c cb |......| +peer1.org2.example.com | [417f 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [40f2 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 c5 40 da 93 42 9a b9 f5 c2 88 76 16 7a 7a 9e 8c |.@..B.....v.zz..| +peer1.org1.example.com | [3c7d 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c380 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4180 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d080 gate 1574140992937418700 evaluation starts +peer0.org2.example.com | [40f3 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 4a 8e 9d 82 0e 93 |J.....| +peer1.org1.example.com | [3c7e 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c380 gate 1574140991855217200 evaluation succeeds +peer1.org2.example.com | [4181 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d080 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40f4 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c7f 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4182 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d080 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [40f5 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [439b 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c80 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4183 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d080 principal matched by identity 0 +peer0.org2.example.com | [40f6 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [439c 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 gate 1574140987844893400 evaluation succeeds +peer1.org1.example.com | [3c81 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4184 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c f3 18 66 18 31 22 dd 55 ee d9 e8 ff 54 c1 d9 ||..f.1".U....T..| +peer0.org2.example.com | [40f7 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [439d 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c82 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 07 75 fb 0b d2 45 8d 06 95 c1 63 c1 7f df 8e 6e |.u...E....c....n| +peer0.org2.example.com | [40f8 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [439e 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c83 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4185 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 80 be 46 41 9d f5 39 7c be 5f 98 |0D. ...FA..9|._.| +peer0.org2.example.com | [40f9 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [439f 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c84 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | 00000010 2f 17 7a 3e ce 20 21 a7 d3 20 1e fa 74 e8 6e a0 |/.z>. !.. ..t.n.| +peer0.org2.example.com | [40fa 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [43a0 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c85 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000020 c2 a6 62 9a 02 20 3c fc ca 9c 2b 4b 7e ac 27 3a |..b.. <...+K~.':| +peer0.org2.example.com | [40fb 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43a1 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3c86 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000030 9b b8 ce 42 a4 1a 28 3d 13 7f b1 6c de cb 36 05 |...B..(=...l..6.| +peer0.org2.example.com | [40fc 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43a2 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3c87 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | 00000040 e3 e3 ed a1 83 d2 |......| +peer0.org2.example.com | [40fd 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [43a3 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3c88 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4186 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d080 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [40fe 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [43a4 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3c89 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4187 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d080 gate 1574140992937418700 evaluation succeeds +peer0.org2.example.com | [40ff 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43a5 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3c8a 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4188 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4100 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [43a6 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c8b 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org2.example.com | [4189 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4101 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [43a7 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c8c 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [418a 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4102 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [43a8 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c8d 11-19 05:23:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [418b 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4103 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43a9 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer1.org1.example.com | [3c8e 11-19 05:23:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [418c 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4104 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43aa 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c8f 11-19 05:23:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [418d 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4105 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [43ab 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [418e 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3c90 11-19 05:23:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [4106 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43ac 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [418f 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3c91 11-19 05:23:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [4107 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [43ad 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4190 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3c92 11-19 05:23:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4108 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151038 +peer1.org2.example.com | [4191 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c93 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [43ae 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > alive: +peer0.org2.example.com | [4109 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 861A1A579C7E178E27DD4D8F1C134068FD9FDFD67FAC09C06642083844F8BB02 +peer1.org2.example.com | [4192 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c94 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43af 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [410a 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4193 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c95 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43b0 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4194 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [410b 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3c96 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43b1 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4195 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [410c 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [3c97 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43b2 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4196 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [410d 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3c98 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [43b3 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4197 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [410e 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c99 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [43b4 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4198 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [410f 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c9a 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43b5 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4199 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > alive:" signature:"0D\002 X\371\327>f<\341'\275\366\334\232\237{u\035\003?z\234#\3549\206\317c74\024\301:N\002 b\030;^~\225\r\205\226\206\316`!\314]\333\017\320\270\317(U1\342\345\274\355N\231\234\305\036" > +peer0.org2.example.com | [4110 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3c9b 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43b6 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [419a 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [4111 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c9c 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43b7 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [419b 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4112 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3c9d 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43b8 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [419c 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4113 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c9e 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [43b9 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [419d 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4114 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3c9f 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...B8DA120C08A8DBCACDDF999EEC151040 +peer0.org1.example.com | [43ba 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [419e 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.9:56090 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org2.example.com | [4115 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ca0 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7CF31866183122DD55EED9E8FF54C1D90775FB0BD2458D0695C163C17FDF8E6E +peer0.org1.example.com | [43bb 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [419f 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4116 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ca1 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [43bc 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4117 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ca2 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [43bd 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" secret_envelope:|\254$\264N&t\326N\275 \306\222\322\376Ra\265\255\315=\231Y\302\276Yg\321\3632\353" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [4118 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ca3 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [43be 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4119 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ca4 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" secret_envelope:\3048\271\372\232\321y@~8\317\037\215\252t\370\026b\352\370\271" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [43bf 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" secret_envelope:|\254$\264N&t\326N\275 \306\222\322\376Ra\265\255\315=\231Y\302\276Yg\321\3632\353" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [411a 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ca5 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43c0 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [411b 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ca6 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [43c1 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 f1 65 c4 d6 ae b1 02 42 9b 90 fa 0d 90 c1 e5 |..e.....B.......| +peer0.org2.example.com | [411c 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ca7 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 09 f5 72 3f 2b df 03 dd fe 7e 70 54 55 ec a5 9b |..r?+....~pTU...| +peer0.org2.example.com | [411d 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ca8 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [43c2 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 d0 ba e6 d9 d5 a7 bd cc 56 79 f6 |0D. y........Vy.| +peer0.org2.example.com | [411e 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ca9 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" secret_envelope:\3048\271\372\232\321y@~8\317\037\215\252t\370\026b\352\370\271" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 47 76 c8 55 4e 5e 54 cf 7a 26 ab 4b d6 ac 3b 7e |Gv.UN^T.z&.K..;~| +peer0.org2.example.com | [411f 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | [3caa 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 d0 99 b1 d3 02 20 2a 1c ae d1 1a ad c3 a9 45 d7 |..... *.......E.| +peer0.org2.example.com | [4120 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 1a 1a 57 9c 7e 17 8e 27 dd 4d 8f 1c 13 40 68 |...W.~..'.M...@h| +peer1.org1.example.com | [3cab 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 6c 61 fd 14 68 e0 4e d3 f2 81 ec 56 44 63 00 fd |la..h.N....VDc..| +peer0.org2.example.com | 00000010 fd 9f df d6 7f ac 09 c0 66 42 08 38 44 f8 bb 02 |........fB.8D...| +peer1.org1.example.com | [3cac 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cad 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 d1 86 09 64 92 a1 |...d..| +peer0.org1.example.com | [43c3 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [4121 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 82 cf 91 e4 e0 ca 0f 6f 9c e4 b1 |0D. 6.......o...| +peer1.org1.example.com | [3cae 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | 00000010 e6 56 4d 3d 09 5f a7 67 0c 33 74 af c9 28 9c dd |.VM=._.g.3t..(..| +peer1.org1.example.com | [3caf 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [43c4 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 88 2a 18 bb 28 9e b8 5d 28 4c 17 |0D. Y.*..(..](L.| +peer0.org2.example.com | 00000020 ef df d4 34 02 20 37 f8 fb a5 76 70 b6 93 cd 3b |...4. 7...vp...;| +peer1.org1.example.com | [3cb0 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 bb 43 65 82 04 13 16 cb d6 97 2f 1d c5 7b 69 8e |.Ce......./..{i.| +peer0.org2.example.com | 00000030 23 b2 27 cd 88 dc b8 0a 1f 03 ba e9 72 be 90 a7 |#.'.........r...| +peer1.org1.example.com | [3cb1 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 58 48 7e a2 02 20 3e 7c ac 24 b4 4e 26 74 d6 4e |XH~.. >|.$.N&t.N| +peer0.org2.example.com | 00000040 80 b4 f7 d3 92 9d |......| +peer1.org1.example.com | [3cb2 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 bd 20 c6 92 d2 fe 52 61 b5 ad cd 3d 99 59 c2 be |. ....Ra...=.Y..| +peer0.org2.example.com | [4122 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3cb3 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | 00000040 59 67 d1 f3 32 eb |Yg..2.| +peer0.org2.example.com | [4123 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cb4 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [43c5 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4124 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3cb5 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c f3 18 66 18 31 22 dd 55 ee d9 e8 ff 54 c1 d9 ||..f.1".U....T..| +peer0.org1.example.com | [43c6 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [4125 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 07 75 fb 0b d2 45 8d 06 95 c1 63 c1 7f df 8e 6e |.u...E....c....n| +peer0.org1.example.com | [43c7 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4126 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cb6 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [43c8 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4127 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3cb7 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 80 be 46 41 9d f5 39 7c be 5f 98 |0D. ...FA..9|._.| +peer0.org1.example.com | [43c9 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4128 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer1.org1.example.com | 00000010 2f 17 7a 3e ce 20 21 a7 d3 20 1e fa 74 e8 6e a0 |/.z>. !.. ..t.n.| +peer0.org1.example.com | [43ca 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4129 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 1a 1a 57 9c 7e 17 8e 27 dd 4d 8f 1c 13 40 68 |...W.~..'.M...@h| +peer1.org1.example.com | 00000020 c2 a6 62 9a 02 20 3c fc ca 9c 2b 4b 7e ac 27 3a |..b.. <...+K~.':| +peer0.org1.example.com | [43cb 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 fd 9f df d6 7f ac 09 c0 66 42 08 38 44 f8 bb 02 |........fB.8D...| +peer1.org1.example.com | 00000030 9b b8 ce 42 a4 1a 28 3d 13 7f b1 6c de cb 36 05 |...B..(=...l..6.| +peer0.org1.example.com | [43cc 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [412a 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 82 cf 91 e4 e0 ca 0f 6f 9c e4 b1 |0D. 6.......o...| +peer1.org1.example.com | 00000040 e3 e3 ed a1 83 d2 |......| +peer0.org1.example.com | [43cd 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | 00000010 e6 56 4d 3d 09 5f a7 67 0c 33 74 af c9 28 9c dd |.VM=._.g.3t..(..| +peer1.org1.example.com | [3cb8 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | [43ce 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 ef df d4 34 02 20 37 f8 fb a5 76 70 b6 93 cd 3b |...4. 7...vp...;| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [43cf 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 23 b2 27 cd 88 dc b8 0a 1f 03 ba e9 72 be 90 a7 |#.'.........r...| +peer1.org1.example.com | [3cb9 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 0e 78 00 fa 61 c8 b0 3a 02 d9 b2 |0D. ..x..a..:...| +peer0.org1.example.com | [43d0 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000040 80 b4 f7 d3 92 9d |......| +peer1.org1.example.com | 00000010 17 84 4e 46 64 cb 94 d3 7a 74 35 ef 9c 9b aa eb |..NFd...zt5.....| +peer0.org1.example.com | [43d1 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" secret_envelope:|\254$\264N&t\326N\275 \306\222\322\376Ra\265\255\315=\231Y\302\276Yg\321\3632\353" > > alive: +peer0.org2.example.com | [412b 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000020 d5 42 30 ab 02 20 30 45 29 9b f5 cc 46 fe 22 e5 |.B0.. 0E)...F.".| +peer0.org1.example.com | [43d2 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [412c 11-19 05:23:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 3e c4 38 b9 fa 9a d1 79 40 7e 38 cf 1f 8d aa 74 |>.8....y@~8....t| +peer0.org1.example.com | [43d3 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [412d 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 f8 16 62 ea f8 b9 |..b...| +peer0.org1.example.com | [43d4 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45776 +peer0.org2.example.com | [412e 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3cba 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [43d5 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003f5c460 +peer0.org2.example.com | [412f 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cbb 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [43d6 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [4130 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cbc 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43d7 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [4131 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cbd 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43d8 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org2.example.com | [4132 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cbe 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43d9 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [4133 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cbf 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:51680 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [43da 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 f8 48 a0 a2 c5 4b 2a 93 17 fd e2 cd 8c a2 69 |..H...K*.......i| +peer0.org2.example.com | [4134 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cc0 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 21 a3 80 27 5d 70 eb dd cb 18 c3 7c ef 59 0d cc |!..']p.....|.Y..| +peer0.org2.example.com | [4135 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer1.org1.example.com | [3cc1 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [43db 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 a4 75 6a 11 e1 82 42 49 5e a2 |0E.!...uj...BI^.| +peer0.org2.example.com | [4136 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cc2 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer0.org1.example.com | 00000010 d1 54 8a 51 a6 2e 17 89 0c 94 fa 22 db 46 f8 ff |.T.Q.......".F..| +peer0.org2.example.com | [4137 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer0.org1.example.com | 00000020 8f a8 4e 6b 00 02 20 2b 2c d4 36 6d 8e 28 5a 28 |..Nk.. +,.6m.(Z(| +peer0.org2.example.com | [4138 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cc3 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer0.org1.example.com | 00000030 66 2b 20 b9 64 22 7d e9 64 db f7 0c 83 6f cb 41 |f+ .d"}.d....o.A| +peer0.org2.example.com | [4139 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer0.org1.example.com | 00000040 c7 34 77 e7 3e 05 4b |.4w.>.K| +peer0.org2.example.com | [413a 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer1.org1.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer0.org1.example.com | [43dc 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [413b 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer0.org1.example.com | [43dd 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003527180, header 0xc003f5c870 +peer0.org2.example.com | [413c 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer0.org1.example.com | [43de 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [413d 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cc4 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [43df 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][3701af05] processing txid: 3701af0596581299c94979206d3a8f011ce5fe5d78d191ebddb773279bf98998 +peer0.org2.example.com | [413e 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cc5 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43e0 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][3701af05] Entry chaincode: name:"cscc" +peer0.org2.example.com | [413f 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3cc6 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [43e1 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> INFO [][3701af05] Entry chaincode: name:"cscc" +peer0.org2.example.com | [4140 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3cc7 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43e2 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [4141 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [43e3 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org1.example.com | [3cc8 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4142 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004332e50 gate 1574140986862723700 evaluation starts +peer1.org1.example.com | [3cc9 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43e4 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 f8 48 a0 a2 c5 4b 2a 93 17 fd e2 cd 8c a2 69 |..H...K*.......i| +peer0.org2.example.com | [4143 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004332e50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cca 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 21 a3 80 27 5d 70 eb dd cb 18 c3 7c ef 59 0d cc |!..']p.....|.Y..| +peer0.org2.example.com | [4144 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004332e50 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3ccb 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [43e5 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 a4 75 6a 11 e1 82 42 49 5e a2 |0E.!...uj...BI^.| +peer0.org2.example.com | [4145 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004332e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [3ccc 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 d1 54 8a 51 a6 2e 17 89 0c 94 fa 22 db 46 f8 ff |.T.Q.......".F..| +peer1.org1.example.com | [3ccd 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 8f a8 4e 6b 00 02 20 2b 2c d4 36 6d 8e 28 5a 28 |..Nk.. +,.6m.(Z(| +peer1.org1.example.com | [3cce 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b963c0 gate 1574140992965699500 evaluation starts +peer0.org1.example.com | 00000030 66 2b 20 b9 64 22 7d e9 64 db f7 0c 83 6f cb 41 |f+ .d"}.d....o.A| +peer0.org2.example.com | [4146 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004332e50 principal evaluation fails +peer1.org1.example.com | [3ccf 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b963c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 c7 34 77 e7 3e 05 4b |.4w.>.K| +peer0.org2.example.com | [4147 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004332e50 gate 1574140986862723700 evaluation fails +peer1.org1.example.com | [3cd0 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b963c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [43e6 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [3701af05] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [4148 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3cd1 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b963c0 principal matched by identity 0 +peer0.org1.example.com | [43e7 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [3701af05] notifying Txid:3701af0596581299c94979206d3a8f011ce5fe5d78d191ebddb773279bf98998, channelID: +peer0.org2.example.com | [4149 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3cd2 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e0 a2 fa cb 47 0a b5 7a 5b 9c 92 8d 7e 08 a4 |.....G..z[...~..| +peer0.org1.example.com | [43e8 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [414a 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 92 76 fc 7f 1a 1f e4 0f 00 32 da af a1 dc 8c 54 |.v.......2.....T| +peer0.org1.example.com | [43e9 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> INFO [][3701af05] Exit chaincode: name:"cscc" (2ms) +peer0.org2.example.com | [414b 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043333c0 gate 1574140986863055800 evaluation starts +peer1.org1.example.com | [3cd3 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 72 cd 43 d4 2c ed 46 dd 83 26 90 |0D. .r.C.,.F..&.| +peer0.org1.example.com | [43ea 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][3701af05] Exit +peer0.org2.example.com | [414c 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043333c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 14 b4 87 28 b9 23 83 61 3c f9 ee b4 cd fe 4e 7a |...(.#.a<.....Nz| +peer0.org1.example.com | [43eb 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45776 +peer0.org2.example.com | [414d 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043333c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | 00000020 bb ed 9c 0e 02 20 17 4e 4c 34 4f 80 10 27 6d 68 |..... .NL4O..'mh| +peer0.org1.example.com | [43ec 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45776 grpc.code=OK grpc.call_duration=10.1217ms +peer0.org2.example.com | [414e 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043333c0 principal matched by identity 0 +peer1.org1.example.com | 00000030 33 64 93 d0 90 22 f2 af 8e b3 e9 e2 0e 99 53 fa |3d..."........S.| +peer0.org1.example.com | [43ed 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [414f 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer1.org1.example.com | 00000040 c5 f6 ff eb 1c cb |......| +peer0.org1.example.com | [43ee 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +peer0.org2.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer1.org1.example.com | [3cd4 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b963c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [43ef 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +peer0.org2.example.com | [4150 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer1.org1.example.com | [3cd5 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b963c0 gate 1574140992965699500 evaluation succeeds +peer0.org1.example.com | [43f0 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer1.org1.example.com | [3cd6 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [43f1 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510121801 +peer0.org2.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer1.org1.example.com | [3cd7 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [43f2 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A439EE89422A49047C60338D20F58F0ED6FCEEEB10183ADAC1B971D82FF3F754 +peer0.org2.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer1.org1.example.com | [3cd8 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [43f3 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +peer0.org2.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer1.org1.example.com | [3cd9 11-19 05:23:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [43f4 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4151 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043333c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3cda 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [43f5 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151038 +peer0.org2.example.com | [4152 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043333c0 gate 1574140986863055800 evaluation succeeds +peer1.org1.example.com | [3cdb 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43f6 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CAAED8099B66F416708025AD57C06950F593D1BE052B0701E6167FEEF89CC28 +peer0.org2.example.com | [4153 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cdc 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [43f7 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4154 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cdd 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c f3 18 66 18 31 22 dd 55 ee d9 e8 ff 54 c1 d9 ||..f.1".U....T..| +peer0.org1.example.com | [43f8 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4155 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 07 75 fb 0b d2 45 8d 06 95 c1 63 c1 7f df 8e 6e |.u...E....c....n| +peer0.org1.example.com | [43f9 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | [4156 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3cde 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 80 be 46 41 9d f5 39 7c be 5f 98 |0D. ...FA..9|._.| +peer0.org1.example.com | [43fa 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [4157 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 2f 17 7a 3e ce 20 21 a7 d3 20 1e fa 74 e8 6e a0 |/.z>. !.. ..t.n.| +peer0.org1.example.com | [43fb 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4158 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000020 c2 a6 62 9a 02 20 3c fc ca 9c 2b 4b 7e ac 27 3a |..b.. <...+K~.':| +peer0.org1.example.com | [43fc 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4159 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000030 9b b8 ce 42 a4 1a 28 3d 13 7f b1 6c de cb 36 05 |...B..(=...l..6.| +peer0.org1.example.com | [43fd 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [415a 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000040 e3 e3 ed a1 83 d2 |......| +peer0.org1.example.com | [43fe 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [415b 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3cdf 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [43ff 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [415c 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ce0 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4400 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [415d 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ce1 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4401 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [415e 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ce2 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4402 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [415f 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer1.org1.example.com | [3ce3 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4403 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4160 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ce4 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4404 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4161 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ce5 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [4405 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4162 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ce6 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c f3 18 66 18 31 22 dd 55 ee d9 e8 ff 54 c1 d9 ||..f.1".U....T..| +peer0.org1.example.com | [4406 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4163 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 07 75 fb 0b d2 45 8d 06 95 c1 63 c1 7f df 8e 6e |.u...E....c....n| +peer0.org1.example.com | [4407 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4164 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > alive: alive: +peer1.org1.example.com | [3ce7 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 80 be 46 41 9d f5 39 7c be 5f 98 |0D. ...FA..9|._.| +peer0.org1.example.com | [4408 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4165 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 2f 17 7a 3e ce 20 21 a7 d3 20 1e fa 74 e8 6e a0 |/.z>. !.. ..t.n.| +peer0.org1.example.com | [4409 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4166 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 c2 a6 62 9a 02 20 3c fc ca 9c 2b 4b 7e ac 27 3a |..b.. <...+K~.':| +peer0.org1.example.com | [440a 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 9b b8 ce 42 a4 1a 28 3d 13 7f b1 6c de cb 36 05 |...B..(=...l..6.| +peer0.org1.example.com | [440b 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4167 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 e3 e3 ed a1 83 d2 |......| +peer0.org1.example.com | [440c 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4168 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ce8 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [440d 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4169 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [416a 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [440e 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [416b 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ce9 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [416c 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [440f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3cea 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [416d 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4410 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ceb 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [416e 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4411 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cec 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer0.org2.example.com | [416f 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [4412 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer0.org2.example.com | [4170 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4413 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer1.org1.example.com | [3ced 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer0.org2.example.com | [4171 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" secret_envelope:^(\004\333>\335\212\237\002 P99K\225\312\253\320\357U\201\203\n\366\037\225\305\325\367\257\321L\177\0207\234\200\326ik,Z" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4414 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer0.org2.example.com | [4172 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" secret_envelope:^(\004\333>\335\212\237\002 P99K\225\312\253\320\357U\201\203\n\366\037\225\305\325\367\257\321L\177\0207\234\200\326ik,Z" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4415 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer0.org2.example.com | [4173 11-19 05:23:07.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4416 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer0.org2.example.com | [4174 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" secret_envelope:^(\004\333>\335\212\237\002 P99K\225\312\253\320\357U\201\203\n\366\037\225\305\325\367\257\321L\177\0207\234\200\326ik,Z" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4417 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer0.org2.example.com | [4175 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [4418 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3cee 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4176 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer0.org1.example.com | [4419 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3cef 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer0.org1.example.com | [441a 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3cf0 11-19 05:23:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [4177 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer0.org1.example.com | [441b 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 gate 1574140990375035400 evaluation starts +peer1.org1.example.com | [3cf1 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer0.org1.example.com | [441c 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cf2 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer0.org1.example.com | [441d 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3cf3 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer0.org1.example.com | [441e 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3cf4 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer0.org1.example.com | [441f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 principal evaluation fails +peer1.org1.example.com | [3cf5 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4178 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [4420 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 gate 1574140990375035400 evaluation fails +peer1.org1.example.com | [3cf6 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [4421 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cf7 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4179 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 bb 03 85 59 df 4e a1 d4 0e 8b 05 |0D. p...Y.N.....| +peer0.org1.example.com | [4422 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cf8 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c134c0 gate 1574140992981288800 evaluation starts +peer0.org2.example.com | 00000010 da c7 6c 8a 5b 90 a8 0f 9d ac 24 3e 5e 28 04 db |..l.[.....$>^(..| +peer0.org1.example.com | [4423 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3cf9 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c134c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 3e dd 8a 9f 02 20 50 39 39 4b 95 ca ab d0 ef 55 |>.... P99K.....U| +peer0.org1.example.com | [4424 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 gate 1574140990375398600 evaluation starts +peer1.org1.example.com | [3cfa 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c134c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000030 81 83 0a f6 1f 95 c5 d5 f7 af d1 4c 7f 10 37 9c |...........L..7.| +peer0.org1.example.com | [4425 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cfb 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c134c0 principal matched by identity 0 +peer0.org2.example.com | 00000040 80 d6 69 6b 2c 5a |..ik,Z| +peer0.org1.example.com | [4426 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 processing identity 0 with bytes of 1151ae0 +peer1.org1.example.com | [3cfc 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer0.org2.example.com | [417a 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4427 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 principal matched by identity 0 +peer1.org1.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer0.org2.example.com | [417b 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [4428 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 10 c2 41 01 11 56 a1 91 b3 87 7f 5a 4f ae c8 |...A..V.....ZO..| +peer1.org1.example.com | [3cfd 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer0.org2.example.com | [417c 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000010 5d dc 05 04 e3 76 02 e9 90 6b b6 ff 44 9a 08 81 |]....v...k..D...| +peer1.org1.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer0.org2.example.com | [417d 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4429 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f9 d7 3e 66 3c e1 27 bd f6 dc 9a |0D. X..>f<.'....| +peer1.org1.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer0.org1.example.com | 00000010 9f 7b 75 1d 03 3f 7a 9c 23 ec 39 86 cf 63 37 34 |.{u..?z.#.9..c74| +peer0.org2.example.com | [417e 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU Exiting +peer1.org1.example.com | 00000040 67 7f cd d0 71 a4 |g...q.| +peer0.org1.example.com | 00000030 ce 60 21 cc 5d db 0f d0 b8 cf 28 55 31 e2 e5 bc |.`!.].....(U1...| +peer0.org2.example.com | [4180 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cfe 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c134c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 ed 4e 99 9c c5 1e |.N....| +peer0.org2.example.com | [4181 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cff 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c134c0 gate 1574140992981288800 evaluation succeeds +peer0.org1.example.com | [442a 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4182 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer1.org1.example.com | [3d00 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [442b 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 gate 1574140990375398600 evaluation succeeds +peer0.org2.example.com | [4183 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d01 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [442c 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4184 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d02 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [442d 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4185 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d03 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4186 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" secret_envelope:^(\004\333>\335\212\237\002 P99K\225\312\253\320\357U\201\203\n\366\037\225\305\325\367\257\321L\177\0207\234\200\326ik,Z" > > alive: +peer0.org1.example.com | [442e 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d04 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4187 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [442f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d05 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4188 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4430 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3d06 11-19 05:23:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4189 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4431 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [418a 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4432 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [418b 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4433 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [418c 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4434 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [418d 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4435 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [418e 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4436 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [418f 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4437 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4190 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4438 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4191 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4439 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4192 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [443a 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4193 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [443b 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4194 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [443c 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4195 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [443d 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4196 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [443e 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4197 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [443f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4198 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [4440 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4199 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4441 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [419a 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4442 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [419b 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4443 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [419c 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [4444 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [419d 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4445 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [419e 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4446 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [419f 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4447 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41a1 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer0.org1.example.com | [4448 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41a0 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4449 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41a2 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [444a 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41a3 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [444b 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41a4 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [444c 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41a5 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [444d 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [41a6 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer0.org1.example.com | [444e 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e ab 4d 25 44 be 79 41 27 8d 64 51 7e 10 02 bd |..M%D.yA'.dQ~...| +peer0.org2.example.com | [41a7 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 48 e0 12 2f b8 34 63 31 e4 89 7f 67 c0 1c cd 38 |H../.4c1...g...8| +peer0.org2.example.com | [41a8 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer0.org1.example.com | [444f 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 f0 53 a4 96 9d f4 da 16 9a 24 5c |0D. Y.S.......$\| +peer0.org2.example.com | [41a9 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 1f 91 4a e6 1f 04 00 5e a1 ca b0 36 63 26 cc 2b |..J....^...6c&.+| +peer0.org2.example.com | [41aa 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 25 ff 8e ec 02 20 5d 60 ae 8e 94 07 9f 79 de 0a |%.... ]`.....y..| +peer0.org2.example.com | [41ab 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 30 63 5d bd a7 84 26 5a c4 b9 e4 03 d2 79 76 a5 |0c]...&Z.....yv.| +peer0.org2.example.com | [41ac 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 81 6d f2 fd 19 4d |.m...M| +peer0.org2.example.com | [41ad 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41ae 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4450 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41af 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4451 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [41b0 11-19 05:23:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4452 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [41b1 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4453 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [41b2 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC151039 +peer0.org1.example.com | [4454 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [41b3 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B97EBA35E256B637645645510F247DA34F7CDB5C8FFE6122BAFBF784878FEB7F +peer0.org1.example.com | [4455 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41b4 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4456 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41b5 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4457 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41b6 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [4458 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [41b7 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4459 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [41b8 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [445a 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [41b9 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [445b 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [41ba 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [445c 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [445d 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [41bb 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [445e 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [41bc 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [445f 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41bd 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4460 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [41be 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4461 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41bf 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4462 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [41c0 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4463 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41c1 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4464 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41c2 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4465 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41c3 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4466 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41c4 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4467 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [41c5 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4468 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41c6 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [4469 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [41c7 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [446a 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41c8 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [446b 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41c9 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [446c 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41ca 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [446d 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [446e 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41cc 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [446f 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41cd 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4470 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41ce 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4471 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41cf 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8c80 gate 1574140987855868500 evaluation starts +peer0.org1.example.com | [4472 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41d0 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8c80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4473 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d1 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8c80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [41d2 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4474 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41cb 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4475 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d3 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4476 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41d4 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8c80 principal evaluation fails +peer0.org1.example.com | [4477 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d5 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8c80 gate 1574140987855868500 evaluation fails +peer0.org1.example.com | [4478 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d6 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4479 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d7 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [447a 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41d8 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [447b 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d9 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c91f0 gate 1574140987856898100 evaluation starts +peer0.org1.example.com | [447c 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [41da 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c91f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [447d 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41db 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c91f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [447e 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41dc 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c91f0 principal matched by identity 0 +peer0.org1.example.com | [447f 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41dd 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +peer0.org1.example.com | [4480 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +peer0.org1.example.com | [4481 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41de 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +peer0.org1.example.com | [4482 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +peer0.org1.example.com | [4483 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +peer0.org1.example.com | [4484 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +peer0.org1.example.com | [4485 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 d0 b2 50 fe ef 86 ca |..P....| +peer0.org1.example.com | [4486 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [41df 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c91f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4487 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [41e0 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c91f0 gate 1574140987856898100 evaluation succeeds +peer0.org1.example.com | [4488 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41e1 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41e2 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4489 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [41e3 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [448a 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41e4 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [448b 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41e5 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [448c 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41e6 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [448d 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [41e7 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [448e 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41e8 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 7e ba 35 e2 56 b6 37 64 56 45 51 0f 24 7d a3 |.~.5.V.7dVEQ.$}.| +peer0.org1.example.com | [448f 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 gate 1574140990817218000 evaluation starts +peer0.org2.example.com | 00000010 4f 7c db 5c 8f fe 61 22 ba fb f7 84 87 8f eb 7f |O|.\..a"........| +peer0.org1.example.com | [4490 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41e9 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b c7 da 1d 4c 2f 53 2d f8 25 9d 00 |0D. K...L/S-.%..| +peer0.org1.example.com | [4491 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 b2 be 4f 35 19 b6 3c f5 b1 33 2e c4 16 69 62 ef |..O5..<..3...ib.| +peer0.org1.example.com | [4492 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | 00000020 bc 01 d5 17 02 20 68 eb 07 98 1b 84 a1 17 79 eb |..... h.......y.| +peer0.org1.example.com | [4493 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 principal evaluation fails +peer0.org2.example.com | 00000030 c5 40 da 93 42 9a b9 f5 c2 88 76 16 7a 7a 9e 8c |.@..B.....v.zz..| +peer0.org1.example.com | [4494 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 gate 1574140990817218000 evaluation fails +peer0.org2.example.com | 00000040 4a 8e 9d 82 0e 93 |J.....| +peer0.org1.example.com | [4495 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41ea 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4496 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41eb 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4497 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [41ec 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4498 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 gate 1574140990817521400 evaluation starts +peer0.org2.example.com | [41ed 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [4499 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41ee 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer0.org1.example.com | [449a 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer0.org1.example.com | [449b 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 principal matched by identity 0 +peer0.org2.example.com | [41ef 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer0.org1.example.com | [449c 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fa 22 f8 cc 26 3e 3a 42 9f e3 0e ba b1 ce 5f |E."..&>:B......_| +peer0.org2.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer0.org1.example.com | 00000010 be 5d 6a 8a 4a 17 6c 01 16 8f 49 db dc 13 fc 4e |.]j.J.l...I....N| +peer0.org2.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer0.org1.example.com | [449d 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b bb 10 b1 72 e5 49 9e 39 67 bf |0E.!.....r.I.9g.| +peer0.org2.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer0.org1.example.com | 00000010 ef 3d 27 6f b8 06 63 b4 64 23 8c dd f0 cf 2c b3 |.='o..c.d#....,.| +peer0.org2.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer0.org1.example.com | 00000020 9a 98 09 f4 37 02 20 28 71 7b 35 93 91 85 81 99 |....7. (q{5.....| +peer0.org1.example.com | 00000030 d8 0b 55 fd 23 bc 98 c3 6b bc df 79 41 94 8e dc |..U.#...k..yA...| +peer0.org2.example.com | [41f0 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 8e 8e 92 57 6a 4a 1e |...WjJ.| +peer0.org2.example.com | [41f1 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [449e 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41f2 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [449f 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 gate 1574140990817521400 evaluation succeeds +peer0.org2.example.com | [41f3 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [44a0 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [41f4 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [44a1 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [41f5 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 7e ba 35 e2 56 b6 37 64 56 45 51 0f 24 7d a3 |.~.5.V.7dVEQ.$}.| +peer0.org1.example.com | [44a2 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 4f 7c db 5c 8f fe 61 22 ba fb f7 84 87 8f eb 7f |O|.\..a"........| +peer0.org1.example.com | [44a3 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [41f6 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b c7 da 1d 4c 2f 53 2d f8 25 9d 00 |0D. K...L/S-.%..| +peer0.org1.example.com | [44a4 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 b2 be 4f 35 19 b6 3c f5 b1 33 2e c4 16 69 62 ef |..O5..<..3...ib.| +peer0.org1.example.com | [44a5 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | 00000020 bc 01 d5 17 02 20 68 eb 07 98 1b 84 a1 17 79 eb |..... h.......y.| +peer0.org1.example.com | [44a6 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000030 c5 40 da 93 42 9a b9 f5 c2 88 76 16 7a 7a 9e 8c |.@..B.....v.zz..| +peer0.org1.example.com | [44a7 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000040 4a 8e 9d 82 0e 93 |J.....| +peer0.org1.example.com | [44a8 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [41f7 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41f8 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [44a9 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41f9 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44aa 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41fa 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [44ab 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41fb 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +peer0.org1.example.com | [44ac 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +peer0.org1.example.com | [44ad 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41fc 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +peer0.org1.example.com | [44ae 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +peer0.org1.example.com | [44af 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +peer0.org1.example.com | [44b0 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +peer0.org1.example.com | [44b1 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 95 e8 7d 5b f4 e5 10 |..}[...| +peer0.org1.example.com | [44b2 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41fd 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44b3 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [41fe 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41ff 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4200 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4201 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [4202 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4203 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [4204 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [4205 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 7e ba 35 e2 56 b6 37 64 56 45 51 0f 24 7d a3 |.~.5.V.7dVEQ.$}.| +peer0.org2.example.com | 00000010 4f 7c db 5c 8f fe 61 22 ba fb f7 84 87 8f eb 7f |O|.\..a"........| +peer0.org2.example.com | [4206 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b c7 da 1d 4c 2f 53 2d f8 25 9d 00 |0D. K...L/S-.%..| +peer0.org2.example.com | 00000010 b2 be 4f 35 19 b6 3c f5 b1 33 2e c4 16 69 62 ef |..O5..<..3...ib.| +peer0.org2.example.com | 00000020 bc 01 d5 17 02 20 68 eb 07 98 1b 84 a1 17 79 eb |..... h.......y.| +peer0.org2.example.com | 00000030 c5 40 da 93 42 9a b9 f5 c2 88 76 16 7a 7a 9e 8c |.@..B.....v.zz..| +peer0.org2.example.com | 00000040 4a 8e 9d 82 0e 93 |J.....| +peer0.org2.example.com | [4207 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [4208 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 80 98 e8 a9 da de c8 52 f5 98 |0E.!.........R..| +peer0.org2.example.com | 00000010 ff 5e 2c f1 c6 3f d2 2b d1 a5 7e df 7d 33 0b 7d |.^,..?.+..~.}3.}| +peer0.org2.example.com | 00000020 47 e9 f8 9b 15 02 20 5a 45 2a 20 fc be 84 44 ef |G..... ZE* ...D.| +peer0.org2.example.com | 00000030 7e 10 e6 26 1b 29 8a d7 2b b4 17 06 8e d0 e0 b5 |~..&.)..+.......| +peer0.org2.example.com | 00000040 08 a1 02 bb 7f dc bc |.......| +peer0.org2.example.com | [4209 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [420a 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [420b 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [420c 11-19 05:23:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [420d 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [420e 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [420f 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [44b4 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44b5 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [44b6 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44b7 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44b8 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44b9 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44ba 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44bb 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44bc 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44bd 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44be 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44bf 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44c0 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44c1 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44c2 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44c3 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45784 +peer0.org1.example.com | [44c4 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004316050 +peer0.org1.example.com | [44c5 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [44c6 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [44c7 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +peer0.org1.example.com | [44c8 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [44c9 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 81 6f e1 31 fe 15 61 41 03 27 50 0d 31 e7 93 |..o.1..aA.'P.1..| +peer0.org1.example.com | 00000010 4e 2b a5 33 70 a8 5f 60 bd 8e 02 16 f0 09 da 6c |N+.3p._`.......l| +peer0.org1.example.com | [44ca 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 d9 15 c2 70 51 b1 77 7c 91 44 12 |0D. ....pQ.w|.D.| +peer0.org1.example.com | 00000010 74 de 8a 9a 31 72 68 0d d8 41 a8 7d fa b2 21 60 |t...1rh..A.}..!`| +peer0.org1.example.com | 00000020 b0 e1 d9 25 02 20 60 83 b9 55 62 71 e5 68 05 b0 |...%. `..Ubq.h..| +peer0.org1.example.com | 00000030 cb da 9c b5 db ac 27 44 b9 40 7b 56 d8 38 83 85 |......'D.@{V.8..| +peer0.org1.example.com | 00000040 2d 1d e5 cb 3d 7e |-...=~| +peer0.org1.example.com | [44cb 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [44cc 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003527f80, header 0xc004316460 +peer0.org1.example.com | [44cd 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [44ce 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU [][6c97ea83] processing txid: 6c97ea83b812671201bdb1d555580c741ffb587961199e8796badacb879b6773 +peer0.org1.example.com | [44cf 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU [][6c97ea83] Entry chaincode: name:"qscc" +peer0.org1.example.com | [44d0 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> INFO [][6c97ea83] Entry chaincode: name:"qscc" +peer0.org1.example.com | [44d1 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [44d2 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [44d3 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [44d4 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [4210 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4211 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4212 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4213 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4214 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4215 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4216 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [4217 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [4218 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [4219 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [421a 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [421b 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [421c 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [421d 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [421e 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [421f 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4220 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4221 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4222 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004421250 gate 1574140987915961100 evaluation starts +peer0.org2.example.com | [4223 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004421250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4224 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004421250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4225 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004421250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4226 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004421250 principal evaluation fails +peer0.org2.example.com | [4227 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004421250 gate 1574140987915961100 evaluation fails +peer0.org2.example.com | [4228 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4229 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [422a 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [422b 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044217c0 gate 1574140987916221500 evaluation starts +peer0.org2.example.com | [422c 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044217c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [422d 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044217c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [422e 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044217c0 principal matched by identity 0 +peer0.org2.example.com | [422f 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [4230 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | [44d5 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [44d6 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [44d7 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [44d8 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44d9 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [44da 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 gate 1574140990861087200 evaluation starts +peer0.org1.example.com | [44db 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44dc 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [44dd 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [44de 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [44df 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [44e0 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151039 +peer0.org1.example.com | [44e1 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 06C2EAB0631716D57BA34E4F845B86C89B6BFBDA9689E7DE6ACCEED74854DEED +peer0.org1.example.com | [44e2 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [44e3 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [44e4 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [44e5 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [44e6 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44e7 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [44e8 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 principal matched by identity 0 +peer0.org1.example.com | [44e9 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 81 6f e1 31 fe 15 61 41 03 27 50 0d 31 e7 93 |..o.1..aA.'P.1..| +peer0.org1.example.com | 00000010 4e 2b a5 33 70 a8 5f 60 bd 8e 02 16 f0 09 da 6c |N+.3p._`.......l| +peer0.org1.example.com | [44ea 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 d9 15 c2 70 51 b1 77 7c 91 44 12 |0D. ....pQ.w|.D.| +peer0.org1.example.com | 00000010 74 de 8a 9a 31 72 68 0d d8 41 a8 7d fa b2 21 60 |t...1rh..A.}..!`| +peer0.org1.example.com | 00000020 b0 e1 d9 25 02 20 60 83 b9 55 62 71 e5 68 05 b0 |...%. `..Ubq.h..| +peer0.org1.example.com | 00000030 cb da 9c b5 db ac 27 44 b9 40 7b 56 d8 38 83 85 |......'D.@{V.8..| +peer0.org1.example.com | 00000040 2d 1d e5 cb 3d 7e |-...=~| +peer0.org1.example.com | [44eb 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [44ec 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44ed 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [44ee 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 gate 1574140990861087200 evaluation succeeds +peer0.org1.example.com | [44ef 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44f0 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44f1 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [44f2 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [44f3 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [44f4 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [44f7 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44f8 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU [6c97ea83] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [4231 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044217c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4232 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044217c0 gate 1574140987916221500 evaluation succeeds +peer0.org2.example.com | [4233 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4234 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4235 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4236 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4237 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4238 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4239 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [423a 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [423b 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [423c 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [423d 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [423e 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [423f 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e950 gate 1574140987916953500 evaluation starts +peer0.org2.example.com | [4240 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e950 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4241 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e950 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4242 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4243 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e950 principal evaluation fails +peer0.org2.example.com | [4244 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e950 gate 1574140987916953500 evaluation fails +peer0.org2.example.com | [4245 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4246 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4247 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4248 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443eec0 gate 1574140987917199700 evaluation starts +peer0.org2.example.com | [4249 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443eec0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [424a 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443eec0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [424b 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443eec0 principal matched by identity 0 +peer0.org2.example.com | [424c 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [424d 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [424e 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443eec0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [424f 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443eec0 gate 1574140987917199700 evaluation succeeds +peer0.org2.example.com | [4250 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4251 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4252 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [44f9 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU [6c97ea83] notifying Txid:6c97ea83b812671201bdb1d555580c741ffb587961199e8796badacb879b6773, channelID: +peer0.org1.example.com | [44f5 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [44fa 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44fc 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [44fb 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [44fe 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [44ff 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4500 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4501 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [44fd 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> INFO [][6c97ea83] Exit chaincode: name:"qscc" (14ms) +peer0.org1.example.com | [4502 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][6c97ea83] Exit +peer0.org1.example.com | [4503 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45784 +peer0.org1.example.com | [4504 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer0.org1.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer0.org1.example.com | [4505 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer0.org1.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer0.org1.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer0.org1.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer0.org1.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer0.org1.example.com | [4506 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45784 grpc.code=OK grpc.call_duration=19.365ms +peer0.org1.example.com | [44f6 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4507 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4508 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4509 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [450a 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [450b 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [450c 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [450d 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [450e 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [450f 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4510 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [4511 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer0.org1.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer0.org1.example.com | [4512 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer0.org1.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer0.org1.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer0.org1.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer0.org1.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer0.org1.example.com | [4513 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4514 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4515 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4516 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4253 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4254 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [4255 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [4256 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4257 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [4258 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [4259 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [425a 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [425b 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [425c 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [425d 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [425e 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [425f 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4260 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4261 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4262 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458a30 gate 1574140987919336600 evaluation starts +peer0.org2.example.com | [4263 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458a30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4264 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458a30 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4265 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4266 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458a30 principal evaluation fails +peer0.org2.example.com | [4267 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458a30 gate 1574140987919336600 evaluation fails +peer0.org2.example.com | [4268 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4269 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [426a 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [426b 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458fa0 gate 1574140987919585700 evaluation starts +peer0.org2.example.com | [426c 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [426d 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458fa0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [426e 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458fa0 principal matched by identity 0 +peer0.org2.example.com | [426f 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [4270 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [4271 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458fa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4272 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004458fa0 gate 1574140987919585700 evaluation succeeds +peer0.org2.example.com | [4273 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4274 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4275 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4276 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4277 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4278 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4279 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [427a 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [427b 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [427c 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [427d 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [427e 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [427f 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004474130 gate 1574140987920507400 evaluation starts +peer0.org2.example.com | [4280 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004474130 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4281 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004474130 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4282 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004474130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4283 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004474130 principal evaluation fails +peer0.org2.example.com | [4284 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004474130 gate 1574140987920507400 evaluation fails +peer0.org2.example.com | [4285 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4286 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4287 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4288 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044746a0 gate 1574140987920819100 evaluation starts +peer0.org2.example.com | [4289 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044746a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [428a 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044746a0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [428b 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044746a0 principal matched by identity 0 +peer0.org2.example.com | [428c 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [428d 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [428e 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044746a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [428f 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044746a0 gate 1574140987920819100 evaluation succeeds +peer0.org2.example.com | [4290 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4291 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4292 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4293 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4294 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [4295 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | [4517 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4518 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4519 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [451a 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [451b 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer0.org1.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer0.org1.example.com | [451c 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer0.org1.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer0.org1.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer0.org1.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer0.org1.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer0.org1.example.com | [451d 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [451e 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a6 8a 8f 61 5c f3 5e 77 d7 f2 19 |0D. &...a\.^w...| +peer0.org1.example.com | 00000010 82 40 d2 28 c7 52 85 5b 21 e7 b0 c2 64 39 75 8d |.@.(.R.[!...d9u.| +peer0.org1.example.com | 00000020 0b 58 33 20 02 20 2c 6d 95 89 23 4a d0 af f0 92 |.X3 . ,m..#J....| +peer0.org1.example.com | 00000030 e8 17 af e2 db b5 fd e8 24 ad 50 33 9b 43 14 1d |........$.P3.C..| +peer0.org1.example.com | 00000040 43 7b b0 6d 74 11 |C{.mt.| +peer0.org1.example.com | [451f 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4520 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4521 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4522 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4523 11-19 05:23:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4524 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4525 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4526 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [4527 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4529 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [452a 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4528 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [452b 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [452c 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [452d 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [452e 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [452f 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4530 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4531 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4532 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4533 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4534 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4535 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4536 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4537 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4538 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 gate 1574140991275428200 evaluation starts +peer0.org1.example.com | [4539 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [453a 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [453b 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [453c 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [453d 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 principal evaluation fails +peer0.org1.example.com | [453e 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 gate 1574140991275428200 evaluation fails +peer0.org1.example.com | [453f 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4540 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4541 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4542 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 gate 1574140991279759000 evaluation starts +peer0.org1.example.com | [4543 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4544 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4545 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 principal matched by identity 0 +peer0.org1.example.com | [4546 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [4547 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [4548 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4549 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 gate 1574140991279759000 evaluation succeeds +peer0.org1.example.com | [454a 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [454b 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [454c 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [454d 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [454e 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [454f 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [4550 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [4551 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [4552 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4553 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4554 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4555 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4556 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4557 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4558 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4559 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [455a 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 gate 1574140991288090900 evaluation starts +peer0.org1.example.com | [455b 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [455c 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [455d 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [455e 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 principal evaluation fails +peer0.org1.example.com | [455f 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 gate 1574140991288090900 evaluation fails +peer0.org1.example.com | [4560 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4561 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4562 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4563 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 gate 1574140991290387600 evaluation starts +peer0.org1.example.com | [4564 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4565 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4566 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 principal matched by identity 0 +peer0.org1.example.com | [4567 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [4568 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [4569 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [456a 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 gate 1574140991290387600 evaluation succeeds +peer0.org1.example.com | [456b 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [456c 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [456d 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [456e 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [456f 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4570 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4571 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4572 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4573 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4574 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4575 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4576 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4577 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4578 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4579 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [457a 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 gate 1574140991297374900 evaluation starts +peer0.org1.example.com | [457b 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [457c 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [457d 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [457e 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 principal evaluation fails +peer0.org1.example.com | [457f 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 gate 1574140991297374900 evaluation fails +peer0.org1.example.com | [4580 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4581 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4582 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4583 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 gate 1574140991299830500 evaluation starts +peer0.org1.example.com | [4584 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4585 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4586 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 principal matched by identity 0 +peer0.org1.example.com | [4587 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [4588 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [4589 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [458a 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 gate 1574140991299830500 evaluation succeeds +peer0.org1.example.com | [458b 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [458c 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [458d 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [458e 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [458f 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [4590 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [4591 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [4592 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [4593 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4594 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4595 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4596 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4597 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4598 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4599 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [459a 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [459b 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 gate 1574140991306475900 evaluation starts +peer0.org1.example.com | [459c 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [459d 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [459e 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [459f 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 principal evaluation fails +peer0.org1.example.com | [45a0 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 gate 1574140991306475900 evaluation fails +peer0.org1.example.com | [45a1 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [45a2 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [45a3 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [45a4 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 gate 1574140991308525200 evaluation starts +peer0.org1.example.com | [45a5 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45a6 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [45a7 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 principal matched by identity 0 +peer0.org1.example.com | [45a8 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [45a9 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [45aa 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [45ab 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 gate 1574140991308525200 evaluation succeeds +peer0.org1.example.com | [45ac 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45ad 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45ae 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [45af 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [45b0 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45b1 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [45b2 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org1.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org1.example.com | [45b3 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org1.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org1.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org1.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org1.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org1.example.com | [45b4 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org1.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org1.example.com | [45b5 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org1.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org1.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org1.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org1.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org1.example.com | [45b6 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b7 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b8 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [45b9 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45ba 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45bb 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [45bc 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [45bd 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [45be 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 gate 1574140991314536400 evaluation starts +peer0.org1.example.com | [45bf 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45c0 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [45c1 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [45c2 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 principal evaluation fails +peer0.org1.example.com | [45c3 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 gate 1574140991314536400 evaluation fails +peer0.org1.example.com | [45c4 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [45c5 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [45c6 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [45c7 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 gate 1574140991316142500 evaluation starts +peer0.org1.example.com | [45c8 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45c9 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [45ca 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 principal matched by identity 0 +peer0.org1.example.com | [45cb 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org1.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org1.example.com | [45cc 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org1.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org1.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org1.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org1.example.com | [45cd 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [45ce 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 gate 1574140991316142500 evaluation succeeds +peer0.org1.example.com | [45cf 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45d0 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45d1 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [45d2 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [45d3 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45d4 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45d5 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [45d6 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45d7 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45d8 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [45d9 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [45da 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [45db 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 gate 1574140991320664400 evaluation starts +peer0.org1.example.com | [45dc 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45dd 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [45de 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [45df 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 principal evaluation fails +peer0.org1.example.com | [45e0 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 gate 1574140991320664400 evaluation fails +peer0.org1.example.com | [45e1 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [45e2 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [45e3 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [45e4 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 gate 1574140991322174100 evaluation starts +peer0.org1.example.com | [45e5 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45e6 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [45e7 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 principal matched by identity 0 +peer0.org1.example.com | [45e8 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org1.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org1.example.com | [45e9 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org1.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org1.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org1.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org1.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org1.example.com | [45ea 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [45eb 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 gate 1574140991322174100 evaluation succeeds +peer0.org1.example.com | [45ec 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45ed 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45ee 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [45ef 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [45f0 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45f1 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45f2 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45f3 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45f4 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45f5 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45f6 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45f7 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45f8 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45f9 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45fa 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org1.example.com | [45fb 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45fc 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45fd 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45fe 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [45ff 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4600 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4601 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4602 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4603 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4604 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [4605 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [4606 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4607 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4608 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4609 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [460a 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [460b 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org1.example.com | [460c 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [460d 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [460e 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [460f 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4610 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4611 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4612 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4613 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 gate 1574140991483127300 evaluation starts +peer0.org1.example.com | [4614 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4615 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4616 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4617 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 principal evaluation fails +peer0.org1.example.com | [4618 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 gate 1574140991483127300 evaluation fails +peer0.org1.example.com | [4619 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [461a 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [461b 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [461c 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 gate 1574140991483526400 evaluation starts +peer0.org1.example.com | [461d 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [461e 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [461f 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 principal matched by identity 0 +peer0.org1.example.com | [4620 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer0.org1.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer0.org1.example.com | [4621 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer0.org1.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer0.org1.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer0.org1.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU 0xc004443890 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4623 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 gate 1574140991483526400 evaluation succeeds +peer0.org1.example.com | [4624 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4625 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4626 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4627 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4628 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4629 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [462a 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [462b 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [462c 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [462d 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [462e 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [462f 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4630 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org1.example.com | [4631 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4632 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4633 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4634 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4635 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: +peer0.org1.example.com | [4636 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4637 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4638 11-19 05:23:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4639 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [463a 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [463b 11-19 05:23:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [463c 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [463d 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [463e 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [463f 11-19 05:23:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4640 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4641 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4642 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +peer0.org1.example.com | [4643 11-19 05:23:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4644 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4645 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4646 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4647 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4648 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4649 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [464a 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [464b 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [464c 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [464d 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +peer0.org1.example.com | [464e 11-19 05:23:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [464f 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4650 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4651 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4652 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4653 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org1.example.com | [4654 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [4296 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [4297 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [4298 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4299 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [429a 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [429b 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [429c 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [429d 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [429e 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [429f 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42a0 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [42a1 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [42a2 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [42a3 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044907b0 gate 1574140987922554900 evaluation starts +peer0.org2.example.com | [42a4 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044907b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42a5 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044907b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [42a6 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044907b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [42a7 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044907b0 principal evaluation fails +peer0.org2.example.com | [42a8 11-19 05:23:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044907b0 gate 1574140987922554900 evaluation fails +peer0.org2.example.com | [42a9 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [42aa 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [42ab 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [42ac 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004490d20 gate 1574140987934352900 evaluation starts +peer0.org2.example.com | [42ad 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004490d20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42ae 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004490d20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [42af 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004490d20 principal matched by identity 0 +peer0.org2.example.com | [42b0 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [42b1 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [42b2 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004490d20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [42b3 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004490d20 gate 1574140987934352900 evaluation succeeds +peer0.org2.example.com | [42b4 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42b5 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42b6 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [42b7 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [42b8 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42b9 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42ba 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [42bb 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42bc 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42bd 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [42be 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [42bf 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [42c0 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004491eb0 gate 1574140987935611100 evaluation starts +peer0.org2.example.com | [42c1 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004491eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42c2 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004491eb0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [42c3 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004491eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [42c4 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004491eb0 principal evaluation fails +peer0.org2.example.com | [42c5 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004491eb0 gate 1574140987935611100 evaluation fails +peer0.org2.example.com | [42c6 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [42c7 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [42c8 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [42c9 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b2420 gate 1574140987935948300 evaluation starts +peer0.org2.example.com | [42ca 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b2420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42cb 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b2420 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [42cc 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b2420 principal matched by identity 0 +peer0.org2.example.com | [42cd 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [42ce 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [42cf 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b2420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [42d0 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b2420 gate 1574140987935948300 evaluation succeeds +peer0.org2.example.com | [42d1 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42d2 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42d3 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [42d4 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [42d5 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [42d6 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [42d7 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [42d8 11-19 05:23:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [42d9 11-19 05:23:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42da 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [42db 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [42dc 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42dd 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42de 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42df 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [42e0 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [42e1 11-19 05:23:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [42e2 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [42e3 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42e4 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [42e5 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [42e6 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42e7 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [42e8 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [42e9 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42ea 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [42eb 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42ec 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42ed 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [42ee 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [42ef 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [42f0 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d2e60 gate 1574140988961663800 evaluation starts +peer0.org2.example.com | [42f1 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d2e60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42f2 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d2e60 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [42f3 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d2e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [42f4 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d2e60 principal evaluation fails +peer0.org2.example.com | [42f5 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d2e60 gate 1574140988961663800 evaluation fails +peer0.org2.example.com | [42f6 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [42f7 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [42f8 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [42f9 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d33d0 gate 1574140988962269500 evaluation starts +peer0.org2.example.com | [42fa 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d33d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42fb 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d33d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [42fc 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d33d0 principal matched by identity 0 +peer0.org2.example.com | [42fd 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 f1 65 c4 d6 ae b1 02 42 9b 90 fa 0d 90 c1 e5 |..e.....B.......| +peer0.org2.example.com | 00000010 09 f5 72 3f 2b df 03 dd fe 7e 70 54 55 ec a5 9b |..r?+....~pTU...| +peer0.org2.example.com | [42fe 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 d0 ba e6 d9 d5 a7 bd cc 56 79 f6 |0D. y........Vy.| +peer0.org2.example.com | 00000010 47 76 c8 55 4e 5e 54 cf 7a 26 ab 4b d6 ac 3b 7e |Gv.UN^T.z&.K..;~| +peer0.org2.example.com | 00000020 d0 99 b1 d3 02 20 2a 1c ae d1 1a ad c3 a9 45 d7 |..... *.......E.| +peer0.org2.example.com | 00000030 6c 61 fd 14 68 e0 4e d3 f2 81 ec 56 44 63 00 fd |la..h.N....VDc..| +peer0.org2.example.com | 00000040 d1 86 09 64 92 a1 |...d..| +peer0.org2.example.com | [42ff 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d33d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4300 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d33d0 gate 1574140988962269500 evaluation succeeds +peer0.org2.example.com | [4301 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4302 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4303 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4304 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4305 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4306 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4307 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4308 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4309 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [430a 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [430b 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [430c 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [430d 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [430e 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [430f 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4310 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4311 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4312 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" > alive:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > alive:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > alive: +peer0.org2.example.com | [4313 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4314 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4315 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4316 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4317 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4318 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4319 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [431a 11-19 05:23:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [431b 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [431c 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [431d 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [431e 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [431f 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [4320 11-19 05:23:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4321 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4322 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4323 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4324 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [4325 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4326 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4327 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4328 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4329 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [432a 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [432b 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [432c 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30630 gate 1574140989975198700 evaluation starts +peer0.org2.example.com | [432d 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30630 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [432e 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30630 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [432f 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4330 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30630 principal evaluation fails +peer0.org2.example.com | [4331 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30630 gate 1574140989975198700 evaluation fails +peer0.org2.example.com | [4332 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4333 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4334 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4335 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30ba0 gate 1574140989975458300 evaluation starts +peer0.org2.example.com | [4336 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30ba0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4337 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30ba0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4338 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30ba0 principal matched by identity 0 +peer0.org2.example.com | [4339 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa ed 80 99 b6 6f 41 67 08 02 5a d5 7c 06 95 |......oAg..Z.|..| +peer0.org2.example.com | 00000010 0f 59 3d 1b e0 52 b0 70 1e 61 67 fe ef 89 cc 28 |.Y=..R.p.ag....(| +peer0.org2.example.com | [433a 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 cd 4c 54 ee fc 5a 32 90 d8 65 |0E.!...LT..Z2..e| +peer0.org2.example.com | 00000010 01 4a c0 14 c8 e7 3f a3 8d ce 7e 0e 54 f1 79 77 |.J....?...~.T.yw| +peer0.org2.example.com | 00000020 a9 e7 24 54 64 02 20 76 b9 eb d3 07 b7 a2 7e 82 |..$Td. v......~.| +peer0.org2.example.com | 00000030 68 65 29 27 9d 05 02 61 ea 14 69 34 c9 74 6e cf |he)'...a..i4.tn.| +peer0.org2.example.com | 00000040 4f 3a c4 94 0e 63 9f |O:...c.| +peer0.org2.example.com | [433b 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30ba0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [433c 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30ba0 gate 1574140989975458300 evaluation succeeds +peer0.org2.example.com | [433d 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [433e 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [433f 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4340 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4341 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4342 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4343 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4344 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4345 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4346 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4347 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4348 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4349 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [434a 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [434b 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [434c 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [434d 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [434e 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [434f 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4350 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4351 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4352 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4353 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4354 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4355 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4356 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4357 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4358 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4359 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [435a 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [435b 11-19 05:23:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [435c 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [435d 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [435e 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [435f 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4360 11-19 05:23:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4361 11-19 05:23:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Exiting +peer0.org2.example.com | [4362 11-19 05:23:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Returning true +peer0.org2.example.com | [4363 11-19 05:23:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4364 11-19 05:23:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E0BC8994FE999EEC1510121801 +peer0.org2.example.com | [4365 11-19 05:23:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 14743F4E8B75C68D306B1D0363768AF6FCFEE2EE8D0066EC87E46983AEC03B71 +peer0.org2.example.com | [4366 11-19 05:23:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Entering +peer0.org2.example.com | [4367 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4368 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4369 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [436a 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [436b 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [436c 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [436d 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [436e 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [436f 11-19 05:23:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4370 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:33198 +peer0.org2.example.com | [4371 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0044cda40 +peer0.org2.example.com | [4372 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [4373 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [4374 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +peer0.org2.example.com | [4375 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [4376 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c 30 2b 8f af 08 54 af bb 07 69 8e e3 d8 99 9c ||0+...T...i.....| +peer0.org2.example.com | 00000010 f3 86 9d 82 ec 11 ea 50 b0 7a 7b be a3 14 ee 62 |.......P.z{....b| +peer0.org2.example.com | [4377 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 64 d5 36 d4 44 d8 6f f6 ae 2a |0E.!..d.6.D.o..*| +peer0.org2.example.com | 00000010 c2 fc 19 50 3b 85 4f a9 24 87 1e b7 48 6b 43 e9 |...P;.O.$...HkC.| +peer0.org2.example.com | 00000020 c5 86 14 11 90 02 20 1a 5f d2 b0 ab 34 6d 78 b3 |...... ._...4mx.| +peer0.org2.example.com | 00000030 84 3e 2e 7e f3 a3 9c 5f c6 f2 98 73 3d c8 70 fa |.>.~..._...s=.p.| +peer0.org2.example.com | 00000040 15 d0 70 21 e7 63 f3 |..p!.c.| +peer0.org2.example.com | [4378 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [4379 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004b8a150, header 0xc0044cde50 +peer0.org2.example.com | [437a 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [437b 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU [][a219e9a0] processing txid: a219e9a00f8fcae872273d61ae75f9277328a7919aaa62b470a3295386f3a5fc +peer0.org2.example.com | [437c 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU [][a219e9a0] Entry chaincode: name:"cscc" +peer0.org2.example.com | [437d 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> INFO [][a219e9a0] Entry chaincode: name:"cscc" +peer0.org2.example.com | [437e 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [437f 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org2.example.com | [4380 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c 30 2b 8f af 08 54 af bb 07 69 8e e3 d8 99 9c ||0+...T...i.....| +peer0.org2.example.com | 00000010 f3 86 9d 82 ec 11 ea 50 b0 7a 7b be a3 14 ee 62 |.......P.z{....b| +peer0.org2.example.com | [4381 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 64 d5 36 d4 44 d8 6f f6 ae 2a |0E.!..d.6.D.o..*| +peer0.org2.example.com | 00000010 c2 fc 19 50 3b 85 4f a9 24 87 1e b7 48 6b 43 e9 |...P;.O.$...HkC.| +peer0.org2.example.com | 00000020 c5 86 14 11 90 02 20 1a 5f d2 b0 ab 34 6d 78 b3 |...... ._...4mx.| +peer0.org2.example.com | 00000030 84 3e 2e 7e f3 a3 9c 5f c6 f2 98 73 3d c8 70 fa |.>.~..._...s=.p.| +peer0.org2.example.com | 00000040 15 d0 70 21 e7 63 f3 |..p!.c.| +peer0.org2.example.com | [4382 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU [a219e9a0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [4383 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU [a219e9a0] notifying Txid:a219e9a00f8fcae872273d61ae75f9277328a7919aaa62b470a3295386f3a5fc, channelID: +peer0.org2.example.com | [4384 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [4385 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> INFO [][a219e9a0] Exit chaincode: name:"cscc" (1ms) +peer0.org2.example.com | [4386 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU [][a219e9a0] Exit +peer0.org2.example.com | [4387 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:33198 +peer0.org2.example.com | [4388 11-19 05:23:10.20 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:33198 grpc.code=OK grpc.call_duration=4.338ms +peer0.org2.example.com | [4389 11-19 05:23:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [438a 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [438b 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [438c 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [438d 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [438e 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 10 c2 41 01 11 56 a1 91 b3 87 7f 5a 4f ae c8 |...A..V.....ZO..| +peer0.org2.example.com | 00000010 5d dc 05 04 e3 76 02 e9 90 6b b6 ff 44 9a 08 81 |]....v...k..D...| +peer0.org2.example.com | [438f 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f9 d7 3e 66 3c e1 27 bd f6 dc 9a |0D. X..>f<.'....| +peer0.org2.example.com | 00000010 9f 7b 75 1d 03 3f 7a 9c 23 ec 39 86 cf 63 37 34 |.{u..?z.#.9..c74| +peer0.org2.example.com | 00000020 14 c1 3a 4e 02 20 62 18 3b 5e 7e 95 0d 85 96 86 |..:N. b.;^~.....| +peer0.org2.example.com | 00000030 ce 60 21 cc 5d db 0f d0 b8 cf 28 55 31 e2 e5 bc |.`!.].....(U1...| +peer0.org2.example.com | 00000040 ed 4e 99 9c c5 1e |.N....| +peer0.org2.example.com | [4390 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4391 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4392 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4393 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4394 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4395 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4396 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4397 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4398 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4399 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [439a 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [439b 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [439c 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [439d 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [439e 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [439f 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43a0 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43a1 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43a2 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43a3 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43a4 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43a5 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [43a6 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [43a7 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43a8 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43a9 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43aa 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ab 11-19 05:23:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43ac 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43ad 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ae 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43af 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [43b0 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43b1 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [43b2 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [43b3 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [43b4 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [43b5 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [43b6 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [43b7 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6510 gate 1574140990782233500 evaluation starts +peer0.org2.example.com | [43b8 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [43b9 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6510 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [43ba 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [43bb 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6510 principal evaluation fails +peer0.org2.example.com | [43bc 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6510 gate 1574140990782233500 evaluation fails +peer0.org2.example.com | [43bd 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [43be 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [43bf 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [43c0 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6a80 gate 1574140990783869300 evaluation starts +peer0.org2.example.com | [43c1 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6a80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [43c2 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6a80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [43c3 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6a80 principal matched by identity 0 +peer0.org2.example.com | [43c4 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e ab 4d 25 44 be 79 41 27 8d 64 51 7e 10 02 bd |..M%D.yA'.dQ~...| +peer0.org2.example.com | 00000010 48 e0 12 2f b8 34 63 31 e4 89 7f 67 c0 1c cd 38 |H../.4c1...g...8| +peer0.org2.example.com | [43c5 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 f0 53 a4 96 9d f4 da 16 9a 24 5c |0D. Y.S.......$\| +peer0.org2.example.com | 00000010 1f 91 4a e6 1f 04 00 5e a1 ca b0 36 63 26 cc 2b |..J....^...6c&.+| +peer0.org2.example.com | 00000020 25 ff 8e ec 02 20 5d 60 ae 8e 94 07 9f 79 de 0a |%.... ]`.....y..| +peer0.org2.example.com | 00000030 30 63 5d bd a7 84 26 5a c4 b9 e4 03 d2 79 76 a5 |0c]...&Z.....yv.| +peer0.org2.example.com | 00000040 81 6d f2 fd 19 4d |.m...M| +peer0.org2.example.com | [43c6 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6a80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [43c7 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6a80 gate 1574140990783869300 evaluation succeeds +peer0.org2.example.com | [43c8 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [43c9 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [43ca 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [43cb 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [43cc 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43cd 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [43ce 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [43cf 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [43d0 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [43d1 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43d2 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43d3 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43d4 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43d5 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43d6 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43d7 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43d8 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43d9 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43da 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [43db 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43dc 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43dd 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [43de 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43df 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43e0 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [43e1 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [43e2 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e3 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e4 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e5 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e6 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e7 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e8 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f +peer0.org2.example.com | [43e9 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ea 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43eb 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ec 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43ed 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ee 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43ef 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43f0 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [43f1 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...1DF2120C08A4EAB0D6DF999EEC15103A +peer0.org2.example.com | [43f2 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 45FA22F8CC263E3A429FE30EBAB1CE5FBE5D6A8A4A176C01168F49DBDC13FC4E +peer0.org2.example.com | [43f3 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [43f4 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [43f5 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [43f6 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [43f7 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43f8 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43f9 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43fa 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [43fb 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43fc 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43fd 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43fe 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43ff 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4400 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4401 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4402 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4403 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4404 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4405 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4407 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4406 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4408 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4409 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [440a 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [440b 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [440c 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org1.example.com | [4655 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4656 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4657 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4658 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4659 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [465a 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [465b 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a080 gate 1574140991845602700 evaluation starts +peer0.org1.example.com | [465c 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a080 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [465d 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a080 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [465e 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [465f 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a080 principal evaluation fails +peer0.org1.example.com | [4660 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a080 gate 1574140991845602700 evaluation fails +peer0.org1.example.com | [4661 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4662 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4663 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4664 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a5f0 gate 1574140991845855800 evaluation starts +peer0.org1.example.com | [4665 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a5f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4666 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a5f0 processing identity 0 with bytes of 1151ae0 +peer0.org1.example.com | [4667 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a5f0 principal matched by identity 0 +peer0.org1.example.com | [4668 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e0 a2 fa cb 47 0a b5 7a 5b 9c 92 8d 7e 08 a4 |.....G..z[...~..| +peer0.org1.example.com | 00000010 92 76 fc 7f 1a 1f e4 0f 00 32 da af a1 dc 8c 54 |.v.......2.....T| +peer0.org1.example.com | [4669 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 72 cd 43 d4 2c ed 46 dd 83 26 90 |0D. .r.C.,.F..&.| +peer0.org1.example.com | 00000010 14 b4 87 28 b9 23 83 61 3c f9 ee b4 cd fe 4e 7a |...(.#.a<.....Nz| +peer0.org1.example.com | 00000020 bb ed 9c 0e 02 20 17 4e 4c 34 4f 80 10 27 6d 68 |..... .NL4O..'mh| +peer0.org1.example.com | 00000030 33 64 93 d0 90 22 f2 af 8e b3 e9 e2 0e 99 53 fa |3d..."........S.| +peer0.org1.example.com | 00000040 c5 f6 ff eb 1c cb |......| +peer0.org1.example.com | [466a 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a5f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [466b 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449a5f0 gate 1574140991845855800 evaluation succeeds +peer0.org1.example.com | [466c 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [466d 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [466e 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [466f 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4670 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4671 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4672 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4673 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4674 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4675 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4676 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4677 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4678 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +peer0.org1.example.com | [4679 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [467a 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [467b 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [467c 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [467d 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [467e 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [467f 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4680 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4681 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4682 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4683 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4684 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4685 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4686 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4687 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4688 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4689 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [468a 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [468b 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [468c 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" secret_envelope:\3048\271\372\232\321y@~8\317\037\215\252t\370\026b\352\370\271" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [468d 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [468e 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" secret_envelope:\3048\271\372\232\321y@~8\317\037\215\252t\370\026b\352\370\271" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [468f 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org1.example.com | [4690 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c f3 18 66 18 31 22 dd 55 ee d9 e8 ff 54 c1 d9 ||..f.1".U....T..| +peer0.org1.example.com | 00000010 07 75 fb 0b d2 45 8d 06 95 c1 63 c1 7f df 8e 6e |.u...E....c....n| +peer0.org1.example.com | [4691 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 80 be 46 41 9d f5 39 7c be 5f 98 |0D. ...FA..9|._.| +peer0.org1.example.com | 00000010 2f 17 7a 3e ce 20 21 a7 d3 20 1e fa 74 e8 6e a0 |/.z>. !.. ..t.n.| +peer0.org1.example.com | 00000020 c2 a6 62 9a 02 20 3c fc ca 9c 2b 4b 7e ac 27 3a |..b.. <...+K~.':| +peer0.org1.example.com | 00000030 9b b8 ce 42 a4 1a 28 3d 13 7f b1 6c de cb 36 05 |...B..(=...l..6.| +peer0.org1.example.com | 00000040 e3 e3 ed a1 83 d2 |......| +peer0.org1.example.com | [4692 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [4693 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 0e 78 00 fa 61 c8 b0 3a 02 d9 b2 |0D. ..x..a..:...| +peer0.org1.example.com | 00000010 17 84 4e 46 64 cb 94 d3 7a 74 35 ef 9c 9b aa eb |..NFd...zt5.....| +peer0.org1.example.com | 00000020 d5 42 30 ab 02 20 30 45 29 9b f5 cc 46 fe 22 e5 |.B0.. 0E)...F.".| +peer0.org1.example.com | 00000030 3e c4 38 b9 fa 9a d1 79 40 7e 38 cf 1f 8d aa 74 |>.8....y@~8....t| +peer0.org1.example.com | 00000040 f8 16 62 ea f8 b9 |..b...| +peer0.org1.example.com | [4694 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4695 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [440d 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [440e 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [440f 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4410 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4411 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4412 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4413 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4414 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c250 gate 1574140990868943400 evaluation starts +peer0.org2.example.com | [4415 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4416 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c250 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4417 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4418 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c250 principal evaluation fails +peer0.org2.example.com | [4419 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c250 gate 1574140990868943400 evaluation fails +peer0.org2.example.com | [441a 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [441b 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [441c 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [441d 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c7c0 gate 1574140990869669500 evaluation starts +peer0.org2.example.com | [441e 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c7c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [441f 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c7c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4420 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c7c0 principal matched by identity 0 +peer0.org2.example.com | [4421 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer0.org2.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer0.org2.example.com | [4422 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer0.org2.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer0.org2.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer0.org2.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer0.org2.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer0.org2.example.com | [4423 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c7c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4424 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1c7c0 gate 1574140990869669500 evaluation succeeds +peer0.org2.example.com | [4425 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4426 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4427 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4428 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4429 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [442a 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [442b 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4696 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4697 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4698 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4699 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [469a 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [469b 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [469c 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org1.example.com | [469d 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [469e 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [469f 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [46a0 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [46a1 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46a2 11-19 05:23:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" secret_envelope:\3048\271\372\232\321y@~8\317\037\215\252t\370\026b\352\370\271" > > alive: +peer0.org2.example.com | [442c 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [442d 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [442e 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [442f 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4430 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4431 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" +peer0.org2.example.com | [4432 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4433 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4434 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4435 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4436 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:" signature:"0D\002 X\371\327>f<\341'\275\366\334\232\237{u\035\003?z\234#\3549\206\317c74\024\301:N\002 b\030;^~\225\r\205\226\206\316`!\314]\333\017\320\270\317(U1\342\345\274\355N\231\234\305\036" > alive: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4484 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4485 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4486 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4487 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [4488 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer0.org2.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer0.org2.example.com | [4489 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer0.org2.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer0.org2.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer0.org2.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [448b 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 65 b1 a2 41 32 63 89 d9 6c e4 |0E.!..e..A2c..l.| +peer0.org2.example.com | 00000010 29 d1 1e b8 bf a8 65 75 85 b2 76 71 9f 3d 71 ca |).....eu..vq.=q.| +peer0.org2.example.com | 00000020 7a ce 76 36 cc 02 20 45 70 bf 0b 30 c6 98 75 cf |z.v6.. Ep..0..u.| +peer0.org2.example.com | 00000030 ba 82 6f ad 37 a7 b9 ea 84 c1 81 ef 43 ad d1 8d |..o.7.......C...| +peer0.org2.example.com | 00000040 27 b9 d7 e4 31 4e 61 |'...1Na| +peer0.org2.example.com | [448c 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [448d 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [448e 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [448f 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4490 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4491 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4492 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4493 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4494 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +peer0.org2.example.com | [4495 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4496 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4497 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4498 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [44cb 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44cc 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [44cd 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [44ce 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44cf 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [44d0 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [44d1 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [44d2 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44d3 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44d4 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [44d5 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [44d6 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44d7 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [44d8 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [44d9 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e0 a2 fa cb 47 0a b5 7a 5b 9c 92 8d 7e 08 a4 |.....G..z[...~..| +peer0.org2.example.com | 00000010 92 76 fc 7f 1a 1f e4 0f 00 32 da af a1 dc 8c 54 |.v.......2.....T| +peer0.org2.example.com | [44da 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 72 cd 43 d4 2c ed 46 dd 83 26 90 |0D. .r.C.,.F..&.| +peer0.org2.example.com | 00000010 14 b4 87 28 b9 23 83 61 3c f9 ee b4 cd fe 4e 7a |...(.#.a<.....Nz| +peer0.org2.example.com | 00000020 bb ed 9c 0e 02 20 17 4e 4c 34 4f 80 10 27 6d 68 |..... .NL4O..'mh| +peer0.org2.example.com | 00000030 33 64 93 d0 90 22 f2 af 8e b3 e9 e2 0e 99 53 fa |3d..."........S.| +peer0.org2.example.com | 00000040 c5 f6 ff eb 1c cb |......| +peer0.org2.example.com | [44db 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [44dc 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [44dd 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 c7 b2 9e 82 bd 8d a7 f3 3c 30 ad |0D. 4........<0.| +peer0.org2.example.com | 00000010 aa da c7 3f 3f ca 6b 0a 28 a9 70 35 aa 5e d9 7f |...??.k.(.p5.^..| +peer0.org2.example.com | 00000020 67 f0 cb 14 02 20 10 c2 d9 80 d8 73 90 89 bb d0 |g.... .....s....| +peer0.org2.example.com | 00000030 bb d7 f2 fc cc 2b 5a d5 ff aa 04 72 e3 f3 71 f7 |.....+Z....r..q.| +peer0.org2.example.com | 00000040 4e a5 1a b4 da 38 |N....8| +peer0.org2.example.com | [44de 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [44df 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [44e0 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44e1 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44e2 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44e3 11-19 05:23:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [44e4 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [44e5 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e0 a2 fa cb 47 0a b5 7a 5b 9c 92 8d 7e 08 a4 |.....G..z[...~..| +peer0.org2.example.com | 00000010 92 76 fc 7f 1a 1f e4 0f 00 32 da af a1 dc 8c 54 |.v.......2.....T| +peer0.org2.example.com | [44e6 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 72 cd 43 d4 2c ed 46 dd 83 26 90 |0D. .r.C.,.F..&.| +peer0.org2.example.com | 00000010 14 b4 87 28 b9 23 83 61 3c f9 ee b4 cd fe 4e 7a |...(.#.a<.....Nz| +peer0.org2.example.com | 00000020 bb ed 9c 0e 02 20 17 4e 4c 34 4f 80 10 27 6d 68 |..... .NL4O..'mh| +peer0.org2.example.com | 00000030 33 64 93 d0 90 22 f2 af 8e b3 e9 e2 0e 99 53 fa |3d..."........S.| +peer0.org2.example.com | 00000040 c5 f6 ff eb 1c cb |......| +peer0.org2.example.com | [44e7 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [44e8 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [44e9 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44ea 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [44eb 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer0.org2.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer0.org2.example.com | [44ec 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer0.org2.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer0.org2.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer0.org2.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [44ee 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44ef 11-19 05:23:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44f0 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [44f1 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [44f2 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44f3 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [44f4 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +peer0.org2.example.com | [44f5 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44f6 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [44f7 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [44f8 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [44f9 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [44fa 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [44fb 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [44fc 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14290 gate 1574140991880880500 evaluation starts +peer0.org2.example.com | [44fd 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14290 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [44fe 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14290 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [44ff 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4500 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14290 principal evaluation fails +peer0.org2.example.com | [4501 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14290 gate 1574140991880880500 evaluation fails +peer0.org2.example.com | [4502 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4503 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4504 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4505 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14800 gate 1574140991881278300 evaluation starts +peer0.org2.example.com | [4506 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4507 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14800 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4508 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14800 principal matched by identity 0 +peer0.org2.example.com | [4509 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +peer0.org2.example.com | 00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +peer0.org2.example.com | [450a 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +peer0.org2.example.com | 00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +peer0.org2.example.com | 00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +peer0.org2.example.com | 00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +peer0.org2.example.com | 00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +peer0.org2.example.com | [450b 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14800 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [450c 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14800 gate 1574140991881278300 evaluation succeeds +peer0.org2.example.com | [450d 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [450e 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [450f 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4510 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4511 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4512 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4513 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +peer0.org2.example.com | [4514 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e0 a2 fa cb 47 0a b5 7a 5b 9c 92 8d 7e 08 a4 |.....G..z[...~..| +peer0.org2.example.com | 00000010 92 76 fc 7f 1a 1f e4 0f 00 32 da af a1 dc 8c 54 |.v.......2.....T| +peer0.org2.example.com | [4515 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 72 cd 43 d4 2c ed 46 dd 83 26 90 |0D. .r.C.,.F..&.| +peer0.org2.example.com | 00000010 14 b4 87 28 b9 23 83 61 3c f9 ee b4 cd fe 4e 7a |...(.#.a<.....Nz| +peer0.org2.example.com | 00000020 bb ed 9c 0e 02 20 17 4e 4c 34 4f 80 10 27 6d 68 |..... .NL4O..'mh| +peer0.org2.example.com | 00000030 33 64 93 d0 90 22 f2 af 8e b3 e9 e2 0e 99 53 fa |3d..."........S.| +peer0.org2.example.com | 00000040 c5 f6 ff eb 1c cb |......| +peer0.org2.example.com | [4516 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4517 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4518 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4519 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +peer0.org2.example.com | [451a 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +peer0.org2.example.com | 00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +peer0.org2.example.com | [451b 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +peer0.org2.example.com | 00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +peer0.org2.example.com | 00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +peer0.org2.example.com | 00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [451d 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [451e 11-19 05:23:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [451f 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4520 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4521 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [4522 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4523 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4524 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4525 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4526 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4527 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4528 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [4529 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [452a 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [452b 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [452c 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [452d 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [452e 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [452f 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4530 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4531 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4532 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4533 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4534 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d48e80 gate 1574140991915910400 evaluation starts +peer0.org2.example.com | [4535 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d48e80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4536 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d48e80 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4537 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d48e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4538 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d48e80 principal evaluation fails +peer0.org2.example.com | [4539 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d48e80 gate 1574140991915910400 evaluation fails +peer0.org2.example.com | [453a 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [453b 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [453c 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [453d 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d493f0 gate 1574140991916172600 evaluation starts +peer0.org2.example.com | [453e 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d493f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [453f 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d493f0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4540 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d493f0 principal matched by identity 0 +peer0.org2.example.com | [4541 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [4542 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [4543 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d493f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4544 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d493f0 gate 1574140991916172600 evaluation succeeds +peer0.org2.example.com | [4545 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4546 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4547 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4548 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4549 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [454a 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [454b 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [454c 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [454d 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [454e 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [454f 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4550 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4551 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62580 gate 1574140991917163000 evaluation starts +peer0.org2.example.com | [4552 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4553 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62580 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4554 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4555 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62580 principal evaluation fails +peer0.org2.example.com | [4556 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62580 gate 1574140991917163000 evaluation fails +peer0.org2.example.com | [4557 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4558 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4559 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [455a 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62af0 gate 1574140991917643900 evaluation starts +peer0.org2.example.com | [455b 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [455c 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62af0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [455d 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62af0 principal matched by identity 0 +peer0.org2.example.com | [455e 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [455f 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [4560 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62af0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4561 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d62af0 gate 1574140991917643900 evaluation succeeds +peer0.org2.example.com | [4562 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4563 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4564 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4565 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4566 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [4567 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [4568 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4569 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:37388 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [456a 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [456b 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [456c 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [456d 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [456e 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [456f 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4570 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4571 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4572 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4573 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7e550 gate 1574140991919577000 evaluation starts +peer0.org2.example.com | [4574 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7e550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4575 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7e550 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4576 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7e550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4577 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7e550 principal evaluation fails +peer0.org2.example.com | [4578 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7e550 gate 1574140991919577000 evaluation fails +peer0.org2.example.com | [4579 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [457a 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [457b 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [457c 11-19 05:23:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7eac0 gate 1574140991919983400 evaluation starts +peer0.org2.example.com | [457d 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7eac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [457e 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7eac0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [457f 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7eac0 principal matched by identity 0 +peer0.org2.example.com | [4580 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [4581 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [4582 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [4583 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7eac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4584 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7eac0 gate 1574140991919983400 evaluation succeeds +peer0.org2.example.com | [4585 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4586 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4587 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4588 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4589 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [458a 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [458b 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [458c 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [458d 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [458e 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [458f 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4590 11-19 05:23:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4591 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7fc50 gate 1574140991929562100 evaluation starts +peer0.org2.example.com | [4592 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7fc50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4593 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7fc50 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4594 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7fc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4595 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7fc50 principal evaluation fails +peer0.org2.example.com | [4596 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7fc50 gate 1574140991929562100 evaluation fails +peer0.org2.example.com | [4597 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4598 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4599 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [459a 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9e1c0 gate 1574140991933603500 evaluation starts +peer0.org2.example.com | [459b 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9e1c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [459c 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9e1c0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [459d 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9e1c0 principal matched by identity 0 +peer0.org2.example.com | [459e 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [459f 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [45a0 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9e1c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [45a1 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9e1c0 gate 1574140991933603500 evaluation succeeds +peer0.org2.example.com | [45a2 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45a3 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45a4 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [45a5 11-19 05:23:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [45a6 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [45a7 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [45a8 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [45a9 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [45aa 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45ab 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [45ac 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45ad 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45ae 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45af 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [45b0 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [45b1 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [45b2 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [45b3 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [45b4 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [45b5 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d319b0 gate 1574140991956703100 evaluation starts +peer0.org2.example.com | [45b6 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d319b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [45b7 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d319b0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [45b8 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d319b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [45b9 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d319b0 principal evaluation fails +peer0.org2.example.com | [45ba 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d319b0 gate 1574140991956703100 evaluation fails +peer0.org2.example.com | [45bb 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45bc 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45bd 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [45be 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d31f20 gate 1574140991956987200 evaluation starts +peer0.org2.example.com | [45bf 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d31f20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [45c0 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d31f20 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [45c1 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d31f20 principal matched by identity 0 +peer0.org2.example.com | [45c2 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +peer0.org2.example.com | 00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +peer0.org2.example.com | [45c3 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +peer0.org2.example.com | 00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +peer0.org2.example.com | 00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +peer0.org2.example.com | 00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +peer0.org2.example.com | 00000040 4f 5b 34 7e be c3 |O[4~..| +peer0.org2.example.com | [45c4 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d31f20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [45c5 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d31f20 gate 1574140991956987200 evaluation succeeds +peer0.org2.example.com | [45c6 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45c7 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45c8 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [45c9 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [45ca 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45cb 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45cc 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4a 35 55 59 6f 58 6c 31 5a 78 4f 6a 32 45 36 36 4a 57 43 6b 31 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 50 31 75 33 76 4a 45 47 71 59 59 32 0a 36 67 2f 38 70 54 62 39 30 7a 4d 47 38 38 53 2f 43 55 79 47 6a 4a 66 2b 50 41 44 52 30 70 6f 6f 6b 33 4a 4f 55 77 62 76 6f 71 52 73 57 43 55 6b 4f 67 45 71 70 65 4e 74 71 43 78 50 6e 48 4d 51 0a 50 62 76 49 47 70 37 5a 41 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 62 70 41 61 6e 6c 65 7a 6f 33 79 77 31 71 71 4c 30 32 7a 66 69 72 6b 57 6c 2f 59 65 54 64 51 78 65 72 38 4d 34 79 69 62 48 62 6b 43 49 42 39 49 47 55 55 4f 0a 64 6f 47 36 79 51 6e 42 58 66 79 61 43 74 66 4e 59 64 70 65 69 33 45 4c 2b 74 32 61 4e 71 2b 6a 44 68 6e 4f 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [45cd 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [45ce 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [45cf 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [45d0 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [45d1 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [45d2 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f0d0 gate 1574140991957855000 evaluation starts +peer0.org2.example.com | [45d3 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [45d4 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f0d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [45d5 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [45d6 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f0d0 principal evaluation fails +peer0.org2.example.com | [45d7 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f0d0 gate 1574140991957855000 evaluation fails +peer0.org2.example.com | [45d8 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45d9 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45da 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [45db 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f640 gate 1574140991958117900 evaluation starts +peer0.org2.example.com | [45dc 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [45dd 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f640 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [45de 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f640 principal matched by identity 0 +peer0.org2.example.com | [45df 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +peer0.org2.example.com | 00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +peer0.org2.example.com | [45e0 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +peer0.org2.example.com | 00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +peer0.org2.example.com | 00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +peer0.org2.example.com | 00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +peer0.org2.example.com | 00000040 d2 f4 89 0d 43 61 5a |....CaZ| +peer0.org2.example.com | [45e1 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [45e2 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9f640 gate 1574140991958117900 evaluation succeeds +peer0.org2.example.com | [45e3 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45e4 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45e5 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [45e6 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [45e7 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +peer0.org2.example.com | 00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +peer0.org2.example.com | [45e8 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +peer0.org2.example.com | 00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +peer0.org2.example.com | 00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +peer0.org2.example.com | 00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +peer0.org2.example.com | [45e9 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +peer0.org2.example.com | 00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +peer0.org2.example.com | [45ea 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +peer0.org2.example.com | 00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +peer0.org2.example.com | 00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +peer0.org2.example.com | 00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +peer0.org2.example.com | 00000040 b0 cc d8 82 da 9d 34 |......4| +peer0.org2.example.com | [45eb 11-19 05:23:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45ec 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45ed 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45ee 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45ef 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45f0 11-19 05:23:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45f1 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [45f2 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [45f3 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [45f4 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +peer0.org2.example.com | [45f5 11-19 05:23:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45f6 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45f7 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45f8 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [45f9 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45fa 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45fb 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [45fc 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [45fd 11-19 05:23:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45fe 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [45ff 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4600 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4601 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4602 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4603 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4604 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4605 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4606 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +peer0.org2.example.com | [4607 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4608 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 45 74 4a 78 45 38 45 38 30 65 38 67 33 68 67 2f 76 31 49 58 63 54 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 50 66 6f 75 2b 65 42 51 50 7a 71 0a 33 4e 46 57 53 44 2b 65 77 4b 79 66 4d 64 4b 4f 4b 4b 70 66 63 68 34 2f 68 4c 44 2f 30 71 34 30 57 35 31 62 52 6c 44 54 4b 6f 4c 77 34 49 43 68 79 6f 4c 4f 33 45 5a 75 76 5a 39 37 64 62 70 77 0a 69 71 63 61 42 65 5a 44 37 4b 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 76 56 52 41 30 41 73 4a 4d 70 79 65 44 74 6d 43 48 6a 6e 56 4f 46 43 45 66 41 46 77 64 54 39 39 33 41 35 52 67 4c 33 4d 6d 42 34 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4c 35 34 7a 2b 66 4f 4a 4c 36 33 4b 6e 69 45 78 48 6d 62 4d 73 30 64 73 6b 45 35 66 2b 4d 6a 6f 42 4f 34 5a 4e 7a 6a 59 39 41 32 41 69 41 6d 67 46 51 32 0a 51 70 51 55 45 72 30 68 31 6c 2b 4b 75 4c 37 49 76 54 55 6b 62 49 76 4f 7a 74 71 71 30 63 4c 6f 36 69 70 72 35 51 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4609 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [460a 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [460b 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [460c 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [460d 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [460e 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048297d0 gate 1574140992948596600 evaluation starts +peer0.org2.example.com | [460f 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048297d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4610 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048297d0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [4611 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048297d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4612 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048297d0 principal evaluation fails +peer0.org2.example.com | [4613 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048297d0 gate 1574140992948596600 evaluation fails +peer0.org2.example.com | [4614 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4615 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4616 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4617 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829dc0 gate 1574140992949769100 evaluation starts +peer0.org2.example.com | [4618 11-19 05:23:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4619 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829dc0 processing identity 0 with bytes of 1151ae0 +peer0.org2.example.com | [461a 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829dc0 principal matched by identity 0 +peer0.org2.example.com | [461b 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c f3 18 66 18 31 22 dd 55 ee d9 e8 ff 54 c1 d9 ||..f.1".U....T..| +peer0.org2.example.com | 00000010 07 75 fb 0b d2 45 8d 06 95 c1 63 c1 7f df 8e 6e |.u...E....c....n| +peer0.org2.example.com | [461c 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 80 be 46 41 9d f5 39 7c be 5f 98 |0D. ...FA..9|._.| +peer0.org2.example.com | 00000010 2f 17 7a 3e ce 20 21 a7 d3 20 1e fa 74 e8 6e a0 |/.z>. !.. ..t.n.| +peer0.org2.example.com | 00000020 c2 a6 62 9a 02 20 3c fc ca 9c 2b 4b 7e ac 27 3a |..b.. <...+K~.':| +peer0.org2.example.com | 00000030 9b b8 ce 42 a4 1a 28 3d 13 7f b1 6c de cb 36 05 |...B..(=...l..6.| +peer0.org2.example.com | 00000040 e3 e3 ed a1 83 d2 |......| +peer0.org2.example.com | [461d 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829dc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [461e 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004829dc0 gate 1574140992949769100 evaluation succeeds +peer0.org2.example.com | [461f 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4620 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4621 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4622 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4623 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4624 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4625 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4626 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4627 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4628 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4629 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [462a 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [462b 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +peer0.org2.example.com | [462c 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [462d 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [462e 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [462f 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4630 11-19 05:23:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\316 !\247\323 \036\372t\350n\240\302\246b\232\002 <\374\312\234+K~\254':\233\270\316B\244\032(=\023\177\261l\336\3136\005\343\343\355\241\203\322" > alive: alive: alive: DEBU 006 Found real value for metrics.Statsd.Network setting to string udp +2019-11-19 05:21:32.251 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-11-19 05:21:32.251 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2019-11-19 05:21:32.251 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.251 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for metrics.Statsd.WriteInterval setting to string 30s +2019-11-19 05:21:32.251 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for metrics.Provider setting to string prometheus +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 00d Found map[interface{}]interface{} value for consensus +2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[interface{}]interface{} value for general +2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for general.ListenAddress setting to string 0.0.0.0 +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for general.TLS +2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.252 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-11-19 05:21:32.252 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value is not a string: false +2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.TLS.ClientAuthRequired setting to bool false +2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.TLS.ClientRootCAs setting to +2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.TLS.Enabled setting to string true +2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 022 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 023 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 024 Found map[string]interface{} value for general.Profile +2019-11-19 05:21:32.253 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value is not a string: false +2019-11-19 05:21:32.253 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.Profile.Enabled setting to bool false +2019-11-19 05:21:32.254 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 029 Found map[string]interface{} value for general.BCCSP +2019-11-19 05:21:32.254 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for general.BCCSP.Default setting to string SW +2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 02c Found map[string]interface{} value for general.BCCSP.SW +2019-11-19 05:21:32.254 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-11-19 05:21:32.254 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2019-11-19 05:21:32.255 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value is not a string: 256 +2019-11-19 05:21:32.255 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.BCCSP.SW.Security setting to int 256 +2019-11-19 05:21:32.255 UTC [viperutil] getKeysRecursively -> DEBU 031 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2019-11-19 05:21:32.256 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.256 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2019-11-19 05:21:32.257 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.SystemChannel setting to +2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.ListenPort setting to string 7050 +2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.LedgerType setting to string file +2019-11-19 05:21:32.262 UTC [viperutil] getKeysRecursively -> DEBU 03e Found map[string]interface{} value for general.Cluster +2019-11-19 05:21:32.262 UTC [viperutil] unmarshalJSON -> DEBU 03f Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 040 Found real value for general.Cluster.ServerCertificate setting to +2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 041 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 042 Found real value for general.Cluster.ServerPrivateKey setting to +2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for general.Cluster.DialTimeout setting to +2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for general.Cluster.TLSHandshakeTimeShift setting to +2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 047 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.263 UTC [viperutil] getKeysRecursively -> DEBU 048 Found real value for general.Cluster.ListenPort setting to +2019-11-19 05:21:32.263 UTC [viperutil] unmarshalJSON -> DEBU 049 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 04a Found real value for general.Cluster.ListenAddress setting to +2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for general.Cluster.CertExpirationWarningThreshold setting to +2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Cluster.ReplicationBufferSize setting to +2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.264 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.Cluster.ReplicationPullTimeout setting to +2019-11-19 05:21:32.264 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.Cluster.ReplicationMaxRetries setting to +2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.Cluster.RPCTimeout setting to +2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.Cluster.ReplicationRetryTimeout setting to +2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value is not a string: 10 +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for general.Cluster.SendBufferSize setting to int 10 +2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for general.GenesisMethod setting to string file +2019-11-19 05:21:32.265 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2019-11-19 05:21:32.265 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for general.LocalMSPID setting to string OrdererMSP +2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 065 Found map[string]interface{} value for general.Keepalive +2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for general.Keepalive.ServerInterval setting to string 7200s +2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for general.Keepalive.ServerTimeout setting to string 20s +2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for general.ConnectionTimeout setting to +2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 06e Found map[string]interface{} value for general.Authentication +2019-11-19 05:21:32.266 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-11-19 05:21:32.266 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for general.Authentication.TimeWindow setting to string 15m +2019-11-19 05:21:32.267 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.267 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for general.Authentication.NoExpirationChecks setting to +2019-11-19 05:21:32.269 UTC [viperutil] getKeysRecursively -> DEBU 073 Found map[interface{}]interface{} value for fileledger +2019-11-19 05:21:32.270 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2019-11-19 05:21:32.271 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2019-11-19 05:21:32.271 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-11-19 05:21:32.271 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2019-11-19 05:21:32.272 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[interface{}]interface{} value for ramledger +2019-11-19 05:21:32.272 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value is not a string: 1000 +2019-11-19 05:21:32.272 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for ramledger.HistorySize setting to int 1000 +2019-11-19 05:21:32.272 UTC [viperutil] getKeysRecursively -> DEBU 07b Found map[interface{}]interface{} value for kafka +2019-11-19 05:21:32.272 UTC [viperutil] getKeysRecursively -> DEBU 07c Found map[string]interface{} value for kafka.SASLPlain +2019-11-19 05:21:32.273 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value is not a string: false +2019-11-19 05:21:32.273 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for kafka.SASLPlain.Enabled setting to bool false +2019-11-19 05:21:32.273 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.277 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for kafka.SASLPlain.User setting to +2019-11-19 05:21:32.277 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.277 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.SASLPlain.Password setting to +2019-11-19 05:21:32.278 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.279 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Version setting to +2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[string]interface{} value for kafka.Retry +2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 086 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2019-11-19 05:21:32.280 UTC [viperutil] unmarshalJSON -> DEBU 087 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 088 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2019-11-19 05:21:32.280 UTC [viperutil] unmarshalJSON -> DEBU 089 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 08a Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2019-11-19 05:21:32.280 UTC [viperutil] unmarshalJSON -> DEBU 08b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 08c Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2019-11-19 05:21:32.280 UTC [viperutil] getKeysRecursively -> DEBU 08d Found map[string]interface{} value for kafka.Retry.Metadata +2019-11-19 05:21:32.285 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-11-19 05:21:32.285 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2019-11-19 05:21:32.290 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value is not a string: 3 +2019-11-19 05:21:32.290 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2019-11-19 05:21:32.292 UTC [viperutil] getKeysRecursively -> DEBU 092 Found map[string]interface{} value for kafka.Retry.Producer +2019-11-19 05:21:32.293 UTC [viperutil] unmarshalJSON -> DEBU 093 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-11-19 05:21:32.294 UTC [viperutil] getKeysRecursively -> DEBU 094 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2019-11-19 05:21:32.296 UTC [viperutil] unmarshalJSON -> DEBU 095 Unmarshal JSON: value is not a string: 3 +2019-11-19 05:21:32.297 UTC [viperutil] getKeysRecursively -> DEBU 096 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2019-11-19 05:21:32.299 UTC [viperutil] getKeysRecursively -> DEBU 097 Found map[string]interface{} value for kafka.Retry.Consumer +2019-11-19 05:21:32.304 UTC [viperutil] unmarshalJSON -> DEBU 098 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.308 UTC [viperutil] getKeysRecursively -> DEBU 099 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 09a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 09b Found real value for kafka.Retry.ShortInterval setting to string 5s +2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for kafka.Retry.ShortTotal setting to string 10m +2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.Retry.LongInterval setting to string 5m +2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.Retry.LongTotal setting to string 12h +2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found map[string]interface{} value for kafka.Topic +2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value is not a string: 3 +2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2019-11-19 05:21:32.309 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value is not a string: false +2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for kafka.Verbose setting to bool false +2019-11-19 05:21:32.309 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found map[string]interface{} value for kafka.TLS +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for kafka.TLS.ClientAuthRequired setting to +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for kafka.TLS.ClientRootCAs setting to +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: false +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for kafka.TLS.Enabled setting to bool false +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0ae Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0af Found real value for kafka.TLS.PrivateKey setting to +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0b0 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found real value for kafka.TLS.Certificate setting to +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for kafka.TLS.RootCAs setting to +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b4 Found map[interface{}]interface{} value for debug +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0b5 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b6 Found real value for debug.BroadcastTraceDir setting to +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0b7 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b8 Found real value for debug.DeliverTraceDir setting to +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found map[interface{}]interface{} value for operations +2019-11-19 05:21:32.310 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-11-19 05:21:32.310 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2019-11-19 05:21:32.311 UTC [viperutil] getKeysRecursively -> DEBU 0bc Found map[string]interface{} value for operations.TLS +2019-11-19 05:21:32.311 UTC [viperutil] unmarshalJSON -> DEBU 0bd Unmarshal JSON: value is not a string: false +2019-11-19 05:21:32.311 UTC [viperutil] getKeysRecursively -> DEBU 0be Found real value for operations.TLS.Enabled setting to bool false +2019-11-19 05:21:32.311 UTC [viperutil] unmarshalJSON -> DEBU 0bf Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.311 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found real value for operations.TLS.Certificate setting to +2019-11-19 05:21:32.316 UTC [viperutil] unmarshalJSON -> DEBU 0c1 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.317 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found real value for operations.TLS.PrivateKey setting to +2019-11-19 05:21:32.317 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value is not a string: false +2019-11-19 05:21:32.317 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for operations.TLS.ClientAuthRequired setting to bool false +2019-11-19 05:21:32.317 UTC [viperutil] unmarshalJSON -> DEBU 0c5 Unmarshal JSON: value is not a string: [] +2019-11-19 05:21:32.317 UTC [viperutil] getKeysRecursively -> DEBU 0c6 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2019-11-19 05:21:32.317 UTC [viperutil] unmarshalJSON -> DEBU 0c7 Unmarshal JSON: value is not a string: +2019-11-19 05:21:32.317 UTC [viperutil] getKeysRecursively -> DEBU 0c8 Found real value for operations.TLS.RootCAs setting to +2019-11-19 05:21:32.317 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey: TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +2019-11-19 05:21:32.319 UTC [localconfig] completeInitialization -> INFO 0ca Kafka.Version unset, setting to 0.10.2.0 +"2019-11-19 05:21:32.326 UTC [bccsp_sw] openKeyStore -> DEBU 0cb KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +"2019-11-19 05:21:32.326 UTC [bccsp] initBCCSP -> DEBU 0cc Initialize BCCSP [SW]" +"2019-11-19 05:21:32.328 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/signcerts" +"2019-11-19 05:21:32.336 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2019-11-19 05:21:32.344 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/cacerts" +"2019-11-19 05:21:32.355 UTC [msp] getPemMaterialFromDir -> DEBU 0d0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2019-11-19 05:21:32.361 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/admincerts" +"2019-11-19 05:21:32.377 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +"2019-11-19 05:21:32.409 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2019-11-19 05:21:32.414 UTC [msp] getMspConfig -> DEBU 0d4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2019-11-19 05:21:32.414 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2019-11-19 05:21:32.425 UTC [msp] getPemMaterialFromDir -> DEBU 0d6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2019-11-19 05:21:32.430 UTC [msp] getPemMaterialFromDir -> DEBU 0d7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2019-11-19 05:21:32.434 UTC [msp] getMspConfig -> DEBU 0d8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2019-11-19 05:21:32.435 UTC [msp] getPemMaterialFromDir -> DEBU 0d9 Reading directory /var/hyperledger/orderer/msp/crls" +"2019-11-19 05:21:32.436 UTC [msp] getMspConfig -> DEBU 0da crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2019-11-19 05:21:32.437 UTC [msp] getMspConfig -> DEBU 0db MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +"2019-11-19 05:21:32.437 UTC [msp] newBccspMsp -> DEBU 0dc Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.437 UTC [msp] New -> DEBU 0dd Creating Cache-MSP instance" +"2019-11-19 05:21:32.437 UTC [msp] loadLocaMSP -> DEBU 0de Created new local MSP" +"2019-11-19 05:21:32.438 UTC [msp] Setup -> DEBU 0df Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:32.438 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.438 UTC [msp.identity] newIdentity -> DEBU 0e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.477 UTC [bccsp_sw] loadPrivateKey -> DEBU 0e2 Loading private key [0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f] at [/var/hyperledger/orderer/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk]..." +"2019-11-19 05:21:32.488 UTC [msp.identity] newIdentity -> DEBU 0e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.488 UTC [msp] setupSigningIdentity -> DEBU 0e4 Signing identity expires at 2029-09-21 00:59:00 +0000 UTC" +"2019-11-19 05:21:32.488 UTC [msp.identity] newIdentity -> DEBU 0e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.488 UTC [msp] Validate -> DEBU 0e6 MSP OrdererMSP validating identity" +"2019-11-19 05:21:32.489 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e7 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "" + General.Cluster.ListenPort = 0 + General.Cluster.ServerCertificate = "" + General.Cluster.ServerPrivateKey = "" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Cluster.TLSHandshakeTimeShift = 0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.ConnectionTimeout = 0s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + General.Authentication.NoExpirationChecks = false + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = false + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2019-11-19 05:21:32.494 UTC [common.channelconfig] NewStandardValues -> DEBU 0e8 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:32.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: HashingAlgorithm" +"2019-11-19 05:21:32.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ea Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: OrdererAddresses" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: Consortium" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: Capabilities" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] NewStandardValues -> DEBU 0ee Initializing protos for *channelconfig.ConsortiumProtos" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ChannelCreationPolicy" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] NewStandardValues -> DEBU 0f0 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f1 Processing field: MSP" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] validateMSP -> DEBU 0f2 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:32.495 UTC [msp] newBccspMsp -> DEBU 0f3 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.495 UTC [msp] New -> DEBU 0f4 Creating Cache-MSP instance" +"2019-11-19 05:21:32.495 UTC [msp] Setup -> DEBU 0f5 Setting up MSP instance Org2MSP" +"2019-11-19 05:21:32.495 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] NewStandardValues -> DEBU 0f7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f8 Processing field: MSP" +"2019-11-19 05:21:32.495 UTC [common.channelconfig] validateMSP -> DEBU 0f9 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:32.496 UTC [msp] newBccspMsp -> DEBU 0fa Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.496 UTC [msp] New -> DEBU 0fb Creating Cache-MSP instance" +"2019-11-19 05:21:32.496 UTC [msp] Setup -> DEBU 0fc Setting up MSP instance Org1MSP" +"2019-11-19 05:21:32.496 UTC [msp.identity] newIdentity -> DEBU 0fd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.496 UTC [common.channelconfig] NewStandardValues -> DEBU 0fe Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ff Processing field: ConsensusType" +"2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 100 Processing field: BatchSize" +"2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 101 Processing field: BatchTimeout" +"2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 102 Processing field: KafkaBrokers" +"2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: ChannelRestrictions" +"2019-11-19 05:21:32.496 UTC [common.channelconfig] initializeProtosStruct -> DEBU 104 Processing field: Capabilities" +"2019-11-19 05:21:32.497 UTC [common.channelconfig] NewStandardValues -> DEBU 105 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:32.497 UTC [common.channelconfig] initializeProtosStruct -> DEBU 106 Processing field: Endpoints" +"2019-11-19 05:21:32.497 UTC [common.channelconfig] NewStandardValues -> DEBU 107 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.497 UTC [common.channelconfig] initializeProtosStruct -> DEBU 108 Processing field: MSP" +"2019-11-19 05:21:32.497 UTC [common.channelconfig] validateMSP -> DEBU 109 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:32.497 UTC [msp] newBccspMsp -> DEBU 10a Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.497 UTC [msp] New -> DEBU 10b Creating Cache-MSP instance" +"2019-11-19 05:21:32.497 UTC [msp] Setup -> DEBU 10c Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:32.497 UTC [msp.identity] newIdentity -> DEBU 10d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.497 UTC [msp.identity] newIdentity -> DEBU 10e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.497 UTC [msp] Validate -> DEBU 10f MSP OrdererMSP validating identity" +"2019-11-19 05:21:32.497 UTC [msp] Setup -> DEBU 110 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:32.497 UTC [msp] Setup -> DEBU 111 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 113 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 114 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 115 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 116 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 117 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 118 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 119 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Admins for Channel/Consortiums" +"2019-11-19 05:21:32.498 UTC [policies] GetPolicy -> DEBU 122 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Writers for Channel" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Admins for Channel" +"2019-11-19 05:21:32.498 UTC [policies] GetPolicy -> DEBU 125 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-11-19 05:21:32.498 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Readers for Channel" +"2019-11-19 05:21:32.498 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Group] /Channel/Consortiums" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-11-19 05:21:32.499 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:32.500 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:32.500 UTC [orderer.common.server] createLedgerFactory -> DEBU 14e Ledger dir: /var/hyperledger/production/orderer" +"2019-11-19 05:21:32.500 UTC [kvledger.util] CreateDirIfMissing -> DEBU 14f CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2019-11-19 05:21:32.501 UTC [kvledger.util] logDirStatus -> DEBU 150 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2019-11-19 05:21:32.501 UTC [kvledger.util] logDirStatus -> DEBU 151 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2019-11-19 05:21:32.515 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 152 Bootstrapping because no existing channels" +"2019-11-19 05:21:32.515 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 153 Selected bootstrap block, because system channel last config block is nil" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] NewStandardValues -> DEBU 154 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155 Processing field: HashingAlgorithm" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157 Processing field: OrdererAddresses" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 158 Processing field: Consortium" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: Capabilities" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: ConsensusType" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c Processing field: BatchSize" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: BatchTimeout" +"2019-11-19 05:21:32.515 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: KafkaBrokers" +"2019-11-19 05:21:32.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: ChannelRestrictions" +"2019-11-19 05:21:32.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Capabilities" +"2019-11-19 05:21:32.516 UTC [common.channelconfig] NewStandardValues -> DEBU 161 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:32.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: Endpoints" +"2019-11-19 05:21:32.516 UTC [common.channelconfig] NewStandardValues -> DEBU 163 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164 Processing field: MSP" +"2019-11-19 05:21:32.516 UTC [common.channelconfig] validateMSP -> DEBU 165 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:32.516 UTC [msp] newBccspMsp -> DEBU 166 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.516 UTC [msp] New -> DEBU 167 Creating Cache-MSP instance" +"2019-11-19 05:21:32.516 UTC [msp] Setup -> DEBU 168 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:32.518 UTC [msp.identity] newIdentity -> DEBU 169 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.518 UTC [msp.identity] newIdentity -> DEBU 16a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.519 UTC [msp] Validate -> DEBU 16b MSP OrdererMSP validating identity" +"2019-11-19 05:21:32.521 UTC [common.channelconfig] NewStandardValues -> DEBU 16c Initializing protos for *channelconfig.ConsortiumProtos" +"2019-11-19 05:21:32.521 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d Processing field: ChannelCreationPolicy" +"2019-11-19 05:21:32.521 UTC [common.channelconfig] NewStandardValues -> DEBU 16e Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.521 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f Processing field: MSP" +"2019-11-19 05:21:32.522 UTC [common.channelconfig] validateMSP -> DEBU 170 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:32.522 UTC [msp] newBccspMsp -> DEBU 171 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.522 UTC [msp] New -> DEBU 172 Creating Cache-MSP instance" +"2019-11-19 05:21:32.522 UTC [msp] Setup -> DEBU 173 Setting up MSP instance Org2MSP" +"2019-11-19 05:21:32.524 UTC [msp.identity] newIdentity -> DEBU 174 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.525 UTC [common.channelconfig] NewStandardValues -> DEBU 175 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.525 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176 Processing field: MSP" +"2019-11-19 05:21:32.525 UTC [common.channelconfig] validateMSP -> DEBU 177 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:32.525 UTC [msp] newBccspMsp -> DEBU 178 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.525 UTC [msp] New -> DEBU 179 Creating Cache-MSP instance" +"2019-11-19 05:21:32.525 UTC [msp] Setup -> DEBU 17a Setting up MSP instance Org1MSP" +"2019-11-19 05:21:32.525 UTC [msp.identity] newIdentity -> DEBU 17b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.527 UTC [msp] Setup -> DEBU 17c Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:32.527 UTC [msp] Setup -> DEBU 17d MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.527 UTC [policies] NewManagerImpl -> DEBU 18b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.528 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.528 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Admins for Channel/Consortiums" +"2019-11-19 05:21:32.528 UTC [policies] GetPolicy -> DEBU 18e Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-11-19 05:21:32.528 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy Writers for Channel" +"2019-11-19 05:21:32.528 UTC [policies] NewManagerImpl -> DEBU 190 Proposed new policy Admins for Channel" +"2019-11-19 05:21:32.528 UTC [policies] GetPolicy -> DEBU 191 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-11-19 05:21:32.530 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Readers for Channel" +"2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Group] /Channel/Consortiums" +"2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.530 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:32.531 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:32.532 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:32.598 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ba Booted with a genesis block, replication isn't an option" +"2019-11-19 05:21:32.625 UTC [orderer.common.server] initializeServerConfig -> INFO 1bb Starting orderer with TLS enabled" +"2019-11-19 05:21:32.633 UTC [orderer.common.server] configureClusterListener -> INFO 1bc Cluster listener is not configured, defaulting to use the general listener on port 7050" +"2019-11-19 05:21:32.634 UTC [msp] GetDefaultSigningIdentity -> DEBU 1bd Obtaining default signing identity" +"2019-11-19 05:21:32.636 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1be newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2019-11-19 05:21:32.636 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1bf CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2019-11-19 05:21:32.636 UTC [kvledger.util] logDirStatus -> DEBU 1c0 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2019-11-19 05:21:32.636 UTC [kvledger.util] logDirStatus -> DEBU 1c1 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2019-11-19 05:21:32.636 UTC [fsblkstorage] newBlockfileMgr -> INFO 1c2 Getting block information from block storage" +"2019-11-19 05:21:32.636 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c3 Retrieving checkpoint info from block files" +"2019-11-19 05:21:32.636 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1c4 retrieveLastFileSuffix()" +"2019-11-19 05:21:32.636 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1c5 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-11-19 05:21:32.636 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c6 Last file number found = -1" +"2019-11-19 05:21:32.637 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c7 No block file found" +"2019-11-19 05:21:32.637 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c8 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00032cf60)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-11-19 05:21:32.638 UTC [fsblkstorage] newBlockIndex -> DEBU 1c9 newBlockIndex() - indexItems:[[BlockNum]]" +"2019-11-19 05:21:32.640 UTC [fsblkstorage] indexBlock -> DEBU 1ca Indexing block [blockNum=0, blockHash=[]byte{0x7a, 0xe4, 0xf, 0xb1, 0xee, 0x3d, 0xd4, 0x66, 0xa7, 0xfe, 0x3b, 0x6a, 0x5c, 0x89, 0xe8, 0x21, 0xa4, 0xb8, 0x77, 0x34, 0xad, 0x52, 0x6b, 0x49, 0xee, 0xf9, 0xd5, 0x8f, 0x4, 0xbf, 0x6f, 0x8} txOffsets= +txId=91599760615898f37a6feafc942b65ddc7dfaa3a4367e688121bd379fdbc4520 locPointer=offset=39, bytesLength=20242 +]" +"2019-11-19 05:21:32.642 UTC [fsblkstorage] updateCheckpoint -> DEBU 1cb Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[20287], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] NewStandardValues -> DEBU 1cc Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: HashingAlgorithm" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: OrdererAddresses" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Consortium" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: Capabilities" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] NewStandardValues -> DEBU 1d2 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d3 Processing field: ConsensusType" +"2019-11-19 05:21:32.642 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: BatchSize" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d5 Processing field: BatchTimeout" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6 Processing field: KafkaBrokers" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7 Processing field: ChannelRestrictions" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d8 Processing field: Capabilities" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] NewStandardValues -> DEBU 1d9 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da Processing field: Endpoints" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] NewStandardValues -> DEBU 1db Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dc Processing field: MSP" +"2019-11-19 05:21:32.643 UTC [common.channelconfig] validateMSP -> DEBU 1dd Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:32.643 UTC [msp] newBccspMsp -> DEBU 1de Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.643 UTC [msp] New -> DEBU 1df Creating Cache-MSP instance" +"2019-11-19 05:21:32.643 UTC [msp] Setup -> DEBU 1e0 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:32.643 UTC [msp.identity] newIdentity -> DEBU 1e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.643 UTC [msp.identity] newIdentity -> DEBU 1e2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.644 UTC [msp] Validate -> DEBU 1e3 MSP OrdererMSP validating identity" +"2019-11-19 05:21:32.644 UTC [common.channelconfig] NewStandardValues -> DEBU 1e4 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-11-19 05:21:32.644 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e5 Processing field: ChannelCreationPolicy" +"2019-11-19 05:21:32.644 UTC [common.channelconfig] NewStandardValues -> DEBU 1e6 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.644 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e7 Processing field: MSP" +"2019-11-19 05:21:32.644 UTC [common.channelconfig] validateMSP -> DEBU 1e8 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:32.644 UTC [msp] newBccspMsp -> DEBU 1e9 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.644 UTC [msp] New -> DEBU 1ea Creating Cache-MSP instance" +"2019-11-19 05:21:32.644 UTC [msp] Setup -> DEBU 1eb Setting up MSP instance Org2MSP" +"2019-11-19 05:21:32.644 UTC [msp.identity] newIdentity -> DEBU 1ec Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.645 UTC [common.channelconfig] NewStandardValues -> DEBU 1ed Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.645 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ee Processing field: MSP" +"2019-11-19 05:21:32.645 UTC [common.channelconfig] validateMSP -> DEBU 1ef Setting up MSP for org Org1MSP" +"2019-11-19 05:21:32.645 UTC [msp] newBccspMsp -> DEBU 1f0 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.645 UTC [msp] New -> DEBU 1f1 Creating Cache-MSP instance" +"2019-11-19 05:21:32.645 UTC [msp] Setup -> DEBU 1f2 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:32.645 UTC [msp.identity] newIdentity -> DEBU 1f3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.645 UTC [msp] Setup -> DEBU 1f4 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:32.646 UTC [msp] Setup -> DEBU 1f5 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.646 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Admins for Channel/Consortiums" +"2019-11-19 05:21:32.648 UTC [policies] GetPolicy -> DEBU 206 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Writers for Channel" +"2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Admins for Channel" +"2019-11-19 05:21:32.648 UTC [policies] GetPolicy -> DEBU 209 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-11-19 05:21:32.648 UTC [policies] NewManagerImpl -> DEBU 20a Proposed new policy Readers for Channel" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Group] /Channel" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Group] /Channel/Consortiums" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-11-19 05:21:32.648 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:32.649 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:32.650 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:32.650 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:32.650 UTC [fsblkstorage] Next -> DEBU 232 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-11-19 05:21:32.650 UTC [fsblkstorage] newBlockfileStream -> DEBU 233 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:21:32.650 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 234 Remaining bytes=[20287], Going to peek [8] bytes" +"2019-11-19 05:21:32.650 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 235 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:21:32.650 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 236 blockbytes [20284] read from file [0]" +"2019-11-19 05:21:32.651 UTC [fsblkstorage] Next -> DEBU 237 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-11-19 05:21:32.651 UTC [fsblkstorage] newBlockfileStream -> DEBU 238 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:21:32.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Remaining bytes=[20287], Going to peek [8] bytes" +"2019-11-19 05:21:32.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:21:32.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23b blockbytes [20284] read from file [0]" +"2019-11-19 05:21:32.651 UTC [common.channelconfig] NewStandardValues -> DEBU 23c Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:32.651 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: HashingAlgorithm" +"2019-11-19 05:21:32.651 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:32.651 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: OrdererAddresses" +"2019-11-19 05:21:32.652 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: Consortium" +"2019-11-19 05:21:32.652 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: Capabilities" +"2019-11-19 05:21:32.652 UTC [common.channelconfig] NewStandardValues -> DEBU 242 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:32.652 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: ConsensusType" +"2019-11-19 05:21:32.652 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: BatchSize" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: BatchTimeout" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: KafkaBrokers" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ChannelRestrictions" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: Capabilities" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] NewStandardValues -> DEBU 249 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: Endpoints" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] NewStandardValues -> DEBU 24b Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: MSP" +"2019-11-19 05:21:32.653 UTC [common.channelconfig] validateMSP -> DEBU 24d Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:32.653 UTC [msp] newBccspMsp -> DEBU 24e Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.653 UTC [msp] New -> DEBU 24f Creating Cache-MSP instance" +"2019-11-19 05:21:32.653 UTC [msp] Setup -> DEBU 250 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:32.653 UTC [msp.identity] newIdentity -> DEBU 251 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.654 UTC [msp.identity] newIdentity -> DEBU 252 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.654 UTC [msp] Validate -> DEBU 253 MSP OrdererMSP validating identity" +"2019-11-19 05:21:32.654 UTC [common.channelconfig] NewStandardValues -> DEBU 254 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-11-19 05:21:32.654 UTC [common.channelconfig] initializeProtosStruct -> DEBU 255 Processing field: ChannelCreationPolicy" +"2019-11-19 05:21:32.654 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.655 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: MSP" +"2019-11-19 05:21:32.655 UTC [common.channelconfig] validateMSP -> DEBU 258 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:32.655 UTC [msp] newBccspMsp -> DEBU 259 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.655 UTC [msp] New -> DEBU 25a Creating Cache-MSP instance" +"2019-11-19 05:21:32.655 UTC [msp] Setup -> DEBU 25b Setting up MSP instance Org2MSP" +"2019-11-19 05:21:32.655 UTC [msp.identity] newIdentity -> DEBU 25c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.656 UTC [common.channelconfig] NewStandardValues -> DEBU 25d Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:32.656 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: MSP" +"2019-11-19 05:21:32.656 UTC [common.channelconfig] validateMSP -> DEBU 25f Setting up MSP for org Org1MSP" +"2019-11-19 05:21:32.656 UTC [msp] newBccspMsp -> DEBU 260 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:32.656 UTC [msp] New -> DEBU 261 Creating Cache-MSP instance" +"2019-11-19 05:21:32.656 UTC [msp] Setup -> DEBU 262 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:32.656 UTC [msp.identity] newIdentity -> DEBU 263 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:32.658 UTC [msp] Setup -> DEBU 264 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:32.658 UTC [msp] Setup -> DEBU 265 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:32.658 UTC [policies] NewManagerImpl -> DEBU 266 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.658 UTC [policies] NewManagerImpl -> DEBU 267 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.658 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Admins for Channel/Consortiums" +"2019-11-19 05:21:32.659 UTC [policies] GetPolicy -> DEBU 276 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Writers for Channel" +"2019-11-19 05:21:32.659 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Admins for Channel" +"2019-11-19 05:21:32.659 UTC [policies] GetPolicy -> DEBU 279 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-11-19 05:21:32.667 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel" +"2019-11-19 05:21:32.668 UTC [common.configtx] addToMap -> DEBU 27b Adding to config map: [Group] /Channel" +"2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 27c Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:32.669 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:32.670 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:32.671 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:32.671 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:32.671 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel/Consortiums" +"2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-11-19 05:21:32.672 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-11-19 05:21:32.673 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-11-19 05:21:32.673 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-11-19 05:21:32.673 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:32.674 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2a2 As expected, current configuration has policy '/Channel/Readers'" +"2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2a3 As expected, current configuration has policy '/Channel/Writers'" +"2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a4 Manager Channel looking up path [Application]" +"2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a5 Manager Channel has managers Orderer" +"2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a6 Manager Channel has managers Consortiums" +"2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a7 Manager Channel looking up path [Orderer]" +"2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a8 Manager Channel has managers Orderer" +"2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2a9 Manager Channel has managers Consortiums" +"2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2aa Manager Channel/Orderer looking up path []" +"2019-11-19 05:21:32.674 UTC [policies] Manager -> DEBU 2ab Manager Channel/Orderer has managers OrdererOrg" +"2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ac As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ad As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ae As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-11-19 05:21:32.674 UTC [common.channelconfig] LogSanityChecks -> DEBU 2af As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-11-19 05:21:32.674 UTC [common.capabilities] Supported -> DEBU 2b0 Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:21:32.675 UTC [common.capabilities] Supported -> DEBU 2b1 Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:21:32.675 UTC [orderer.common.server] func1 -> DEBU 2b2 Executing callback to update root CAs" +"2019-11-19 05:21:32.675 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b3 updating root CAs for channel [testchainid]" +"2019-11-19 05:21:32.675 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b4 adding app root CAs for MSP [Org1MSP]" +"2019-11-19 05:21:32.675 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b5 adding orderer root CAs for MSP [OrdererMSP]" +"2019-11-19 05:21:32.675 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b6 adding app root CAs for MSP [Org2MSP]" +"2019-11-19 05:21:32.676 UTC [fsblkstorage] Next -> DEBU 2b7 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-11-19 05:21:32.676 UTC [fsblkstorage] newBlockfileStream -> DEBU 2b8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:21:32.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2b9 Remaining bytes=[20287], Going to peek [8] bytes" +"2019-11-19 05:21:32.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ba Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:21:32.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2bb blockbytes [20284] read from file [0]" +"2019-11-19 05:21:32.676 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2bc [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2019-11-19 05:21:32.676 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2bd EvictionSuspicion not set, defaulting to 10m0s" +"2019-11-19 05:21:32.676 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2be No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2019-11-19 05:21:32.676 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2bf No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2019-11-19 05:21:32.682 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2c0 Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2019-11-19 05:21:32.683 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c1 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2019-11-19 05:21:32.683 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c2 Appending 0 entries to memory storage" channel=testchainid node=1 +"2019-11-19 05:21:32.683 UTC [fsblkstorage] Next -> DEBU 2c3 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-11-19 05:21:32.683 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:21:32.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c5 Remaining bytes=[20287], Going to peek [8] bytes" +"2019-11-19 05:21:32.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:21:32.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c7 blockbytes [20284] read from file [0]" +"2019-11-19 05:21:32.684 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2c8 [channel: testchainid] Done creating channel support resources" +"2019-11-19 05:21:32.684 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2c9 Creating system channel msg processor for channel testchainid" +"2019-11-19 05:21:32.684 UTC [fsblkstorage] Next -> DEBU 2ca Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-11-19 05:21:32.684 UTC [fsblkstorage] newBlockfileStream -> DEBU 2cb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:21:32.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cc Remaining bytes=[20287], Going to peek [8] bytes" +"2019-11-19 05:21:32.685 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cd Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:21:32.685 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ce blockbytes [20284] read from file [0]" +"2019-11-19 05:21:32.685 UTC [orderer.commmon.multichannel] Initialize -> INFO 2cf Starting system channel 'testchainid' with genesis block hash 7ae40fb1ee3dd466a7fe3b6a5c89e821a4b87734ad526b49eef9d58f04bf6f08 and orderer type etcdraft" +"2019-11-19 05:21:32.685 UTC [orderer.consensus.etcdraft] Start -> INFO 2d0 Starting Raft node" channel=testchainid node=1 +"2019-11-19 05:21:32.686 UTC [orderer.common.cluster] Configure -> INFO 2d1 Entering, channel: testchainid, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +]" +"2019-11-19 05:21:32.686 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d2 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2019-11-19 05:21:32.686 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d3 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-11-19 05:21:32.686 UTC [orderer.common.cluster] func1 -> DEBU 2d4 Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- + for channel testchainid" +"2019-11-19 05:21:32.688 UTC [grpc] DialContext -> DEBU 2d5 parsed scheme: """ +"2019-11-19 05:21:32.688 UTC [grpc] DialContext -> DEBU 2d6 scheme "" not registered, fallback to default scheme" +"2019-11-19 05:21:32.688 UTC [grpc] watcher -> DEBU 2d7 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2019-11-19 05:21:32.688 UTC [grpc] switchBalancer -> DEBU 2d8 ClientConn switching balancer to "pick_first"" +"2019-11-19 05:21:32.689 UTC [grpc] HandleSubConnStateChange -> DEBU 2d9 pickfirstBalancer: HandleSubConnStateChange: 0xc000227c80, CONNECTING" +"2019-11-19 05:21:32.690 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2da Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2019-11-19 05:21:32.690 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2db Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-11-19 05:21:32.691 UTC [orderer.common.cluster] func1 -> DEBU 2dc Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- + for channel testchainid" +"2019-11-19 05:21:32.691 UTC [grpc] DialContext -> DEBU 2dd parsed scheme: """ +"2019-11-19 05:21:32.692 UTC [grpc] DialContext -> DEBU 2de scheme "" not registered, fallback to default scheme" +"2019-11-19 05:21:32.699 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2df 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-11-19 05:21:32.699 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2e0 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-11-19 05:21:32.699 UTC [orderer.common.cluster] Configure -> INFO 2e1 Exiting" +"2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] start -> DEBU 2e2 Starting raft node: #peers: 3" channel=testchainid node=1 +"2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] start -> INFO 2e3 Starting raft node as part of a new channel" channel=testchainid node=1 +"2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2e4 1 became follower at term 0" channel=testchainid node=1 +"2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2e5 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2019-11-19 05:21:32.699 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2e6 1 became follower at term 1" channel=testchainid node=1 +"2019-11-19 05:21:32.700 UTC [grpc] HandleSubConnStateChange -> DEBU 2e7 pickfirstBalancer: HandleSubConnStateChange: 0xc000227c80, READY" +"2019-11-19 05:21:32.700 UTC [grpc] watcher -> DEBU 2e8 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2019-11-19 05:21:32.700 UTC [grpc] switchBalancer -> DEBU 2e9 ClientConn switching balancer to "pick_first"" +"2019-11-19 05:21:32.700 UTC [grpc] HandleSubConnStateChange -> DEBU 2ea pickfirstBalancer: HandleSubConnStateChange: 0xc0001aaf70, CONNECTING" +"2019-11-19 05:21:32.702 UTC [orderer.common.server] Start -> INFO 2eb Starting orderer: + Version: 1.4.4 + Commit SHA: development build + Go version: go1.12.13 + OS/Arch: linux/amd64" +"2019-11-19 05:21:32.702 UTC [orderer.common.server] Start -> INFO 2ec Beginning to serve requests" +"2019-11-19 05:21:32.705 UTC [orderer.consensus.etcdraft] apply -> INFO 2ed Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-11-19 05:21:32.705 UTC [orderer.consensus.etcdraft] apply -> INFO 2ee Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-11-19 05:21:32.705 UTC [orderer.consensus.etcdraft] apply -> INFO 2ef Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-11-19 05:21:32.710 UTC [grpc] HandleSubConnStateChange -> DEBU 2f0 pickfirstBalancer: HandleSubConnStateChange: 0xc0001aaf70, READY" +"2019-11-19 05:21:33.662 UTC [orderer.common.cluster] Step -> DEBU 2f1 Connection from orderer2.example.com(172.18.0.4:44088)" +"2019-11-19 05:21:33.662 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2f2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:33.662 UTC [orderer.consensus.etcdraft] Step -> INFO 2f3 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f4 1 became follower at term 2" channel=testchainid node=1 +"2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] Step -> INFO 2f5 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +"2019-11-19 05:21:33.663 UTC [orderer.common.cluster] NewStream -> DEBU 2f6 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-11-19 05:21:33.663 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2f7 Sending msg of 28 bytes to 3 on channel testchainid took 91.6µs" +"2019-11-19 05:21:33.664 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.6µs " +"2019-11-19 05:21:33.664 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2f9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 36" +"2019-11-19 05:21:33.664 UTC [orderer.consensus.etcdraft] run -> INFO 2fa raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2019-11-19 05:21:33.666 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 2fb Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2019-11-19 05:21:33.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +"2019-11-19 05:21:33.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2fd Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2019-11-19 05:21:33.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2fe Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:33.668 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2ff Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +"2019-11-19 05:21:33.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU 300 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +"2019-11-19 05:21:34.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 301 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:34.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 302 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.8285ms " +"2019-11-19 05:21:34.127 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 303 Sending msg of 28 bytes to 3 on channel testchainid took 69.7µs" +"2019-11-19 05:21:34.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 304 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:34.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 305 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-11-19 05:21:34.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +"2019-11-19 05:21:35.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 307 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:35.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 308 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-11-19 05:21:35.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 285.4µs " +"2019-11-19 05:21:35.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:35.600 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30b Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2019-11-19 05:21:35.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 501.5µs " +"2019-11-19 05:21:36.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:36.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30e Sending msg of 28 bytes to 3 on channel testchainid took 449.8µs" +"2019-11-19 05:21:36.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.8µs " +"2019-11-19 05:21:36.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 310 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:36.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 311 Sending msg of 28 bytes to 3 on channel testchainid took 57.8µs" +"2019-11-19 05:21:36.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 312 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " +"2019-11-19 05:21:37.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 313 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:37.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 314 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +"2019-11-19 05:21:37.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 315 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 786.9µs " +"2019-11-19 05:21:37.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 316 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:37.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 317 Sending msg of 28 bytes to 3 on channel testchainid took 36.9µs" +"2019-11-19 05:21:37.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.9µs " +"2019-11-19 05:21:38.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 319 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:38.100 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31a Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +"2019-11-19 05:21:38.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " +"2019-11-19 05:21:38.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:38.600 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31d Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +"2019-11-19 05:21:38.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 550.7µs " +"2019-11-19 05:21:39.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:39.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 35.3µs" +"2019-11-19 05:21:39.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.1µs " +"2019-11-19 05:21:39.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:39.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 323 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +"2019-11-19 05:21:39.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 324 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 416.2µs " +"2019-11-19 05:21:40.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 325 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:40.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 135.4µs" +"2019-11-19 05:21:40.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.9µs " +"2019-11-19 05:21:40.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:40.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 329 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-11-19 05:21:40.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.7µs " +"2019-11-19 05:21:41.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:41.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32c Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +"2019-11-19 05:21:41.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.8µs " +"2019-11-19 05:21:41.241 UTC [orderer.common.server] Deliver -> DEBU 32e Starting new Deliver handler" +"2019-11-19 05:21:41.241 UTC [common.deliver] Handle -> DEBU 32f Starting new deliver loop for 172.18.0.5:51412" +"2019-11-19 05:21:41.241 UTC [common.deliver] Handle -> DEBU 330 Attempting to read seek info message from 172.18.0.5:51412" +"2019-11-19 05:21:41.261 UTC [orderer.common.server] Broadcast -> DEBU 331 Starting new Broadcast handler" +"2019-11-19 05:21:41.261 UTC [orderer.common.broadcast] Handle -> DEBU 332 Starting new broadcast loop for 172.18.0.5:51414" +"2019-11-19 05:21:41.262 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 333 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:51414" +"2019-11-19 05:21:41.262 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 334 Processing config update tx with system channel message processor for channel ID businesschannel" +"2019-11-19 05:21:41.263 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 335 Processing channel create tx for channel businesschannel on system channel testchainid" +"2019-11-19 05:21:41.263 UTC [common.channelconfig] NewStandardValues -> DEBU 336 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:41.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 337 Processing field: HashingAlgorithm" +"2019-11-19 05:21:41.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 338 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:41.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 339 Processing field: OrdererAddresses" +"2019-11-19 05:21:41.263 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33a Processing field: Consortium" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33b Processing field: Capabilities" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] NewStandardValues -> DEBU 33c Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d Processing field: ConsensusType" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33e Processing field: BatchSize" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f Processing field: BatchTimeout" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 340 Processing field: KafkaBrokers" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 341 Processing field: ChannelRestrictions" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 342 Processing field: Capabilities" +"2019-11-19 05:21:41.264 UTC [common.channelconfig] NewStandardValues -> DEBU 343 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:41.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU 344 Processing field: Endpoints" +"2019-11-19 05:21:41.265 UTC [common.channelconfig] NewStandardValues -> DEBU 345 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU 346 Processing field: MSP" +"2019-11-19 05:21:41.265 UTC [common.channelconfig] validateMSP -> DEBU 347 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:41.265 UTC [msp] newBccspMsp -> DEBU 348 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.265 UTC [msp] New -> DEBU 349 Creating Cache-MSP instance" +"2019-11-19 05:21:41.265 UTC [msp] Setup -> DEBU 34a Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:41.266 UTC [msp.identity] newIdentity -> DEBU 34b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.266 UTC [msp.identity] newIdentity -> DEBU 34c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.266 UTC [msp] Validate -> DEBU 34d MSP OrdererMSP validating identity" +"2019-11-19 05:21:41.267 UTC [common.channelconfig] NewStandardValues -> DEBU 34e Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:41.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34f Processing field: ACLs" +"2019-11-19 05:21:41.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 350 Processing field: Capabilities" +"2019-11-19 05:21:41.267 UTC [common.channelconfig] NewStandardValues -> DEBU 351 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:41.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 352 Processing field: AnchorPeers" +"2019-11-19 05:21:41.267 UTC [common.channelconfig] NewStandardValues -> DEBU 353 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 354 Processing field: MSP" +"2019-11-19 05:21:41.267 UTC [common.channelconfig] Validate -> DEBU 355 Anchor peers for org Org1MSP are " +"2019-11-19 05:21:41.267 UTC [common.channelconfig] validateMSP -> DEBU 356 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:41.267 UTC [msp] newBccspMsp -> DEBU 357 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.267 UTC [msp] New -> DEBU 358 Creating Cache-MSP instance" +"2019-11-19 05:21:41.267 UTC [msp] Setup -> DEBU 359 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:41.268 UTC [msp.identity] newIdentity -> DEBU 35a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.268 UTC [common.channelconfig] NewStandardValues -> DEBU 35b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:41.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35c Processing field: AnchorPeers" +"2019-11-19 05:21:41.268 UTC [common.channelconfig] NewStandardValues -> DEBU 35d Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35e Processing field: MSP" +"2019-11-19 05:21:41.268 UTC [common.channelconfig] Validate -> DEBU 35f Anchor peers for org Org2MSP are " +"2019-11-19 05:21:41.269 UTC [common.channelconfig] validateMSP -> DEBU 360 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:41.269 UTC [msp] newBccspMsp -> DEBU 361 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.269 UTC [msp] New -> DEBU 362 Creating Cache-MSP instance" +"2019-11-19 05:21:41.269 UTC [msp] Setup -> DEBU 363 Setting up MSP instance Org2MSP" +"2019-11-19 05:21:41.269 UTC [msp.identity] newIdentity -> DEBU 364 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.270 UTC [msp] Setup -> DEBU 365 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:41.270 UTC [msp] Setup -> DEBU 366 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 367 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 368 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 369 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36a Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36b Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36c Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36d Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36e Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.270 UTC [policies] NewManagerImpl -> DEBU 36f Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 370 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 371 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 372 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 373 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 374 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 375 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 376 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-11-19 05:21:41.271 UTC [policies] GetPolicy -> DEBU 377 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 378 Proposed new policy Writers for Channel" +"2019-11-19 05:21:41.271 UTC [policies] GetPolicy -> DEBU 379 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 37a Proposed new policy Admins for Channel" +"2019-11-19 05:21:41.271 UTC [policies] GetPolicy -> DEBU 37b Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-11-19 05:21:41.271 UTC [policies] NewManagerImpl -> DEBU 37c Proposed new policy Readers for Channel" +"2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 37d Adding to config map: [Group] /Channel" +"2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 37e Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 37f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 380 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:41.271 UTC [common.configtx] addToMap -> DEBU 381 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 382 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 383 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 384 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 385 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 386 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 387 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 388 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 389 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:41.272 UTC [common.configtx] addToMap -> DEBU 38a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38b Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38c Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 38f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 390 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 391 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 392 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 393 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 394 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 395 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 396 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:41.273 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:41.274 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:41.275 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b4 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b5 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b6 Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b7 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b8 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3b9 Processing change to key: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:41.275 UTC [common.configtx] verifyDeltaSet -> DEBU 3ba Processing change to key: [Group] /Channel/Application" +"2019-11-19 05:21:41.275 UTC [common.configtx] policyForItem -> DEBU 3bb Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3bc Manager Channel looking up path []" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3bd Manager Channel has managers Orderer" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3be Manager Channel has managers Application" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3bf Manager Channel looking up path [Application]" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c0 Manager Channel has managers Orderer" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c1 Manager Channel has managers Application" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c2 Manager Channel/Application looking up path []" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c3 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:41.275 UTC [policies] Manager -> DEBU 3c4 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:41.275 UTC [policies] Evaluate -> DEBU 3c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-11-19 05:21:41.275 UTC [policies] Evaluate -> DEBU 3c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:41.275 UTC [policies] Evaluate -> DEBU 3c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-11-19 05:21:41.275 UTC [msp] DeserializeIdentity -> DEBU 3c8 Obtaining identity" +"2019-11-19 05:21:41.276 UTC [msp.identity] newIdentity -> DEBU 3c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.276 UTC [cauthdsl] func1 -> DEBU 3ca 0xc000925200 gate 1574140901276305700 evaluation starts" +"2019-11-19 05:21:41.276 UTC [cauthdsl] func2 -> DEBU 3cb 0xc000925200 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:41.276 UTC [cauthdsl] func2 -> DEBU 3cc 0xc000925200 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:41.276 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3cd Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-11-19 05:21:41.276 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3ce Checking if identity carries the admin ou for Org1MSP" +"2019-11-19 05:21:41.276 UTC [msp] Validate -> DEBU 3cf MSP Org1MSP validating identity" +"2019-11-19 05:21:41.276 UTC [msp] getCertificationChain -> DEBU 3d0 MSP Org1MSP getting certification chain" +"2019-11-19 05:21:41.276 UTC [msp] hasOURole -> DEBU 3d1 MSP Org1MSP checking if the identity is a client" +"2019-11-19 05:21:41.277 UTC [msp] getCertificationChain -> DEBU 3d2 MSP Org1MSP getting certification chain" +"2019-11-19 05:21:41.277 UTC [cauthdsl] func2 -> DEBU 3d3 0xc000925200 principal matched by identity 0" +"2019-11-19 05:21:41.277 UTC [msp.identity] Verify -> DEBU 3d4 Verify: digest = 00000000 f9 6f 4d ca e1 d0 95 1d 1d 09 87 f1 47 35 33 91 |.oM.........G53.| +00000010 09 ac fd d6 12 40 bb 66 ea 49 fa 7b 6f 84 b7 72 |.....@.f.I.{o..r|" +"2019-11-19 05:21:41.277 UTC [msp.identity] Verify -> DEBU 3d5 Verify: sig = 00000000 30 45 02 21 00 f5 b3 1c f4 c4 bb 3f d2 03 0c 6f |0E.!.......?...o| +00000010 15 d9 68 59 0a 69 49 a1 63 9d 07 14 52 80 db a4 |..hY.iI.c...R...| +00000020 e5 27 2c 7b 3e 02 20 0a eb 04 74 31 4b 3b e1 1c |.',{>. ...t1K;..| +00000030 9f 78 a7 ea f2 c6 d9 3c ee ff 97 d6 37 13 a8 78 |.x.....<....7..x| +00000040 32 7a 3f 6b c5 e7 f9 |2z?k...|" +"2019-11-19 05:21:41.277 UTC [cauthdsl] func2 -> DEBU 3d6 0xc000925200 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:41.277 UTC [cauthdsl] func1 -> DEBU 3d7 0xc000925200 gate 1574140901276305700 evaluation succeeds" +"2019-11-19 05:21:41.277 UTC [policies] Evaluate -> DEBU 3d8 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:41.277 UTC [policies] Evaluate -> DEBU 3d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:41.277 UTC [policies] Evaluate -> DEBU 3da Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-11-19 05:21:41.277 UTC [policies] Evaluate -> DEBU 3db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-11-19 05:21:41.277 UTC [common.configtx] verifyDeltaSet -> DEBU 3dc Processing change to key: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:41.277 UTC [common.configtx] recurseConfigMap -> DEBU 3dd Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.277 UTC [common.configtx] recurseConfigMap -> DEBU 3de Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3df Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e2 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e7 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3e9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3ea Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.278 UTC [common.configtx] recurseConfigMap -> DEBU 3eb Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3ec Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3ee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3ef Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3f1 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3f2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [common.configtx] recurseConfigMap -> DEBU 3f3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f4 Obtaining default signing identity" +"2019-11-19 05:21:41.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f5 Obtaining default signing identity" +"2019-11-19 05:21:41.280 UTC [msp.identity] Sign -> DEBU 3f6 Sign: plaintext: 0AD2060A1B08011A0608E5F7CDEE0522...1A7066823D13BD641343311233347296 " +"2019-11-19 05:21:41.280 UTC [msp.identity] Sign -> DEBU 3f7 Sign: digest: 5E8794C27BE6F608BABD00831B4CF18AFBC257AE3DB063A9271D0D0C4CB4537B " +"2019-11-19 05:21:41.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f8 Obtaining default signing identity" +"2019-11-19 05:21:41.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f9 Obtaining default signing identity" +"2019-11-19 05:21:41.280 UTC [msp.identity] Sign -> DEBU 3fa Sign: plaintext: 0ACE060A1708041A0608E5F7CDEE0522...7EC18B4E5D154B731367901066214577 " +"2019-11-19 05:21:41.280 UTC [msp.identity] Sign -> DEBU 3fb Sign: digest: 83EC0D9DC48D82002ABDEB52955820EB8F0D7CF4ECA53BDF6309D0B150C7B2ED " +"2019-11-19 05:21:41.281 UTC [policies] Evaluate -> DEBU 3fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:21:41.281 UTC [policies] Evaluate -> DEBU 3fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:41.282 UTC [policies] Evaluate -> DEBU 3fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-11-19 05:21:41.282 UTC [policies] Evaluate -> DEBU 3ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:41.282 UTC [policies] Evaluate -> DEBU 400 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-11-19 05:21:41.282 UTC [msp] DeserializeIdentity -> DEBU 401 Obtaining identity" +"2019-11-19 05:21:41.282 UTC [msp.identity] newIdentity -> DEBU 402 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.283 UTC [cauthdsl] func1 -> DEBU 403 0xc00097eb10 gate 1574140901283477200 evaluation starts" +"2019-11-19 05:21:41.283 UTC [cauthdsl] func2 -> DEBU 404 0xc00097eb10 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:41.283 UTC [cauthdsl] func2 -> DEBU 405 0xc00097eb10 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:41.283 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 406 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-11-19 05:21:41.283 UTC [msp] Validate -> DEBU 407 MSP OrdererMSP validating identity" +"2019-11-19 05:21:41.284 UTC [cauthdsl] func2 -> DEBU 408 0xc00097eb10 principal matched by identity 0" +"2019-11-19 05:21:41.284 UTC [msp.identity] Verify -> DEBU 409 Verify: digest = 00000000 83 ec 0d 9d c4 8d 82 00 2a bd eb 52 95 58 20 eb |........*..R.X .| +00000010 8f 0d 7c f4 ec a5 3b df 63 09 d0 b1 50 c7 b2 ed |..|...;.c...P...|" +"2019-11-19 05:21:41.284 UTC [msp.identity] Verify -> DEBU 40a Verify: sig = 00000000 30 44 02 20 54 be 3e ca 44 4f 64 9a d2 29 ed ba |0D. T.>.DOd..)..| +00000010 0a 0b e9 ec 93 97 98 88 b6 6d 0b 07 c4 d1 62 0d |.........m....b.| +00000020 ef 80 14 91 02 20 11 c1 30 0d 4c 37 37 68 a9 86 |..... ..0.L77h..| +00000030 01 2a 9d ff 76 f5 d7 44 66 f8 fc 2d 9f e2 8a 66 |.*..v..Df..-...f| +00000040 a0 38 1d 51 d7 73 |.8.Q.s|" +"2019-11-19 05:21:41.284 UTC [cauthdsl] func2 -> DEBU 40b 0xc00097eb10 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:41.284 UTC [cauthdsl] func1 -> DEBU 40c 0xc00097eb10 gate 1574140901283477200 evaluation succeeds" +"2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 40d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 40e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 40f Signature set satisfies policy /Channel/Orderer/Writers" +"2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 410 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 411 Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:21:41.285 UTC [policies] Evaluate -> DEBU 412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] NewStandardValues -> DEBU 413 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 414 Processing field: HashingAlgorithm" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 415 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 416 Processing field: OrdererAddresses" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 417 Processing field: Consortium" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 418 Processing field: Capabilities" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] NewStandardValues -> DEBU 419 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41a Processing field: ConsensusType" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41b Processing field: BatchSize" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41c Processing field: BatchTimeout" +"2019-11-19 05:21:41.286 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41d Processing field: KafkaBrokers" +"2019-11-19 05:21:41.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41e Processing field: ChannelRestrictions" +"2019-11-19 05:21:41.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41f Processing field: Capabilities" +"2019-11-19 05:21:41.287 UTC [common.channelconfig] NewStandardValues -> DEBU 420 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:41.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 421 Processing field: Endpoints" +"2019-11-19 05:21:41.287 UTC [common.channelconfig] NewStandardValues -> DEBU 422 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 423 Processing field: MSP" +"2019-11-19 05:21:41.287 UTC [common.channelconfig] validateMSP -> DEBU 424 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:41.287 UTC [msp] newBccspMsp -> DEBU 425 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.287 UTC [msp] New -> DEBU 426 Creating Cache-MSP instance" +"2019-11-19 05:21:41.288 UTC [msp] Setup -> DEBU 427 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:41.288 UTC [msp.identity] newIdentity -> DEBU 428 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.288 UTC [msp.identity] newIdentity -> DEBU 429 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.288 UTC [msp] Validate -> DEBU 42a MSP OrdererMSP validating identity" +"2019-11-19 05:21:41.289 UTC [common.channelconfig] NewStandardValues -> DEBU 42b Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:41.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42c Processing field: ACLs" +"2019-11-19 05:21:41.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42d Processing field: Capabilities" +"2019-11-19 05:21:41.289 UTC [common.channelconfig] NewStandardValues -> DEBU 42e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:41.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42f Processing field: AnchorPeers" +"2019-11-19 05:21:41.289 UTC [common.channelconfig] NewStandardValues -> DEBU 430 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 431 Processing field: MSP" +"2019-11-19 05:21:41.289 UTC [common.channelconfig] Validate -> DEBU 432 Anchor peers for org Org2MSP are " +"2019-11-19 05:21:41.290 UTC [common.channelconfig] validateMSP -> DEBU 433 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:41.290 UTC [msp] newBccspMsp -> DEBU 434 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.290 UTC [msp] New -> DEBU 435 Creating Cache-MSP instance" +"2019-11-19 05:21:41.290 UTC [msp] Setup -> DEBU 436 Setting up MSP instance Org2MSP" +"2019-11-19 05:21:41.291 UTC [msp.identity] newIdentity -> DEBU 437 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.291 UTC [common.channelconfig] NewStandardValues -> DEBU 438 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:41.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 439 Processing field: AnchorPeers" +"2019-11-19 05:21:41.291 UTC [common.channelconfig] NewStandardValues -> DEBU 43a Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43b Processing field: MSP" +"2019-11-19 05:21:41.292 UTC [common.channelconfig] Validate -> DEBU 43c Anchor peers for org Org1MSP are " +"2019-11-19 05:21:41.292 UTC [common.channelconfig] validateMSP -> DEBU 43d Setting up MSP for org Org1MSP" +"2019-11-19 05:21:41.292 UTC [msp] newBccspMsp -> DEBU 43e Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.292 UTC [msp] New -> DEBU 43f Creating Cache-MSP instance" +"2019-11-19 05:21:41.292 UTC [msp] Setup -> DEBU 440 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:41.293 UTC [msp.identity] newIdentity -> DEBU 441 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.293 UTC [msp] Setup -> DEBU 442 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:41.294 UTC [msp] Setup -> DEBU 443 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 444 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 445 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 446 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 447 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 448 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 449 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44a Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44b Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44c Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 44f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 450 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 451 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 452 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 453 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:41.294 UTC [policies] GetPolicy -> DEBU 454 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 455 Proposed new policy Admins for Channel" +"2019-11-19 05:21:41.294 UTC [policies] GetPolicy -> DEBU 456 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-11-19 05:21:41.294 UTC [policies] NewManagerImpl -> DEBU 457 Proposed new policy Readers for Channel" +"2019-11-19 05:21:41.295 UTC [policies] GetPolicy -> DEBU 458 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-11-19 05:21:41.295 UTC [policies] NewManagerImpl -> DEBU 459 Proposed new policy Writers for Channel" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45a Adding to config map: [Group] /Channel" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45b Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 45f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 460 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 461 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 463 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 465 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 467 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 468 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46a Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:41.295 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 470 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 471 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 472 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 474 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 478 Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 47a Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 47b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:41.296 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 47f Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:41.297 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:41.298 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:41.299 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:41.299 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:41.299 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:41.299 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 491 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 492 Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 493 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 494 Processing change to key: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 495 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:41.299 UTC [common.configtx] verifyDeltaSet -> DEBU 496 Processing change to key: [Group] /Channel/Application" +"2019-11-19 05:21:41.300 UTC [common.configtx] policyForItem -> DEBU 497 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 498 Manager Channel looking up path []" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 499 Manager Channel has managers Application" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49a Manager Channel has managers Orderer" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49b Manager Channel looking up path [Application]" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49c Manager Channel has managers Application" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49d Manager Channel has managers Orderer" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49e Manager Channel/Application looking up path []" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 49f Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:41.300 UTC [policies] Manager -> DEBU 4a0 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:41.300 UTC [policies] Evaluate -> DEBU 4a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-11-19 05:21:41.300 UTC [policies] Evaluate -> DEBU 4a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:41.301 UTC [policies] Evaluate -> DEBU 4a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-11-19 05:21:41.301 UTC [msp] DeserializeIdentity -> DEBU 4a4 Obtaining identity" +"2019-11-19 05:21:41.301 UTC [msp.identity] newIdentity -> DEBU 4a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.302 UTC [cauthdsl] func1 -> DEBU 4a6 0xc000b78100 gate 1574140901301988600 evaluation starts" +"2019-11-19 05:21:41.302 UTC [cauthdsl] func2 -> DEBU 4a7 0xc000b78100 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:41.302 UTC [cauthdsl] func2 -> DEBU 4a8 0xc000b78100 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:41.302 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 4a9 Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-11-19 05:21:41.302 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 4aa Checking if identity carries the admin ou for Org1MSP" +"2019-11-19 05:21:41.302 UTC [msp] Validate -> DEBU 4ab MSP Org1MSP validating identity" +"2019-11-19 05:21:41.302 UTC [msp] getCertificationChain -> DEBU 4ac MSP Org1MSP getting certification chain" +"2019-11-19 05:21:41.302 UTC [msp] hasOURole -> DEBU 4ad MSP Org1MSP checking if the identity is a client" +"2019-11-19 05:21:41.302 UTC [msp] getCertificationChain -> DEBU 4ae MSP Org1MSP getting certification chain" +"2019-11-19 05:21:41.303 UTC [cauthdsl] func2 -> DEBU 4af 0xc000b78100 principal matched by identity 0" +"2019-11-19 05:21:41.303 UTC [msp.identity] Verify -> DEBU 4b0 Verify: digest = 00000000 f9 6f 4d ca e1 d0 95 1d 1d 09 87 f1 47 35 33 91 |.oM.........G53.| +00000010 09 ac fd d6 12 40 bb 66 ea 49 fa 7b 6f 84 b7 72 |.....@.f.I.{o..r|" +"2019-11-19 05:21:41.303 UTC [msp.identity] Verify -> DEBU 4b1 Verify: sig = 00000000 30 45 02 21 00 f5 b3 1c f4 c4 bb 3f d2 03 0c 6f |0E.!.......?...o| +00000010 15 d9 68 59 0a 69 49 a1 63 9d 07 14 52 80 db a4 |..hY.iI.c...R...| +00000020 e5 27 2c 7b 3e 02 20 0a eb 04 74 31 4b 3b e1 1c |.',{>. ...t1K;..| +00000030 9f 78 a7 ea f2 c6 d9 3c ee ff 97 d6 37 13 a8 78 |.x.....<....7..x| +00000040 32 7a 3f 6b c5 e7 f9 |2z?k...|" +"2019-11-19 05:21:41.303 UTC [cauthdsl] func2 -> DEBU 4b2 0xc000b78100 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:41.303 UTC [cauthdsl] func1 -> DEBU 4b3 0xc000b78100 gate 1574140901301988600 evaluation succeeds" +"2019-11-19 05:21:41.303 UTC [policies] Evaluate -> DEBU 4b4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:41.304 UTC [policies] Evaluate -> DEBU 4b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:41.304 UTC [policies] Evaluate -> DEBU 4b6 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-11-19 05:21:41.304 UTC [policies] Evaluate -> DEBU 4b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-11-19 05:21:41.304 UTC [common.configtx] verifyDeltaSet -> DEBU 4b8 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:41.304 UTC [common.configtx] verifyDeltaSet -> DEBU 4b9 Processing change to key: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:41.304 UTC [common.configtx] recurseConfigMap -> DEBU 4ba Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.304 UTC [common.configtx] recurseConfigMap -> DEBU 4bb Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.304 UTC [common.configtx] recurseConfigMap -> DEBU 4bc Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4bd Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4be Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4bf Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c0 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.305 UTC [common.configtx] recurseConfigMap -> DEBU 4c4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c7 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c8 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4c9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4ca Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4cb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4cc Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.306 UTC [common.configtx] recurseConfigMap -> DEBU 4cd Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.307 UTC [common.configtx] recurseConfigMap -> DEBU 4ce Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.307 UTC [common.configtx] recurseConfigMap -> DEBU 4cf Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.307 UTC [common.configtx] recurseConfigMap -> DEBU 4d0 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:41.307 UTC [common.channelconfig] NewStandardValues -> DEBU 4d1 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:41.307 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d2 Processing field: HashingAlgorithm" +"2019-11-19 05:21:41.307 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d3 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:41.307 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d4 Processing field: OrdererAddresses" +"2019-11-19 05:21:41.307 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d5 Processing field: Consortium" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: Capabilities" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] NewStandardValues -> DEBU 4d7 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: ConsensusType" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d9 Processing field: BatchSize" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4da Processing field: BatchTimeout" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4db Processing field: KafkaBrokers" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4dc Processing field: ChannelRestrictions" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4dd Processing field: Capabilities" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] NewStandardValues -> DEBU 4de Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4df Processing field: Endpoints" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] NewStandardValues -> DEBU 4e0 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e1 Processing field: MSP" +"2019-11-19 05:21:41.308 UTC [common.channelconfig] validateMSP -> DEBU 4e2 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:41.308 UTC [msp] newBccspMsp -> DEBU 4e3 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.309 UTC [msp] New -> DEBU 4e4 Creating Cache-MSP instance" +"2019-11-19 05:21:41.309 UTC [msp] Setup -> DEBU 4e5 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:41.309 UTC [msp.identity] newIdentity -> DEBU 4e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.309 UTC [msp.identity] newIdentity -> DEBU 4e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.309 UTC [msp] Validate -> DEBU 4e8 MSP OrdererMSP validating identity" +"2019-11-19 05:21:41.309 UTC [common.channelconfig] NewStandardValues -> DEBU 4e9 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:41.309 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ea Processing field: ACLs" +"2019-11-19 05:21:41.309 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4eb Processing field: Capabilities" +"2019-11-19 05:21:41.310 UTC [common.channelconfig] NewStandardValues -> DEBU 4ec Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:41.310 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ed Processing field: AnchorPeers" +"2019-11-19 05:21:41.310 UTC [common.channelconfig] NewStandardValues -> DEBU 4ee Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.310 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ef Processing field: MSP" +"2019-11-19 05:21:41.310 UTC [common.channelconfig] Validate -> DEBU 4f0 Anchor peers for org Org1MSP are " +"2019-11-19 05:21:41.310 UTC [common.channelconfig] validateMSP -> DEBU 4f1 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:41.310 UTC [msp] newBccspMsp -> DEBU 4f2 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.310 UTC [msp] New -> DEBU 4f3 Creating Cache-MSP instance" +"2019-11-19 05:21:41.310 UTC [msp] Setup -> DEBU 4f4 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:41.310 UTC [msp.identity] newIdentity -> DEBU 4f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.311 UTC [common.channelconfig] NewStandardValues -> DEBU 4f6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:41.311 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f7 Processing field: AnchorPeers" +"2019-11-19 05:21:41.311 UTC [common.channelconfig] NewStandardValues -> DEBU 4f8 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.311 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f9 Processing field: MSP" +"2019-11-19 05:21:41.311 UTC [common.channelconfig] Validate -> DEBU 4fa Anchor peers for org Org2MSP are " +"2019-11-19 05:21:41.311 UTC [common.channelconfig] validateMSP -> DEBU 4fb Setting up MSP for org Org2MSP" +"2019-11-19 05:21:41.311 UTC [msp] newBccspMsp -> DEBU 4fc Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.311 UTC [msp] New -> DEBU 4fd Creating Cache-MSP instance" +"2019-11-19 05:21:41.311 UTC [msp] Setup -> DEBU 4fe Setting up MSP instance Org2MSP" +"2019-11-19 05:21:41.311 UTC [msp.identity] newIdentity -> DEBU 4ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.311 UTC [msp] Setup -> DEBU 500 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:41.311 UTC [msp] Setup -> DEBU 501 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 502 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 503 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 504 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 505 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 506 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 507 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 508 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 509 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50a Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50b Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50c Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50d Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50e Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 50f Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 510 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Readers for Channel/Application" +"2019-11-19 05:21:41.312 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Writers for Channel/Application" +"2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Admins for Channel/Application" +"2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 516 Proposed new policy Writers for Channel" +"2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 517 Proposed new policy Admins for Channel" +"2019-11-19 05:21:41.313 UTC [policies] NewManagerImpl -> DEBU 518 Proposed new policy Readers for Channel" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51a Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 51f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 520 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 521 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 522 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:41.313 UTC [common.configtx] addToMap -> DEBU 523 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52b Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 52f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 530 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 531 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:41.314 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:41.315 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:41.315 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:41.316 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:41.316 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:41.316 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:41.316 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:41.317 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:41.317 UTC [common.capabilities] Supported -> DEBU 545 Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:21:41.317 UTC [common.capabilities] Supported -> DEBU 546 Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:21:41.318 UTC [orderer.common.cluster] NewStream -> DEBU 547 Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2019-11-19 05:21:41.318 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 548 Sending msg of 26611 bytes to 3 on channel testchainid took 146.7µs" +"2019-11-19 05:21:41.318 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 549 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:51414" +"2019-11-19 05:21:41.318 UTC [orderer.common.cluster.step] sendMessage -> DEBU 54a Send of SubmitRequest for channel testchainid with payload of size 26611 to orderer2.example.com(orderer2.example.com:7050) took 128.6µs " +"2019-11-19 05:21:41.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 54b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 26821" +"2019-11-19 05:21:41.346 UTC [orderer.common.cluster.step] handleMessage -> DEBU 54c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:41.354 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 54d Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2019-11-19 05:21:41.355 UTC [orderer.common.cluster.step] sendMessage -> DEBU 54e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 763.6µs " +"2019-11-19 05:21:41.360 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 54f Sending msg of 28 bytes to 3 on channel testchainid took 4.6843ms" +"2019-11-19 05:21:41.363 UTC [orderer.common.cluster.step] sendMessage -> DEBU 550 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.3µs " +"2019-11-19 05:21:41.363 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 551 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2019-11-19 05:21:41.370 UTC [common.channelconfig] NewStandardValues -> DEBU 552 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:41.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 553 Processing field: HashingAlgorithm" +"2019-11-19 05:21:41.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 554 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:41.370 UTC [common.channelconfig] initializeProtosStruct -> DEBU 555 Processing field: OrdererAddresses" +"2019-11-19 05:21:41.372 UTC [common.channelconfig] initializeProtosStruct -> DEBU 556 Processing field: Consortium" +"2019-11-19 05:21:41.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 557 Processing field: Capabilities" +"2019-11-19 05:21:41.375 UTC [common.channelconfig] NewStandardValues -> DEBU 558 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:41.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 559 Processing field: ACLs" +"2019-11-19 05:21:41.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55a Processing field: Capabilities" +"2019-11-19 05:21:41.376 UTC [common.channelconfig] NewStandardValues -> DEBU 55b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:41.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55c Processing field: AnchorPeers" +"2019-11-19 05:21:41.376 UTC [common.channelconfig] NewStandardValues -> DEBU 55d Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55e Processing field: MSP" +"2019-11-19 05:21:41.377 UTC [common.channelconfig] Validate -> DEBU 55f Anchor peers for org Org1MSP are " +"2019-11-19 05:21:41.380 UTC [orderer.common.broadcast] Handle -> DEBU 560 Received EOF from 172.18.0.5:51414, hangup" +"2019-11-19 05:21:41.382 UTC [orderer.common.server] func1 -> DEBU 561 Closing Broadcast stream" +"2019-11-19 05:21:41.382 UTC [comm.grpc.server] 1 -> INFO 562 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51414 grpc.code=OK grpc.call_duration=120.7758ms +"2019-11-19 05:21:41.382 UTC [common.channelconfig] validateMSP -> DEBU 563 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:41.382 UTC [msp] newBccspMsp -> DEBU 564 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.382 UTC [msp] New -> DEBU 565 Creating Cache-MSP instance" +"2019-11-19 05:21:41.391 UTC [msp] Setup -> DEBU 566 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:41.391 UTC [msp.identity] newIdentity -> DEBU 567 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.393 UTC [common.channelconfig] NewStandardValues -> DEBU 568 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:41.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU 569 Processing field: AnchorPeers" +"2019-11-19 05:21:41.393 UTC [common.channelconfig] NewStandardValues -> DEBU 56a Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.393 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56b Processing field: MSP" +"2019-11-19 05:21:41.393 UTC [common.channelconfig] Validate -> DEBU 56c Anchor peers for org Org2MSP are " +"2019-11-19 05:21:41.393 UTC [common.channelconfig] validateMSP -> DEBU 56d Setting up MSP for org Org2MSP" +"2019-11-19 05:21:41.394 UTC [msp] newBccspMsp -> DEBU 56e Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.394 UTC [msp] New -> DEBU 56f Creating Cache-MSP instance" +"2019-11-19 05:21:41.394 UTC [msp] Setup -> DEBU 570 Setting up MSP instance Org2MSP" +"2019-11-19 05:21:41.395 UTC [msp.identity] newIdentity -> DEBU 571 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.396 UTC [common.channelconfig] NewStandardValues -> DEBU 572 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 573 Processing field: ConsensusType" +"2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 574 Processing field: BatchSize" +"2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 575 Processing field: BatchTimeout" +"2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 576 Processing field: KafkaBrokers" +"2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 577 Processing field: ChannelRestrictions" +"2019-11-19 05:21:41.396 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: Capabilities" +"2019-11-19 05:21:41.397 UTC [common.channelconfig] NewStandardValues -> DEBU 579 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:41.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: Endpoints" +"2019-11-19 05:21:41.397 UTC [common.channelconfig] NewStandardValues -> DEBU 57b Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:41.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57c Processing field: MSP" +"2019-11-19 05:21:41.397 UTC [common.channelconfig] validateMSP -> DEBU 57d Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:41.397 UTC [msp] newBccspMsp -> DEBU 57e Creating BCCSP-based MSP instance" +"2019-11-19 05:21:41.397 UTC [msp] New -> DEBU 57f Creating Cache-MSP instance" +"2019-11-19 05:21:41.397 UTC [msp] Setup -> DEBU 580 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:41.398 UTC [msp.identity] newIdentity -> DEBU 581 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.398 UTC [msp.identity] newIdentity -> DEBU 582 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:41.399 UTC [msp] Validate -> DEBU 583 MSP OrdererMSP validating identity" +"2019-11-19 05:21:41.399 UTC [msp] Setup -> DEBU 584 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:41.399 UTC [msp] Setup -> DEBU 585 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:41.399 UTC [policies] NewManagerImpl -> DEBU 586 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.399 UTC [policies] NewManagerImpl -> DEBU 587 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.399 UTC [policies] NewManagerImpl -> DEBU 588 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Readers for Channel/Application" +"2019-11-19 05:21:41.400 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Writers for Channel/Application" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Admins for Channel/Application" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:41.401 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:41.402 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy Admins for Channel" +"2019-11-19 05:21:41.402 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Readers for Channel" +"2019-11-19 05:21:41.402 UTC [policies] NewManagerImpl -> DEBU 59c Proposed new policy Writers for Channel" +"2019-11-19 05:21:41.402 UTC [common.configtx] addToMap -> DEBU 59d Adding to config map: [Group] /Channel" +"2019-11-19 05:21:41.402 UTC [common.configtx] addToMap -> DEBU 59e Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 59f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:41.403 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:41.404 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:41.405 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:41.407 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:41.408 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:41.408 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:41.418 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:41.418 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:41.419 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:41.419 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:41.420 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:41.420 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:41.420 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:41.421 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:41.421 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:41.421 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:41.422 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:41.422 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:41.423 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:41.423 UTC [common.configtx] addToMap -> DEBU 5c8 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:41.424 UTC [common.channelconfig] LogSanityChecks -> DEBU 5c9 As expected, current configuration has policy '/Channel/Readers'" +"2019-11-19 05:21:41.424 UTC [common.channelconfig] LogSanityChecks -> DEBU 5ca As expected, current configuration has policy '/Channel/Writers'" +"2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5cb Manager Channel looking up path [Application]" +"2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5cc Manager Channel has managers Application" +"2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5cd Manager Channel has managers Orderer" +"2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5ce Manager Channel/Application looking up path []" +"2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5cf Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:41.425 UTC [policies] Manager -> DEBU 5d0 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:41.425 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d1 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-11-19 05:21:41.426 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d2 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-11-19 05:21:41.426 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d3 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d4 Manager Channel looking up path [Orderer]" +"2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d5 Manager Channel has managers Application" +"2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d6 Manager Channel has managers Orderer" +"2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d7 Manager Channel/Orderer looking up path []" +"2019-11-19 05:21:41.426 UTC [policies] Manager -> DEBU 5d8 Manager Channel/Orderer has managers OrdererOrg" +"2019-11-19 05:21:41.427 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d9 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-11-19 05:21:41.427 UTC [common.channelconfig] LogSanityChecks -> DEBU 5da As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-11-19 05:21:41.427 UTC [common.channelconfig] LogSanityChecks -> DEBU 5db As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-11-19 05:21:41.427 UTC [common.channelconfig] LogSanityChecks -> DEBU 5dc As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-11-19 05:21:41.427 UTC [common.capabilities] Supported -> DEBU 5dd Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:21:41.428 UTC [common.capabilities] Supported -> DEBU 5de Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:21:41.428 UTC [fsblkstorage] newBlockfileMgr -> DEBU 5df newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-11-19 05:21:41.428 UTC [kvledger.util] CreateDirIfMissing -> DEBU 5e0 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2019-11-19 05:21:41.428 UTC [kvledger.util] logDirStatus -> DEBU 5e1 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2019-11-19 05:21:41.430 UTC [kvledger.util] logDirStatus -> DEBU 5e2 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2019-11-19 05:21:41.435 UTC [fsblkstorage] newBlockfileMgr -> INFO 5e3 Getting block information from block storage" +"2019-11-19 05:21:41.435 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5e4 Retrieving checkpoint info from block files" +"2019-11-19 05:21:41.436 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 5e5 retrieveLastFileSuffix()" +"2019-11-19 05:21:41.436 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 5e6 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-11-19 05:21:41.436 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5e7 Last file number found = -1" +"2019-11-19 05:21:41.436 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5e8 No block file found" +"2019-11-19 05:21:41.437 UTC [fsblkstorage] newBlockfileMgr -> DEBU 5e9 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000168d60)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-11-19 05:21:41.439 UTC [fsblkstorage] newBlockIndex -> DEBU 5ea newBlockIndex() - indexItems:[[BlockNum]]" +"2019-11-19 05:21:41.439 UTC [orderer.common.server] func1 -> DEBU 5eb Executing callback to update root CAs" +"2019-11-19 05:21:41.439 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ec updating root CAs for channel [businesschannel]" +"2019-11-19 05:21:41.439 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ed adding app root CAs for MSP [Org1MSP]" +"2019-11-19 05:21:41.440 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ee adding app root CAs for MSP [Org2MSP]" +"2019-11-19 05:21:41.440 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ef adding orderer root CAs for MSP [OrdererMSP]" +"2019-11-19 05:21:41.443 UTC [fsblkstorage] indexBlock -> DEBU 5f0 Indexing block [blockNum=0, blockHash=[]byte{0xeb, 0xcd, 0x1f, 0x7, 0xa0, 0x44, 0x7e, 0xdb, 0xb0, 0xc3, 0xd8, 0x38, 0xb2, 0x31, 0xa, 0x6d, 0xa6, 0x14, 0x14, 0x86, 0xef, 0x53, 0x16, 0x8b, 0x27, 0xf5, 0x83, 0xcc, 0x3e, 0xcb, 0xfd, 0x8c} txOffsets= +txId=92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426 locPointer=offset=39, bytesLength=25761 +]" +"2019-11-19 05:21:41.445 UTC [fsblkstorage] updateCheckpoint -> DEBU 5f1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25806], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-11-19 05:21:41.445 UTC [fsblkstorage] Next -> DEBU 5f2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-11-19 05:21:41.446 UTC [fsblkstorage] newBlockfileStream -> DEBU 5f3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-11-19 05:21:41.446 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f4 Remaining bytes=[25806], Going to peek [8] bytes" +"2019-11-19 05:21:41.446 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f5 Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:21:41.446 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f6 blockbytes [25803] read from file [0]" +"2019-11-19 05:21:41.447 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 5f7 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2019-11-19 05:21:41.447 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 5f8 EvictionSuspicion not set, defaulting to 10m0s" +"2019-11-19 05:21:41.447 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 5f9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2019-11-19 05:21:41.447 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 5fa No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2019-11-19 05:21:41.452 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 5fb Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2019-11-19 05:21:41.453 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 5fc Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2019-11-19 05:21:41.453 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 5fd Appending 0 entries to memory storage" channel=businesschannel node=1 +"2019-11-19 05:21:41.453 UTC [fsblkstorage] Next -> DEBU 5fe Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-11-19 05:21:41.453 UTC [fsblkstorage] newBlockfileStream -> DEBU 5ff newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-11-19 05:21:41.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 600 Remaining bytes=[25806], Going to peek [8] bytes" +"2019-11-19 05:21:41.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 601 Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:21:41.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 602 blockbytes [25803] read from file [0]" +"2019-11-19 05:21:41.454 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 603 [channel: businesschannel] Done creating channel support resources" +"2019-11-19 05:21:41.454 UTC [orderer.commmon.multichannel] newChain -> INFO 604 Created and starting new chain businesschannel" +"2019-11-19 05:21:41.454 UTC [orderer.consensus.etcdraft] Start -> INFO 605 Starting Raft node" channel=businesschannel node=1 +"2019-11-19 05:21:41.455 UTC [orderer.common.cluster] Configure -> INFO 606 Entering, channel: businesschannel, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +]" +"2019-11-19 05:21:41.457 UTC [orderer.common.cluster] updateStubInMapping -> INFO 607 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2019-11-19 05:21:41.457 UTC [orderer.common.cluster] updateStubInMapping -> INFO 608 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-11-19 05:21:41.457 UTC [orderer.common.cluster] func1 -> DEBU 609 Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- + for channel businesschannel" +"2019-11-19 05:21:41.458 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60a Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2019-11-19 05:21:41.458 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60b Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-11-19 05:21:41.459 UTC [orderer.common.cluster] func1 -> DEBU 60c Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- + for channel businesschannel" +"2019-11-19 05:21:41.459 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 60d 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-11-19 05:21:41.459 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 60e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-11-19 05:21:41.465 UTC [orderer.common.cluster] Configure -> INFO 60f Exiting" +"2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] start -> DEBU 610 Starting raft node: #peers: 3" channel=businesschannel node=1 +"2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] start -> INFO 611 Starting raft node as part of a new channel" channel=businesschannel node=1 +"2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 612 1 became follower at term 0" channel=businesschannel node=1 +"2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] newRaft -> INFO 613 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2019-11-19 05:21:41.465 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 614 1 became follower at term 1" channel=businesschannel node=1 +"2019-11-19 05:21:41.466 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 615 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2019-11-19 05:21:41.466 UTC [msp] GetDefaultSigningIdentity -> DEBU 616 Obtaining default signing identity" +"2019-11-19 05:21:41.466 UTC [msp] GetDefaultSigningIdentity -> DEBU 617 Obtaining default signing identity" +"2019-11-19 05:21:41.466 UTC [msp.identity] Sign -> DEBU 618 Sign: plaintext: 0A00120B0A090A03010203100418050A...6A5F52C44195187F2F6CC97D288A1283 " +"2019-11-19 05:21:41.466 UTC [msp.identity] Sign -> DEBU 619 Sign: digest: 79351464429015126BDA4D07B75CE29969D95A3FF95ECF87CE085F8CBF67E161 " +"2019-11-19 05:21:41.468 UTC [orderer.consensus.etcdraft] run -> INFO 61a This node is picked to start campaign" channel=businesschannel node=1 +"2019-11-19 05:21:41.470 UTC [fsblkstorage] indexBlock -> DEBU 61b Indexing block [blockNum=1, blockHash=[]byte{0x99, 0xe4, 0xbf, 0x1d, 0x57, 0xdc, 0xe1, 0xe4, 0x76, 0x42, 0xcb, 0x5, 0x13, 0xcf, 0x4f, 0x64, 0xd8, 0x44, 0x1c, 0x4c, 0xde, 0x74, 0xd2, 0xac, 0x5, 0xa5, 0xb7, 0xa4, 0x1c, 0x63, 0x7d, 0x26} txOffsets= +txId=023949a6631ee2d7e0e47b7c0948d4e2886db2b79b5914bfa467dc5da576f2fa locPointer=offset=71, bytesLength=26690 +]" +"2019-11-19 05:21:41.474 UTC [orderer.consensus.etcdraft] apply -> INFO 61c Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-11-19 05:21:41.474 UTC [orderer.consensus.etcdraft] apply -> INFO 61d Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-11-19 05:21:41.474 UTC [orderer.consensus.etcdraft] apply -> INFO 61e Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-11-19 05:21:41.474 UTC [common.deliver] deliverBlocks -> WARN 61f [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51412 because of consenter error" +"2019-11-19 05:21:41.475 UTC [orderer.common.server] func1 -> DEBU 620 Closing Deliver stream" +"2019-11-19 05:21:41.475 UTC [comm.grpc.server] 1 -> INFO 621 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51412 grpc.code=OK grpc.call_duration=234.4417ms +"2019-11-19 05:21:41.496 UTC [fsblkstorage] updateCheckpoint -> DEBU 622 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47979], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-11-19 05:21:41.496 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 623 [channel: testchainid] Wrote block [1]" +"2019-11-19 05:21:41.519 UTC [orderer.common.server] Deliver -> DEBU 624 Starting new Deliver handler" +"2019-11-19 05:21:41.520 UTC [common.deliver] Handle -> DEBU 625 Starting new deliver loop for 172.18.0.5:51416" +"2019-11-19 05:21:41.521 UTC [common.deliver] Handle -> DEBU 626 Attempting to read seek info message from 172.18.0.5:51416" +"2019-11-19 05:21:41.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 627 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:41.600 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 628 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-11-19 05:21:41.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 629 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.2µs " +"2019-11-19 05:21:41.723 UTC [common.deliver] deliverBlocks -> WARN 62a [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51416 because of consenter error" +"2019-11-19 05:21:41.724 UTC [orderer.common.server] func1 -> DEBU 62b Closing Deliver stream" +"2019-11-19 05:21:41.725 UTC [comm.grpc.server] 1 -> INFO 62c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51416 grpc.code=OK grpc.call_duration=206.4013ms +"2019-11-19 05:21:41.749 UTC [orderer.common.server] Deliver -> DEBU 62d Starting new Deliver handler" +"2019-11-19 05:21:41.749 UTC [common.deliver] Handle -> DEBU 62e Starting new deliver loop for 172.18.0.5:51418" +"2019-11-19 05:21:41.749 UTC [common.deliver] Handle -> DEBU 62f Attempting to read seek info message from 172.18.0.5:51418" +"2019-11-19 05:21:41.951 UTC [common.deliver] deliverBlocks -> WARN 630 [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51418 because of consenter error" +"2019-11-19 05:21:41.952 UTC [orderer.common.server] func1 -> DEBU 631 Closing Deliver stream" +"2019-11-19 05:21:41.955 UTC [comm.grpc.server] 1 -> INFO 632 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51418 grpc.code=OK grpc.call_duration=207.0777ms +"2019-11-19 05:21:41.988 UTC [orderer.common.server] Deliver -> DEBU 633 Starting new Deliver handler" +"2019-11-19 05:21:41.989 UTC [common.deliver] Handle -> DEBU 634 Starting new deliver loop for 172.18.0.5:51420" +"2019-11-19 05:21:41.989 UTC [common.deliver] Handle -> DEBU 635 Attempting to read seek info message from 172.18.0.5:51420" +"2019-11-19 05:21:42.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 636 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:42.101 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 637 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2019-11-19 05:21:42.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 638 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +"2019-11-19 05:21:42.191 UTC [common.deliver] deliverBlocks -> WARN 639 [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51420 because of consenter error" +"2019-11-19 05:21:42.194 UTC [orderer.common.server] func1 -> DEBU 63a Closing Deliver stream" +"2019-11-19 05:21:42.197 UTC [comm.grpc.server] 1 -> INFO 63b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51420 grpc.code=OK grpc.call_duration=208.3239ms +"2019-11-19 05:21:42.225 UTC [orderer.common.server] Deliver -> DEBU 63c Starting new Deliver handler" +"2019-11-19 05:21:42.225 UTC [common.deliver] Handle -> DEBU 63d Starting new deliver loop for 172.18.0.5:51422" +"2019-11-19 05:21:42.225 UTC [common.deliver] Handle -> DEBU 63e Attempting to read seek info message from 172.18.0.5:51422" +"2019-11-19 05:21:42.440 UTC [common.deliver] deliverBlocks -> WARN 63f [channel: businesschannel] Rejecting deliver request for 172.18.0.5:51422 because of consenter error" +"2019-11-19 05:21:42.440 UTC [orderer.common.server] func1 -> DEBU 640 Closing Deliver stream" +"2019-11-19 05:21:42.440 UTC [comm.grpc.server] 1 -> INFO 641 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51422 grpc.code=OK grpc.call_duration=215.2155ms +"2019-11-19 05:21:42.477 UTC [orderer.consensus.etcdraft] Step -> INFO 642 1 is starting a new election at term 1" channel=businesschannel node=1 +"2019-11-19 05:21:42.479 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 643 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2019-11-19 05:21:42.479 UTC [orderer.consensus.etcdraft] poll -> INFO 644 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2019-11-19 05:21:42.479 UTC [orderer.consensus.etcdraft] campaign -> INFO 645 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2019-11-19 05:21:42.480 UTC [orderer.consensus.etcdraft] campaign -> INFO 646 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2019-11-19 05:21:42.481 UTC [orderer.common.cluster] NewStream -> DEBU 647 Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2019-11-19 05:21:42.481 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 648 Sending msg of 28 bytes to 2 on channel businesschannel took 553.5µs" +"2019-11-19 05:21:42.482 UTC [orderer.common.cluster.step] sendMessage -> DEBU 649 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97µs " +"2019-11-19 05:21:42.485 UTC [orderer.common.cluster] NewStream -> DEBU 64a Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-11-19 05:21:42.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 64b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.1µs " +"2019-11-19 05:21:42.459 UTC [orderer.common.cluster] Step -> DEBU 64c Connection from orderer2.example.com(172.18.0.4:44088)" +"2019-11-19 05:21:42.460 UTC [orderer.common.cluster.step] handleMessage -> DEBU 64d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.460 UTC [orderer.consensus.etcdraft] poll -> INFO 64e 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 +"2019-11-19 05:21:42.460 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 64f 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-11-19 05:21:42.461 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 650 1 became candidate at term 2" channel=businesschannel node=1 +"2019-11-19 05:21:42.462 UTC [orderer.consensus.etcdraft] poll -> INFO 651 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2019-11-19 05:21:42.462 UTC [orderer.consensus.etcdraft] campaign -> INFO 652 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2019-11-19 05:21:42.463 UTC [orderer.consensus.etcdraft] campaign -> INFO 653 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2019-11-19 05:21:42.463 UTC [orderer.common.cluster] Step -> DEBU 654 Connection from orderer1.example.com(172.18.0.2:42290)" +"2019-11-19 05:21:42.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU 655 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 656 Sending msg of 28 bytes to 3 on channel businesschannel took 2.5865ms" +"2019-11-19 05:21:42.467 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 657 Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +"2019-11-19 05:21:42.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 659 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.470 UTC [orderer.consensus.etcdraft] poll -> INFO 65a 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +"2019-11-19 05:21:42.468 UTC [orderer.common.cluster.step] sendMessage -> DEBU 658 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.1µs " +"2019-11-19 05:21:42.477 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 65b 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-11-19 05:21:42.477 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 65c 1 became leader at term 2" channel=businesschannel node=1 +"2019-11-19 05:21:42.477 UTC [orderer.consensus.etcdraft] run -> INFO 65d raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2019-11-19 05:21:42.483 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 65e Sending msg of 28 bytes to 3 on channel businesschannel took 14.277ms" +"2019-11-19 05:21:42.485 UTC [orderer.common.server] Deliver -> DEBU 660 Starting new Deliver handler" +"2019-11-19 05:21:42.485 UTC [common.deliver] Handle -> DEBU 661 Starting new deliver loop for 172.18.0.5:51424" +"2019-11-19 05:21:42.486 UTC [common.deliver] Handle -> DEBU 662 Attempting to read seek info message from 172.18.0.5:51424" +"2019-11-19 05:21:42.486 UTC [orderer.consensus.etcdraft] run -> INFO 663 Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2019-11-19 05:21:42.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 65f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.1µs " +"2019-11-19 05:21:42.486 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 664 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2019-11-19 05:21:42.487 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 665 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2019-11-19 05:21:42.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 666 Sending msg of 36 bytes to 2 on channel businesschannel took 56.5µs" +"2019-11-19 05:21:42.490 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 667 Sending msg of 36 bytes to 3 on channel businesschannel took 124.7µs" +"2019-11-19 05:21:42.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 668 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 2.3562ms " +"2019-11-19 05:21:42.498 UTC [orderer.common.cluster.step] sendMessage -> DEBU 669 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 519.9µs " +"2019-11-19 05:21:42.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 66a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66c Sending msg of 28 bytes to 2 on channel businesschannel took 16.8µs" +"2019-11-19 05:21:42.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 66d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216.1µs " +"2019-11-19 05:21:42.502 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 66e Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2019-11-19 05:21:42.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 66b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 66f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 670 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.508 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 671 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2019-11-19 05:21:42.509 UTC [orderer.common.cluster.step] sendMessage -> DEBU 672 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 315.9µs " +"2019-11-19 05:21:42.512 UTC [orderer.common.cluster.step] handleMessage -> DEBU 673 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 674 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:42.568 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 675 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +"2019-11-19 05:21:42.568 UTC [orderer.common.cluster.step] sendMessage -> DEBU 676 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.4µs " +"2019-11-19 05:21:42.616 UTC [orderer.common.server] replicateDisabledChains -> DEBU 677 No inactive chains to try to replicate" +"2019-11-19 05:21:42.688 UTC [policies] Evaluate -> DEBU 678 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:21:42.689 UTC [policies] Evaluate -> DEBU 679 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:42.689 UTC [policies] Evaluate -> DEBU 67a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:21:42.691 UTC [policies] Evaluate -> DEBU 67b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:42.691 UTC [policies] Evaluate -> DEBU 67c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:21:42.692 UTC [msp] DeserializeIdentity -> DEBU 67d Obtaining identity" +"2019-11-19 05:21:42.693 UTC [msp.identity] newIdentity -> DEBU 67e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-11-19 05:21:42.694 UTC [cauthdsl] func1 -> DEBU 67f 0xc0008eee30 gate 1574140902694116700 evaluation starts" +"2019-11-19 05:21:42.694 UTC [cauthdsl] func2 -> DEBU 680 0xc0008eee30 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:42.694 UTC [cauthdsl] func2 -> DEBU 681 0xc0008eee30 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:42.694 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 682 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-11-19 05:21:42.694 UTC [msp] Validate -> DEBU 683 MSP Org1MSP validating identity" +"2019-11-19 05:21:42.695 UTC [msp] getCertificationChain -> DEBU 684 MSP Org1MSP getting certification chain" +"2019-11-19 05:21:42.696 UTC [cauthdsl] func2 -> DEBU 685 0xc0008eee30 principal matched by identity 0" +"2019-11-19 05:21:42.696 UTC [msp.identity] Verify -> DEBU 686 Verify: digest = 00000000 c4 a3 63 0e 74 7b 1b 5e a8 20 9f 1e fd 6e ca c3 |..c.t{.^. ...n..| +00000010 0e 30 75 6e 15 fa c1 45 bd aa f1 63 34 09 f5 6a |.0un...E...c4..j|" +"2019-11-19 05:21:42.696 UTC [msp.identity] Verify -> DEBU 687 Verify: sig = 00000000 30 45 02 21 00 e2 fe 3a 7f ad 49 29 49 81 90 d8 |0E.!...:..I)I...| +00000010 68 27 cd ff 27 cc 63 d7 21 bd e8 0d d3 29 0b ec |h'..'.c.!....)..| +00000020 e5 75 9d ff d2 02 20 77 7b 59 a8 aa af 0c d8 1c |.u.... w{Y......| +00000030 06 d5 09 1b 53 2a 43 2d f9 0b 6b 29 22 db 51 b2 |....S*C-..k)".Q.| +00000040 f8 e2 d6 0b 94 5b e3 |.....[.|" +"2019-11-19 05:21:42.697 UTC [cauthdsl] func2 -> DEBU 688 0xc0008eee30 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:42.697 UTC [cauthdsl] func1 -> DEBU 689 0xc0008eee30 gate 1574140902694116700 evaluation succeeds" +"2019-11-19 05:21:42.697 UTC [policies] Evaluate -> DEBU 68a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:42.697 UTC [policies] Evaluate -> DEBU 68b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:42.698 UTC [policies] Evaluate -> DEBU 68c Signature set satisfies policy /Channel/Application/Readers" +"2019-11-19 05:21:42.698 UTC [policies] Evaluate -> DEBU 68d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:21:42.698 UTC [policies] Evaluate -> DEBU 68e Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:21:42.698 UTC [policies] Evaluate -> DEBU 68f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:21:42.700 UTC [common.deliver] deliverBlocks -> DEBU 690 [channel: businesschannel] Received seekInfo (0xc00095eb00) start: > stop: > from 172.18.0.5:51424" +"2019-11-19 05:21:42.701 UTC [fsblkstorage] Next -> DEBU 691 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-11-19 05:21:42.702 UTC [fsblkstorage] newBlockfileStream -> DEBU 692 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-11-19 05:21:42.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 693 Remaining bytes=[25806], Going to peek [8] bytes" +"2019-11-19 05:21:42.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 694 Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:21:42.702 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 695 blockbytes [25803] read from file [0]" +"2019-11-19 05:21:42.703 UTC [common.deliver] deliverBlocks -> DEBU 696 [channel: businesschannel] Delivering block for (0xc00095eb00) for 172.18.0.5:51424" +"2019-11-19 05:21:42.703 UTC [common.deliver] deliverBlocks -> DEBU 697 [channel: businesschannel] Done delivering to 172.18.0.5:51424 for (0xc00095eb00)" +"2019-11-19 05:21:42.704 UTC [common.deliver] Handle -> DEBU 698 Waiting for new SeekInfo from 172.18.0.5:51424" +"2019-11-19 05:21:42.705 UTC [common.deliver] Handle -> DEBU 699 Attempting to read seek info message from 172.18.0.5:51424" +"2019-11-19 05:21:42.709 UTC [grpc] infof -> DEBU 69a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:42.709 UTC [common.deliver] Handle -> WARN 69b Error reading from 172.18.0.5:51424: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:21:42.709 UTC [orderer.common.server] func1 -> DEBU 69c Closing Deliver stream" +"2019-11-19 05:21:42.709 UTC [comm.grpc.server] 1 -> INFO 69d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51424 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=224.9038ms +"2019-11-19 05:21:42.709 UTC [grpc] infof -> DEBU 69e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 69f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 6a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 6a1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 6a2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:42.710 UTC [grpc] infof -> DEBU 6a3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:42.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a4 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2019-11-19 05:21:42.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.8µs " +"2019-11-19 05:21:42.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.4µs " +"2019-11-19 05:21:42.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a7 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-11-19 05:21:42.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:42.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:43.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6aa Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:43.066 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ab Sending msg of 28 bytes to 3 on channel testchainid took 37.2µs" +"2019-11-19 05:21:43.067 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ac Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.4µs " +"2019-11-19 05:21:43.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-11-19 05:21:43.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.1µs " +"2019-11-19 05:21:43.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6af Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:43.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b0 Sending msg of 28 bytes to 2 on channel businesschannel took 1.3399ms" +"2019-11-19 05:21:43.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.1µs " +"2019-11-19 05:21:43.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:43.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:43.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b4 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2019-11-19 05:21:43.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.2µs " +"2019-11-19 05:21:43.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2019-11-19 05:21:43.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b7 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2019-11-19 05:21:43.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.6µs " +"2019-11-19 05:21:43.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 162.2µs " +"2019-11-19 05:21:43.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ba Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:43.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bb Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:44.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bc Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:44.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bd Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-11-19 05:21:44.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.4µs " +"2019-11-19 05:21:44.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bf Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2019-11-19 05:21:44.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.7µs " +"2019-11-19 05:21:44.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c1 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2019-11-19 05:21:44.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +"2019-11-19 05:21:44.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:44.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:44.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:44.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c6 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-11-19 05:21:44.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " +"2019-11-19 05:21:44.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c8 Sending msg of 28 bytes to 2 on channel businesschannel took 37.3µs" +"2019-11-19 05:21:44.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c9 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2019-11-19 05:21:44.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.2µs " +"2019-11-19 05:21:44.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6cb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:44.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4372ms " +"2019-11-19 05:21:44.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6cd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:45.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:45.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2019-11-19 05:21:45.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.3µs " +"2019-11-19 05:21:45.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d1 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +"2019-11-19 05:21:45.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d2 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2019-11-19 05:21:45.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 226.6µs " +"2019-11-19 05:21:45.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d4 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:45.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:45.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.8µs " +"2019-11-19 05:21:45.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:45.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d8 Sending msg of 28 bytes to 3 on channel testchainid took 182.7µs" +"2019-11-19 05:21:45.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +"2019-11-19 05:21:45.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6da Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" +"2019-11-19 05:21:45.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6db Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +"2019-11-19 05:21:45.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.5µs " +"2019-11-19 05:21:45.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6dd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 155.6µs " +"2019-11-19 05:21:45.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6de Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:45.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6df Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:46.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:46.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e1 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-11-19 05:21:46.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 921.3µs " +"2019-11-19 05:21:46.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e3 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +"2019-11-19 05:21:46.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e4 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2019-11-19 05:21:46.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " +"2019-11-19 05:21:46.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.4µs " +"2019-11-19 05:21:46.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:46.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:46.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:46.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ea Sending msg of 28 bytes to 3 on channel testchainid took 67.8µs" +"2019-11-19 05:21:46.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6eb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.8µs " +"2019-11-19 05:21:46.681 UTC [orderer.common.server] Deliver -> DEBU 6ec Starting new Deliver handler" +"2019-11-19 05:21:46.685 UTC [common.deliver] Handle -> DEBU 6ed Starting new deliver loop for 172.18.0.5:51450" +"2019-11-19 05:21:46.685 UTC [common.deliver] Handle -> DEBU 6ee Attempting to read seek info message from 172.18.0.5:51450" +"2019-11-19 05:21:46.695 UTC [orderer.common.server] Broadcast -> DEBU 6ef Starting new Broadcast handler" +"2019-11-19 05:21:46.695 UTC [orderer.common.broadcast] Handle -> DEBU 6f0 Starting new broadcast loop for 172.18.0.5:51452" +"2019-11-19 05:21:46.696 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 6f1 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:51452" +"2019-11-19 05:21:46.696 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 6f2 Processing config update message for exisitng channel businesschannel" +"2019-11-19 05:21:46.697 UTC [policies] Evaluate -> DEBU 6f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:21:46.697 UTC [policies] Evaluate -> DEBU 6f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:46.697 UTC [policies] Evaluate -> DEBU 6f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:21:46.698 UTC [policies] Evaluate -> DEBU 6f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:46.698 UTC [policies] Evaluate -> DEBU 6f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-11-19 05:21:46.698 UTC [cauthdsl] func1 -> DEBU 6f8 0xc000b03240 gate 1574140906698476300 evaluation starts" +"2019-11-19 05:21:46.698 UTC [cauthdsl] func2 -> DEBU 6f9 0xc000b03240 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:46.698 UTC [cauthdsl] func2 -> DEBU 6fa 0xc000b03240 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:46.699 UTC [cauthdsl] func2 -> DEBU 6fb 0xc000b03240 principal matched by identity 0" +"2019-11-19 05:21:46.699 UTC [msp.identity] Verify -> DEBU 6fc Verify: digest = 00000000 94 36 ec e8 20 52 d0 4d f8 19 92 d4 7c 83 89 13 |.6.. R.M....|...| +00000010 83 5e 12 c5 e9 b6 a2 5c 3b ea 22 15 04 f7 0a b5 |.^.....\;.".....|" +"2019-11-19 05:21:46.699 UTC [msp.identity] Verify -> DEBU 6fd Verify: sig = 00000000 30 44 02 20 1f e7 f5 8c 39 2a 1c dc 70 f9 90 19 |0D. ....9*..p...| +00000010 62 08 cc 47 5e c2 de 02 3b 8d 45 e8 c8 fd 7c d8 |b..G^...;.E...|.| +00000020 5b 69 48 ef 02 20 5c 30 9c 80 3e 8f fc 40 26 1f |[iH.. \0..>..@&.| +00000030 a0 e7 fa 17 63 20 7f 3a 33 a6 cf b6 08 3b 92 35 |....c .:3....;.5| +00000040 74 a1 98 33 6f 80 |t..3o.|" +"2019-11-19 05:21:46.700 UTC [cauthdsl] func2 -> DEBU 6fe 0xc000b03240 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:46.700 UTC [cauthdsl] func1 -> DEBU 6ff 0xc000b03240 gate 1574140906698476300 evaluation succeeds" +"2019-11-19 05:21:46.700 UTC [policies] Evaluate -> DEBU 700 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.700 UTC [policies] Evaluate -> DEBU 701 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.701 UTC [policies] Evaluate -> DEBU 702 Signature set satisfies policy /Channel/Application/Writers" +"2019-11-19 05:21:46.701 UTC [policies] Evaluate -> DEBU 703 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:21:46.701 UTC [policies] Evaluate -> DEBU 704 Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:21:46.701 UTC [policies] Evaluate -> DEBU 705 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:21:46.701 UTC [common.configtx] addToMap -> DEBU 706 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:46.703 UTC [common.configtx] addToMap -> DEBU 707 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:46.703 UTC [common.configtx] addToMap -> DEBU 708 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.703 UTC [common.configtx] addToMap -> DEBU 709 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70d Adding to config map: [Group] /Channel" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70e Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 70f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 710 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 711 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 712 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 713 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:46.704 UTC [common.configtx] addToMap -> DEBU 714 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.704 UTC [common.configtx] verifyDeltaSet -> DEBU 715 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.704 UTC [common.configtx] policyForItem -> DEBU 716 Getting policy for item Org1MSP with mod_policy Admins" +"2019-11-19 05:21:46.704 UTC [policies] Manager -> DEBU 717 Manager Channel looking up path [Application]" +"2019-11-19 05:21:46.704 UTC [policies] Manager -> DEBU 718 Manager Channel has managers Application" +"2019-11-19 05:21:46.704 UTC [policies] Manager -> DEBU 719 Manager Channel has managers Orderer" +"2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71a Manager Channel/Application looking up path []" +"2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71b Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71c Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71d Manager Channel/Application looking up path [Org1MSP]" +"2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71e Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 71f Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:46.705 UTC [policies] Manager -> DEBU 720 Manager Channel/Application/Org1MSP looking up path []" +"2019-11-19 05:21:46.705 UTC [policies] Evaluate -> DEBU 721 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-11-19 05:21:46.705 UTC [cauthdsl] func1 -> DEBU 722 0xc000b3dc20 gate 1574140906705424900 evaluation starts" +"2019-11-19 05:21:46.705 UTC [cauthdsl] func2 -> DEBU 723 0xc000b3dc20 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:46.705 UTC [cauthdsl] func2 -> DEBU 724 0xc000b3dc20 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:46.705 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 725 Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-11-19 05:21:46.705 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 726 Checking if identity carries the admin ou for Org1MSP" +"2019-11-19 05:21:46.705 UTC [msp] Validate -> DEBU 727 MSP Org1MSP validating identity" +"2019-11-19 05:21:46.705 UTC [msp] getCertificationChain -> DEBU 728 MSP Org1MSP getting certification chain" +"2019-11-19 05:21:46.706 UTC [msp] hasOURole -> DEBU 729 MSP Org1MSP checking if the identity is a client" +"2019-11-19 05:21:46.706 UTC [msp] getCertificationChain -> DEBU 72a MSP Org1MSP getting certification chain" +"2019-11-19 05:21:46.706 UTC [cauthdsl] func2 -> DEBU 72b 0xc000b3dc20 principal matched by identity 0" +"2019-11-19 05:21:46.706 UTC [msp.identity] Verify -> DEBU 72c Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.|" +"2019-11-19 05:21:46.706 UTC [msp.identity] Verify -> DEBU 72d Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +00000020 9d 53 74 88 4b 02 20 0b f6 9b f4 5d 00 74 ee 9d |.St.K. ....].t..| +00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +00000040 4d ed a9 9c dd 40 ef |M....@.|" +"2019-11-19 05:21:46.706 UTC [cauthdsl] func2 -> DEBU 72e 0xc000b3dc20 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:46.706 UTC [cauthdsl] func1 -> DEBU 72f 0xc000b3dc20 gate 1574140906705424900 evaluation succeeds" +"2019-11-19 05:21:46.706 UTC [policies] Evaluate -> DEBU 730 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.706 UTC [policies] Evaluate -> DEBU 731 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.706 UTC [common.configtx] verifyDeltaSet -> DEBU 732 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 733 Setting policy for key Readers to " +"2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 734 Setting policy for key Writers to " +"2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 735 Setting policy for key Admins to " +"2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 736 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 737 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.707 UTC [common.configtx] recurseConfigMap -> DEBU 738 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.708 UTC [common.configtx] recurseConfigMap -> DEBU 739 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.708 UTC [common.configtx] recurseConfigMap -> DEBU 73a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.708 UTC [common.configtx] recurseConfigMap -> DEBU 73b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.708 UTC [common.configtx] recurseConfigMap -> DEBU 73c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 73d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 73e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 73f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 740 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 741 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 742 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 743 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 744 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 745 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 746 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.709 UTC [common.configtx] recurseConfigMap -> DEBU 747 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.710 UTC [common.configtx] recurseConfigMap -> DEBU 748 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.710 UTC [common.channelconfig] NewStandardValues -> DEBU 749 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74a Processing field: HashingAlgorithm" +"2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74b Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74c Processing field: OrdererAddresses" +"2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74d Processing field: Consortium" +"2019-11-19 05:21:46.710 UTC [common.channelconfig] initializeProtosStruct -> DEBU 74e Processing field: Capabilities" +"2019-11-19 05:21:46.710 UTC [common.channelconfig] NewStandardValues -> DEBU 74f Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 750 Processing field: ConsensusType" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 751 Processing field: BatchSize" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 752 Processing field: BatchTimeout" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 753 Processing field: KafkaBrokers" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 754 Processing field: ChannelRestrictions" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 755 Processing field: Capabilities" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] NewStandardValues -> DEBU 756 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 757 Processing field: Endpoints" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] NewStandardValues -> DEBU 758 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 759 Processing field: MSP" +"2019-11-19 05:21:46.711 UTC [common.channelconfig] validateMSP -> DEBU 75a Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:46.711 UTC [msp] newBccspMsp -> DEBU 75b Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.711 UTC [msp] New -> DEBU 75c Creating Cache-MSP instance" +"2019-11-19 05:21:46.711 UTC [msp] Setup -> DEBU 75d Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:46.712 UTC [msp.identity] newIdentity -> DEBU 75e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.712 UTC [msp.identity] newIdentity -> DEBU 75f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.712 UTC [msp] Validate -> DEBU 760 MSP OrdererMSP validating identity" +"2019-11-19 05:21:46.712 UTC [common.channelconfig] NewStandardValues -> DEBU 761 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:46.712 UTC [common.channelconfig] initializeProtosStruct -> DEBU 762 Processing field: ACLs" +"2019-11-19 05:21:46.712 UTC [common.channelconfig] initializeProtosStruct -> DEBU 763 Processing field: Capabilities" +"2019-11-19 05:21:46.712 UTC [common.channelconfig] NewStandardValues -> DEBU 764 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:46.712 UTC [common.channelconfig] initializeProtosStruct -> DEBU 765 Processing field: AnchorPeers" +"2019-11-19 05:21:46.712 UTC [common.channelconfig] NewStandardValues -> DEBU 766 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.712 UTC [common.channelconfig] initializeProtosStruct -> DEBU 767 Processing field: MSP" +"2019-11-19 05:21:46.712 UTC [common.channelconfig] Validate -> DEBU 768 Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:21:46.712 UTC [common.channelconfig] validateMSP -> DEBU 769 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:46.715 UTC [msp] newBccspMsp -> DEBU 76a Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.715 UTC [msp] New -> DEBU 76b Creating Cache-MSP instance" +"2019-11-19 05:21:46.715 UTC [msp] Setup -> DEBU 76c Setting up MSP instance Org1MSP" +"2019-11-19 05:21:46.716 UTC [msp.identity] newIdentity -> DEBU 76d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.716 UTC [common.channelconfig] NewStandardValues -> DEBU 76e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:46.717 UTC [common.channelconfig] initializeProtosStruct -> DEBU 76f Processing field: AnchorPeers" +"2019-11-19 05:21:46.717 UTC [common.channelconfig] NewStandardValues -> DEBU 770 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.717 UTC [common.channelconfig] initializeProtosStruct -> DEBU 771 Processing field: MSP" +"2019-11-19 05:21:46.717 UTC [common.channelconfig] Validate -> DEBU 772 Anchor peers for org Org2MSP are " +"2019-11-19 05:21:46.717 UTC [common.channelconfig] validateMSP -> DEBU 773 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:46.717 UTC [msp] newBccspMsp -> DEBU 774 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.717 UTC [msp] New -> DEBU 775 Creating Cache-MSP instance" +"2019-11-19 05:21:46.717 UTC [msp] Setup -> DEBU 776 Setting up MSP instance Org2MSP" +"2019-11-19 05:21:46.717 UTC [msp.identity] newIdentity -> DEBU 777 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.717 UTC [msp] Setup -> DEBU 778 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:46.717 UTC [msp] Setup -> DEBU 779 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77a Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77b Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77c Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77d Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77e Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 77f Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 780 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 781 Proposed new policy Writers for Channel/Application" +"2019-11-19 05:21:46.717 UTC [policies] NewManagerImpl -> DEBU 782 Proposed new policy Admins for Channel/Application" +"2019-11-19 05:21:46.718 UTC [policies] GetPolicy -> DEBU 783 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 784 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:21:46.718 UTC [policies] GetPolicy -> DEBU 785 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 786 Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 787 Proposed new policy Readers for Channel/Application" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 788 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 789 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78b Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78c Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78d Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78e Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:46.718 UTC [policies] NewManagerImpl -> DEBU 78f Proposed new policy Writers for Channel" +"2019-11-19 05:21:46.719 UTC [policies] NewManagerImpl -> DEBU 790 Proposed new policy Admins for Channel" +"2019-11-19 05:21:46.719 UTC [policies] NewManagerImpl -> DEBU 791 Proposed new policy Readers for Channel" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 792 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 793 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 794 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 795 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 796 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 797 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 798 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 799 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 79a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:46.719 UTC [common.configtx] addToMap -> DEBU 79b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 79c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 79d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 79e Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 79f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a0 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a2 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a3 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a4 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7a9 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7aa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7ab Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7ac Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7ad Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7af Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b0 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b1 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b2 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b3 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:46.720 UTC [common.configtx] addToMap -> DEBU 7b4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b5 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b7 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b8 Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7b9 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:46.721 UTC [common.configtx] addToMap -> DEBU 7ba Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:46.722 UTC [common.configtx] addToMap -> DEBU 7bb Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:46.722 UTC [common.configtx] addToMap -> DEBU 7bc Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:46.722 UTC [common.configtx] addToMap -> DEBU 7bd Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:46.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 7be As expected, current configuration has policy '/Channel/Readers'" +"2019-11-19 05:21:46.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 7bf As expected, current configuration has policy '/Channel/Writers'" +"2019-11-19 05:21:46.722 UTC [policies] Manager -> DEBU 7c0 Manager Channel looking up path [Application]" +"2019-11-19 05:21:46.722 UTC [policies] Manager -> DEBU 7c1 Manager Channel has managers Application" +"2019-11-19 05:21:46.722 UTC [policies] Manager -> DEBU 7c2 Manager Channel has managers Orderer" +"2019-11-19 05:21:46.723 UTC [policies] Manager -> DEBU 7c3 Manager Channel/Application looking up path []" +"2019-11-19 05:21:46.723 UTC [policies] Manager -> DEBU 7c4 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:46.723 UTC [policies] Manager -> DEBU 7c5 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:46.723 UTC [common.channelconfig] LogSanityChecks -> DEBU 7c6 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-11-19 05:21:46.723 UTC [common.channelconfig] LogSanityChecks -> DEBU 7c7 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7c8 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7c9 Manager Channel looking up path [Orderer]" +"2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7ca Manager Channel has managers Application" +"2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7cb Manager Channel has managers Orderer" +"2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7cc Manager Channel/Orderer looking up path []" +"2019-11-19 05:21:46.724 UTC [policies] Manager -> DEBU 7cd Manager Channel/Orderer has managers OrdererOrg" +"2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7ce As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7cf As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7d0 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-11-19 05:21:46.724 UTC [common.channelconfig] LogSanityChecks -> DEBU 7d1 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-11-19 05:21:46.724 UTC [common.capabilities] Supported -> DEBU 7d2 Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:21:46.724 UTC [common.capabilities] Supported -> DEBU 7d3 Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:21:46.724 UTC [msp] GetDefaultSigningIdentity -> DEBU 7d4 Obtaining default signing identity" +"2019-11-19 05:21:46.725 UTC [msp] GetDefaultSigningIdentity -> DEBU 7d5 Obtaining default signing identity" +"2019-11-19 05:21:46.725 UTC [msp.identity] Sign -> DEBU 7d6 Sign: plaintext: 0AD2060A1B08011A0608EAF7CDEE0522...7F3A33A6CFB6083B923574A198336F80 " +"2019-11-19 05:21:46.725 UTC [msp.identity] Sign -> DEBU 7d7 Sign: digest: BD24AC104616FECEBB6E57F7C21EA1D7CAF6E7E8448CCDD1BFF4D7409411A479 " +"2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:46.726 UTC [policies] Evaluate -> DEBU 7dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-11-19 05:21:46.726 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity" +"2019-11-19 05:21:46.726 UTC [msp.identity] newIdentity -> DEBU 7de Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.727 UTC [cauthdsl] func1 -> DEBU 7df 0xc0001f65c0 gate 1574140906727017600 evaluation starts" +"2019-11-19 05:21:46.727 UTC [cauthdsl] func2 -> DEBU 7e0 0xc0001f65c0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7e1 0xc0001f65c0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7e2 0xc0001f65c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7e3 0xc0001f65c0 principal evaluation fails" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func1 -> DEBU 7e4 0xc0001f65c0 gate 1574140906727017600 evaluation fails" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7e5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func1 -> DEBU 7e8 0xc0001f7740 gate 1574140906728218300 evaluation starts" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7e9 0xc0001f7740 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7ea 0xc0001f7740 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7eb 0xc0001f7740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7ec 0xc0001f7740 principal evaluation fails" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func1 -> DEBU 7ed 0xc0001f7740 gate 1574140906728218300 evaluation fails" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7ee Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:46.728 UTC [policies] func1 -> DEBU 7f0 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f1 Signature set did not satisfy policy /Channel/Application/Writers" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:46.728 UTC [policies] Evaluate -> DEBU 7f5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func1 -> DEBU 7f6 0xc000264660 gate 1574140906728909800 evaluation starts" +"2019-11-19 05:21:46.728 UTC [cauthdsl] func2 -> DEBU 7f7 0xc000264660 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:46.729 UTC [cauthdsl] func2 -> DEBU 7f8 0xc000264660 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:46.729 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7f9 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-11-19 05:21:46.729 UTC [msp] Validate -> DEBU 7fa MSP OrdererMSP validating identity" +"2019-11-19 05:21:46.729 UTC [cauthdsl] func2 -> DEBU 7fb 0xc000264660 principal matched by identity 0" +"2019-11-19 05:21:46.730 UTC [msp.identity] Verify -> DEBU 7fc Verify: digest = 00000000 bd 24 ac 10 46 16 fe ce bb 6e 57 f7 c2 1e a1 d7 |.$..F....nW.....| +00000010 ca f6 e7 e8 44 8c cd d1 bf f4 d7 40 94 11 a4 79 |....D......@...y|" +"2019-11-19 05:21:46.730 UTC [msp.identity] Verify -> DEBU 7fd Verify: sig = 00000000 30 45 02 21 00 c3 c4 5b a3 d3 2b 64 c0 35 61 d6 |0E.!...[..+d.5a.| +00000010 95 cb 42 f3 53 ed ef ed 72 82 6d 75 eb c7 a6 cf |..B.S...r.mu....| +00000020 f1 06 36 11 63 02 20 1c 0c c7 c4 d6 6e e7 f0 43 |..6.c. .....n..C| +00000030 67 71 a7 fd 4f 11 0f ce c9 86 9f 83 ad a4 58 be |gq..O.........X.| +00000040 b3 5c 64 f4 e2 dd 4d |.\d...M|" +"2019-11-19 05:21:46.730 UTC [cauthdsl] func2 -> DEBU 7fe 0xc000264660 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:46.730 UTC [cauthdsl] func1 -> DEBU 7ff 0xc000264660 gate 1574140906728909800 evaluation succeeds" +"2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 800 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 801 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 802 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 803 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 804 Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:21:46.730 UTC [policies] Evaluate -> DEBU 805 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:21:46.731 UTC [orderer.common.msgprocessor] Apply -> DEBU 806 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-11-19 05:21:46.731 UTC [common.channelconfig] NewStandardValues -> DEBU 807 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 808 Processing field: HashingAlgorithm" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 809 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80a Processing field: OrdererAddresses" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80b Processing field: Consortium" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80c Processing field: Capabilities" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] NewStandardValues -> DEBU 80d Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80e Processing field: ConsensusType" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80f Processing field: BatchSize" +"2019-11-19 05:21:46.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 810 Processing field: BatchTimeout" +"2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 811 Processing field: KafkaBrokers" +"2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 812 Processing field: ChannelRestrictions" +"2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 813 Processing field: Capabilities" +"2019-11-19 05:21:46.732 UTC [common.channelconfig] NewStandardValues -> DEBU 814 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 815 Processing field: Endpoints" +"2019-11-19 05:21:46.732 UTC [common.channelconfig] NewStandardValues -> DEBU 816 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.732 UTC [common.channelconfig] initializeProtosStruct -> DEBU 817 Processing field: MSP" +"2019-11-19 05:21:46.732 UTC [common.channelconfig] validateMSP -> DEBU 818 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:46.732 UTC [msp] newBccspMsp -> DEBU 819 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.732 UTC [msp] New -> DEBU 81a Creating Cache-MSP instance" +"2019-11-19 05:21:46.732 UTC [msp] Setup -> DEBU 81b Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:46.733 UTC [msp.identity] newIdentity -> DEBU 81c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.735 UTC [msp.identity] newIdentity -> DEBU 81d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.735 UTC [msp] Validate -> DEBU 81e MSP OrdererMSP validating identity" +"2019-11-19 05:21:46.735 UTC [common.channelconfig] NewStandardValues -> DEBU 81f Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:46.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 820 Processing field: ACLs" +"2019-11-19 05:21:46.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 821 Processing field: Capabilities" +"2019-11-19 05:21:46.735 UTC [common.channelconfig] NewStandardValues -> DEBU 822 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:46.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 823 Processing field: AnchorPeers" +"2019-11-19 05:21:46.735 UTC [common.channelconfig] NewStandardValues -> DEBU 824 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 825 Processing field: MSP" +"2019-11-19 05:21:46.735 UTC [common.channelconfig] Validate -> DEBU 826 Anchor peers for org Org2MSP are " +"2019-11-19 05:21:46.735 UTC [common.channelconfig] validateMSP -> DEBU 827 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:46.735 UTC [msp] newBccspMsp -> DEBU 828 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.735 UTC [msp] New -> DEBU 829 Creating Cache-MSP instance" +"2019-11-19 05:21:46.735 UTC [msp] Setup -> DEBU 82a Setting up MSP instance Org2MSP" +"2019-11-19 05:21:46.736 UTC [msp.identity] newIdentity -> DEBU 82b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.737 UTC [common.channelconfig] NewStandardValues -> DEBU 82c Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:46.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82d Processing field: AnchorPeers" +"2019-11-19 05:21:46.737 UTC [common.channelconfig] NewStandardValues -> DEBU 82e Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82f Processing field: MSP" +"2019-11-19 05:21:46.737 UTC [common.channelconfig] Validate -> DEBU 830 Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:21:46.737 UTC [common.channelconfig] validateMSP -> DEBU 831 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:46.738 UTC [msp] newBccspMsp -> DEBU 832 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.738 UTC [msp] New -> DEBU 833 Creating Cache-MSP instance" +"2019-11-19 05:21:46.738 UTC [msp] Setup -> DEBU 834 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:46.738 UTC [msp.identity] newIdentity -> DEBU 835 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.740 UTC [msp] Setup -> DEBU 836 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:46.740 UTC [msp] Setup -> DEBU 837 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:46.740 UTC [policies] NewManagerImpl -> DEBU 838 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.740 UTC [policies] NewManagerImpl -> DEBU 839 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83b Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83c Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83d Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83e Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 83f Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 840 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 841 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 842 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 843 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.741 UTC [policies] NewManagerImpl -> DEBU 844 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 845 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 846 Proposed new policy Writers for Channel/Application" +"2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 847 Proposed new policy Admins for Channel/Application" +"2019-11-19 05:21:46.742 UTC [policies] GetPolicy -> DEBU 848 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 849 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:21:46.742 UTC [policies] GetPolicy -> DEBU 84a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 84b Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:21:46.742 UTC [policies] NewManagerImpl -> DEBU 84c Proposed new policy Readers for Channel/Application" +"2019-11-19 05:21:46.743 UTC [policies] NewManagerImpl -> DEBU 84d Proposed new policy Admins for Channel" +"2019-11-19 05:21:46.743 UTC [policies] NewManagerImpl -> DEBU 84e Proposed new policy Readers for Channel" +"2019-11-19 05:21:46.743 UTC [policies] NewManagerImpl -> DEBU 84f Proposed new policy Writers for Channel" +"2019-11-19 05:21:46.743 UTC [common.configtx] addToMap -> DEBU 850 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:46.743 UTC [common.configtx] addToMap -> DEBU 851 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:46.743 UTC [common.configtx] addToMap -> DEBU 852 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 853 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 854 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 855 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 856 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:46.744 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 862 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 863 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 864 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 865 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:46.745 UTC [common.configtx] addToMap -> DEBU 866 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 867 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 868 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 869 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86d Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86e Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 86f Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:46.746 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:46.747 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:46.747 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:46.747 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:46.748 UTC [common.configtx] addToMap -> DEBU 87b Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:46.749 UTC [orderer.consensus.etcdraft] propose -> INFO 87c Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-11-19 05:21:46.749 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 87d Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-11-19 05:21:46.751 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 87e [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:51452" +"2019-11-19 05:21:46.752 UTC [orderer.consensus.etcdraft] 2 -> DEBU 87f Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2019-11-19 05:21:46.757 UTC [common.deliver] Handle -> WARN 880 Error reading from 172.18.0.5:51450: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:21:46.757 UTC [orderer.common.server] func1 -> DEBU 881 Closing Deliver stream" +"2019-11-19 05:21:46.757 UTC [comm.grpc.server] 1 -> INFO 882 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51450 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=75.8921ms +"2019-11-19 05:21:46.758 UTC [grpc] infof -> DEBU 883 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:46.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 884 Sending msg of 24601 bytes to 2 on channel businesschannel took 28.1µs" +"2019-11-19 05:21:46.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 885 Sending msg of 24601 bytes to 3 on channel businesschannel took 14.6µs" +"2019-11-19 05:21:46.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 886 Send of ConsensusRequest for channel businesschannel with payload of size 24601 to orderer2.example.com(orderer2.example.com:7050) took 737.2µs " +"2019-11-19 05:21:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 887 Send of ConsensusRequest for channel businesschannel with payload of size 24601 to orderer1.example.com(orderer1.example.com:7050) took 265.7µs " +"2019-11-19 05:21:46.761 UTC [grpc] infof -> DEBU 888 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:46.761 UTC [orderer.common.broadcast] Handle -> WARN 889 Error reading from 172.18.0.5:51452: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:21:46.761 UTC [orderer.common.server] func1 -> DEBU 88a Closing Broadcast stream" +"2019-11-19 05:21:46.761 UTC [comm.grpc.server] 1 -> INFO 88b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51452 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=66.4525ms +"2019-11-19 05:21:46.773 UTC [orderer.common.cluster.step] handleMessage -> DEBU 88c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:46.779 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 88d Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2019-11-19 05:21:46.779 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 88e Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-11-19 05:21:46.781 UTC [orderer.common.cluster.step] handleMessage -> DEBU 88f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:46.781 UTC [orderer.common.cluster.step] sendMessage -> DEBU 892 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.7µs " +"2019-11-19 05:21:46.781 UTC [orderer.common.cluster.step] sendMessage -> DEBU 890 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " +"2019-11-19 05:21:46.781 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 891 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2019-11-19 05:21:46.786 UTC [common.configtx] addToMap -> DEBU 893 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:46.786 UTC [common.configtx] addToMap -> DEBU 894 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:46.786 UTC [common.configtx] addToMap -> DEBU 895 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.787 UTC [common.configtx] addToMap -> DEBU 896 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:46.789 UTC [common.configtx] addToMap -> DEBU 897 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.790 UTC [common.configtx] addToMap -> DEBU 898 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:46.792 UTC [common.configtx] addToMap -> DEBU 899 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.792 UTC [common.configtx] addToMap -> DEBU 89a Adding to config map: [Group] /Channel" +"2019-11-19 05:21:46.793 UTC [common.configtx] addToMap -> DEBU 89b Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:46.793 UTC [common.configtx] addToMap -> DEBU 89c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.794 UTC [common.configtx] addToMap -> DEBU 89d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:46.794 UTC [common.configtx] addToMap -> DEBU 89e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:46.795 UTC [common.configtx] addToMap -> DEBU 89f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.795 UTC [common.configtx] addToMap -> DEBU 8a0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.796 UTC [common.configtx] addToMap -> DEBU 8a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:46.796 UTC [common.configtx] verifyDeltaSet -> DEBU 8a2 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.796 UTC [common.configtx] policyForItem -> DEBU 8a3 Getting policy for item Org1MSP with mod_policy Admins" +"2019-11-19 05:21:46.796 UTC [policies] Manager -> DEBU 8a4 Manager Channel looking up path [Application]" +"2019-11-19 05:21:46.796 UTC [policies] Manager -> DEBU 8a5 Manager Channel has managers Application" +"2019-11-19 05:21:46.797 UTC [policies] Manager -> DEBU 8a6 Manager Channel has managers Orderer" +"2019-11-19 05:21:46.797 UTC [policies] Manager -> DEBU 8a7 Manager Channel/Application looking up path []" +"2019-11-19 05:21:46.797 UTC [policies] Manager -> DEBU 8a8 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:46.797 UTC [policies] Manager -> DEBU 8a9 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:46.798 UTC [policies] Manager -> DEBU 8aa Manager Channel/Application looking up path [Org1MSP]" +"2019-11-19 05:21:46.798 UTC [policies] Manager -> DEBU 8ab Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:46.798 UTC [policies] Manager -> DEBU 8ac Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:46.798 UTC [policies] Manager -> DEBU 8ad Manager Channel/Application/Org1MSP looking up path []" +"2019-11-19 05:21:46.799 UTC [policies] Evaluate -> DEBU 8ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-11-19 05:21:46.799 UTC [cauthdsl] func1 -> DEBU 8af 0xc00093ad30 gate 1574140906799652700 evaluation starts" +"2019-11-19 05:21:46.800 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8b0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:46.799 UTC [cauthdsl] func2 -> DEBU 8b1 0xc00093ad30 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:46.800 UTC [cauthdsl] func2 -> DEBU 8b2 0xc00093ad30 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:46.801 UTC [cauthdsl] func2 -> DEBU 8b3 0xc00093ad30 principal matched by identity 0" +"2019-11-19 05:21:46.801 UTC [msp.identity] Verify -> DEBU 8b4 Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.|" +"2019-11-19 05:21:46.802 UTC [msp.identity] Verify -> DEBU 8b5 Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +00000020 9d 53 74 88 4b 02 20 0b f6 9b f4 5d 00 74 ee 9d |.St.K. ....].t..| +00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +00000040 4d ed a9 9c dd 40 ef |M....@.|" +"2019-11-19 05:21:46.802 UTC [cauthdsl] func2 -> DEBU 8b6 0xc00093ad30 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:46.803 UTC [cauthdsl] func1 -> DEBU 8b7 0xc00093ad30 gate 1574140906799652700 evaluation succeeds" +"2019-11-19 05:21:46.803 UTC [policies] Evaluate -> DEBU 8b8 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.803 UTC [policies] Evaluate -> DEBU 8b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.803 UTC [common.configtx] verifyDeltaSet -> DEBU 8ba Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:46.804 UTC [common.configtx] recurseConfigMap -> DEBU 8bb Setting policy for key Readers to " +"2019-11-19 05:21:46.804 UTC [common.configtx] recurseConfigMap -> DEBU 8bc Setting policy for key Writers to " +"2019-11-19 05:21:46.805 UTC [common.configtx] recurseConfigMap -> DEBU 8bd Setting policy for key Admins to " +"2019-11-19 05:21:46.805 UTC [common.configtx] recurseConfigMap -> DEBU 8be Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.805 UTC [common.configtx] recurseConfigMap -> DEBU 8bf Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.806 UTC [common.configtx] recurseConfigMap -> DEBU 8c0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.806 UTC [common.configtx] recurseConfigMap -> DEBU 8c1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.806 UTC [common.configtx] recurseConfigMap -> DEBU 8c2 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.806 UTC [common.configtx] recurseConfigMap -> DEBU 8c3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.807 UTC [common.configtx] recurseConfigMap -> DEBU 8c9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8ca Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8cb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8cc Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8cd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8ce Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8cf Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.808 UTC [common.configtx] recurseConfigMap -> DEBU 8d0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:46.809 UTC [common.channelconfig] NewStandardValues -> DEBU 8d1 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:46.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d2 Processing field: HashingAlgorithm" +"2019-11-19 05:21:46.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d3 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:46.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d4 Processing field: OrdererAddresses" +"2019-11-19 05:21:46.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d5 Processing field: Consortium" +"2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d6 Processing field: Capabilities" +"2019-11-19 05:21:46.810 UTC [common.channelconfig] NewStandardValues -> DEBU 8d7 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d8 Processing field: ConsensusType" +"2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d9 Processing field: BatchSize" +"2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8da Processing field: BatchTimeout" +"2019-11-19 05:21:46.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8db Processing field: KafkaBrokers" +"2019-11-19 05:21:46.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dc Processing field: ChannelRestrictions" +"2019-11-19 05:21:46.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8dd Processing field: Capabilities" +"2019-11-19 05:21:46.811 UTC [common.channelconfig] NewStandardValues -> DEBU 8de Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:46.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8df Processing field: Endpoints" +"2019-11-19 05:21:46.812 UTC [common.channelconfig] NewStandardValues -> DEBU 8e0 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8e1 Processing field: MSP" +"2019-11-19 05:21:46.812 UTC [common.channelconfig] validateMSP -> DEBU 8e2 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:46.812 UTC [msp] newBccspMsp -> DEBU 8e3 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.813 UTC [msp] New -> DEBU 8e4 Creating Cache-MSP instance" +"2019-11-19 05:21:46.813 UTC [msp] Setup -> DEBU 8e5 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:46.814 UTC [msp.identity] newIdentity -> DEBU 8e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.814 UTC [msp.identity] newIdentity -> DEBU 8e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.815 UTC [msp] Validate -> DEBU 8e8 MSP OrdererMSP validating identity" +"2019-11-19 05:21:46.815 UTC [common.channelconfig] NewStandardValues -> DEBU 8e9 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:46.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ea Processing field: ACLs" +"2019-11-19 05:21:46.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8eb Processing field: Capabilities" +"2019-11-19 05:21:46.816 UTC [common.channelconfig] NewStandardValues -> DEBU 8ec Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:46.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ed Processing field: AnchorPeers" +"2019-11-19 05:21:46.817 UTC [common.channelconfig] NewStandardValues -> DEBU 8ee Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ef Processing field: MSP" +"2019-11-19 05:21:46.817 UTC [common.channelconfig] Validate -> DEBU 8f0 Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:21:46.818 UTC [common.channelconfig] validateMSP -> DEBU 8f1 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:46.818 UTC [msp] newBccspMsp -> DEBU 8f2 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.818 UTC [msp] New -> DEBU 8f3 Creating Cache-MSP instance" +"2019-11-19 05:21:46.818 UTC [msp] Setup -> DEBU 8f4 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:46.819 UTC [msp.identity] newIdentity -> DEBU 8f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.819 UTC [common.channelconfig] NewStandardValues -> DEBU 8f6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:46.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f7 Processing field: AnchorPeers" +"2019-11-19 05:21:46.820 UTC [common.channelconfig] NewStandardValues -> DEBU 8f8 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f9 Processing field: MSP" +"2019-11-19 05:21:46.820 UTC [common.channelconfig] Validate -> DEBU 8fa Anchor peers for org Org2MSP are " +"2019-11-19 05:21:46.821 UTC [common.channelconfig] validateMSP -> DEBU 8fb Setting up MSP for org Org2MSP" +"2019-11-19 05:21:46.821 UTC [msp] newBccspMsp -> DEBU 8fc Creating BCCSP-based MSP instance" +"2019-11-19 05:21:46.821 UTC [msp] New -> DEBU 8fd Creating Cache-MSP instance" +"2019-11-19 05:21:46.822 UTC [msp] Setup -> DEBU 8fe Setting up MSP instance Org2MSP" +"2019-11-19 05:21:46.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8ff Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:46.823 UTC [msp.identity] newIdentity -> DEBU 900 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:46.823 UTC [msp] Setup -> DEBU 901 Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:46.823 UTC [msp] Setup -> DEBU 902 MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:46.824 UTC [policies] NewManagerImpl -> DEBU 903 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.824 UTC [policies] NewManagerImpl -> DEBU 904 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.824 UTC [policies] NewManagerImpl -> DEBU 905 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:46.824 UTC [policies] NewManagerImpl -> DEBU 906 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.825 UTC [policies] NewManagerImpl -> DEBU 907 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.825 UTC [policies] NewManagerImpl -> DEBU 908 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.826 UTC [policies] NewManagerImpl -> DEBU 909 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:46.826 UTC [policies] NewManagerImpl -> DEBU 90a Proposed new policy Writers for Channel/Application" +"2019-11-19 05:21:46.826 UTC [policies] NewManagerImpl -> DEBU 90b Proposed new policy Admins for Channel/Application" +"2019-11-19 05:21:46.826 UTC [policies] GetPolicy -> DEBU 90c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 90d Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:21:46.827 UTC [policies] GetPolicy -> DEBU 90e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 90f Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 910 Proposed new policy Readers for Channel/Application" +"2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 911 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 912 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.827 UTC [policies] NewManagerImpl -> DEBU 913 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 914 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 915 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 916 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 917 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 918 Proposed new policy Admins for Channel" +"2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 919 Proposed new policy Readers for Channel" +"2019-11-19 05:21:46.828 UTC [policies] NewManagerImpl -> DEBU 91a Proposed new policy Writers for Channel" +"2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Group] /Channel" +"2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:46.829 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:46.830 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:46.831 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:46.833 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:46.843 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:46.844 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:46.844 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:46.845 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:46.845 UTC [common.configtx] addToMap -> DEBU 932 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:46.846 UTC [common.configtx] addToMap -> DEBU 933 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:46.846 UTC [common.configtx] addToMap -> DEBU 934 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:46.846 UTC [common.configtx] addToMap -> DEBU 935 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:46.846 UTC [common.configtx] addToMap -> DEBU 936 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 937 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 938 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 939 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 93a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 93b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:46.847 UTC [common.configtx] addToMap -> DEBU 93c Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:46.848 UTC [common.configtx] addToMap -> DEBU 93d Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:46.848 UTC [common.configtx] addToMap -> DEBU 93e Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:46.849 UTC [common.configtx] addToMap -> DEBU 93f Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:46.849 UTC [common.configtx] addToMap -> DEBU 940 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:46.849 UTC [common.configtx] addToMap -> DEBU 941 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:46.850 UTC [common.configtx] addToMap -> DEBU 942 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:46.850 UTC [common.configtx] addToMap -> DEBU 943 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:46.851 UTC [common.configtx] addToMap -> DEBU 944 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:46.851 UTC [common.configtx] addToMap -> DEBU 945 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:46.851 UTC [common.configtx] addToMap -> DEBU 946 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:46.852 UTC [common.channelconfig] LogSanityChecks -> DEBU 947 As expected, current configuration has policy '/Channel/Readers'" +"2019-11-19 05:21:46.852 UTC [common.channelconfig] LogSanityChecks -> DEBU 948 As expected, current configuration has policy '/Channel/Writers'" +"2019-11-19 05:21:46.853 UTC [policies] Manager -> DEBU 949 Manager Channel looking up path [Application]" +"2019-11-19 05:21:46.854 UTC [policies] Manager -> DEBU 94a Manager Channel has managers Application" +"2019-11-19 05:21:46.854 UTC [policies] Manager -> DEBU 94b Manager Channel has managers Orderer" +"2019-11-19 05:21:46.854 UTC [policies] Manager -> DEBU 94c Manager Channel/Application looking up path []" +"2019-11-19 05:21:46.855 UTC [policies] Manager -> DEBU 94d Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:46.855 UTC [policies] Manager -> DEBU 94e Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:46.855 UTC [common.channelconfig] LogSanityChecks -> DEBU 94f As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-11-19 05:21:46.855 UTC [common.channelconfig] LogSanityChecks -> DEBU 950 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-11-19 05:21:46.856 UTC [common.channelconfig] LogSanityChecks -> DEBU 951 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-11-19 05:21:46.856 UTC [policies] Manager -> DEBU 952 Manager Channel looking up path [Orderer]" +"2019-11-19 05:21:46.857 UTC [policies] Manager -> DEBU 953 Manager Channel has managers Orderer" +"2019-11-19 05:21:46.857 UTC [policies] Manager -> DEBU 954 Manager Channel has managers Application" +"2019-11-19 05:21:46.857 UTC [policies] Manager -> DEBU 955 Manager Channel/Orderer looking up path []" +"2019-11-19 05:21:46.857 UTC [policies] Manager -> DEBU 956 Manager Channel/Orderer has managers OrdererOrg" +"2019-11-19 05:21:46.858 UTC [common.channelconfig] LogSanityChecks -> DEBU 957 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-11-19 05:21:46.858 UTC [common.channelconfig] LogSanityChecks -> DEBU 958 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-11-19 05:21:46.859 UTC [common.channelconfig] LogSanityChecks -> DEBU 959 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-11-19 05:21:46.859 UTC [common.channelconfig] LogSanityChecks -> DEBU 95a As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-11-19 05:21:46.859 UTC [common.capabilities] Supported -> DEBU 95b Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:21:46.860 UTC [common.capabilities] Supported -> DEBU 95c Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:21:46.860 UTC [orderer.common.server] func1 -> DEBU 95d Executing callback to update root CAs" +"2019-11-19 05:21:46.860 UTC [orderer.common.server] updateTrustedRoots -> DEBU 95e updating root CAs for channel [businesschannel]" +"2019-11-19 05:21:46.861 UTC [orderer.common.server] updateTrustedRoots -> DEBU 95f adding app root CAs for MSP [Org2MSP]" +"2019-11-19 05:21:46.861 UTC [orderer.common.server] updateTrustedRoots -> DEBU 960 adding orderer root CAs for MSP [OrdererMSP]" +"2019-11-19 05:21:46.862 UTC [orderer.common.server] updateTrustedRoots -> DEBU 961 adding app root CAs for MSP [Org1MSP]" +"2019-11-19 05:21:46.862 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 962 [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2019-11-19 05:21:46.862 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 963 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2019-11-19 05:21:46.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 964 Obtaining default signing identity" +"2019-11-19 05:21:46.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 965 Obtaining default signing identity" +"2019-11-19 05:21:46.863 UTC [msp.identity] Sign -> DEBU 966 Sign: plaintext: 0A020801120B0A090A03010203100418...C777BD462801DDAB76D65A78615D5596 " +"2019-11-19 05:21:46.863 UTC [msp.identity] Sign -> DEBU 967 Sign: digest: 0BBB594FA13D44520D31F25572556F29303F53BCD6AEE4C543BE01A8B7DB71EB " +"2019-11-19 05:21:46.865 UTC [fsblkstorage] indexBlock -> DEBU 968 Indexing block [blockNum=1, blockHash=[]byte{0x60, 0x1e, 0xe1, 0xb7, 0xa1, 0x19, 0x69, 0xc3, 0xf3, 0xb5, 0x51, 0x11, 0x52, 0x94, 0x60, 0xd, 0x7b, 0xd0, 0x3f, 0x9f, 0xa0, 0x2a, 0x24, 0xa6, 0x25, 0xf8, 0xdd, 0x54, 0x3d, 0xb9, 0xca, 0x84} txOffsets= +txId=994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727 locPointer=offset=71, bytesLength=24470 +]" +"2019-11-19 05:21:46.867 UTC [fsblkstorage] updateCheckpoint -> DEBU 969 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51284], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-11-19 05:21:46.867 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 96a [channel: businesschannel] Wrote block [1]" +"2019-11-19 05:21:46.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96b Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +"2019-11-19 05:21:46.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 96c Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2019-11-19 05:21:46.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +"2019-11-19 05:21:46.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 96e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.4µs " +"2019-11-19 05:21:46.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU 96f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:46.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU 970 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:47.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU 971 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:47.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 972 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2019-11-19 05:21:47.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 973 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.9µs " +"2019-11-19 05:21:47.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 974 Sending msg of 28 bytes to 2 on channel businesschannel took 58.2µs" +"2019-11-19 05:21:47.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 975 Sending msg of 28 bytes to 3 on channel businesschannel took 34.5µs" +"2019-11-19 05:21:47.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU 976 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 553.2µs " +"2019-11-19 05:21:47.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 977 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6983ms " +"2019-11-19 05:21:47.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 978 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:47.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 979 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:47.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 97a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:47.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 97b Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +"2019-11-19 05:21:47.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 97c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.4µs " +"2019-11-19 05:21:47.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 97d Sending msg of 28 bytes to 2 on channel businesschannel took 42.1µs" +"2019-11-19 05:21:47.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 97e Sending msg of 28 bytes to 3 on channel businesschannel took 118.3µs" +"2019-11-19 05:21:47.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 97f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 673.2µs " +"2019-11-19 05:21:47.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 980 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.5µs " +"2019-11-19 05:21:47.940 UTC [orderer.common.cluster.step] handleMessage -> DEBU 981 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:47.942 UTC [orderer.common.cluster.step] handleMessage -> DEBU 982 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:48.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU 983 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:48.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 984 Sending msg of 28 bytes to 3 on channel testchainid took 24.8µs" +"2019-11-19 05:21:48.065 UTC [orderer.common.cluster.step] sendMessage -> DEBU 985 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.4µs " +"2019-11-19 05:21:48.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 986 Sending msg of 28 bytes to 2 on channel businesschannel took 33.4µs" +"2019-11-19 05:21:48.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 987 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +"2019-11-19 05:21:48.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 988 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 259.8µs " +"2019-11-19 05:21:48.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 989 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:48.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 98a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:48.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.8µs " +"2019-11-19 05:21:48.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 98c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:48.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 98d Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +"2019-11-19 05:21:48.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.8µs " +"2019-11-19 05:21:48.894 UTC [orderer.common.server] Deliver -> DEBU 98f Starting new Deliver handler" +"2019-11-19 05:21:48.894 UTC [common.deliver] Handle -> DEBU 990 Starting new deliver loop for 172.18.0.5:51454" +"2019-11-19 05:21:48.894 UTC [common.deliver] Handle -> DEBU 991 Attempting to read seek info message from 172.18.0.5:51454" +"2019-11-19 05:21:48.923 UTC [orderer.common.server] Broadcast -> DEBU 992 Starting new Broadcast handler" +"2019-11-19 05:21:48.923 UTC [orderer.common.broadcast] Handle -> DEBU 993 Starting new broadcast loop for 172.18.0.5:51456" +"2019-11-19 05:21:48.923 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 994 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:51456" +"2019-11-19 05:21:48.924 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 995 Processing config update message for exisitng channel businesschannel" +"2019-11-19 05:21:48.924 UTC [policies] Evaluate -> DEBU 996 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:21:48.924 UTC [policies] Evaluate -> DEBU 997 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:48.924 UTC [policies] Evaluate -> DEBU 998 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:21:48.924 UTC [policies] Evaluate -> DEBU 999 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:48.925 UTC [policies] Evaluate -> DEBU 99a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-11-19 05:21:48.926 UTC [msp] DeserializeIdentity -> DEBU 99b Obtaining identity" +"2019-11-19 05:21:48.926 UTC [msp.identity] newIdentity -> DEBU 99c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.927 UTC [cauthdsl] func1 -> DEBU 99d 0xc000d784f0 gate 1574140908927725700 evaluation starts" +"2019-11-19 05:21:48.927 UTC [cauthdsl] func2 -> DEBU 99e 0xc000d784f0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:48.927 UTC [cauthdsl] func2 -> DEBU 99f 0xc000d784f0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:48.928 UTC [cauthdsl] func2 -> DEBU 9a0 0xc000d784f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-11-19 05:21:48.928 UTC [cauthdsl] func2 -> DEBU 9a1 0xc000d784f0 principal evaluation fails" +"2019-11-19 05:21:48.928 UTC [cauthdsl] func1 -> DEBU 9a2 0xc000d784f0 gate 1574140908927725700 evaluation fails" +"2019-11-19 05:21:48.928 UTC [policies] Evaluate -> DEBU 9a3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:48.928 UTC [policies] Evaluate -> DEBU 9a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:48.929 UTC [policies] Evaluate -> DEBU 9a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-11-19 05:21:48.929 UTC [cauthdsl] func1 -> DEBU 9a6 0xc000d79670 gate 1574140908929794800 evaluation starts" +"2019-11-19 05:21:48.930 UTC [cauthdsl] func2 -> DEBU 9a7 0xc000d79670 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:48.930 UTC [cauthdsl] func2 -> DEBU 9a8 0xc000d79670 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:48.930 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9a9 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-11-19 05:21:48.930 UTC [msp] Validate -> DEBU 9aa MSP Org2MSP validating identity" +"2019-11-19 05:21:48.931 UTC [msp] getCertificationChain -> DEBU 9ab MSP Org2MSP getting certification chain" +"2019-11-19 05:21:48.931 UTC [cauthdsl] func2 -> DEBU 9ac 0xc000d79670 principal matched by identity 0" +"2019-11-19 05:21:48.931 UTC [msp.identity] Verify -> DEBU 9ad Verify: digest = 00000000 70 83 92 0f b1 97 ee cb 0d ae eb 88 b1 10 2b 7f |p.............+.| +00000010 6a 67 40 9f a8 28 75 68 8a 81 30 74 f7 d3 f1 54 |jg@..(uh..0t...T|" +"2019-11-19 05:21:48.931 UTC [msp.identity] Verify -> DEBU 9ae Verify: sig = 00000000 30 45 02 21 00 d6 63 94 fa 69 b1 a1 62 bd c3 0c |0E.!..c..i..b...| +00000010 78 3a 62 16 e3 17 e7 17 d5 38 2d cf 88 3e de c4 |x:b......8-..>..| +00000020 23 13 1a c5 9a 02 20 41 e9 82 be b8 35 74 90 e6 |#..... A....5t..| +00000030 dc 22 5c 62 d2 11 dc c4 39 35 ba 56 3d da 3a 4a |."\b....95.V=.:J| +00000040 8e 8f f7 8a 69 47 d5 |....iG.|" +"2019-11-19 05:21:48.932 UTC [cauthdsl] func2 -> DEBU 9af 0xc000d79670 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:48.932 UTC [cauthdsl] func1 -> DEBU 9b0 0xc000d79670 gate 1574140908929794800 evaluation succeeds" +"2019-11-19 05:21:48.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9b1 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +"2019-11-19 05:21:48.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9b2 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-11-19 05:21:48.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.9µs " +"2019-11-19 05:21:48.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.9µs " +"2019-11-19 05:21:48.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9b5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:48.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9b6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:48.932 UTC [policies] Evaluate -> DEBU 9b7 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:48.937 UTC [policies] Evaluate -> DEBU 9b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:48.938 UTC [policies] Evaluate -> DEBU 9b9 Signature set satisfies policy /Channel/Application/Writers" +"2019-11-19 05:21:48.938 UTC [policies] Evaluate -> DEBU 9ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:21:48.938 UTC [policies] Evaluate -> DEBU 9bb Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:21:48.939 UTC [policies] Evaluate -> DEBU 9bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:21:48.939 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Group] /Channel" +"2019-11-19 05:21:48.939 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:48.940 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:48.941 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:48.941 UTC [common.configtx] verifyDeltaSet -> DEBU 9cc Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:48.941 UTC [common.configtx] policyForItem -> DEBU 9cd Getting policy for item Org2MSP with mod_policy Admins" +"2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9ce Manager Channel looking up path [Application]" +"2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9cf Manager Channel has managers Application" +"2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d0 Manager Channel has managers Orderer" +"2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d1 Manager Channel/Application looking up path []" +"2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d2 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d3 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:48.942 UTC [policies] Manager -> DEBU 9d4 Manager Channel/Application looking up path [Org2MSP]" +"2019-11-19 05:21:48.943 UTC [policies] Manager -> DEBU 9d5 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:48.943 UTC [policies] Manager -> DEBU 9d6 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:48.944 UTC [policies] Manager -> DEBU 9d7 Manager Channel/Application/Org2MSP looking up path []" +"2019-11-19 05:21:48.944 UTC [policies] Evaluate -> DEBU 9d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-11-19 05:21:48.944 UTC [cauthdsl] func1 -> DEBU 9d9 0xc000da63d0 gate 1574140908944497600 evaluation starts" +"2019-11-19 05:21:48.944 UTC [cauthdsl] func2 -> DEBU 9da 0xc000da63d0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:48.944 UTC [cauthdsl] func2 -> DEBU 9db 0xc000da63d0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:48.944 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 9dc Checking if identity has been named explicitly as an admin for Org2MSP" +"2019-11-19 05:21:48.945 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 9dd Checking if identity carries the admin ou for Org2MSP" +"2019-11-19 05:21:48.945 UTC [msp] Validate -> DEBU 9de MSP Org2MSP validating identity" +"2019-11-19 05:21:48.945 UTC [msp] getCertificationChain -> DEBU 9df MSP Org2MSP getting certification chain" +"2019-11-19 05:21:48.946 UTC [msp] hasOURole -> DEBU 9e0 MSP Org2MSP checking if the identity is a client" +"2019-11-19 05:21:48.946 UTC [msp] getCertificationChain -> DEBU 9e1 MSP Org2MSP getting certification chain" +"2019-11-19 05:21:48.946 UTC [cauthdsl] func2 -> DEBU 9e2 0xc000da63d0 principal matched by identity 0" +"2019-11-19 05:21:48.946 UTC [msp.identity] Verify -> DEBU 9e3 Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.|" +"2019-11-19 05:21:48.946 UTC [msp.identity] Verify -> DEBU 9e4 Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +00000040 56 71 ab 2e 37 58 4a |Vq..7XJ|" +"2019-11-19 05:21:48.947 UTC [cauthdsl] func2 -> DEBU 9e5 0xc000da63d0 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:48.947 UTC [cauthdsl] func1 -> DEBU 9e6 0xc000da63d0 gate 1574140908944497600 evaluation succeeds" +"2019-11-19 05:21:48.947 UTC [policies] Evaluate -> DEBU 9e7 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:48.947 UTC [policies] Evaluate -> DEBU 9e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:48.947 UTC [common.configtx] verifyDeltaSet -> DEBU 9e9 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:21:48.948 UTC [common.configtx] recurseConfigMap -> DEBU 9ea Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.948 UTC [common.configtx] recurseConfigMap -> DEBU 9eb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.948 UTC [common.configtx] recurseConfigMap -> DEBU 9ec Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.948 UTC [common.configtx] recurseConfigMap -> DEBU 9ed Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.949 UTC [common.configtx] recurseConfigMap -> DEBU 9ee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.950 UTC [common.configtx] recurseConfigMap -> DEBU 9ef Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.950 UTC [common.configtx] recurseConfigMap -> DEBU 9f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f4 Setting policy for key Admins to " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f5 Setting policy for key Readers to " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f6 Setting policy for key Writers to " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9f9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9fa Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.951 UTC [common.configtx] recurseConfigMap -> DEBU 9fb Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.952 UTC [common.configtx] recurseConfigMap -> DEBU 9fc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.952 UTC [common.configtx] recurseConfigMap -> DEBU 9fd Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.952 UTC [common.configtx] recurseConfigMap -> DEBU 9fe Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:48.952 UTC [common.channelconfig] NewStandardValues -> DEBU 9ff Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a00 Processing field: HashingAlgorithm" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a01 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a02 Processing field: OrdererAddresses" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a03 Processing field: Consortium" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a04 Processing field: Capabilities" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] NewStandardValues -> DEBU a05 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a06 Processing field: ConsensusType" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a07 Processing field: BatchSize" +"2019-11-19 05:21:48.952 UTC [common.channelconfig] initializeProtosStruct -> DEBU a08 Processing field: BatchTimeout" +"2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a09 Processing field: KafkaBrokers" +"2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0a Processing field: ChannelRestrictions" +"2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0b Processing field: Capabilities" +"2019-11-19 05:21:48.953 UTC [common.channelconfig] NewStandardValues -> DEBU a0c Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0d Processing field: Endpoints" +"2019-11-19 05:21:48.953 UTC [common.channelconfig] NewStandardValues -> DEBU a0e Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:48.953 UTC [common.channelconfig] initializeProtosStruct -> DEBU a0f Processing field: MSP" +"2019-11-19 05:21:48.954 UTC [common.channelconfig] validateMSP -> DEBU a10 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:48.954 UTC [msp] newBccspMsp -> DEBU a11 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:48.954 UTC [msp] New -> DEBU a12 Creating Cache-MSP instance" +"2019-11-19 05:21:48.954 UTC [msp] Setup -> DEBU a13 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:48.955 UTC [msp.identity] newIdentity -> DEBU a14 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.955 UTC [msp.identity] newIdentity -> DEBU a15 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.955 UTC [msp] Validate -> DEBU a16 MSP OrdererMSP validating identity" +"2019-11-19 05:21:48.956 UTC [common.channelconfig] NewStandardValues -> DEBU a17 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:48.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU a18 Processing field: ACLs" +"2019-11-19 05:21:48.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU a19 Processing field: Capabilities" +"2019-11-19 05:21:48.956 UTC [common.channelconfig] NewStandardValues -> DEBU a1a Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:48.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU a1b Processing field: AnchorPeers" +"2019-11-19 05:21:48.956 UTC [common.channelconfig] NewStandardValues -> DEBU a1c Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:48.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU a1d Processing field: MSP" +"2019-11-19 05:21:48.956 UTC [common.channelconfig] Validate -> DEBU a1e Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:21:48.956 UTC [common.channelconfig] validateMSP -> DEBU a1f Setting up MSP for org Org1MSP" +"2019-11-19 05:21:48.956 UTC [msp] newBccspMsp -> DEBU a20 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:48.956 UTC [msp] New -> DEBU a21 Creating Cache-MSP instance" +"2019-11-19 05:21:48.956 UTC [msp] Setup -> DEBU a22 Setting up MSP instance Org1MSP" +"2019-11-19 05:21:48.957 UTC [msp.identity] newIdentity -> DEBU a23 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.957 UTC [common.channelconfig] NewStandardValues -> DEBU a24 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:48.957 UTC [common.channelconfig] initializeProtosStruct -> DEBU a25 Processing field: AnchorPeers" +"2019-11-19 05:21:48.957 UTC [common.channelconfig] NewStandardValues -> DEBU a26 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:48.958 UTC [common.channelconfig] initializeProtosStruct -> DEBU a27 Processing field: MSP" +"2019-11-19 05:21:48.958 UTC [common.channelconfig] Validate -> DEBU a28 Anchor peers for org Org2MSP are anchor_peers: " +"2019-11-19 05:21:48.958 UTC [common.channelconfig] validateMSP -> DEBU a29 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:48.958 UTC [msp] newBccspMsp -> DEBU a2a Creating BCCSP-based MSP instance" +"2019-11-19 05:21:48.958 UTC [msp] New -> DEBU a2b Creating Cache-MSP instance" +"2019-11-19 05:21:48.958 UTC [msp] Setup -> DEBU a2c Setting up MSP instance Org2MSP" +"2019-11-19 05:21:48.958 UTC [msp.identity] newIdentity -> DEBU a2d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.959 UTC [msp] Setup -> DEBU a2e Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:48.959 UTC [msp] Setup -> DEBU a2f MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:48.959 UTC [policies] NewManagerImpl -> DEBU a30 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:48.959 UTC [policies] NewManagerImpl -> DEBU a31 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:48.959 UTC [policies] NewManagerImpl -> DEBU a32 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:48.959 UTC [policies] NewManagerImpl -> DEBU a33 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a34 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a35 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a36 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a37 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a38 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a39 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a3a Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a3b Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:48.960 UTC [policies] NewManagerImpl -> DEBU a3c Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:48.960 UTC [policies] GetPolicy -> DEBU a3d Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:48.960 UTC [policies] GetPolicy -> DEBU a3e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a3f Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:21:48.961 UTC [policies] GetPolicy -> DEBU a40 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:48.961 UTC [policies] GetPolicy -> DEBU a41 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a42 Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a43 Proposed new policy Readers for Channel/Application" +"2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a44 Proposed new policy Writers for Channel/Application" +"2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a45 Proposed new policy Admins for Channel/Application" +"2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a46 Proposed new policy Writers for Channel" +"2019-11-19 05:21:48.961 UTC [policies] NewManagerImpl -> DEBU a47 Proposed new policy Admins for Channel" +"2019-11-19 05:21:48.962 UTC [policies] NewManagerImpl -> DEBU a48 Proposed new policy Readers for Channel" +"2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:48.962 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:48.963 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5c Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5d Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:48.965 UTC [common.configtx] addToMap -> DEBU a5e Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a5f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a60 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a61 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a62 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a63 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:48.966 UTC [common.configtx] addToMap -> DEBU a64 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a65 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a66 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a67 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a68 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a69 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a6a Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:48.967 UTC [common.configtx] addToMap -> DEBU a6b Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a6c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a6d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a6e Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a6f Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a70 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a71 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a72 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a73 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:48.968 UTC [common.configtx] addToMap -> DEBU a74 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:48.969 UTC [common.channelconfig] LogSanityChecks -> DEBU a75 As expected, current configuration has policy '/Channel/Readers'" +"2019-11-19 05:21:48.969 UTC [common.channelconfig] LogSanityChecks -> DEBU a76 As expected, current configuration has policy '/Channel/Writers'" +"2019-11-19 05:21:48.969 UTC [policies] Manager -> DEBU a77 Manager Channel looking up path [Application]" +"2019-11-19 05:21:48.969 UTC [policies] Manager -> DEBU a78 Manager Channel has managers Orderer" +"2019-11-19 05:21:48.969 UTC [policies] Manager -> DEBU a79 Manager Channel has managers Application" +"2019-11-19 05:21:48.969 UTC [policies] Manager -> DEBU a7a Manager Channel/Application looking up path []" +"2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a7b Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a7c Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:48.970 UTC [common.channelconfig] LogSanityChecks -> DEBU a7d As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-11-19 05:21:48.970 UTC [common.channelconfig] LogSanityChecks -> DEBU a7e As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-11-19 05:21:48.970 UTC [common.channelconfig] LogSanityChecks -> DEBU a7f As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a80 Manager Channel looking up path [Orderer]" +"2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a81 Manager Channel has managers Orderer" +"2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a82 Manager Channel has managers Application" +"2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a83 Manager Channel/Orderer looking up path []" +"2019-11-19 05:21:48.970 UTC [policies] Manager -> DEBU a84 Manager Channel/Orderer has managers OrdererOrg" +"2019-11-19 05:21:48.971 UTC [common.channelconfig] LogSanityChecks -> DEBU a85 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-11-19 05:21:48.971 UTC [common.channelconfig] LogSanityChecks -> DEBU a86 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-11-19 05:21:48.971 UTC [common.channelconfig] LogSanityChecks -> DEBU a87 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-11-19 05:21:48.971 UTC [common.channelconfig] LogSanityChecks -> DEBU a88 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-11-19 05:21:48.971 UTC [common.capabilities] Supported -> DEBU a89 Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:21:48.971 UTC [common.capabilities] Supported -> DEBU a8a Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:21:48.971 UTC [msp] GetDefaultSigningIdentity -> DEBU a8b Obtaining default signing identity" +"2019-11-19 05:21:48.972 UTC [msp] GetDefaultSigningIdentity -> DEBU a8c Obtaining default signing identity" +"2019-11-19 05:21:48.972 UTC [msp.identity] Sign -> DEBU a8d Sign: plaintext: 0AD2060A1B08011A0608ECF7CDEE0522...C43935BA563DDA3A4A8E8FF78A6947D5 " +"2019-11-19 05:21:48.972 UTC [msp.identity] Sign -> DEBU a8e Sign: digest: 205C3F1BD84ADAC34B672049D848CE53E189FC50B4B15EC3A1042D2B2AA253C9 " +"2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a91 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a92 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:48.973 UTC [policies] Evaluate -> DEBU a93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-11-19 05:21:48.973 UTC [msp] DeserializeIdentity -> DEBU a94 Obtaining identity" +"2019-11-19 05:21:48.975 UTC [msp.identity] newIdentity -> DEBU a95 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.975 UTC [cauthdsl] func1 -> DEBU a96 0xc000e77ee0 gate 1574140908975894200 evaluation starts" +"2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU a97 0xc000e77ee0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU a98 0xc000e77ee0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU a99 0xc000e77ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU a9a 0xc000e77ee0 principal evaluation fails" +"2019-11-19 05:21:48.976 UTC [cauthdsl] func1 -> DEBU a9b 0xc000e77ee0 gate 1574140908975894200 evaluation fails" +"2019-11-19 05:21:48.976 UTC [policies] Evaluate -> DEBU a9c Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:48.976 UTC [policies] Evaluate -> DEBU a9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:48.976 UTC [policies] Evaluate -> DEBU a9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-11-19 05:21:48.976 UTC [cauthdsl] func1 -> DEBU a9f 0xc000fe7020 gate 1574140908976779600 evaluation starts" +"2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU aa0 0xc000fe7020 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:48.976 UTC [cauthdsl] func2 -> DEBU aa1 0xc000fe7020 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:48.977 UTC [cauthdsl] func2 -> DEBU aa2 0xc000fe7020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:21:48.977 UTC [cauthdsl] func2 -> DEBU aa3 0xc000fe7020 principal evaluation fails" +"2019-11-19 05:21:48.977 UTC [cauthdsl] func1 -> DEBU aa4 0xc000fe7020 gate 1574140908976779600 evaluation fails" +"2019-11-19 05:21:48.977 UTC [policies] Evaluate -> DEBU aa5 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:48.977 UTC [policies] Evaluate -> DEBU aa6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:48.977 UTC [policies] func1 -> DEBU aa7 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2019-11-19 05:21:48.977 UTC [policies] Evaluate -> DEBU aa8 Signature set did not satisfy policy /Channel/Application/Writers" +"2019-11-19 05:21:48.978 UTC [policies] Evaluate -> DEBU aa9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:21:48.978 UTC [policies] Evaluate -> DEBU aaa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-11-19 05:21:48.978 UTC [policies] Evaluate -> DEBU aab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:21:48.978 UTC [policies] Evaluate -> DEBU aac == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-11-19 05:21:48.978 UTC [cauthdsl] func1 -> DEBU aad 0xc000fe7d30 gate 1574140908978670200 evaluation starts" +"2019-11-19 05:21:48.978 UTC [cauthdsl] func2 -> DEBU aae 0xc000fe7d30 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:48.978 UTC [cauthdsl] func2 -> DEBU aaf 0xc000fe7d30 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:48.978 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ab0 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-11-19 05:21:48.979 UTC [msp] Validate -> DEBU ab1 MSP OrdererMSP validating identity" +"2019-11-19 05:21:48.979 UTC [cauthdsl] func2 -> DEBU ab2 0xc000fe7d30 principal matched by identity 0" +"2019-11-19 05:21:48.979 UTC [msp.identity] Verify -> DEBU ab3 Verify: digest = 00000000 20 5c 3f 1b d8 4a da c3 4b 67 20 49 d8 48 ce 53 | \?..J..Kg I.H.S| +00000010 e1 89 fc 50 b4 b1 5e c3 a1 04 2d 2b 2a a2 53 c9 |...P..^...-+*.S.|" +"2019-11-19 05:21:48.979 UTC [msp.identity] Verify -> DEBU ab4 Verify: sig = 00000000 30 44 02 20 3c da 5b 7f f8 0b 78 dd 56 60 07 6f |0D. <.[...x.V`.o| +00000010 55 50 96 78 11 13 49 28 89 52 93 b7 b2 9d bb 4d |UP.x..I(.R.....M| +00000020 1c 1a 01 32 02 20 63 c4 7c ca a7 d6 48 c5 10 9b |...2. c.|...H...| +00000030 00 2d 4d 59 a6 7a c2 62 62 b5 9b 3a ce f0 9e e7 |.-MY.z.bb..:....| +00000040 61 25 fa 66 d3 6c |a%.f.l|" +"2019-11-19 05:21:48.980 UTC [cauthdsl] func2 -> DEBU ab5 0xc000fe7d30 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:48.980 UTC [cauthdsl] func1 -> DEBU ab6 0xc000fe7d30 gate 1574140908978670200 evaluation succeeds" +"2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU ab7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU ab8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU ab9 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU aba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU abb Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:21:48.980 UTC [policies] Evaluate -> DEBU abc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:21:48.981 UTC [orderer.common.msgprocessor] Apply -> DEBU abd Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-11-19 05:21:48.981 UTC [common.channelconfig] NewStandardValues -> DEBU abe Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU abf Processing field: HashingAlgorithm" +"2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac0 Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac1 Processing field: OrdererAddresses" +"2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac2 Processing field: Consortium" +"2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac3 Processing field: Capabilities" +"2019-11-19 05:21:48.981 UTC [common.channelconfig] NewStandardValues -> DEBU ac4 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:48.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac5 Processing field: ConsensusType" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac6 Processing field: BatchSize" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac7 Processing field: BatchTimeout" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac8 Processing field: KafkaBrokers" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ac9 Processing field: ChannelRestrictions" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU aca Processing field: Capabilities" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] NewStandardValues -> DEBU acb Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU acc Processing field: Endpoints" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] NewStandardValues -> DEBU acd Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU ace Processing field: MSP" +"2019-11-19 05:21:48.982 UTC [common.channelconfig] validateMSP -> DEBU acf Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:48.983 UTC [msp] newBccspMsp -> DEBU ad0 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:48.983 UTC [msp] New -> DEBU ad1 Creating Cache-MSP instance" +"2019-11-19 05:21:48.983 UTC [msp] Setup -> DEBU ad2 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:48.983 UTC [msp.identity] newIdentity -> DEBU ad3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.984 UTC [msp.identity] newIdentity -> DEBU ad4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.985 UTC [msp] Validate -> DEBU ad5 MSP OrdererMSP validating identity" +"2019-11-19 05:21:48.985 UTC [common.channelconfig] NewStandardValues -> DEBU ad6 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:48.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU ad7 Processing field: ACLs" +"2019-11-19 05:21:48.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU ad8 Processing field: Capabilities" +"2019-11-19 05:21:48.986 UTC [common.channelconfig] NewStandardValues -> DEBU ad9 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:48.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU ada Processing field: AnchorPeers" +"2019-11-19 05:21:48.986 UTC [common.channelconfig] NewStandardValues -> DEBU adb Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:48.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU adc Processing field: MSP" +"2019-11-19 05:21:48.986 UTC [common.channelconfig] Validate -> DEBU add Anchor peers for org Org2MSP are anchor_peers: " +"2019-11-19 05:21:48.986 UTC [common.channelconfig] validateMSP -> DEBU ade Setting up MSP for org Org2MSP" +"2019-11-19 05:21:48.986 UTC [msp] newBccspMsp -> DEBU adf Creating BCCSP-based MSP instance" +"2019-11-19 05:21:48.986 UTC [msp] New -> DEBU ae0 Creating Cache-MSP instance" +"2019-11-19 05:21:48.987 UTC [msp] Setup -> DEBU ae1 Setting up MSP instance Org2MSP" +"2019-11-19 05:21:48.987 UTC [msp.identity] newIdentity -> DEBU ae2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.988 UTC [common.channelconfig] NewStandardValues -> DEBU ae3 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:48.988 UTC [common.channelconfig] initializeProtosStruct -> DEBU ae4 Processing field: AnchorPeers" +"2019-11-19 05:21:48.988 UTC [common.channelconfig] NewStandardValues -> DEBU ae5 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:48.988 UTC [common.channelconfig] initializeProtosStruct -> DEBU ae6 Processing field: MSP" +"2019-11-19 05:21:48.988 UTC [common.channelconfig] Validate -> DEBU ae7 Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:21:48.989 UTC [common.channelconfig] validateMSP -> DEBU ae8 Setting up MSP for org Org1MSP" +"2019-11-19 05:21:48.989 UTC [msp] newBccspMsp -> DEBU ae9 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:48.989 UTC [msp] New -> DEBU aea Creating Cache-MSP instance" +"2019-11-19 05:21:48.989 UTC [msp] Setup -> DEBU aeb Setting up MSP instance Org1MSP" +"2019-11-19 05:21:48.989 UTC [msp.identity] newIdentity -> DEBU aec Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:48.990 UTC [msp] Setup -> DEBU aed Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:48.990 UTC [msp] Setup -> DEBU aee MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:48.990 UTC [policies] NewManagerImpl -> DEBU aef Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:48.990 UTC [policies] NewManagerImpl -> DEBU af0 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:48.990 UTC [policies] NewManagerImpl -> DEBU af1 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af2 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af3 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af4 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af5 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af6 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af7 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af8 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU af9 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU afa Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:48.991 UTC [policies] NewManagerImpl -> DEBU afb Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU afc Proposed new policy Admins for Channel/Application" +"2019-11-19 05:21:48.992 UTC [policies] GetPolicy -> DEBU afd Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:48.992 UTC [policies] GetPolicy -> DEBU afe Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU aff Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:21:48.992 UTC [policies] GetPolicy -> DEBU b00 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:48.992 UTC [policies] GetPolicy -> DEBU b01 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU b02 Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU b03 Proposed new policy Readers for Channel/Application" +"2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU b04 Proposed new policy Writers for Channel/Application" +"2019-11-19 05:21:48.992 UTC [policies] NewManagerImpl -> DEBU b05 Proposed new policy Writers for Channel" +"2019-11-19 05:21:48.993 UTC [policies] NewManagerImpl -> DEBU b06 Proposed new policy Admins for Channel" +"2019-11-19 05:21:48.993 UTC [policies] NewManagerImpl -> DEBU b07 Proposed new policy Readers for Channel" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b08 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b09 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0a Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0b Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b0f Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:48.993 UTC [common.configtx] addToMap -> DEBU b10 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b11 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b12 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b13 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b14 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b15 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:48.994 UTC [common.configtx] addToMap -> DEBU b16 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:48.995 UTC [common.configtx] addToMap -> DEBU b17 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:48.995 UTC [common.configtx] addToMap -> DEBU b18 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:48.995 UTC [common.configtx] addToMap -> DEBU b19 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b1f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:48.996 UTC [common.configtx] addToMap -> DEBU b20 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b21 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b22 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b23 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b24 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b25 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b26 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b27 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:48.997 UTC [common.configtx] addToMap -> DEBU b28 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b29 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2a Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2b Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2c Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2d Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:48.998 UTC [common.configtx] addToMap -> DEBU b2f Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:48.999 UTC [common.configtx] addToMap -> DEBU b30 Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:48.999 UTC [common.configtx] addToMap -> DEBU b31 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:48.999 UTC [common.configtx] addToMap -> DEBU b32 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:48.999 UTC [common.configtx] addToMap -> DEBU b33 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:49.000 UTC [orderer.common.broadcast] ProcessMessage -> DEBU b34 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:51456" +"2019-11-19 05:21:49.000 UTC [orderer.consensus.etcdraft] propose -> INFO b35 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-11-19 05:21:49.003 UTC [orderer.consensus.etcdraft] serveRequest -> INFO b36 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-11-19 05:21:49.003 UTC [common.deliver] Handle -> WARN b37 Error reading from 172.18.0.5:51454: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:21:49.004 UTC [orderer.common.server] func1 -> DEBU b38 Closing Deliver stream" +"2019-11-19 05:21:49.004 UTC [comm.grpc.server] 1 -> INFO b39 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51454 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=109.4814ms +"2019-11-19 05:21:49.006 UTC [orderer.common.broadcast] Handle -> WARN b3a Error reading from 172.18.0.5:51456: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:21:49.007 UTC [orderer.common.server] func1 -> DEBU b3b Closing Broadcast stream" +"2019-11-19 05:21:49.007 UTC [comm.grpc.server] 1 -> INFO b3c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51456 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.3334ms +"2019-11-19 05:21:49.007 UTC [grpc] infof -> DEBU b3d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:49.007 UTC [grpc] infof -> DEBU b3e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:21:49.007 UTC [orderer.consensus.etcdraft] 2 -> DEBU b3f Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2019-11-19 05:21:49.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b40 Sending msg of 24605 bytes to 2 on channel businesschannel took 20.7µs" +"2019-11-19 05:21:49.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU b41 Send of ConsensusRequest for channel businesschannel with payload of size 24605 to orderer1.example.com(orderer1.example.com:7050) took 203.3µs " +"2019-11-19 05:21:49.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b42 Sending msg of 24605 bytes to 3 on channel businesschannel took 18.8µs" +"2019-11-19 05:21:49.031 UTC [orderer.common.cluster.step] sendMessage -> DEBU b43 Send of ConsensusRequest for channel businesschannel with payload of size 24605 to orderer2.example.com(orderer2.example.com:7050) took 2.3956ms " +"2019-11-19 05:21:49.033 UTC [orderer.common.cluster.step] handleMessage -> DEBU b44 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:49.034 UTC [orderer.consensus.etcdraft] writeBlock -> INFO b45 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2019-11-19 05:21:49.035 UTC [common.configtx] addToMap -> DEBU b46 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:49.035 UTC [common.configtx] addToMap -> DEBU b47 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:49.035 UTC [common.configtx] addToMap -> DEBU b48 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:49.035 UTC [common.configtx] addToMap -> DEBU b49 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:49.036 UTC [common.configtx] addToMap -> DEBU b4a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:49.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b4b Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2019-11-19 05:21:49.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b4c Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +"2019-11-19 05:21:49.036 UTC [common.configtx] addToMap -> DEBU b4d Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:49.038 UTC [common.configtx] addToMap -> DEBU b4e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:49.038 UTC [common.configtx] addToMap -> DEBU b4f Adding to config map: [Group] /Channel" +"2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b51 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b52 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b53 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:21:49.046 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:49.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU b50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 405.8µs " +"2019-11-19 05:21:49.046 UTC [orderer.common.cluster.step] sendMessage -> DEBU b56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 9.0249ms " +"2019-11-19 05:21:49.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU b57 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:49.052 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:49.052 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:49.052 UTC [common.configtx] verifyDeltaSet -> DEBU b5a Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:21:49.052 UTC [common.configtx] verifyDeltaSet -> DEBU b5b Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:49.052 UTC [common.configtx] policyForItem -> DEBU b5c Getting policy for item Org2MSP with mod_policy Admins" +"2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b5d Manager Channel looking up path [Application]" +"2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b5e Manager Channel has managers Application" +"2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b5f Manager Channel has managers Orderer" +"2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b60 Manager Channel/Application looking up path []" +"2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b61 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:49.052 UTC [policies] Manager -> DEBU b62 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:49.053 UTC [policies] Manager -> DEBU b63 Manager Channel/Application looking up path [Org2MSP]" +"2019-11-19 05:21:49.053 UTC [policies] Manager -> DEBU b64 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:49.053 UTC [policies] Manager -> DEBU b65 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:49.053 UTC [policies] Manager -> DEBU b66 Manager Channel/Application/Org2MSP looking up path []" +"2019-11-19 05:21:49.053 UTC [policies] Evaluate -> DEBU b67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-11-19 05:21:49.053 UTC [cauthdsl] func1 -> DEBU b68 0xc0011a4750 gate 1574140909053396900 evaluation starts" +"2019-11-19 05:21:49.053 UTC [cauthdsl] func2 -> DEBU b69 0xc0011a4750 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:21:49.059 UTC [cauthdsl] func2 -> DEBU b6a 0xc0011a4750 processing identity 0 with bytes of fd6070" +"2019-11-19 05:21:49.059 UTC [cauthdsl] func2 -> DEBU b6b 0xc0011a4750 principal matched by identity 0" +"2019-11-19 05:21:49.059 UTC [msp.identity] Verify -> DEBU b6c Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.|" +"2019-11-19 05:21:49.059 UTC [msp.identity] Verify -> DEBU b6d Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +00000040 56 71 ab 2e 37 58 4a |Vq..7XJ|" +"2019-11-19 05:21:49.060 UTC [cauthdsl] func2 -> DEBU b6e 0xc0011a4750 principal evaluation succeeds for identity 0" +"2019-11-19 05:21:49.060 UTC [cauthdsl] func1 -> DEBU b6f 0xc0011a4750 gate 1574140909053396900 evaluation succeeds" +"2019-11-19 05:21:49.060 UTC [policies] Evaluate -> DEBU b70 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:49.060 UTC [policies] Evaluate -> DEBU b71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:49.061 UTC [common.configtx] recurseConfigMap -> DEBU b72 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.061 UTC [common.configtx] recurseConfigMap -> DEBU b73 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.061 UTC [common.configtx] recurseConfigMap -> DEBU b74 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.062 UTC [common.configtx] recurseConfigMap -> DEBU b75 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.062 UTC [common.configtx] recurseConfigMap -> DEBU b76 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.062 UTC [common.configtx] recurseConfigMap -> DEBU b77 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU b78 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:49.065 UTC [orderer.common.cluster.step] handleMessage -> DEBU b79 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:49.066 UTC [orderer.common.cluster.step] handleMessage -> DEBU b7a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:49.066 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b7b Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +"2019-11-19 05:21:49.067 UTC [orderer.common.cluster.step] sendMessage -> DEBU b7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +"2019-11-19 05:21:49.062 UTC [common.configtx] recurseConfigMap -> DEBU b7d Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.068 UTC [common.configtx] recurseConfigMap -> DEBU b7e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b7f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b80 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b81 Setting policy for key Readers to " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b82 Setting policy for key Writers to " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b83 Setting policy for key Admins to " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b84 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b85 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b86 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.069 UTC [common.configtx] recurseConfigMap -> DEBU b87 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.070 UTC [common.configtx] recurseConfigMap -> DEBU b88 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.070 UTC [common.configtx] recurseConfigMap -> DEBU b89 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.070 UTC [common.configtx] recurseConfigMap -> DEBU b8a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.071 UTC [common.configtx] recurseConfigMap -> DEBU b8b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:21:49.071 UTC [common.channelconfig] NewStandardValues -> DEBU b8c Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b8d Processing field: HashingAlgorithm" +"2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b8e Processing field: BlockDataHashingStructure" +"2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b8f Processing field: OrdererAddresses" +"2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b90 Processing field: Consortium" +"2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b91 Processing field: Capabilities" +"2019-11-19 05:21:49.071 UTC [common.channelconfig] NewStandardValues -> DEBU b92 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b93 Processing field: ACLs" +"2019-11-19 05:21:49.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU b94 Processing field: Capabilities" +"2019-11-19 05:21:49.072 UTC [common.channelconfig] NewStandardValues -> DEBU b95 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:49.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU b96 Processing field: AnchorPeers" +"2019-11-19 05:21:49.072 UTC [common.channelconfig] NewStandardValues -> DEBU b97 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:49.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU b98 Processing field: MSP" +"2019-11-19 05:21:49.073 UTC [common.channelconfig] Validate -> DEBU b99 Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:21:49.073 UTC [common.channelconfig] validateMSP -> DEBU b9a Setting up MSP for org Org1MSP" +"2019-11-19 05:21:49.073 UTC [msp] newBccspMsp -> DEBU b9b Creating BCCSP-based MSP instance" +"2019-11-19 05:21:49.073 UTC [msp] New -> DEBU b9c Creating Cache-MSP instance" +"2019-11-19 05:21:49.073 UTC [msp] Setup -> DEBU b9d Setting up MSP instance Org1MSP" +"2019-11-19 05:21:49.074 UTC [msp.identity] newIdentity -> DEBU b9e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:21:49.075 UTC [common.channelconfig] NewStandardValues -> DEBU b9f Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:21:49.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba0 Processing field: AnchorPeers" +"2019-11-19 05:21:49.075 UTC [common.channelconfig] NewStandardValues -> DEBU ba1 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:49.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba2 Processing field: MSP" +"2019-11-19 05:21:49.076 UTC [common.channelconfig] Validate -> DEBU ba3 Anchor peers for org Org2MSP are anchor_peers: " +"2019-11-19 05:21:49.076 UTC [common.channelconfig] validateMSP -> DEBU ba4 Setting up MSP for org Org2MSP" +"2019-11-19 05:21:49.076 UTC [msp] newBccspMsp -> DEBU ba5 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:49.077 UTC [msp] New -> DEBU ba6 Creating Cache-MSP instance" +"2019-11-19 05:21:49.077 UTC [msp] Setup -> DEBU ba7 Setting up MSP instance Org2MSP" +"2019-11-19 05:21:49.077 UTC [msp.identity] newIdentity -> DEBU ba8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:21:49.078 UTC [common.channelconfig] NewStandardValues -> DEBU ba9 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:21:49.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU baa Processing field: ConsensusType" +"2019-11-19 05:21:49.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU bab Processing field: BatchSize" +"2019-11-19 05:21:49.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU bac Processing field: BatchTimeout" +"2019-11-19 05:21:49.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU bad Processing field: KafkaBrokers" +"2019-11-19 05:21:49.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU bae Processing field: ChannelRestrictions" +"2019-11-19 05:21:49.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU baf Processing field: Capabilities" +"2019-11-19 05:21:49.080 UTC [common.channelconfig] NewStandardValues -> DEBU bb0 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:21:49.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU bb1 Processing field: Endpoints" +"2019-11-19 05:21:49.080 UTC [common.channelconfig] NewStandardValues -> DEBU bb2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:21:49.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU bb3 Processing field: MSP" +"2019-11-19 05:21:49.080 UTC [common.channelconfig] validateMSP -> DEBU bb4 Setting up MSP for org OrdererOrg" +"2019-11-19 05:21:49.080 UTC [msp] newBccspMsp -> DEBU bb5 Creating BCCSP-based MSP instance" +"2019-11-19 05:21:49.081 UTC [msp] New -> DEBU bb6 Creating Cache-MSP instance" +"2019-11-19 05:21:49.081 UTC [msp] Setup -> DEBU bb7 Setting up MSP instance OrdererMSP" +"2019-11-19 05:21:49.081 UTC [msp.identity] newIdentity -> DEBU bb8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:21:49.082 UTC [msp.identity] newIdentity -> DEBU bb9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:21:49.083 UTC [msp] Validate -> DEBU bba MSP OrdererMSP validating identity" +"2019-11-19 05:21:49.083 UTC [msp] Setup -> DEBU bbb Setting up the MSP manager (3 msps)" +"2019-11-19 05:21:49.083 UTC [msp] Setup -> DEBU bbc MSP manager setup complete, setup 3 msps" +"2019-11-19 05:21:49.083 UTC [policies] NewManagerImpl -> DEBU bbd Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bbe Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bbf Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc0 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc1 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc2 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc3 Proposed new policy Admins for Channel/Application" +"2019-11-19 05:21:49.084 UTC [policies] GetPolicy -> DEBU bc4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:49.084 UTC [policies] GetPolicy -> DEBU bc5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:49.084 UTC [policies] NewManagerImpl -> DEBU bc6 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:21:49.085 UTC [policies] GetPolicy -> DEBU bc7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:21:49.085 UTC [policies] GetPolicy -> DEBU bc8 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:21:49.085 UTC [policies] NewManagerImpl -> DEBU bc9 Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:21:49.085 UTC [policies] NewManagerImpl -> DEBU bca Proposed new policy Readers for Channel/Application" +"2019-11-19 05:21:49.085 UTC [policies] NewManagerImpl -> DEBU bcb Proposed new policy Writers for Channel/Application" +"2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bcc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bcd Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bce Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bcf Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bd0 Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:21:49.086 UTC [policies] NewManagerImpl -> DEBU bd1 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:21:49.087 UTC [policies] NewManagerImpl -> DEBU bd2 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:21:49.087 UTC [policies] NewManagerImpl -> DEBU bd3 Proposed new policy Writers for Channel" +"2019-11-19 05:21:49.087 UTC [policies] NewManagerImpl -> DEBU bd4 Proposed new policy Admins for Channel" +"2019-11-19 05:21:49.087 UTC [policies] NewManagerImpl -> DEBU bd5 Proposed new policy Readers for Channel" +"2019-11-19 05:21:49.088 UTC [common.configtx] addToMap -> DEBU bd6 Adding to config map: [Group] /Channel" +"2019-11-19 05:21:49.088 UTC [common.configtx] addToMap -> DEBU bd7 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:21:49.088 UTC [common.configtx] addToMap -> DEBU bd8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:21:49.089 UTC [common.configtx] addToMap -> DEBU bd9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:21:49.089 UTC [common.configtx] addToMap -> DEBU bda Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:21:49.091 UTC [common.configtx] addToMap -> DEBU bdb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:21:49.091 UTC [common.configtx] addToMap -> DEBU bdc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:21:49.091 UTC [common.configtx] addToMap -> DEBU bdd Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:21:49.092 UTC [common.configtx] addToMap -> DEBU bde Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:21:49.092 UTC [common.configtx] addToMap -> DEBU bdf Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be2 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be4 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:21:49.093 UTC [common.configtx] addToMap -> DEBU be5 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU be6 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU be7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU be8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU bec Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU bed Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:21:49.094 UTC [common.configtx] addToMap -> DEBU bee Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bef Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf3 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:21:49.095 UTC [common.configtx] addToMap -> DEBU bf4 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf5 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf6 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf7 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf8 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bf9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfa Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfb Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfc Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfd Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bfe Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU bff Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU c00 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:21:49.096 UTC [common.configtx] addToMap -> DEBU c01 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:21:49.096 UTC [common.channelconfig] LogSanityChecks -> DEBU c02 As expected, current configuration has policy '/Channel/Readers'" +"2019-11-19 05:21:49.096 UTC [common.channelconfig] LogSanityChecks -> DEBU c03 As expected, current configuration has policy '/Channel/Writers'" +"2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c04 Manager Channel looking up path [Application]" +"2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c05 Manager Channel has managers Orderer" +"2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c06 Manager Channel has managers Application" +"2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c07 Manager Channel/Application looking up path []" +"2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c08 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:21:49.096 UTC [policies] Manager -> DEBU c09 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c0a As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c0b As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c0c As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c0d Manager Channel looking up path [Orderer]" +"2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c0e Manager Channel has managers Application" +"2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c0f Manager Channel has managers Orderer" +"2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c10 Manager Channel/Orderer looking up path []" +"2019-11-19 05:21:49.098 UTC [policies] Manager -> DEBU c11 Manager Channel/Orderer has managers OrdererOrg" +"2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c12 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c13 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c14 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-11-19 05:21:49.098 UTC [common.channelconfig] LogSanityChecks -> DEBU c15 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-11-19 05:21:49.098 UTC [common.capabilities] Supported -> DEBU c16 Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:21:49.098 UTC [common.capabilities] Supported -> DEBU c17 Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:21:49.098 UTC [orderer.common.server] func1 -> DEBU c18 Executing callback to update root CAs" +"2019-11-19 05:21:49.098 UTC [orderer.common.server] updateTrustedRoots -> DEBU c19 updating root CAs for channel [businesschannel]" +"2019-11-19 05:21:49.098 UTC [orderer.common.server] updateTrustedRoots -> DEBU c1a adding app root CAs for MSP [Org1MSP]" +"2019-11-19 05:21:49.098 UTC [orderer.common.server] updateTrustedRoots -> DEBU c1b adding app root CAs for MSP [Org2MSP]" +"2019-11-19 05:21:49.098 UTC [orderer.common.server] updateTrustedRoots -> DEBU c1c adding orderer root CAs for MSP [OrdererMSP]" +"2019-11-19 05:21:49.099 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c1d [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2019-11-19 05:21:49.099 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c1e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-11-19 05:21:49.099 UTC [msp] GetDefaultSigningIdentity -> DEBU c1f Obtaining default signing identity" +"2019-11-19 05:21:49.099 UTC [msp] GetDefaultSigningIdentity -> DEBU c20 Obtaining default signing identity" +"2019-11-19 05:21:49.099 UTC [msp.identity] Sign -> DEBU c21 Sign: plaintext: 0A020802120B0A090A03010203100418...65D284A2D7FBCCB5B62D382A473B7410 " +"2019-11-19 05:21:49.099 UTC [msp.identity] Sign -> DEBU c22 Sign: digest: FA78E4DFFD63233ABE02567FF5F97B500845DDFCE649EF1C56F1890754673F13 " +"2019-11-19 05:21:49.101 UTC [fsblkstorage] indexBlock -> DEBU c23 Indexing block [blockNum=2, blockHash=[]byte{0x39, 0x34, 0x96, 0xee, 0x50, 0x5e, 0xad, 0x78, 0xfc, 0x3, 0xa3, 0xac, 0x21, 0xe9, 0xfb, 0x52, 0x19, 0x4e, 0xd1, 0x91, 0xc2, 0x3c, 0xb8, 0xb, 0x70, 0x9b, 0xb2, 0x3d, 0xdd, 0xb4, 0xc8, 0xd8} txOffsets= +txId=02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732 locPointer=offset=71, bytesLength=24474 +]" +"2019-11-19 05:21:49.103 UTC [fsblkstorage] updateCheckpoint -> DEBU c24 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76767], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-11-19 05:21:49.103 UTC [orderer.commmon.multichannel] commitBlock -> DEBU c25 [channel: businesschannel] Wrote block [2]" +"2019-11-19 05:21:49.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c26 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +"2019-11-19 05:21:49.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c27 Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +"2019-11-19 05:21:49.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.7µs " +"2019-11-19 05:21:49.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.3µs " +"2019-11-19 05:21:49.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:49.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:49.565 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:49.565 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2d Sending msg of 28 bytes to 3 on channel testchainid took 9.7µs" +"2019-11-19 05:21:49.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.2µs " +"2019-11-19 05:21:49.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2f Sending msg of 28 bytes to 2 on channel businesschannel took 119.4µs" +"2019-11-19 05:21:49.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c30 Sending msg of 28 bytes to 3 on channel businesschannel took 34.2µs" +"2019-11-19 05:21:49.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU c31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7883ms " +"2019-11-19 05:21:49.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU c32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.1053ms " +"2019-11-19 05:21:49.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU c33 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:49.940 UTC [orderer.common.cluster.step] handleMessage -> DEBU c34 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:50.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c35 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:50.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c36 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2019-11-19 05:21:50.062 UTC [orderer.common.cluster.step] sendMessage -> DEBU c37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300µs " +"2019-11-19 05:21:50.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c38 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2019-11-19 05:21:50.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3a Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2019-11-19 05:21:50.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +"2019-11-19 05:21:50.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 559.6µs " +"2019-11-19 05:21:50.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:50.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:50.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:50.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3f Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2019-11-19 05:21:50.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU c40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.8µs " +"2019-11-19 05:21:50.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c41 Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +"2019-11-19 05:21:50.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU c42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 474.3µs " +"2019-11-19 05:21:50.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU c43 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:50.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c44 Sending msg of 28 bytes to 2 on channel businesschannel took 2.7642ms" +"2019-11-19 05:21:50.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU c45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 403.7µs " +"2019-11-19 05:21:50.940 UTC [orderer.common.cluster.step] handleMessage -> DEBU c46 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:51.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c47 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:51.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c48 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2019-11-19 05:21:51.062 UTC [orderer.common.cluster.step] sendMessage -> DEBU c49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +"2019-11-19 05:21:51.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4a Sending msg of 28 bytes to 2 on channel businesschannel took 111.8µs" +"2019-11-19 05:21:51.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4b Sending msg of 28 bytes to 3 on channel businesschannel took 113.4µs" +"2019-11-19 05:21:51.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +"2019-11-19 05:21:51.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 287.9µs " +"2019-11-19 05:21:51.441 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:51.441 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:51.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c50 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:51.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c51 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +"2019-11-19 05:21:51.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU c52 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.2µs " +"2019-11-19 05:21:51.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c53 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-11-19 05:21:51.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c54 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +"2019-11-19 05:21:51.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +"2019-11-19 05:21:51.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.2µs " +"2019-11-19 05:21:51.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c57 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:51.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c58 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:52.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c59 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:52.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5a Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2019-11-19 05:21:52.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " +"2019-11-19 05:21:52.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5c Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" +"2019-11-19 05:21:52.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c5d Sending msg of 28 bytes to 3 on channel businesschannel took 47.5µs" +"2019-11-19 05:21:52.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 271.7µs " +"2019-11-19 05:21:52.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU c5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.2µs " +"2019-11-19 05:21:52.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU c60 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:52.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU c61 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:52.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c62 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:52.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c63 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-11-19 05:21:52.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU c64 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +"2019-11-19 05:21:52.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c65 Sending msg of 28 bytes to 2 on channel businesschannel took 51.7µs" +"2019-11-19 05:21:52.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c66 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2019-11-19 05:21:52.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU c67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300.7µs " +"2019-11-19 05:21:52.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU c68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 197.3µs " +"2019-11-19 05:21:52.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU c69 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:52.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:53.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c6b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:53.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6c Sending msg of 28 bytes to 3 on channel testchainid took 260µs" +"2019-11-19 05:21:53.062 UTC [orderer.common.cluster.step] sendMessage -> DEBU c6d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +"2019-11-19 05:21:53.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6e Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2019-11-19 05:21:53.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c6f Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2019-11-19 05:21:53.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU c70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 259.9µs " +"2019-11-19 05:21:53.441 UTC [orderer.common.cluster.step] handleMessage -> DEBU c71 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:53.442 UTC [orderer.common.cluster.step] handleMessage -> DEBU c72 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:53.443 UTC [orderer.common.cluster.step] sendMessage -> DEBU c73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.3288ms " +"2019-11-19 05:21:53.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c74 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:53.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c75 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2019-11-19 05:21:53.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU c76 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +"2019-11-19 05:21:53.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c77 Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +"2019-11-19 05:21:53.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c78 Sending msg of 28 bytes to 3 on channel businesschannel took 18.9µs" +"2019-11-19 05:21:53.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 199.5µs " +"2019-11-19 05:21:53.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.6µs " +"2019-11-19 05:21:53.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c7b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:53.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c7c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:54.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU c7d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:54.065 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7e Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2019-11-19 05:21:54.066 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +"2019-11-19 05:21:54.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c80 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +"2019-11-19 05:21:54.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c82 Sending msg of 28 bytes to 3 on channel businesschannel took 37.4µs" +"2019-11-19 05:21:54.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU c81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.3µs " +"2019-11-19 05:21:54.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU c83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " +"2019-11-19 05:21:54.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU c84 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:54.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU c85 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:54.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU c86 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:54.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c87 Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" +"2019-11-19 05:21:54.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU c88 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.7µs " +"2019-11-19 05:21:54.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c89 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-11-19 05:21:54.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8a Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +"2019-11-19 05:21:54.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.5µs " +"2019-11-19 05:21:54.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.1µs " +"2019-11-19 05:21:54.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:54.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:55.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:55.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c90 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +"2019-11-19 05:21:55.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU c91 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " +"2019-11-19 05:21:55.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c92 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +"2019-11-19 05:21:55.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c93 Sending msg of 28 bytes to 2 on channel businesschannel took 10.8µs" +"2019-11-19 05:21:55.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU c94 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.8µs " +"2019-11-19 05:21:55.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU c95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.7µs " +"2019-11-19 05:21:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU c96 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU c97 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:55.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU c98 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:55.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c99 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-11-19 05:21:55.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.7µs " +"2019-11-19 05:21:55.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9b Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2019-11-19 05:21:55.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9c Sending msg of 28 bytes to 2 on channel businesschannel took 11.3µs" +"2019-11-19 05:21:55.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.8µs " +"2019-11-19 05:21:55.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 44.7µs " +"2019-11-19 05:21:55.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:55.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca0 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:56.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:56.065 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca2 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-11-19 05:21:56.065 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " +"2019-11-19 05:21:56.341 UTC [orderer.common.server] Broadcast -> DEBU ca4 Starting new Broadcast handler" +"2019-11-19 05:21:56.341 UTC [orderer.common.broadcast] Handle -> DEBU ca5 Starting new broadcast loop for 172.18.0.5:51520" +"2019-11-19 05:21:56.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca6 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +"2019-11-19 05:21:56.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-11-19 05:21:56.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " +"2019-11-19 05:21:56.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.1µs " +"2019-11-19 05:21:56.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU caa Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:56.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU cab Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:56.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU cac Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:56.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cad Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2019-11-19 05:21:56.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU cae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.5µs " +"2019-11-19 05:21:56.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU caf Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +"2019-11-19 05:21:56.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb0 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +"2019-11-19 05:21:56.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.3µs " +"2019-11-19 05:21:56.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " +"2019-11-19 05:21:56.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:56.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:57.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:57.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb6 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-11-19 05:21:57.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198µs " +"2019-11-19 05:21:57.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-11-19 05:21:57.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cba Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2019-11-19 05:21:57.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.6µs " +"2019-11-19 05:21:57.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.1µs " +"2019-11-19 05:21:57.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbc Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:57.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:57.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbe Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:57.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cbf Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-11-19 05:21:57.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " +"2019-11-19 05:21:57.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +"2019-11-19 05:21:57.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc3 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +"2019-11-19 05:21:57.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.5µs " +"2019-11-19 05:21:57.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:57.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 224.2µs " +"2019-11-19 05:21:57.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:58.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:58.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc8 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-11-19 05:21:58.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 419.1µs " +"2019-11-19 05:21:58.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cca Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" +"2019-11-19 05:21:58.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccc Sending msg of 28 bytes to 3 on channel businesschannel took 92.4µs" +"2019-11-19 05:21:58.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:58.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 211.8µs " +"2019-11-19 05:21:58.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU cce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +"2019-11-19 05:21:58.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:58.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:58.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +"2019-11-19 05:21:58.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6288ms " +"2019-11-19 05:21:58.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd3 Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs" +"2019-11-19 05:21:58.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +"2019-11-19 05:21:58.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.6µs " +"2019-11-19 05:21:58.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs " +"2019-11-19 05:21:58.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:58.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:59.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:59.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-11-19 05:21:59.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs " +"2019-11-19 05:21:59.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdc Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2019-11-19 05:21:59.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 3 on channel businesschannel took 27.1µs" +"2019-11-19 05:21:59.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +"2019-11-19 05:21:59.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.3µs " +"2019-11-19 05:21:59.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce0 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:59.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:59.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:21:59.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +"2019-11-19 05:21:59.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 830.5µs " +"2019-11-19 05:21:59.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2019-11-19 05:21:59.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-11-19 05:21:59.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.8µs " +"2019-11-19 05:21:59.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.6µs " +"2019-11-19 05:21:59.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce9 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:21:59.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU cea Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:00.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU ceb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:00.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2019-11-19 05:22:00.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.8µs " +"2019-11-19 05:22:00.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-11-19 05:22:00.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf0 Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +"2019-11-19 05:22:00.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.7µs " +"2019-11-19 05:22:00.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.3µs " +"2019-11-19 05:22:00.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:00.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:00.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:00.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel testchainid took 31.1µs" +"2019-11-19 05:22:00.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110µs " +"2019-11-19 05:22:00.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf7 Sending msg of 28 bytes to 2 on channel businesschannel took 35.7µs" +"2019-11-19 05:22:00.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf9 Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +"2019-11-19 05:22:00.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 199.2µs " +"2019-11-19 05:22:00.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.2µs " +"2019-11-19 05:22:00.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:00.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:01.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:01.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 3 on channel testchainid took 34.6µs" +"2019-11-19 05:22:01.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +"2019-11-19 05:22:01.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d00 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2019-11-19 05:22:01.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d02 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-11-19 05:22:01.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.6µs " +"2019-11-19 05:22:01.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU d01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.1µs " +"2019-11-19 05:22:01.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:01.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d05 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:01.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:01.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +"2019-11-19 05:22:01.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.7µs " +"2019-11-19 05:22:01.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2019-11-19 05:22:01.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 2 on channel businesschannel took 13.7µs" +"2019-11-19 05:22:01.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129.1µs " +"2019-11-19 05:22:01.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.5µs " +"2019-11-19 05:22:01.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:01.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:02.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:02.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d10 Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +"2019-11-19 05:22:02.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " +"2019-11-19 05:22:02.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 15.3µs" +"2019-11-19 05:22:02.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2019-11-19 05:22:02.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.2µs " +"2019-11-19 05:22:02.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU d15 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:02.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.3µs " +"2019-11-19 05:22:02.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:02.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:02.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-11-19 05:22:02.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.9µs " +"2019-11-19 05:22:02.616 UTC [orderer.common.server] replicateDisabledChains -> DEBU d1b No inactive chains to try to replicate" +"2019-11-19 05:22:02.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 2 on channel businesschannel took 13.3µs" +"2019-11-19 05:22:02.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.6µs " +"2019-11-19 05:22:02.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1e Sending msg of 28 bytes to 3 on channel businesschannel took 367.6µs" +"2019-11-19 05:22:02.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +"2019-11-19 05:22:02.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:02.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d21 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:03.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d22 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:03.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d23 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-11-19 05:22:03.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU d24 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +"2019-11-19 05:22:03.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d25 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2019-11-19 05:22:03.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d27 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2019-11-19 05:22:03.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.4µs " +"2019-11-19 05:22:03.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU d26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.6µs " +"2019-11-19 05:22:03.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d29 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:03.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:03.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:03.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2c Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-11-19 05:22:03.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148.8µs " +"2019-11-19 05:22:03.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2e Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2019-11-19 05:22:03.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d30 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-11-19 05:22:03.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU d31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 44.4µs " +"2019-11-19 05:22:03.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.4µs " +"2019-11-19 05:22:03.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU d32 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:03.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU d33 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:04.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU d34 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:04.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d35 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +"2019-11-19 05:22:04.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d36 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 43.3µs " +"2019-11-19 05:22:04.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d37 Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +"2019-11-19 05:22:04.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d38 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2019-11-19 05:22:04.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78µs " +"2019-11-19 05:22:04.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 36µs " +"2019-11-19 05:22:04.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:04.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:04.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:04.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3e Sending msg of 28 bytes to 3 on channel testchainid took 12.1µs" +"2019-11-19 05:22:04.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.2µs " +"2019-11-19 05:22:04.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d40 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2019-11-19 05:22:04.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d41 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2019-11-19 05:22:04.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.3µs " +"2019-11-19 05:22:04.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.3µs " +"2019-11-19 05:22:04.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d44 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:04.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d45 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:05.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d46 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:05.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d47 Sending msg of 28 bytes to 3 on channel testchainid took 26.5µs" +"2019-11-19 05:22:05.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141µs " +"2019-11-19 05:22:05.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d49 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +"2019-11-19 05:22:05.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4a Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +"2019-11-19 05:22:05.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.4µs " +"2019-11-19 05:22:05.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.9µs " +"2019-11-19 05:22:05.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:05.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:05.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:05.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.9µs " +"2019-11-19 05:22:05.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d50 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2019-11-19 05:22:05.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d52 Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +"2019-11-19 05:22:05.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d53 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2019-11-19 05:22:05.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " +"2019-11-19 05:22:05.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.9µs " +"2019-11-19 05:22:05.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d56 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:05.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d57 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:06.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d58 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:06.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d59 Sending msg of 28 bytes to 3 on channel testchainid took 11.5µs" +"2019-11-19 05:22:06.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.6µs " +"2019-11-19 05:22:06.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5b Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-11-19 05:22:06.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5d Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +"2019-11-19 05:22:06.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.4µs " +"2019-11-19 05:22:06.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.8µs " +"2019-11-19 05:22:06.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:06.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d60 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:06.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d61 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:06.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d62 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2019-11-19 05:22:06.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +"2019-11-19 05:22:06.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d64 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +"2019-11-19 05:22:06.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d66 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-11-19 05:22:06.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +"2019-11-19 05:22:06.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.3µs " +"2019-11-19 05:22:06.934 UTC [orderer.common.cluster.step] handleMessage -> DEBU d68 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:06.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d69 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:07.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:07.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6b Sending msg of 28 bytes to 3 on channel testchainid took 11.2µs" +"2019-11-19 05:22:07.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.2µs " +"2019-11-19 05:22:07.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6d Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-11-19 05:22:07.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6f Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +"2019-11-19 05:22:07.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.7µs " +"2019-11-19 05:22:07.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.1µs " +"2019-11-19 05:22:07.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d71 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:07.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d72 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:07.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d73 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:07.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d74 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2019-11-19 05:22:07.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.1µs " +"2019-11-19 05:22:07.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d76 Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +"2019-11-19 05:22:07.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d78 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +"2019-11-19 05:22:07.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU d79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 46µs " +"2019-11-19 05:22:07.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU d77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.2µs " +"2019-11-19 05:22:07.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:07.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:08.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:08.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7d Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2019-11-19 05:22:08.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +"2019-11-19 05:22:08.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +"2019-11-19 05:22:08.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d81 Sending msg of 28 bytes to 2 on channel businesschannel took 13.8µs" +"2019-11-19 05:22:08.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU d82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.3µs " +"2019-11-19 05:22:08.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.4µs " +"2019-11-19 05:22:08.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d83 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:08.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d84 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:08.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d85 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:08.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-11-19 05:22:08.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.3µs " +"2019-11-19 05:22:08.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d88 Sending msg of 28 bytes to 3 on channel businesschannel took 18.9µs" +"2019-11-19 05:22:08.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8a Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +"2019-11-19 05:22:08.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.7µs " +"2019-11-19 05:22:08.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.3µs " +"2019-11-19 05:22:08.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:08.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:09.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:09.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8f Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-11-19 05:22:09.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.3µs " +"2019-11-19 05:22:09.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-11-19 05:22:09.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d92 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2019-11-19 05:22:09.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " +"2019-11-19 05:22:09.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU d94 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:09.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.2µs " +"2019-11-19 05:22:09.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU d96 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:09.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:09.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d98 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2019-11-19 05:22:09.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.1µs " +"2019-11-19 05:22:09.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9a Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-11-19 05:22:09.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.1µs " +"2019-11-19 05:22:09.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9c Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2019-11-19 05:22:09.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +"2019-11-19 05:22:09.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:09.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:10.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU da0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:10.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel testchainid took 339.3µs" +"2019-11-19 05:22:10.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU da2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +"2019-11-19 05:22:10.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da3 Sending msg of 28 bytes to 2 on channel businesschannel took 39.1µs" +"2019-11-19 05:22:10.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.1µs " +"2019-11-19 05:22:10.434 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da5 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +"2019-11-19 05:22:10.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU da6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 42.5µs " +"2019-11-19 05:22:10.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:10.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU da8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:10.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:10.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 3 on channel testchainid took 12µs" +"2019-11-19 05:22:10.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.3µs " +"2019-11-19 05:22:10.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dac Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2019-11-19 05:22:10.934 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dae Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-11-19 05:22:10.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU daf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +"2019-11-19 05:22:10.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.7µs " +"2019-11-19 05:22:10.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU db0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:10.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU db1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:11.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:11.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db3 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-11-19 05:22:11.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.5µs " +"2019-11-19 05:22:11.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-11-19 05:22:11.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db6 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2019-11-19 05:22:11.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU db7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.5µs " +"2019-11-19 05:22:11.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU db8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.3µs " +"2019-11-19 05:22:11.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU db9 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:11.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU dba Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:11.562 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:11.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbc Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-11-19 05:22:11.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.5µs " +"2019-11-19 05:22:11.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2019-11-19 05:22:11.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbf Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2019-11-19 05:22:11.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " +"2019-11-19 05:22:11.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.9µs " +"2019-11-19 05:22:11.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:11.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:12.062 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:12.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc5 Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +"2019-11-19 05:22:12.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.5µs " +"2019-11-19 05:22:12.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2019-11-19 05:22:12.433 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc8 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2019-11-19 05:22:12.433 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.8µs " +"2019-11-19 05:22:12.434 UTC [orderer.common.cluster.step] sendMessage -> DEBU dca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +"2019-11-19 05:22:12.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcb Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:12.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcc Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:12.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:12.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dce Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2019-11-19 05:22:12.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.4µs " +"2019-11-19 05:22:12.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd0 Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +"2019-11-19 05:22:12.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2019-11-19 05:22:12.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.7µs " +"2019-11-19 05:22:12.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.1µs " +"2019-11-19 05:22:12.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:12.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:13.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:13.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd7 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2019-11-19 05:22:13.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.9µs " +"2019-11-19 05:22:13.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2019-11-19 05:22:13.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 3 on channel businesschannel took 139µs" +"2019-11-19 05:22:13.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 646.2µs " +"2019-11-19 05:22:13.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +"2019-11-19 05:22:13.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:13.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU dde Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:13.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:13.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de0 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-11-19 05:22:13.530 UTC [orderer.common.cluster.step] sendMessage -> DEBU de1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " +"2019-11-19 05:22:13.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de2 Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +"2019-11-19 05:22:13.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2019-11-19 05:22:13.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU de3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.4µs " +"2019-11-19 05:22:13.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU de4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:13.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.6µs " +"2019-11-19 05:22:13.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU de7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:14.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU de8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:14.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de9 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-11-19 05:22:14.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU dea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.8µs " +"2019-11-19 05:22:14.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU deb Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" +"2019-11-19 05:22:14.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2019-11-19 05:22:14.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ded Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.8µs " +"2019-11-19 05:22:14.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU dee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.3µs " +"2019-11-19 05:22:14.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU def Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:14.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU df0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:14.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:14.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df2 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2019-11-19 05:22:14.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU df3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.8µs " +"2019-11-19 05:22:14.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 28 bytes to 2 on channel businesschannel took 21.5µs" +"2019-11-19 05:22:14.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-11-19 05:22:14.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 477.8µs " +"2019-11-19 05:22:14.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280.6µs " +"2019-11-19 05:22:14.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU df8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:14.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU df9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:15.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:15.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfb Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-11-19 05:22:15.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.7µs " +"2019-11-19 05:22:15.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfd Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +"2019-11-19 05:22:15.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2019-11-19 05:22:15.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU dff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 306.1µs " +"2019-11-19 05:22:15.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 228µs " +"2019-11-19 05:22:15.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e01 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:15.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e02 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:15.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:15.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e04 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2019-11-19 05:22:15.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU e05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " +"2019-11-19 05:22:15.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e06 Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +"2019-11-19 05:22:15.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-11-19 05:22:15.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +"2019-11-19 05:22:15.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs " +"2019-11-19 05:22:15.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:15.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:16.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:16.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0d Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +"2019-11-19 05:22:16.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.1µs " +"2019-11-19 05:22:16.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0f Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +"2019-11-19 05:22:16.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +"2019-11-19 05:22:16.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.7µs " +"2019-11-19 05:22:16.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114µs " +"2019-11-19 05:22:16.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e13 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:16.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:16.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:16.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e16 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2019-11-19 05:22:16.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU e17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.3µs " +"2019-11-19 05:22:16.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e18 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-11-19 05:22:16.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-11-19 05:22:16.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 276.7µs " +"2019-11-19 05:22:16.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.6µs " +"2019-11-19 05:22:16.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:16.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:17.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:17.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1f Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2019-11-19 05:22:17.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU e20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.8µs " +"2019-11-19 05:22:17.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e21 Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +"2019-11-19 05:22:17.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +"2019-11-19 05:22:17.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +"2019-11-19 05:22:17.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.5µs " +"2019-11-19 05:22:17.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e25 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:17.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:17.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:17.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e28 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2019-11-19 05:22:17.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU e29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +"2019-11-19 05:22:17.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2a Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2019-11-19 05:22:17.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 3 on channel businesschannel took 119.8µs" +"2019-11-19 05:22:17.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.9µs " +"2019-11-19 05:22:17.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101µs " +"2019-11-19 05:22:17.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:17.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:18.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:18.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e31 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2019-11-19 05:22:18.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU e32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.3µs " +"2019-11-19 05:22:18.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2019-11-19 05:22:18.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2019-11-19 05:22:18.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e35 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.6µs " +"2019-11-19 05:22:18.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 723.3µs " +"2019-11-19 05:22:18.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e37 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:18.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:18.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:18.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3a Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-11-19 05:22:18.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.7µs " +"2019-11-19 05:22:18.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +"2019-11-19 05:22:18.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +"2019-11-19 05:22:18.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +"2019-11-19 05:22:18.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.3µs " +"2019-11-19 05:22:18.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU e40 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:18.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:19.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:19.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e43 Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +"2019-11-19 05:22:19.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU e44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120µs " +"2019-11-19 05:22:19.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e45 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2019-11-19 05:22:19.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e47 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-11-19 05:22:19.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +"2019-11-19 05:22:19.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.6µs " +"2019-11-19 05:22:19.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e49 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:19.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:19.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:19.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4c Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +"2019-11-19 05:22:19.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.9µs " +"2019-11-19 05:22:19.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4e Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2019-11-19 05:22:19.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +"2019-11-19 05:22:19.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.8µs " +"2019-11-19 05:22:19.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80µs " +"2019-11-19 05:22:19.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e52 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:19.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU e53 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:20.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU e54 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:20.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e55 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +"2019-11-19 05:22:20.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU e56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +"2019-11-19 05:22:20.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e57 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +"2019-11-19 05:22:20.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 2 on channel businesschannel took 14µs" +"2019-11-19 05:22:20.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54µs " +"2019-11-19 05:22:20.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +"2019-11-19 05:22:20.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:20.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:20.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:20.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5e Sending msg of 28 bytes to 3 on channel testchainid took 97.1µs" +"2019-11-19 05:22:20.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +"2019-11-19 05:22:20.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e60 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +"2019-11-19 05:22:20.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e61 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2019-11-19 05:22:20.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU e62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +"2019-11-19 05:22:20.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.7µs " +"2019-11-19 05:22:20.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU e64 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:20.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU e65 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:21.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:21.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e67 Sending msg of 28 bytes to 3 on channel testchainid took 69.2µs" +"2019-11-19 05:22:21.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU e68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.1µs " +"2019-11-19 05:22:21.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +"2019-11-19 05:22:21.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6a Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2019-11-19 05:22:21.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.4µs " +"2019-11-19 05:22:21.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60µs " +"2019-11-19 05:22:21.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:21.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:21.546 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:21.546 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e70 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-11-19 05:22:21.546 UTC [orderer.common.cluster.step] sendMessage -> DEBU e71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +"2019-11-19 05:22:21.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +"2019-11-19 05:22:21.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e73 Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +"2019-11-19 05:22:21.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU e74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.6µs " +"2019-11-19 05:22:21.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.8µs " +"2019-11-19 05:22:21.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU e76 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:21.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU e77 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:22.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:22.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e79 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +"2019-11-19 05:22:22.030 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 593.5µs " +"2019-11-19 05:22:22.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 2 on channel businesschannel took 22.9µs" +"2019-11-19 05:22:22.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7c Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +"2019-11-19 05:22:22.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.9µs " +"2019-11-19 05:22:22.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.8µs " +"2019-11-19 05:22:22.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:22.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU e80 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:22.531 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:22.531 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e82 Sending msg of 28 bytes to 3 on channel testchainid took 103.9µs" +"2019-11-19 05:22:22.532 UTC [orderer.common.cluster.step] sendMessage -> DEBU e83 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.7µs " +"2019-11-19 05:22:22.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e84 Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +"2019-11-19 05:22:22.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e85 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2019-11-19 05:22:22.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 519.3µs " +"2019-11-19 05:22:22.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU e87 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:22.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.1µs " +"2019-11-19 05:22:22.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU e89 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:23.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:23.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8b Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-11-19 05:22:23.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.2µs " +"2019-11-19 05:22:23.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8d Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +"2019-11-19 05:22:23.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2019-11-19 05:22:23.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.4µs " +"2019-11-19 05:22:23.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU e91 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:23.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.4µs " +"2019-11-19 05:22:23.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU e92 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:23.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:23.530 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e94 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-11-19 05:22:23.531 UTC [orderer.common.cluster.step] sendMessage -> DEBU e95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.6µs " +"2019-11-19 05:22:23.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e96 Sending msg of 28 bytes to 3 on channel businesschannel took 29.8µs" +"2019-11-19 05:22:23.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e97 Sending msg of 28 bytes to 2 on channel businesschannel took 123.6µs" +"2019-11-19 05:22:23.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU e98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216µs " +"2019-11-19 05:22:23.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.2µs " +"2019-11-19 05:22:23.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:23.907 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:24.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:24.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9d Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2019-11-19 05:22:24.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.8µs " +"2019-11-19 05:22:24.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9f Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +"2019-11-19 05:22:24.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea0 Sending msg of 28 bytes to 3 on channel businesschannel took 29µs" +"2019-11-19 05:22:24.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.2µs " +"2019-11-19 05:22:24.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.9µs " +"2019-11-19 05:22:24.404 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:24.404 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:24.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:24.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2019-11-19 05:22:24.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53µs " +"2019-11-19 05:22:24.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea8 Sending msg of 28 bytes to 2 on channel businesschannel took 40µs" +"2019-11-19 05:22:24.903 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel businesschannel took 85.1µs" +"2019-11-19 05:22:24.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.1µs " +"2019-11-19 05:22:24.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.2µs " +"2019-11-19 05:22:24.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU eac Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:24.906 UTC [orderer.common.cluster.step] handleMessage -> DEBU ead Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:25.029 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:25.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaf Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-11-19 05:22:25.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " +"2019-11-19 05:22:25.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb1 Sending msg of 28 bytes to 2 on channel businesschannel took 28.8µs" +"2019-11-19 05:22:25.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +"2019-11-19 05:22:25.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb4 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:25.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 267.6µs " +"2019-11-19 05:22:25.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +"2019-11-19 05:22:25.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:25.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:25.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb8 Sending msg of 28 bytes to 3 on channel testchainid took 89.3µs" +"2019-11-19 05:22:25.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56µs " +"2019-11-19 05:22:25.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eba Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +"2019-11-19 05:22:25.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebb Sending msg of 28 bytes to 3 on channel businesschannel took 76µs" +"2019-11-19 05:22:25.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.5µs " +"2019-11-19 05:22:25.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.9µs " +"2019-11-19 05:22:25.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebe Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:25.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:26.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:26.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec1 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-11-19 05:22:26.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.4µs " +"2019-11-19 05:22:26.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec3 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +"2019-11-19 05:22:26.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec4 Sending msg of 28 bytes to 3 on channel businesschannel took 7µs" +"2019-11-19 05:22:26.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.7µs " +"2019-11-19 05:22:26.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.8µs " +"2019-11-19 05:22:26.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:26.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:26.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:26.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eca Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2019-11-19 05:22:26.527 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +"2019-11-19 05:22:26.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecc Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +"2019-11-19 05:22:26.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecd Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-11-19 05:22:26.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU ece Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99µs " +"2019-11-19 05:22:26.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.4µs " +"2019-11-19 05:22:26.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:26.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:27.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:27.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed3 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +"2019-11-19 05:22:27.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +"2019-11-19 05:22:27.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed5 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +"2019-11-19 05:22:27.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed6 Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +"2019-11-19 05:22:27.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2019-11-19 05:22:27.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.8µs " +"2019-11-19 05:22:27.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:27.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU eda Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:27.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU edb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:27.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edc Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-11-19 05:22:27.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.3µs " +"2019-11-19 05:22:27.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ede Sending msg of 28 bytes to 2 on channel businesschannel took 28.4µs" +"2019-11-19 05:22:27.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edf Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +"2019-11-19 05:22:27.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.8µs " +"2019-11-19 05:22:27.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.7µs " +"2019-11-19 05:22:27.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:27.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:28.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:28.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee5 Sending msg of 28 bytes to 3 on channel testchainid took 30.7µs" +"2019-11-19 05:22:28.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.3µs " +"2019-11-19 05:22:28.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +"2019-11-19 05:22:28.401 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel businesschannel took 78.9µs" +"2019-11-19 05:22:28.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU eea Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:28.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.5µs " +"2019-11-19 05:22:28.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 351.4µs " +"2019-11-19 05:22:28.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU eec Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:28.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:28.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eee Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2019-11-19 05:22:28.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU eef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.8µs " +"2019-11-19 05:22:28.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef0 Sending msg of 28 bytes to 2 on channel businesschannel took 89.7µs" +"2019-11-19 05:22:28.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef1 Sending msg of 28 bytes to 3 on channel businesschannel took 31.2µs" +"2019-11-19 05:22:28.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.1µs " +"2019-11-19 05:22:28.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.1µs " +"2019-11-19 05:22:28.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:28.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:29.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:29.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef7 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2019-11-19 05:22:29.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +"2019-11-19 05:22:29.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef9 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-11-19 05:22:29.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2019-11-19 05:22:29.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU efb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.6µs " +"2019-11-19 05:22:29.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.1µs " +"2019-11-19 05:22:29.399 UTC [orderer.common.cluster.step] handleMessage -> DEBU efd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:29.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:29.529 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:29.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2019-11-19 05:22:29.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.9µs " +"2019-11-19 05:22:29.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f02 Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +"2019-11-19 05:22:29.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f03 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +"2019-11-19 05:22:29.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU f04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.7µs " +"2019-11-19 05:22:29.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.5µs " +"2019-11-19 05:22:29.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU f06 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:29.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU f07 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:30.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:30.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f09 Sending msg of 28 bytes to 3 on channel testchainid took 67.4µs" +"2019-11-19 05:22:30.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.4µs " +"2019-11-19 05:22:30.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0b Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +"2019-11-19 05:22:30.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0c Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2019-11-19 05:22:30.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.6µs " +"2019-11-19 05:22:30.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:30.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:30.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.4µs " +"2019-11-19 05:22:30.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:30.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f12 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-11-19 05:22:30.527 UTC [orderer.common.cluster.step] sendMessage -> DEBU f13 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.8µs " +"2019-11-19 05:22:30.647 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f14 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:51520 with txid 'afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b' of type ENDORSER_TRANSACTION" +"2019-11-19 05:22:30.647 UTC [policies] Evaluate -> DEBU f15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:22:30.648 UTC [policies] Evaluate -> DEBU f16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:30.648 UTC [policies] Evaluate -> DEBU f17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:22:30.648 UTC [policies] Evaluate -> DEBU f18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:30.649 UTC [policies] Evaluate -> DEBU f19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-11-19 05:22:30.649 UTC [msp] DeserializeIdentity -> DEBU f1a Obtaining identity" +"2019-11-19 05:22:30.649 UTC [msp.identity] newIdentity -> DEBU f1b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-11-19 05:22:30.650 UTC [cauthdsl] func1 -> DEBU f1c 0xc000a825d0 gate 1574140950650662900 evaluation starts" +"2019-11-19 05:22:30.651 UTC [cauthdsl] func2 -> DEBU f1d 0xc000a825d0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:30.651 UTC [cauthdsl] func2 -> DEBU f1e 0xc000a825d0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:30.651 UTC [cauthdsl] func2 -> DEBU f1f 0xc000a825d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-11-19 05:22:30.651 UTC [cauthdsl] func2 -> DEBU f20 0xc000a825d0 principal evaluation fails" +"2019-11-19 05:22:30.652 UTC [cauthdsl] func1 -> DEBU f21 0xc000a825d0 gate 1574140950650662900 evaluation fails" +"2019-11-19 05:22:30.652 UTC [policies] Evaluate -> DEBU f22 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:30.652 UTC [policies] Evaluate -> DEBU f23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:30.653 UTC [policies] Evaluate -> DEBU f24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-11-19 05:22:30.653 UTC [cauthdsl] func1 -> DEBU f25 0xc000a83750 gate 1574140950653251500 evaluation starts" +"2019-11-19 05:22:30.653 UTC [cauthdsl] func2 -> DEBU f26 0xc000a83750 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:30.654 UTC [cauthdsl] func2 -> DEBU f27 0xc000a83750 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:30.654 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU f28 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-11-19 05:22:30.654 UTC [msp] Validate -> DEBU f29 MSP Org1MSP validating identity" +"2019-11-19 05:22:30.655 UTC [msp] getCertificationChain -> DEBU f2a MSP Org1MSP getting certification chain" +"2019-11-19 05:22:30.655 UTC [cauthdsl] func2 -> DEBU f2b 0xc000a83750 principal matched by identity 0" +"2019-11-19 05:22:30.655 UTC [msp.identity] Verify -> DEBU f2c Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?|" +"2019-11-19 05:22:30.656 UTC [msp.identity] Verify -> DEBU f2d Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +00000040 28 97 fa fc 24 78 52 |(...$xR|" +"2019-11-19 05:22:30.656 UTC [cauthdsl] func2 -> DEBU f2e 0xc000a83750 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:30.657 UTC [cauthdsl] func1 -> DEBU f2f 0xc000a83750 gate 1574140950653251500 evaluation succeeds" +"2019-11-19 05:22:30.657 UTC [policies] Evaluate -> DEBU f30 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:30.657 UTC [policies] Evaluate -> DEBU f31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:30.658 UTC [policies] Evaluate -> DEBU f32 Signature set satisfies policy /Channel/Application/Writers" +"2019-11-19 05:22:30.658 UTC [policies] Evaluate -> DEBU f33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:22:30.658 UTC [policies] Evaluate -> DEBU f34 Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:22:30.658 UTC [policies] Evaluate -> DEBU f35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:22:30.658 UTC [orderer.common.blockcutter] Ordered -> DEBU f36 Enqueuing message into batch" +"2019-11-19 05:22:30.658 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f37 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:51520" +"2019-11-19 05:22:30.661 UTC [orderer.common.broadcast] Handle -> WARN f38 Error reading from 172.18.0.5:51520: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:30.661 UTC [orderer.common.server] func1 -> DEBU f39 Closing Broadcast stream" +"2019-11-19 05:22:30.661 UTC [comm.grpc.server] 1 -> INFO f3a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51520 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.355524s +"2019-11-19 05:22:30.661 UTC [grpc] infof -> DEBU f3b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:30.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3c Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" +"2019-11-19 05:22:30.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3d Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +"2019-11-19 05:22:30.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.2µs " +"2019-11-19 05:22:30.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.5µs " +"2019-11-19 05:22:30.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:30.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU f41 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:31.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:31.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-11-19 05:22:31.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 640.8µs " +"2019-11-19 05:22:31.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 2 on channel businesschannel took 73.7µs" +"2019-11-19 05:22:31.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f46 Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +"2019-11-19 05:22:31.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU f47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.5µs " +"2019-11-19 05:22:31.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU f48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.3µs " +"2019-11-19 05:22:31.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:31.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:31.529 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:31.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 3 on channel testchainid took 29.7µs" +"2019-11-19 05:22:31.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101µs " +"2019-11-19 05:22:31.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +"2019-11-19 05:22:31.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4f Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-11-19 05:22:31.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU f50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.6µs " +"2019-11-19 05:22:31.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU f51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +"2019-11-19 05:22:31.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU f52 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:31.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:32.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:32.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +"2019-11-19 05:22:32.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116µs " +"2019-11-19 05:22:32.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f57 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +"2019-11-19 05:22:32.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f58 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +"2019-11-19 05:22:32.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU f59 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +"2019-11-19 05:22:32.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.7µs " +"2019-11-19 05:22:32.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:32.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:32.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:32.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-11-19 05:22:32.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +"2019-11-19 05:22:32.662 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU f60 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-11-19 05:22:32.663 UTC [orderer.consensus.etcdraft] propose -> INFO f61 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-11-19 05:22:32.664 UTC [orderer.consensus.etcdraft] 2 -> DEBU f62 Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2019-11-19 05:22:32.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f63 Sending msg of 3644 bytes to 2 on channel businesschannel took 25µs" +"2019-11-19 05:22:32.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU f64 Send of ConsensusRequest for channel businesschannel with payload of size 3644 to orderer1.example.com(orderer1.example.com:7050) took 125.5µs " +"2019-11-19 05:22:32.668 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f65 Sending msg of 3644 bytes to 3 on channel businesschannel took 1.5718ms" +"2019-11-19 05:22:32.669 UTC [orderer.common.cluster.step] sendMessage -> DEBU f66 Send of ConsensusRequest for channel businesschannel with payload of size 3644 to orderer2.example.com(orderer2.example.com:7050) took 479.7µs " +"2019-11-19 05:22:32.671 UTC [orderer.common.cluster.step] handleMessage -> DEBU f67 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:32.672 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f68 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-11-19 05:22:32.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f69 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2019-11-19 05:22:32.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.6µs " +"2019-11-19 05:22:32.674 UTC [orderer.consensus.etcdraft] writeBlock -> INFO f6b Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2019-11-19 05:22:32.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:32.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60µs " +"2019-11-19 05:22:32.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:32.676 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU f6f [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-11-19 05:22:32.678 UTC [msp] GetDefaultSigningIdentity -> DEBU f70 Obtaining default signing identity" +"2019-11-19 05:22:32.678 UTC [msp] GetDefaultSigningIdentity -> DEBU f71 Obtaining default signing identity" +"2019-11-19 05:22:32.679 UTC [msp.identity] Sign -> DEBU f72 Sign: plaintext: 0A020802120B0A090A03010203100418...A27EC7EEEF94B7CA9B6422427D820D98 " +"2019-11-19 05:22:32.680 UTC [msp.identity] Sign -> DEBU f73 Sign: digest: 14B4668976D394B732A78A0CC2D037228E65F080B679BDCBC1EA755E7E255A24 " +"2019-11-19 05:22:32.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:32.685 UTC [fsblkstorage] indexBlock -> DEBU f75 Indexing block [blockNum=3, blockHash=[]byte{0xaf, 0xe8, 0x73, 0x33, 0x36, 0xd, 0xf9, 0x12, 0x19, 0x79, 0xd, 0x24, 0x42, 0x5b, 0x7d, 0xa9, 0x98, 0xab, 0xce, 0xdc, 0x98, 0x36, 0x45, 0x6e, 0x26, 0x2b, 0x86, 0x76, 0x6a, 0x37, 0x47, 0x75} txOffsets= +txId=afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b locPointer=offset=70, bytesLength=3516 +]" +"2019-11-19 05:22:32.699 UTC [fsblkstorage] updateCheckpoint -> DEBU f76 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81290], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-11-19 05:22:32.700 UTC [orderer.commmon.multichannel] commitBlock -> DEBU f77 [channel: businesschannel] Wrote block [3]" +"2019-11-19 05:22:32.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f78 Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +"2019-11-19 05:22:32.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU f79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 175.9µs " +"2019-11-19 05:22:32.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7a Sending msg of 28 bytes to 3 on channel businesschannel took 220.9µs" +"2019-11-19 05:22:32.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117µs " +"2019-11-19 05:22:32.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:32.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:33.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:33.030 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7f Sending msg of 28 bytes to 3 on channel testchainid took 82.2µs" +"2019-11-19 05:22:33.031 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 216.1µs " +"2019-11-19 05:22:33.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f81 Sending msg of 28 bytes to 3 on channel businesschannel took 29.8µs" +"2019-11-19 05:22:33.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2019-11-19 05:22:33.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU f83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.8µs " +"2019-11-19 05:22:33.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.3µs " +"2019-11-19 05:22:33.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU f85 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:33.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:33.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:33.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f88 Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" +"2019-11-19 05:22:33.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 800.9µs " +"2019-11-19 05:22:33.587 UTC [orderer.common.server] Broadcast -> DEBU f8a Starting new Broadcast handler" +"2019-11-19 05:22:33.587 UTC [orderer.common.broadcast] Handle -> DEBU f8b Starting new broadcast loop for 172.18.0.5:51542" +"2019-11-19 05:22:33.601 UTC [orderer.common.broadcast] ProcessMessage -> DEBU f8c [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:51542 with txid 'e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff' of type ENDORSER_TRANSACTION" +"2019-11-19 05:22:33.602 UTC [policies] Evaluate -> DEBU f8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:22:33.602 UTC [policies] Evaluate -> DEBU f8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:33.602 UTC [policies] Evaluate -> DEBU f8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:22:33.602 UTC [policies] Evaluate -> DEBU f90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:33.603 UTC [policies] Evaluate -> DEBU f91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-11-19 05:22:33.603 UTC [cauthdsl] func1 -> DEBU f92 0xc000e5dd00 gate 1574140953603612800 evaluation starts" +"2019-11-19 05:22:33.603 UTC [cauthdsl] func2 -> DEBU f93 0xc000e5dd00 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:33.604 UTC [cauthdsl] func2 -> DEBU f94 0xc000e5dd00 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:33.604 UTC [cauthdsl] func2 -> DEBU f95 0xc000e5dd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-11-19 05:22:33.604 UTC [cauthdsl] func2 -> DEBU f96 0xc000e5dd00 principal evaluation fails" +"2019-11-19 05:22:33.604 UTC [cauthdsl] func1 -> DEBU f97 0xc000e5dd00 gate 1574140953603612800 evaluation fails" +"2019-11-19 05:22:33.605 UTC [policies] Evaluate -> DEBU f98 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:33.605 UTC [policies] Evaluate -> DEBU f99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:33.605 UTC [policies] Evaluate -> DEBU f9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-11-19 05:22:33.606 UTC [cauthdsl] func1 -> DEBU f9b 0xc000972540 gate 1574140953606070300 evaluation starts" +"2019-11-19 05:22:33.606 UTC [cauthdsl] func2 -> DEBU f9c 0xc000972540 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:33.606 UTC [cauthdsl] func2 -> DEBU f9d 0xc000972540 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:33.606 UTC [cauthdsl] func2 -> DEBU f9e 0xc000972540 principal matched by identity 0" +"2019-11-19 05:22:33.607 UTC [msp.identity] Verify -> DEBU f9f Verify: digest = 00000000 f6 c0 b3 ab 85 aa 28 ac a0 48 cd eb e0 3f c0 10 |......(..H...?..| +00000010 fa ba 63 4b 4c 70 86 bb ba 67 f9 8c 83 44 7d da |..cKLp...g...D}.|" +"2019-11-19 05:22:33.607 UTC [msp.identity] Verify -> DEBU fa0 Verify: sig = 00000000 30 44 02 20 2b ba 1f e0 56 b8 c9 8f 25 b9 ac a3 |0D. +...V...%...| +00000010 12 3b e9 8e 83 b7 ad 48 2a a8 cc bc a2 c1 8d f1 |.;.....H*.......| +00000020 a6 e6 65 91 02 20 10 fb c7 3f ec 92 df 9d 88 d2 |..e.. ...?......| +00000030 a5 4a 4a 02 63 87 22 e8 5c dd d5 12 ce 57 f2 ab |.JJ.c.".\....W..| +00000040 85 6b 5f 12 56 05 |.k_.V.|" +"2019-11-19 05:22:33.607 UTC [cauthdsl] func2 -> DEBU fa1 0xc000972540 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:33.608 UTC [cauthdsl] func1 -> DEBU fa2 0xc000972540 gate 1574140953606070300 evaluation succeeds" +"2019-11-19 05:22:33.608 UTC [policies] Evaluate -> DEBU fa3 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:33.608 UTC [policies] Evaluate -> DEBU fa4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:33.609 UTC [policies] Evaluate -> DEBU fa5 Signature set satisfies policy /Channel/Application/Writers" +"2019-11-19 05:22:33.609 UTC [policies] Evaluate -> DEBU fa6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:22:33.609 UTC [policies] Evaluate -> DEBU fa7 Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:22:33.609 UTC [policies] Evaluate -> DEBU fa8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:22:33.610 UTC [orderer.common.blockcutter] Ordered -> DEBU fa9 Enqueuing message into batch" +"2019-11-19 05:22:33.610 UTC [orderer.common.broadcast] ProcessMessage -> DEBU faa [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:51542" +"2019-11-19 05:22:33.613 UTC [grpc] infof -> DEBU fab transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:33.615 UTC [orderer.common.broadcast] Handle -> WARN fac Error reading from 172.18.0.5:51542: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:33.617 UTC [orderer.common.server] func1 -> DEBU fad Closing Broadcast stream" +"2019-11-19 05:22:33.618 UTC [comm.grpc.server] 1 -> INFO fae streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51542 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.5088ms +"2019-11-19 05:22:33.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 2 on channel businesschannel took 30.9µs" +"2019-11-19 05:22:33.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb1 Sending msg of 28 bytes to 3 on channel businesschannel took 30.9µs" +"2019-11-19 05:22:33.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:33.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.9µs " +"2019-11-19 05:22:33.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85µs " +"2019-11-19 05:22:33.905 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:34.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:34.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb6 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-11-19 05:22:34.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +"2019-11-19 05:22:34.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +"2019-11-19 05:22:34.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb9 Sending msg of 28 bytes to 3 on channel businesschannel took 34µs" +"2019-11-19 05:22:34.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU fba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +"2019-11-19 05:22:34.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:34.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.7471ms " +"2019-11-19 05:22:34.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:34.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:34.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbf Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +"2019-11-19 05:22:34.530 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.8µs " +"2019-11-19 05:22:34.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 2 on channel businesschannel took 39.6µs" +"2019-11-19 05:22:34.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-11-19 05:22:34.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60µs " +"2019-11-19 05:22:34.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.9µs " +"2019-11-19 05:22:34.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:34.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc6 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:35.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:35.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc8 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-11-19 05:22:35.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " +"2019-11-19 05:22:35.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2019-11-19 05:22:35.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +"2019-11-19 05:22:35.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.3µs " +"2019-11-19 05:22:35.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 40.1µs " +"2019-11-19 05:22:35.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU fce Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:35.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:35.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:35.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd1 Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +"2019-11-19 05:22:35.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.5µs " +"2019-11-19 05:22:35.611 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU fd3 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-11-19 05:22:35.611 UTC [orderer.consensus.etcdraft] propose -> INFO fd4 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-11-19 05:22:35.612 UTC [orderer.consensus.etcdraft] 2 -> DEBU fd5 Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2019-11-19 05:22:35.614 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd6 Sending msg of 3105 bytes to 2 on channel businesschannel took 35.9µs" +"2019-11-19 05:22:35.615 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd7 Sending msg of 3105 bytes to 3 on channel businesschannel took 19.2µs" +"2019-11-19 05:22:35.615 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd8 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " +"2019-11-19 05:22:35.615 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd9 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer1.example.com(orderer1.example.com:7050) took 81.6µs " +"2019-11-19 05:22:35.619 UTC [orderer.common.cluster.step] handleMessage -> DEBU fda Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:35.619 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdb Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +"2019-11-19 05:22:35.620 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdc Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +"2019-11-19 05:22:35.620 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.3µs " +"2019-11-19 05:22:35.620 UTC [orderer.consensus.etcdraft] writeBlock -> INFO fde Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2019-11-19 05:22:35.620 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU fdf [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-11-19 05:22:35.620 UTC [msp] GetDefaultSigningIdentity -> DEBU fe0 Obtaining default signing identity" +"2019-11-19 05:22:35.620 UTC [msp] GetDefaultSigningIdentity -> DEBU fe1 Obtaining default signing identity" +"2019-11-19 05:22:35.620 UTC [msp.identity] Sign -> DEBU fe2 Sign: plaintext: 0A020802120B0A090A03010203100418...A1A8727743F6E000026689E4F6CEC658 " +"2019-11-19 05:22:35.621 UTC [msp.identity] Sign -> DEBU fe3 Sign: digest: 086621CFC79801F97E487D1899BCD0B36104F062BBDAD30F4551528040AD3E02 " +"2019-11-19 05:22:35.621 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.4µs " +"2019-11-19 05:22:35.623 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:35.623 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:35.623 UTC [fsblkstorage] indexBlock -> DEBU fe7 Indexing block [blockNum=4, blockHash=[]byte{0x4, 0xe7, 0xc, 0x85, 0x3a, 0x49, 0x30, 0x52, 0x72, 0xab, 0xdb, 0xa8, 0x7b, 0x33, 0xba, 0x1c, 0xf9, 0x58, 0x99, 0xbf, 0x89, 0xa6, 0x5d, 0x1d, 0xca, 0x40, 0x6d, 0xa0, 0xbc, 0x4d, 0x3d, 0x62} txOffsets= +txId=e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff locPointer=offset=70, bytesLength=2977 +]" +"2019-11-19 05:22:35.624 UTC [fsblkstorage] updateCheckpoint -> DEBU fe8 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85274], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-11-19 05:22:35.625 UTC [orderer.commmon.multichannel] commitBlock -> DEBU fe9 [channel: businesschannel] Wrote block [4]" +"2019-11-19 05:22:35.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU fea Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:35.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU feb Sending msg of 28 bytes to 2 on channel businesschannel took 135.4µs" +"2019-11-19 05:22:35.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fec Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +"2019-11-19 05:22:35.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU fed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +"2019-11-19 05:22:35.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU fee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.4µs " +"2019-11-19 05:22:35.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU fef Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:35.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff0 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:36.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:36.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-11-19 05:22:36.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.9µs " +"2019-11-19 05:22:36.365 UTC [orderer.common.server] Broadcast -> DEBU ff4 Starting new Broadcast handler" +"2019-11-19 05:22:36.365 UTC [orderer.common.broadcast] Handle -> DEBU ff5 Starting new broadcast loop for 172.18.0.5:51556" +"2019-11-19 05:22:36.392 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ff6 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:51556 with txid '2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6' of type ENDORSER_TRANSACTION" +"2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ff7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ff8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ff9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ffa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:36.392 UTC [policies] Evaluate -> DEBU ffb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-11-19 05:22:36.392 UTC [msp] DeserializeIdentity -> DEBU ffc Obtaining identity" +"2019-11-19 05:22:36.393 UTC [msp.identity] newIdentity -> DEBU ffd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE-----" +"2019-11-19 05:22:36.393 UTC [cauthdsl] func1 -> DEBU ffe 0xc00109fc20 gate 1574140956393397100 evaluation starts" +"2019-11-19 05:22:36.393 UTC [cauthdsl] func2 -> DEBU fff 0xc00109fc20 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:36.393 UTC [cauthdsl] func2 -> DEBU 1000 0xc00109fc20 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:36.393 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1001 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-11-19 05:22:36.393 UTC [msp] Validate -> DEBU 1002 MSP Org2MSP validating identity" +"2019-11-19 05:22:36.393 UTC [msp] getCertificationChain -> DEBU 1003 MSP Org2MSP getting certification chain" +"2019-11-19 05:22:36.394 UTC [cauthdsl] func2 -> DEBU 1004 0xc00109fc20 principal matched by identity 0" +"2019-11-19 05:22:36.394 UTC [msp.identity] Verify -> DEBU 1005 Verify: digest = 00000000 99 26 b8 08 96 42 20 b0 93 90 db 47 bf fd 5f 64 |.&...B ....G.._d| +00000010 20 57 2e 37 e4 32 9f 5f 80 0a 2f a1 39 a6 64 68 | W.7.2._../.9.dh|" +"2019-11-19 05:22:36.394 UTC [msp.identity] Verify -> DEBU 1006 Verify: sig = 00000000 30 44 02 20 27 8d 3f de 4b 30 dd 90 ff 5a ac b4 |0D. '.?.K0...Z..| +00000010 19 80 38 1a bd c5 6c 25 03 c3 a8 82 3a b5 ca de |..8...l%....:...| +00000020 5a 99 a0 c1 02 20 06 0a 45 ed 9e bd e8 83 cb ea |Z.... ..E.......| +00000030 86 34 5d 26 b1 55 76 12 05 30 94 60 26 6d b2 47 |.4]&.Uv..0.`&m.G| +00000040 52 6c 09 15 27 0e |Rl..'.|" +"2019-11-19 05:22:36.394 UTC [cauthdsl] func2 -> DEBU 1007 0xc00109fc20 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:36.394 UTC [cauthdsl] func1 -> DEBU 1008 0xc00109fc20 gate 1574140956393397100 evaluation succeeds" +"2019-11-19 05:22:36.394 UTC [policies] Evaluate -> DEBU 1009 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100b Signature set satisfies policy /Channel/Application/Writers" +"2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100d Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:22:36.395 UTC [policies] Evaluate -> DEBU 100e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:22:36.396 UTC [orderer.common.blockcutter] Ordered -> DEBU 100f Enqueuing message into batch" +"2019-11-19 05:22:36.396 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1010 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:51556" +"2019-11-19 05:22:36.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1011 Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +"2019-11-19 05:22:36.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1012 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2019-11-19 05:22:36.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1013 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.1µs " +"2019-11-19 05:22:36.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1014 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 309.7µs " +"2019-11-19 05:22:36.401 UTC [orderer.common.broadcast] Handle -> WARN 1015 Error reading from 172.18.0.5:51556: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:36.401 UTC [orderer.common.server] func1 -> DEBU 1016 Closing Broadcast stream" +"2019-11-19 05:22:36.401 UTC [comm.grpc.server] 1 -> INFO 1017 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51556 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.2685ms +"2019-11-19 05:22:36.401 UTC [grpc] infof -> DEBU 1018 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:36.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:36.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:36.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:36.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101c Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +"2019-11-19 05:22:36.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.5µs " +"2019-11-19 05:22:36.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101e Sending msg of 28 bytes to 2 on channel businesschannel took 71.9µs" +"2019-11-19 05:22:36.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101f Sending msg of 28 bytes to 3 on channel businesschannel took 33.1µs" +"2019-11-19 05:22:36.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1020 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.7µs " +"2019-11-19 05:22:36.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1021 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.7µs " +"2019-11-19 05:22:36.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1022 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:36.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1023 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:37.028 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:37.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-11-19 05:22:37.029 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1026 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.8µs " +"2019-11-19 05:22:37.401 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1027 Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +"2019-11-19 05:22:37.403 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1029 Sending msg of 28 bytes to 3 on channel businesschannel took 72.8µs" +"2019-11-19 05:22:37.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:37.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1028 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.2µs " +"2019-11-19 05:22:37.403 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.7µs " +"2019-11-19 05:22:37.405 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:37.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:37.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102e Sending msg of 28 bytes to 3 on channel testchainid took 34µs" +"2019-11-19 05:22:37.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.3µs " +"2019-11-19 05:22:37.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1030 Sending msg of 28 bytes to 2 on channel businesschannel took 32µs" +"2019-11-19 05:22:37.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1031 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147µs " +"2019-11-19 05:22:37.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1032 Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +"2019-11-19 05:22:37.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1033 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:37.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +"2019-11-19 05:22:37.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1035 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.029 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1036 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:38.029 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1037 Sending msg of 28 bytes to 3 on channel testchainid took 28.6µs" +"2019-11-19 05:22:38.030 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1038 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260µs " +"2019-11-19 05:22:38.398 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1039 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-11-19 05:22:38.399 UTC [orderer.consensus.etcdraft] propose -> INFO 103a Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-11-19 05:22:38.400 UTC [orderer.consensus.etcdraft] 2 -> DEBU 103b Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2019-11-19 05:22:38.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.7µs " +"2019-11-19 05:22:38.400 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103d Sending msg of 28 bytes to 2 on channel businesschannel took 957.9µs" +"2019-11-19 05:22:38.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.403 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103f Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +"2019-11-19 05:22:38.403 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1040 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " +"2019-11-19 05:22:38.405 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1041 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1042 Sending msg of 3105 bytes to 3 on channel businesschannel took 23.2µs" +"2019-11-19 05:22:38.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1044 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer2.example.com(orderer2.example.com:7050) took 376.1µs " +"2019-11-19 05:22:38.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1043 Sending msg of 3105 bytes to 2 on channel businesschannel took 70.5µs" +"2019-11-19 05:22:38.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1045 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer1.example.com(orderer1.example.com:7050) took 379.8µs " +"2019-11-19 05:22:38.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1046 Sending msg of 28 bytes to 2 on channel businesschannel took 1.6691ms" +"2019-11-19 05:22:38.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-11-19 05:22:38.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1048 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 276.3µs " +"2019-11-19 05:22:38.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.7µs " +"2019-11-19 05:22:38.414 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104b Sending msg of 28 bytes to 2 on channel businesschannel took 14.2µs" +"2019-11-19 05:22:38.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104c Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-11-19 05:22:38.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.6µs " +"2019-11-19 05:22:38.416 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 104e Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2019-11-19 05:22:38.416 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 104f [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-11-19 05:22:38.417 UTC [msp] GetDefaultSigningIdentity -> DEBU 1050 Obtaining default signing identity" +"2019-11-19 05:22:38.417 UTC [msp] GetDefaultSigningIdentity -> DEBU 1051 Obtaining default signing identity" +"2019-11-19 05:22:38.417 UTC [msp.identity] Sign -> DEBU 1052 Sign: plaintext: 0A020802120B0A090A03010203100418...D868E4050A27D5834C3C64F80CACA885 " +"2019-11-19 05:22:38.417 UTC [msp.identity] Sign -> DEBU 1053 Sign: digest: 5917B87AB26D3CE233682F6C43B6C8F4ABC97E1AB8FAA5738D1D9DD56F705263 " +"2019-11-19 05:22:38.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1054 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.1µs " +"2019-11-19 05:22:38.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1055 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1056 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1057 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1058 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.422 UTC [fsblkstorage] indexBlock -> DEBU 1059 Indexing block [blockNum=5, blockHash=[]byte{0x44, 0xdf, 0xb3, 0x3, 0x50, 0x9, 0x8b, 0x23, 0x1f, 0xc8, 0xd4, 0xb0, 0xc3, 0x60, 0xd3, 0x21, 0x24, 0x37, 0xaf, 0x67, 0x75, 0x46, 0xbe, 0x57, 0x44, 0x26, 0x16, 0x7c, 0x26, 0x99, 0x8e, 0xa7} txOffsets= +txId=2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 locPointer=offset=70, bytesLength=2977 +]" +"2019-11-19 05:22:38.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.439 UTC [fsblkstorage] updateCheckpoint -> DEBU 105b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89259], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-11-19 05:22:38.439 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 105c [channel: businesschannel] Wrote block [5]" +"2019-11-19 05:22:38.528 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:38.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105e Sending msg of 28 bytes to 3 on channel testchainid took 40.7µs" +"2019-11-19 05:22:38.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226µs " +"2019-11-19 05:22:38.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1060 Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +"2019-11-19 05:22:38.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1061 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2019-11-19 05:22:38.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1062 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63µs " +"2019-11-19 05:22:38.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1063 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.5µs " +"2019-11-19 05:22:38.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1064 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:38.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1065 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:39.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1066 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:39.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1067 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-11-19 05:22:39.027 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1068 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.5µs " +"2019-11-19 05:22:39.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1069 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-11-19 05:22:39.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106a Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-11-19 05:22:39.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.8µs " +"2019-11-19 05:22:39.400 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 173.7µs " +"2019-11-19 05:22:39.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:39.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:39.529 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:39.530 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1070 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +"2019-11-19 05:22:39.530 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1071 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.6µs " +"2019-11-19 05:22:39.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1072 Sending msg of 28 bytes to 2 on channel businesschannel took 121.8µs" +"2019-11-19 05:22:39.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1073 Sending msg of 28 bytes to 3 on channel businesschannel took 295.9µs" +"2019-11-19 05:22:39.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1074 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 854.7µs " +"2019-11-19 05:22:39.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1075 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 711.8µs " +"2019-11-19 05:22:39.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1076 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:39.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1077 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:40.032 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1078 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:40.033 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1079 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-11-19 05:22:40.033 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.3µs " +"2019-11-19 05:22:40.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107b Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2019-11-19 05:22:40.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.8µs " +"2019-11-19 05:22:40.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.2µs " +"2019-11-19 05:22:40.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:40.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:40.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1080 Sending msg of 28 bytes to 2 on channel businesschannel took 122.1µs" +"2019-11-19 05:22:40.527 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1081 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:40.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1082 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-11-19 05:22:40.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1083 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.1µs " +"2019-11-19 05:22:40.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1084 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2019-11-19 05:22:40.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1085 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2019-11-19 05:22:40.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1086 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.1µs " +"2019-11-19 05:22:40.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:40.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1088 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:40.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1089 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 294.3µs " +"2019-11-19 05:22:41.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:41.027 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108b Sending msg of 28 bytes to 3 on channel testchainid took 169.5µs" +"2019-11-19 05:22:41.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.5µs " +"2019-11-19 05:22:41.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108d Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2019-11-19 05:22:41.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108e Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +"2019-11-19 05:22:41.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " +"2019-11-19 05:22:41.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1090 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.9µs " +"2019-11-19 05:22:41.399 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1091 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:41.400 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1092 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:41.529 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1093 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:41.529 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-11-19 05:22:41.529 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1095 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.2µs " +"2019-11-19 05:22:41.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1096 Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2019-11-19 05:22:41.898 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1097 Sending msg of 28 bytes to 3 on channel businesschannel took 8.7µs" +"2019-11-19 05:22:41.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1098 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +"2019-11-19 05:22:41.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1099 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.8µs " +"2019-11-19 05:22:41.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:41.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:42.027 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:42.028 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-11-19 05:22:42.028 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +"2019-11-19 05:22:42.166 UTC [orderer.common.server] Deliver -> DEBU 109f Starting new Deliver handler" +"2019-11-19 05:22:42.166 UTC [common.deliver] Handle -> DEBU 10a0 Starting new deliver loop for 172.18.0.5:51602" +"2019-11-19 05:22:42.166 UTC [common.deliver] Handle -> DEBU 10a1 Attempting to read seek info message from 172.18.0.5:51602" +"2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.167 UTC [policies] Evaluate -> DEBU 10a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:42.167 UTC [msp] DeserializeIdentity -> DEBU 10a7 Obtaining identity" +"2019-11-19 05:22:42.168 UTC [msp.identity] newIdentity -> DEBU 10a8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func1 -> DEBU 10a9 0xc000e21b30 gate 1574140962168283700 evaluation starts" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10aa 0xc000e21b30 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10ab 0xc000e21b30 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10ac 0xc000e21b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10ad 0xc000e21b30 principal evaluation fails" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func1 -> DEBU 10ae 0xc000e21b30 gate 1574140962168283700 evaluation fails" +"2019-11-19 05:22:42.168 UTC [policies] Evaluate -> DEBU 10af Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.168 UTC [policies] Evaluate -> DEBU 10b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.168 UTC [policies] Evaluate -> DEBU 10b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func1 -> DEBU 10b2 0xc000da0c70 gate 1574140962168594200 evaluation starts" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10b3 0xc000da0c70 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10b4 0xc000da0c70 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10b5 0xc000da0c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:42.168 UTC [cauthdsl] func2 -> DEBU 10b6 0xc000da0c70 principal evaluation fails" +"2019-11-19 05:22:42.169 UTC [cauthdsl] func1 -> DEBU 10b7 0xc000da0c70 gate 1574140962168594200 evaluation fails" +"2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10b8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.169 UTC [policies] func1 -> DEBU 10ba Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10bb Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.169 UTC [policies] Evaluate -> DEBU 10bf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:42.169 UTC [cauthdsl] func1 -> DEBU 10c0 0xc000da1980 gate 1574140962169448000 evaluation starts" +"2019-11-19 05:22:42.169 UTC [cauthdsl] func2 -> DEBU 10c1 0xc000da1980 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.169 UTC [cauthdsl] func2 -> DEBU 10c2 0xc000da1980 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.169 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 10c3 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-11-19 05:22:42.169 UTC [msp] Validate -> DEBU 10c4 MSP OrdererMSP validating identity" +"2019-11-19 05:22:42.169 UTC [cauthdsl] func2 -> DEBU 10c5 0xc000da1980 principal matched by identity 0" +"2019-11-19 05:22:42.169 UTC [msp.identity] Verify -> DEBU 10c6 Verify: digest = 00000000 85 f3 2f 6a 7d 8a 3d da 82 c9 89 cc 4c 09 99 2c |../j}.=.....L..,| +00000010 d3 57 04 ab b4 8c 6e c9 a6 ab b3 f7 56 1d eb 51 |.W....n.....V..Q|" +"2019-11-19 05:22:42.169 UTC [msp.identity] Verify -> DEBU 10c7 Verify: sig = 00000000 30 44 02 20 2d af bb 5a 01 42 ac af 24 a2 ae fc |0D. -..Z.B..$...| +00000010 b1 92 ed 6c 87 f3 57 99 ce fa 9e a3 25 be 6e 7b |...l..W.....%.n{| +00000020 c9 e0 e2 39 02 20 5f 81 13 a3 f1 5c e1 b3 ba be |...9. _....\....| +00000030 14 89 41 eb 9e cd c5 8a 3f db 8c d5 ca e0 c5 33 |..A.....?......3| +00000040 0a 1f f0 61 ca 56 |...a.V|" +"2019-11-19 05:22:42.169 UTC [cauthdsl] func2 -> DEBU 10c8 0xc000da1980 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:42.170 UTC [cauthdsl] func1 -> DEBU 10c9 0xc000da1980 gate 1574140962169448000 evaluation succeeds" +"2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10ca Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10cb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10cc Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10ce Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:42.170 UTC [policies] Evaluate -> DEBU 10cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:42.170 UTC [common.deliver] deliverBlocks -> DEBU 10d0 [channel: businesschannel] Received seekInfo (0xc00125b540) start: > stop: > from 172.18.0.5:51602" +"2019-11-19 05:22:42.170 UTC [fsblkstorage] Next -> DEBU 10d1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:42.170 UTC [fsblkstorage] newBlockfileStream -> DEBU 10d2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85274]" +"2019-11-19 05:22:42.170 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10d3 Remaining bytes=[3985], Going to peek [8] bytes" +"2019-11-19 05:22:42.170 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10d4 Returning blockbytes - length=[3983], placementInfo={fileNum=[0], startOffset=[85274], bytesOffset=[85276]}" +"2019-11-19 05:22:42.170 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10d5 blockbytes [3983] read from file [0]" +"2019-11-19 05:22:42.170 UTC [common.deliver] deliverBlocks -> DEBU 10d6 [channel: businesschannel] Delivering block for (0xc00125b540) for 172.18.0.5:51602" +"2019-11-19 05:22:42.170 UTC [common.deliver] deliverBlocks -> DEBU 10d7 [channel: businesschannel] Done delivering to 172.18.0.5:51602 for (0xc00125b540)" +"2019-11-19 05:22:42.170 UTC [common.deliver] Handle -> DEBU 10d8 Waiting for new SeekInfo from 172.18.0.5:51602" +"2019-11-19 05:22:42.170 UTC [common.deliver] Handle -> DEBU 10d9 Attempting to read seek info message from 172.18.0.5:51602" +"2019-11-19 05:22:42.175 UTC [common.deliver] Handle -> WARN 10db Error reading from 172.18.0.5:51602: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:42.176 UTC [orderer.common.server] func1 -> DEBU 10dc Closing Deliver stream" +"2019-11-19 05:22:42.175 UTC [grpc] infof -> DEBU 10da transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:42.177 UTC [comm.grpc.server] 1 -> INFO 10dd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51602 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.6878ms +"2019-11-19 05:22:42.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10de Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2019-11-19 05:22:42.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10df Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2019-11-19 05:22:42.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " +"2019-11-19 05:22:42.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.3µs " +"2019-11-19 05:22:42.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:42.402 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:42.422 UTC [orderer.common.server] Deliver -> DEBU 10e4 Starting new Deliver handler" +"2019-11-19 05:22:42.422 UTC [common.deliver] Handle -> DEBU 10e5 Starting new deliver loop for 172.18.0.5:51604" +"2019-11-19 05:22:42.422 UTC [common.deliver] Handle -> DEBU 10e6 Attempting to read seek info message from 172.18.0.5:51604" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func1 -> DEBU 10ec 0xc0008b2180 gate 1574140962423376300 evaluation starts" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10ed 0xc0008b2180 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10ee 0xc0008b2180 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10ef 0xc0008b2180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f0 0xc0008b2180 principal evaluation fails" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func1 -> DEBU 10f1 0xc0008b2180 gate 1574140962423376300 evaluation fails" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10f2 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func1 -> DEBU 10f5 0xc0008b29c0 gate 1574140962423675100 evaluation starts" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f6 0xc0008b29c0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0008b29c0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0008b29c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0008b29c0 principal evaluation fails" +"2019-11-19 05:22:42.423 UTC [cauthdsl] func1 -> DEBU 10fa 0xc0008b29c0 gate 1574140962423675100 evaluation fails" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.423 UTC [policies] func1 -> DEBU 10fd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10fe Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:42.423 UTC [policies] Evaluate -> DEBU 10ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:42.424 UTC [policies] Evaluate -> DEBU 1100 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 1101 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 1102 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:42.425 UTC [cauthdsl] func1 -> DEBU 1103 0xc0008b36b0 gate 1574140962425131300 evaluation starts" +"2019-11-19 05:22:42.425 UTC [cauthdsl] func2 -> DEBU 1104 0xc0008b36b0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.425 UTC [cauthdsl] func2 -> DEBU 1105 0xc0008b36b0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.425 UTC [cauthdsl] func2 -> DEBU 1106 0xc0008b36b0 principal matched by identity 0" +"2019-11-19 05:22:42.425 UTC [msp.identity] Verify -> DEBU 1107 Verify: digest = 00000000 e7 53 83 a9 ce 7a 8d 5b f7 59 08 43 52 97 b6 c4 |.S...z.[.Y.CR...| +00000010 17 44 e0 9f ba 8c f7 91 57 65 f9 b9 97 dd a0 ac |.D......We......|" +"2019-11-19 05:22:42.425 UTC [msp.identity] Verify -> DEBU 1108 Verify: sig = 00000000 30 44 02 20 37 e4 b8 5b ee 17 f2 7b b5 3a b9 a6 |0D. 7..[...{.:..| +00000010 53 3c af 42 4d 98 b4 d6 57 1d da f3 82 b8 02 d6 |S<.BM...W.......| +00000020 c7 f2 e0 37 02 20 40 af cb 9e 91 32 ab a4 9d 67 |...7. @....2...g| +00000030 03 3c d1 15 cf 71 f2 ba 6d 33 2a 66 4e 34 b0 fe |.<...q..m3*fN4..| +00000040 04 5e b5 dc fc de |.^....|" +"2019-11-19 05:22:42.425 UTC [cauthdsl] func2 -> DEBU 1109 0xc0008b36b0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:42.425 UTC [cauthdsl] func1 -> DEBU 110a 0xc0008b36b0 gate 1574140962425131300 evaluation succeeds" +"2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 110f Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:42.425 UTC [policies] Evaluate -> DEBU 1110 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:42.426 UTC [common.deliver] deliverBlocks -> DEBU 1111 [channel: businesschannel] Received seekInfo (0xc000fc6c00) start: > stop: > from 172.18.0.5:51604" +"2019-11-19 05:22:42.426 UTC [fsblkstorage] Next -> DEBU 1112 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:42.426 UTC [fsblkstorage] newBlockfileStream -> DEBU 1113 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85274]" +"2019-11-19 05:22:42.426 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1114 Remaining bytes=[3985], Going to peek [8] bytes" +"2019-11-19 05:22:42.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1115 Returning blockbytes - length=[3983], placementInfo={fileNum=[0], startOffset=[85274], bytesOffset=[85276]}" +"2019-11-19 05:22:42.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1116 blockbytes [3983] read from file [0]" +"2019-11-19 05:22:42.392 UTC [common.deliver] deliverBlocks -> DEBU 1117 [channel: businesschannel] Delivering block for (0xc000fc6c00) for 172.18.0.5:51604" +"2019-11-19 05:22:42.392 UTC [common.deliver] deliverBlocks -> DEBU 1118 [channel: businesschannel] Done delivering to 172.18.0.5:51604 for (0xc000fc6c00)" +"2019-11-19 05:22:42.392 UTC [common.deliver] Handle -> DEBU 1119 Waiting for new SeekInfo from 172.18.0.5:51604" +"2019-11-19 05:22:42.392 UTC [common.deliver] Handle -> DEBU 111a Attempting to read seek info message from 172.18.0.5:51604" +"2019-11-19 05:22:42.396 UTC [policies] Evaluate -> DEBU 111b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:42.396 UTC [policies] Evaluate -> DEBU 111c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.397 UTC [policies] Evaluate -> DEBU 111d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:42.397 UTC [policies] Evaluate -> DEBU 111e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.398 UTC [policies] Evaluate -> DEBU 111f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:42.398 UTC [cauthdsl] func1 -> DEBU 1120 0xc000db7f10 gate 1574140962398476200 evaluation starts" +"2019-11-19 05:22:42.399 UTC [cauthdsl] func2 -> DEBU 1121 0xc000db7f10 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.399 UTC [cauthdsl] func2 -> DEBU 1122 0xc000db7f10 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.400 UTC [cauthdsl] func2 -> DEBU 1123 0xc000db7f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:42.400 UTC [cauthdsl] func2 -> DEBU 1124 0xc000db7f10 principal evaluation fails" +"2019-11-19 05:22:42.400 UTC [cauthdsl] func1 -> DEBU 1125 0xc000db7f10 gate 1574140962398476200 evaluation fails" +"2019-11-19 05:22:42.401 UTC [policies] Evaluate -> DEBU 1126 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.401 UTC [policies] Evaluate -> DEBU 1127 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 1128 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:42.402 UTC [cauthdsl] func1 -> DEBU 1129 0xc000b1c750 gate 1574140962402691500 evaluation starts" +"2019-11-19 05:22:42.402 UTC [cauthdsl] func2 -> DEBU 112a 0xc000b1c750 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.402 UTC [cauthdsl] func2 -> DEBU 112b 0xc000b1c750 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.402 UTC [cauthdsl] func2 -> DEBU 112c 0xc000b1c750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:42.402 UTC [cauthdsl] func2 -> DEBU 112d 0xc000b1c750 principal evaluation fails" +"2019-11-19 05:22:42.402 UTC [cauthdsl] func1 -> DEBU 112e 0xc000b1c750 gate 1574140962402691500 evaluation fails" +"2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 112f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 1130 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.402 UTC [policies] func1 -> DEBU 1131 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 1132 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:42.402 UTC [policies] Evaluate -> DEBU 1133 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1134 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1135 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1136 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:42.403 UTC [cauthdsl] func1 -> DEBU 1137 0xc000b1d440 gate 1574140962403081100 evaluation starts" +"2019-11-19 05:22:42.403 UTC [cauthdsl] func2 -> DEBU 1138 0xc000b1d440 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.403 UTC [cauthdsl] func2 -> DEBU 1139 0xc000b1d440 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.403 UTC [cauthdsl] func2 -> DEBU 113a 0xc000b1d440 principal matched by identity 0" +"2019-11-19 05:22:42.403 UTC [msp.identity] Verify -> DEBU 113b Verify: digest = 00000000 95 1e e1 36 8d ec 05 2f 46 e6 84 2e 7a bb ee 51 |...6.../F...z..Q| +00000010 93 5d 97 61 82 79 f4 90 6a ab 21 51 fc 34 5d 8d |.].a.y..j.!Q.4].|" +"2019-11-19 05:22:42.403 UTC [msp.identity] Verify -> DEBU 113c Verify: sig = 00000000 30 44 02 20 54 0c c6 89 dc 64 de e3 49 c3 32 bd |0D. T....d..I.2.| +00000010 fb 89 74 c2 f2 2f 9d 9e e7 f4 e2 c0 7d 0a 56 a9 |..t../......}.V.| +00000020 67 1b c4 df 02 20 57 a2 2b c6 f8 08 a0 3c b7 46 |g.... W.+....<.F| +00000030 7d a3 1b bb 45 99 a6 9a a3 f6 24 30 a3 37 f1 31 |}...E.....$0.7.1| +00000040 b3 2b d1 95 02 f8 |.+....|" +"2019-11-19 05:22:42.403 UTC [cauthdsl] func2 -> DEBU 113d 0xc000b1d440 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:42.403 UTC [cauthdsl] func1 -> DEBU 113e 0xc000b1d440 gate 1574140962403081100 evaluation succeeds" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 113f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1140 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1141 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1142 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1143 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:42.403 UTC [policies] Evaluate -> DEBU 1144 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:42.403 UTC [common.deliver] deliverBlocks -> DEBU 1145 [channel: businesschannel] Received seekInfo (0xc00125bbc0) start: > stop: > from 172.18.0.5:51604" +"2019-11-19 05:22:42.403 UTC [fsblkstorage] Next -> DEBU 1146 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:42.403 UTC [fsblkstorage] newBlockfileStream -> DEBU 1147 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51284]" +"2019-11-19 05:22:42.403 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1148 Remaining bytes=[37975], Going to peek [8] bytes" +"2019-11-19 05:22:42.403 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1149 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51284], bytesOffset=[51287]}" +"2019-11-19 05:22:42.403 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 114a blockbytes [25480] read from file [0]" +"2019-11-19 05:22:42.403 UTC [common.deliver] deliverBlocks -> DEBU 114b [channel: businesschannel] Delivering block for (0xc00125bbc0) for 172.18.0.5:51604" +"2019-11-19 05:22:42.405 UTC [common.deliver] deliverBlocks -> DEBU 114c [channel: businesschannel] Done delivering to 172.18.0.5:51604 for (0xc00125bbc0)" +"2019-11-19 05:22:42.405 UTC [common.deliver] Handle -> DEBU 114d Waiting for new SeekInfo from 172.18.0.5:51604" +"2019-11-19 05:22:42.406 UTC [common.deliver] Handle -> DEBU 114e Attempting to read seek info message from 172.18.0.5:51604" +"2019-11-19 05:22:42.413 UTC [common.deliver] Handle -> WARN 114f Error reading from 172.18.0.5:51604: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:42.413 UTC [orderer.common.server] func1 -> DEBU 1150 Closing Deliver stream" +"2019-11-19 05:22:42.413 UTC [comm.grpc.server] 1 -> INFO 1151 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51604 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.2486ms +"2019-11-19 05:22:42.413 UTC [grpc] infof -> DEBU 1152 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:42.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1153 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:42.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1154 Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +"2019-11-19 05:22:42.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1155 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.7µs " +"2019-11-19 05:22:42.535 UTC [orderer.common.server] Deliver -> DEBU 1156 Starting new Deliver handler" +"2019-11-19 05:22:42.535 UTC [common.deliver] Handle -> DEBU 1157 Starting new deliver loop for 172.18.0.5:51606" +"2019-11-19 05:22:42.535 UTC [common.deliver] Handle -> DEBU 1158 Attempting to read seek info message from 172.18.0.5:51606" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1159 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 115a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 115b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 115c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 115d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func1 -> DEBU 115e 0xc000b27c80 gate 1574140962536193800 evaluation starts" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 115f 0xc000b27c80 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1160 0xc000b27c80 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1161 0xc000b27c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1162 0xc000b27c80 principal evaluation fails" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func1 -> DEBU 1163 0xc000b27c80 gate 1574140962536193800 evaluation fails" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1164 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1165 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1166 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func1 -> DEBU 1167 0xc0010aa4c0 gate 1574140962536514400 evaluation starts" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1168 0xc0010aa4c0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 1169 0xc0010aa4c0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 116a 0xc0010aa4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func2 -> DEBU 116b 0xc0010aa4c0 principal evaluation fails" +"2019-11-19 05:22:42.536 UTC [cauthdsl] func1 -> DEBU 116c 0xc0010aa4c0 gate 1574140962536514400 evaluation fails" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 116d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 116e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.536 UTC [policies] func1 -> DEBU 116f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1170 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1171 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1172 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:42.536 UTC [policies] Evaluate -> DEBU 1173 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 1174 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:42.537 UTC [cauthdsl] func1 -> DEBU 1175 0xc0010ab1b0 gate 1574140962537035100 evaluation starts" +"2019-11-19 05:22:42.537 UTC [cauthdsl] func2 -> DEBU 1176 0xc0010ab1b0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.537 UTC [cauthdsl] func2 -> DEBU 1177 0xc0010ab1b0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.537 UTC [cauthdsl] func2 -> DEBU 1178 0xc0010ab1b0 principal matched by identity 0" +"2019-11-19 05:22:42.537 UTC [msp.identity] Verify -> DEBU 1179 Verify: digest = 00000000 c7 b3 28 3f 0d 9b b8 72 78 d1 58 8c 47 be 50 b3 |..(?...rx.X.G.P.| +00000010 71 0a 1d 89 a3 ec 30 5d 03 05 96 87 e3 d0 3f f8 |q.....0]......?.|" +"2019-11-19 05:22:42.537 UTC [msp.identity] Verify -> DEBU 117a Verify: sig = 00000000 30 45 02 21 00 a9 9a e2 bb 09 ae c2 fb ad 2a 34 |0E.!..........*4| +00000010 11 64 c6 64 75 f0 79 1e a6 15 90 bb 96 fb a5 ce |.d.du.y.........| +00000020 8c 14 9a a6 c2 02 20 04 1e 21 a7 89 e0 59 93 68 |...... ..!...Y.h| +00000030 c2 8d 66 14 5d 2b 0e db 96 57 4b ac 47 04 f2 ef |..f.]+...WK.G...| +00000040 f1 55 cd 5e ee 77 9a |.U.^.w.|" +"2019-11-19 05:22:42.537 UTC [cauthdsl] func2 -> DEBU 117b 0xc0010ab1b0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:42.537 UTC [cauthdsl] func1 -> DEBU 117c 0xc0010ab1b0 gate 1574140962537035100 evaluation succeeds" +"2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 117d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 117f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 1180 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 1181 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:42.537 UTC [policies] Evaluate -> DEBU 1182 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:42.537 UTC [common.deliver] deliverBlocks -> DEBU 1183 [channel: businesschannel] Received seekInfo (0xc000d56280) start: > stop: > from 172.18.0.5:51606" +"2019-11-19 05:22:42.537 UTC [fsblkstorage] Next -> DEBU 1184 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:42.537 UTC [fsblkstorage] newBlockfileStream -> DEBU 1185 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-11-19 05:22:42.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1186 Remaining bytes=[89259], Going to peek [8] bytes" +"2019-11-19 05:22:42.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1187 Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:22:42.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1188 blockbytes [25803] read from file [0]" +"2019-11-19 05:22:42.537 UTC [common.deliver] deliverBlocks -> DEBU 1189 [channel: businesschannel] Delivering block for (0xc000d56280) for 172.18.0.5:51606" +"2019-11-19 05:22:42.537 UTC [common.deliver] deliverBlocks -> DEBU 118a [channel: businesschannel] Done delivering to 172.18.0.5:51606 for (0xc000d56280)" +"2019-11-19 05:22:42.538 UTC [common.deliver] Handle -> DEBU 118b Waiting for new SeekInfo from 172.18.0.5:51606" +"2019-11-19 05:22:42.538 UTC [common.deliver] Handle -> DEBU 118c Attempting to read seek info message from 172.18.0.5:51606" +"2019-11-19 05:22:42.545 UTC [grpc] infof -> DEBU 118d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:42.547 UTC [orderer.common.server] replicateDisabledChains -> DEBU 118f No inactive chains to try to replicate" +"2019-11-19 05:22:42.546 UTC [common.deliver] Handle -> WARN 118e Error reading from 172.18.0.5:51606: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:42.548 UTC [orderer.common.server] func1 -> DEBU 1190 Closing Deliver stream" +"2019-11-19 05:22:42.549 UTC [comm.grpc.server] 1 -> INFO 1191 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51606 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6542ms +"2019-11-19 05:22:42.706 UTC [orderer.common.server] Deliver -> DEBU 1192 Starting new Deliver handler" +"2019-11-19 05:22:42.706 UTC [common.deliver] Handle -> DEBU 1193 Starting new deliver loop for 172.18.0.5:51608" +"2019-11-19 05:22:42.706 UTC [common.deliver] Handle -> DEBU 1194 Attempting to read seek info message from 172.18.0.5:51608" +"2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1195 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1196 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1197 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1198 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.706 UTC [policies] Evaluate -> DEBU 1199 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:42.706 UTC [cauthdsl] func1 -> DEBU 119a 0xc00113c2f0 gate 1574140962706852800 evaluation starts" +"2019-11-19 05:22:42.706 UTC [cauthdsl] func2 -> DEBU 119b 0xc00113c2f0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.706 UTC [cauthdsl] func2 -> DEBU 119c 0xc00113c2f0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.706 UTC [cauthdsl] func2 -> DEBU 119d 0xc00113c2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 119e 0xc00113c2f0 principal evaluation fails" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 119f 0xc00113c2f0 gate 1574140962706852800 evaluation fails" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11a0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 11a3 0xc00113cb30 gate 1574140962707183700 evaluation starts" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11a4 0xc00113cb30 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11a5 0xc00113cb30 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11a6 0xc00113cb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11a7 0xc00113cb30 principal evaluation fails" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 11a8 0xc00113cb30 gate 1574140962707183700 evaluation fails" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.707 UTC [policies] func1 -> DEBU 11ab Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11ac Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11b0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 11b1 0xc00113d820 gate 1574140962707621200 evaluation starts" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11b2 0xc00113d820 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11b3 0xc00113d820 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11b4 0xc00113d820 principal matched by identity 0" +"2019-11-19 05:22:42.707 UTC [msp.identity] Verify -> DEBU 11b5 Verify: digest = 00000000 1a 35 00 d1 97 1f 99 3a 0c 59 62 7b d1 f0 13 80 |.5.....:.Yb{....| +00000010 f3 2e 18 d5 e8 81 ea 81 bd 0b b0 21 22 e5 32 6a |...........!".2j|" +"2019-11-19 05:22:42.707 UTC [msp.identity] Verify -> DEBU 11b6 Verify: sig = 00000000 30 45 02 21 00 a9 68 94 56 62 15 b0 14 8b f4 5f |0E.!..h.Vb....._| +00000010 57 38 f8 37 6f 0b fd 51 61 0a 3d b0 76 c7 70 f3 |W8.7o..Qa.=.v.p.| +00000020 61 b0 71 9f 02 02 20 58 ea 30 c8 d4 c4 bb 1e 4a |a.q... X.0.....J| +00000030 9d 1c a3 97 93 8d 99 72 70 f5 3f 6a c2 78 a6 9f |.......rp.?j.x..| +00000040 bc c0 74 d6 bd bf 70 |..t...p|" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func2 -> DEBU 11b7 0xc00113d820 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:42.707 UTC [cauthdsl] func1 -> DEBU 11b8 0xc00113d820 gate 1574140962707621200 evaluation succeeds" +"2019-11-19 05:22:42.707 UTC [policies] Evaluate -> DEBU 11b9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11ba == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11bb Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11bd Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:42.708 UTC [policies] Evaluate -> DEBU 11be == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:42.708 UTC [common.deliver] deliverBlocks -> DEBU 11bf [channel: businesschannel] Received seekInfo (0xc000fc74c0) start: > stop: > from 172.18.0.5:51608" +"2019-11-19 05:22:42.708 UTC [fsblkstorage] Next -> DEBU 11c0 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:42.708 UTC [fsblkstorage] newBlockfileStream -> DEBU 11c1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25806]" +"2019-11-19 05:22:42.708 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c2 Remaining bytes=[63453], Going to peek [8] bytes" +"2019-11-19 05:22:42.708 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c3 Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25806], bytesOffset=[25809]}" +"2019-11-19 05:22:42.708 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c4 blockbytes [25475] read from file [0]" +"2019-11-19 05:22:42.708 UTC [common.deliver] deliverBlocks -> DEBU 11c5 [channel: businesschannel] Delivering block for (0xc000fc74c0) for 172.18.0.5:51608" +"2019-11-19 05:22:42.708 UTC [common.deliver] deliverBlocks -> DEBU 11c6 [channel: businesschannel] Done delivering to 172.18.0.5:51608 for (0xc000fc74c0)" +"2019-11-19 05:22:42.709 UTC [common.deliver] Handle -> DEBU 11c7 Waiting for new SeekInfo from 172.18.0.5:51608" +"2019-11-19 05:22:42.709 UTC [common.deliver] Handle -> DEBU 11c8 Attempting to read seek info message from 172.18.0.5:51608" +"2019-11-19 05:22:42.717 UTC [grpc] infof -> DEBU 11c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:42.718 UTC [common.deliver] Handle -> WARN 11ca Error reading from 172.18.0.5:51608: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:42.719 UTC [orderer.common.server] func1 -> DEBU 11cb Closing Deliver stream" +"2019-11-19 05:22:42.719 UTC [comm.grpc.server] 1 -> INFO 11cc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51608 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2443ms +"2019-11-19 05:22:42.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cd Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +"2019-11-19 05:22:42.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ce Sending msg of 28 bytes to 3 on channel businesschannel took 28.7µs" +"2019-11-19 05:22:42.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.1µs " +"2019-11-19 05:22:42.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.347ms " +"2019-11-19 05:22:42.871 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:42.872 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:42.931 UTC [orderer.common.server] Deliver -> DEBU 11d3 Starting new Deliver handler" +"2019-11-19 05:22:42.932 UTC [common.deliver] Handle -> DEBU 11d4 Starting new deliver loop for 172.18.0.5:51610" +"2019-11-19 05:22:42.932 UTC [common.deliver] Handle -> DEBU 11d5 Attempting to read seek info message from 172.18.0.5:51610" +"2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.933 UTC [policies] Evaluate -> DEBU 11da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:42.933 UTC [cauthdsl] func1 -> DEBU 11db 0xc00101e060 gate 1574140962933980700 evaluation starts" +"2019-11-19 05:22:42.934 UTC [cauthdsl] func2 -> DEBU 11dc 0xc00101e060 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.934 UTC [cauthdsl] func2 -> DEBU 11dd 0xc00101e060 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.934 UTC [cauthdsl] func2 -> DEBU 11de 0xc00101e060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:42.934 UTC [cauthdsl] func2 -> DEBU 11df 0xc00101e060 principal evaluation fails" +"2019-11-19 05:22:42.935 UTC [cauthdsl] func1 -> DEBU 11e0 0xc00101e060 gate 1574140962933980700 evaluation fails" +"2019-11-19 05:22:42.935 UTC [policies] Evaluate -> DEBU 11e1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.935 UTC [policies] Evaluate -> DEBU 11e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:42.936 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:42.936 UTC [cauthdsl] func1 -> DEBU 11e4 0xc00101e8a0 gate 1574140962936423700 evaluation starts" +"2019-11-19 05:22:42.936 UTC [cauthdsl] func2 -> DEBU 11e5 0xc00101e8a0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.936 UTC [cauthdsl] func2 -> DEBU 11e6 0xc00101e8a0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.937 UTC [cauthdsl] func2 -> DEBU 11e7 0xc00101e8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:42.937 UTC [cauthdsl] func2 -> DEBU 11e8 0xc00101e8a0 principal evaluation fails" +"2019-11-19 05:22:42.937 UTC [cauthdsl] func1 -> DEBU 11e9 0xc00101e8a0 gate 1574140962936423700 evaluation fails" +"2019-11-19 05:22:42.937 UTC [policies] Evaluate -> DEBU 11ea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.937 UTC [policies] Evaluate -> DEBU 11eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:42.938 UTC [policies] func1 -> DEBU 11ec Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:42.938 UTC [policies] Evaluate -> DEBU 11ed Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:42.938 UTC [policies] Evaluate -> DEBU 11ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:42.939 UTC [policies] Evaluate -> DEBU 11ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:42.939 UTC [policies] Evaluate -> DEBU 11f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:42.939 UTC [policies] Evaluate -> DEBU 11f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:42.940 UTC [cauthdsl] func1 -> DEBU 11f2 0xc00101f590 gate 1574140962939672600 evaluation starts" +"2019-11-19 05:22:42.940 UTC [cauthdsl] func2 -> DEBU 11f3 0xc00101f590 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:42.940 UTC [cauthdsl] func2 -> DEBU 11f4 0xc00101f590 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:42.941 UTC [cauthdsl] func2 -> DEBU 11f5 0xc00101f590 principal matched by identity 0" +"2019-11-19 05:22:42.941 UTC [msp.identity] Verify -> DEBU 11f6 Verify: digest = 00000000 9d 58 07 a0 3a 0b 15 0c c5 f4 34 7d 15 35 3c a6 |.X..:.....4}.5<.| +00000010 0e b6 10 62 a5 57 78 48 a7 79 a7 e0 08 b0 09 08 |...b.WxH.y......|" +"2019-11-19 05:22:42.941 UTC [msp.identity] Verify -> DEBU 11f7 Verify: sig = 00000000 30 45 02 21 00 fc 73 f2 17 b3 13 6a 55 b2 c5 dc |0E.!..s....jU...| +00000010 55 3a 1c b5 d2 15 7e 55 3b 80 07 cc b3 f9 e8 cd |U:....~U;.......| +00000020 f7 47 c9 a0 8d 02 20 13 6d 79 f2 98 45 90 5b ba |.G.... .my..E.[.| +00000030 72 46 f9 18 1a 9d 80 8f cc b5 6a c2 1e 48 fd 66 |rF........j..H.f| +00000040 d3 f3 a5 d0 22 16 e3 |...."..|" +"2019-11-19 05:22:42.942 UTC [cauthdsl] func2 -> DEBU 11f8 0xc00101f590 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:42.942 UTC [cauthdsl] func1 -> DEBU 11f9 0xc00101f590 gate 1574140962939672600 evaluation succeeds" +"2019-11-19 05:22:42.942 UTC [policies] Evaluate -> DEBU 11fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.943 UTC [policies] Evaluate -> DEBU 11fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:42.943 UTC [policies] Evaluate -> DEBU 11fc Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.943 UTC [policies] Evaluate -> DEBU 11fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:42.943 UTC [policies] Evaluate -> DEBU 11fe Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:42.945 UTC [policies] Evaluate -> DEBU 11ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:42.945 UTC [common.deliver] deliverBlocks -> DEBU 1200 [channel: businesschannel] Received seekInfo (0xc000fc7cc0) start: > stop: > from 172.18.0.5:51610" +"2019-11-19 05:22:42.946 UTC [fsblkstorage] Next -> DEBU 1201 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:42.946 UTC [fsblkstorage] newBlockfileStream -> DEBU 1202 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51284]" +"2019-11-19 05:22:42.946 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1203 Remaining bytes=[37975], Going to peek [8] bytes" +"2019-11-19 05:22:42.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1204 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51284], bytesOffset=[51287]}" +"2019-11-19 05:22:42.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1205 blockbytes [25480] read from file [0]" +"2019-11-19 05:22:42.947 UTC [common.deliver] deliverBlocks -> DEBU 1206 [channel: businesschannel] Delivering block for (0xc000fc7cc0) for 172.18.0.5:51610" +"2019-11-19 05:22:42.948 UTC [common.deliver] deliverBlocks -> DEBU 1207 [channel: businesschannel] Done delivering to 172.18.0.5:51610 for (0xc000fc7cc0)" +"2019-11-19 05:22:42.952 UTC [common.deliver] Handle -> DEBU 1208 Waiting for new SeekInfo from 172.18.0.5:51610" +"2019-11-19 05:22:42.952 UTC [common.deliver] Handle -> DEBU 1209 Attempting to read seek info message from 172.18.0.5:51610" +"2019-11-19 05:22:42.958 UTC [common.deliver] Handle -> WARN 120a Error reading from 172.18.0.5:51610: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:42.958 UTC [orderer.common.server] func1 -> DEBU 120b Closing Deliver stream" +"2019-11-19 05:22:42.958 UTC [comm.grpc.server] 1 -> INFO 120c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51610 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.7716ms +"2019-11-19 05:22:42.959 UTC [grpc] infof -> DEBU 120d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:43.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:43.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120f Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +"2019-11-19 05:22:43.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1210 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 12.0875ms " +"2019-11-19 05:22:43.158 UTC [orderer.common.server] Deliver -> DEBU 1211 Starting new Deliver handler" +"2019-11-19 05:22:43.158 UTC [common.deliver] Handle -> DEBU 1212 Starting new deliver loop for 172.18.0.5:51612" +"2019-11-19 05:22:43.158 UTC [common.deliver] Handle -> DEBU 1213 Attempting to read seek info message from 172.18.0.5:51612" +"2019-11-19 05:22:43.160 UTC [policies] Evaluate -> DEBU 1214 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:43.160 UTC [policies] Evaluate -> DEBU 1215 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.161 UTC [policies] Evaluate -> DEBU 1216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:43.161 UTC [policies] Evaluate -> DEBU 1217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.161 UTC [policies] Evaluate -> DEBU 1218 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:43.162 UTC [cauthdsl] func1 -> DEBU 1219 0xc00102f810 gate 1574140963162251000 evaluation starts" +"2019-11-19 05:22:43.162 UTC [cauthdsl] func2 -> DEBU 121a 0xc00102f810 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.163 UTC [cauthdsl] func2 -> DEBU 121b 0xc00102f810 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.163 UTC [cauthdsl] func2 -> DEBU 121c 0xc00102f810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:43.163 UTC [cauthdsl] func2 -> DEBU 121d 0xc00102f810 principal evaluation fails" +"2019-11-19 05:22:43.164 UTC [cauthdsl] func1 -> DEBU 121e 0xc00102f810 gate 1574140963162251000 evaluation fails" +"2019-11-19 05:22:43.164 UTC [policies] Evaluate -> DEBU 121f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:43.164 UTC [policies] Evaluate -> DEBU 1220 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:43.164 UTC [policies] Evaluate -> DEBU 1221 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:43.165 UTC [cauthdsl] func1 -> DEBU 1222 0xc0012bc050 gate 1574140963165237700 evaluation starts" +"2019-11-19 05:22:43.165 UTC [cauthdsl] func2 -> DEBU 1223 0xc0012bc050 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.165 UTC [cauthdsl] func2 -> DEBU 1224 0xc0012bc050 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.166 UTC [cauthdsl] func2 -> DEBU 1225 0xc0012bc050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:43.166 UTC [cauthdsl] func2 -> DEBU 1226 0xc0012bc050 principal evaluation fails" +"2019-11-19 05:22:43.166 UTC [cauthdsl] func1 -> DEBU 1227 0xc0012bc050 gate 1574140963165237700 evaluation fails" +"2019-11-19 05:22:43.166 UTC [policies] Evaluate -> DEBU 1228 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:43.166 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:43.167 UTC [policies] func1 -> DEBU 122a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-11-19 05:22:43.167 UTC [policies] Evaluate -> DEBU 122b Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:43.167 UTC [policies] Evaluate -> DEBU 122c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:43.167 UTC [policies] Evaluate -> DEBU 122d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:43.167 UTC [policies] Evaluate -> DEBU 122e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.168 UTC [policies] Evaluate -> DEBU 122f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:43.168 UTC [cauthdsl] func1 -> DEBU 1230 0xc0012bcd40 gate 1574140963168070200 evaluation starts" +"2019-11-19 05:22:43.168 UTC [cauthdsl] func2 -> DEBU 1231 0xc0012bcd40 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.168 UTC [cauthdsl] func2 -> DEBU 1232 0xc0012bcd40 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.168 UTC [cauthdsl] func2 -> DEBU 1233 0xc0012bcd40 principal matched by identity 0" +"2019-11-19 05:22:43.168 UTC [msp.identity] Verify -> DEBU 1234 Verify: digest = 00000000 c5 c3 15 80 7a e8 2b 96 9c 3c 7b ed f2 55 9d 37 |....z.+..<{..U.7| +00000010 f4 2d 23 a3 da a5 b4 aa 74 a4 c0 c2 34 39 29 c1 |.-#.....t...49).|" +"2019-11-19 05:22:43.168 UTC [msp.identity] Verify -> DEBU 1235 Verify: sig = 00000000 30 45 02 21 00 80 6d 3d 3b 86 67 cd 10 6f a0 74 |0E.!..m=;.g..o.t| +00000010 c9 09 81 94 af 2a b6 b1 e0 92 bb ef cb aa 53 4d |.....*........SM| +00000020 a3 3c 51 06 51 02 20 09 1d e5 d9 2d 72 db 3c be |. DEBU 1236 0xc0012bcd40 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:43.169 UTC [cauthdsl] func1 -> DEBU 1237 0xc0012bcd40 gate 1574140963168070200 evaluation succeeds" +"2019-11-19 05:22:43.169 UTC [policies] Evaluate -> DEBU 1238 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:43.169 UTC [policies] Evaluate -> DEBU 1239 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:43.169 UTC [policies] Evaluate -> DEBU 123a Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:43.170 UTC [policies] Evaluate -> DEBU 123b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:43.170 UTC [policies] Evaluate -> DEBU 123c Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:43.170 UTC [policies] Evaluate -> DEBU 123d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:43.170 UTC [common.deliver] deliverBlocks -> DEBU 123e [channel: businesschannel] Received seekInfo (0xc0012aa200) start: > stop: > from 172.18.0.5:51612" +"2019-11-19 05:22:43.171 UTC [fsblkstorage] Next -> DEBU 123f Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:43.171 UTC [fsblkstorage] newBlockfileStream -> DEBU 1240 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76767]" +"2019-11-19 05:22:43.171 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1241 Remaining bytes=[12492], Going to peek [8] bytes" +"2019-11-19 05:22:43.171 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1242 Returning blockbytes - length=[4521], placementInfo={fileNum=[0], startOffset=[76767], bytesOffset=[76769]}" +"2019-11-19 05:22:43.171 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1243 blockbytes [4521] read from file [0]" +"2019-11-19 05:22:43.172 UTC [common.deliver] deliverBlocks -> DEBU 1244 [channel: businesschannel] Delivering block for (0xc0012aa200) for 172.18.0.5:51612" +"2019-11-19 05:22:43.172 UTC [common.deliver] deliverBlocks -> DEBU 1245 [channel: businesschannel] Done delivering to 172.18.0.5:51612 for (0xc0012aa200)" +"2019-11-19 05:22:43.172 UTC [common.deliver] Handle -> DEBU 1246 Waiting for new SeekInfo from 172.18.0.5:51612" +"2019-11-19 05:22:43.172 UTC [common.deliver] Handle -> DEBU 1247 Attempting to read seek info message from 172.18.0.5:51612" +"2019-11-19 05:22:43.180 UTC [grpc] infof -> DEBU 1248 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:43.181 UTC [common.deliver] Handle -> WARN 1249 Error reading from 172.18.0.5:51612: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:43.181 UTC [orderer.common.server] func1 -> DEBU 124a Closing Deliver stream" +"2019-11-19 05:22:43.181 UTC [comm.grpc.server] 1 -> INFO 124b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51612 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.7474ms +"2019-11-19 05:22:43.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124c Sending msg of 28 bytes to 2 on channel businesschannel took 57.9µs" +"2019-11-19 05:22:43.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124d Sending msg of 28 bytes to 3 on channel businesschannel took 74.5µs" +"2019-11-19 05:22:43.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 568.5µs " +"2019-11-19 05:22:43.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.5µs " +"2019-11-19 05:22:43.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1250 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:43.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1251 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:43.474 UTC [orderer.common.server] Deliver -> DEBU 1252 Starting new Deliver handler" +"2019-11-19 05:22:43.474 UTC [common.deliver] Handle -> DEBU 1253 Starting new deliver loop for 172.18.0.5:51614" +"2019-11-19 05:22:43.474 UTC [common.deliver] Handle -> DEBU 1254 Attempting to read seek info message from 172.18.0.5:51614" +"2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1255 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1256 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1257 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1258 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.475 UTC [policies] Evaluate -> DEBU 1259 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:43.475 UTC [cauthdsl] func1 -> DEBU 125a 0xc0012dce70 gate 1574140963475775200 evaluation starts" +"2019-11-19 05:22:43.476 UTC [cauthdsl] func2 -> DEBU 125b 0xc0012dce70 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.476 UTC [cauthdsl] func2 -> DEBU 125c 0xc0012dce70 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.476 UTC [cauthdsl] func2 -> DEBU 125d 0xc0012dce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:43.476 UTC [cauthdsl] func2 -> DEBU 125e 0xc0012dce70 principal evaluation fails" +"2019-11-19 05:22:43.476 UTC [cauthdsl] func1 -> DEBU 125f 0xc0012dce70 gate 1574140963475775200 evaluation fails" +"2019-11-19 05:22:43.476 UTC [policies] Evaluate -> DEBU 1260 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:43.477 UTC [policies] Evaluate -> DEBU 1261 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:43.477 UTC [policies] Evaluate -> DEBU 1262 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:43.477 UTC [cauthdsl] func1 -> DEBU 1263 0xc0012dd6b0 gate 1574140963477288300 evaluation starts" +"2019-11-19 05:22:43.477 UTC [cauthdsl] func2 -> DEBU 1264 0xc0012dd6b0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.477 UTC [cauthdsl] func2 -> DEBU 1265 0xc0012dd6b0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.477 UTC [cauthdsl] func2 -> DEBU 1266 0xc0012dd6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:43.477 UTC [cauthdsl] func2 -> DEBU 1267 0xc0012dd6b0 principal evaluation fails" +"2019-11-19 05:22:43.477 UTC [cauthdsl] func1 -> DEBU 1268 0xc0012dd6b0 gate 1574140963477288300 evaluation fails" +"2019-11-19 05:22:43.478 UTC [policies] Evaluate -> DEBU 1269 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:43.478 UTC [policies] Evaluate -> DEBU 126a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:43.478 UTC [policies] func1 -> DEBU 126b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:43.478 UTC [policies] Evaluate -> DEBU 126c Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:43.478 UTC [policies] Evaluate -> DEBU 126d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:43.480 UTC [policies] Evaluate -> DEBU 126e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:43.480 UTC [policies] Evaluate -> DEBU 126f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.480 UTC [policies] Evaluate -> DEBU 1270 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:43.481 UTC [cauthdsl] func1 -> DEBU 1271 0xc0013083b0 gate 1574140963481013900 evaluation starts" +"2019-11-19 05:22:43.481 UTC [cauthdsl] func2 -> DEBU 1272 0xc0013083b0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.481 UTC [cauthdsl] func2 -> DEBU 1273 0xc0013083b0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.481 UTC [cauthdsl] func2 -> DEBU 1274 0xc0013083b0 principal matched by identity 0" +"2019-11-19 05:22:43.481 UTC [msp.identity] Verify -> DEBU 1275 Verify: digest = 00000000 f2 3a 47 a4 82 97 bd 21 58 b3 e8 af 06 b2 bf 00 |.:G....!X.......| +00000010 64 a1 d5 1e 0b 4b 83 37 08 c6 b8 a4 e5 41 5d a2 |d....K.7.....A].|" +"2019-11-19 05:22:43.482 UTC [msp.identity] Verify -> DEBU 1276 Verify: sig = 00000000 30 45 02 21 00 fe c8 66 3d a4 55 6e 7d 84 65 55 |0E.!...f=.Un}.eU| +00000010 c8 d6 ba 94 8c e0 ab 3a 95 35 42 98 83 01 43 f1 |.......:.5B...C.| +00000020 77 0d 99 c4 a1 02 20 7b b2 1a e5 30 2b 9f 25 1b |w..... {...0+.%.| +00000030 46 e4 fe 1a 91 dc 9d 35 b8 69 f1 03 68 8d 13 5a |F......5.i..h..Z| +00000040 38 85 25 a9 95 73 c7 |8.%..s.|" +"2019-11-19 05:22:43.482 UTC [cauthdsl] func2 -> DEBU 1277 0xc0013083b0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:43.482 UTC [cauthdsl] func1 -> DEBU 1278 0xc0013083b0 gate 1574140963481013900 evaluation succeeds" +"2019-11-19 05:22:43.482 UTC [policies] Evaluate -> DEBU 1279 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:43.483 UTC [policies] Evaluate -> DEBU 127a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:43.483 UTC [policies] Evaluate -> DEBU 127b Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:43.483 UTC [policies] Evaluate -> DEBU 127c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:43.484 UTC [policies] Evaluate -> DEBU 127d Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:43.484 UTC [policies] Evaluate -> DEBU 127e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:43.484 UTC [common.deliver] deliverBlocks -> DEBU 127f [channel: businesschannel] Received seekInfo (0xc000d56e40) start: > stop: > from 172.18.0.5:51614" +"2019-11-19 05:22:43.485 UTC [fsblkstorage] Next -> DEBU 1280 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:43.486 UTC [fsblkstorage] newBlockfileStream -> DEBU 1281 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[81290]" +"2019-11-19 05:22:43.487 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1282 Remaining bytes=[7969], Going to peek [8] bytes" +"2019-11-19 05:22:43.487 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1283 Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81290], bytesOffset=[81292]}" +"2019-11-19 05:22:43.487 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1284 blockbytes [3982] read from file [0]" +"2019-11-19 05:22:43.487 UTC [common.deliver] deliverBlocks -> DEBU 1285 [channel: businesschannel] Delivering block for (0xc000d56e40) for 172.18.0.5:51614" +"2019-11-19 05:22:43.487 UTC [common.deliver] deliverBlocks -> DEBU 1286 [channel: businesschannel] Done delivering to 172.18.0.5:51614 for (0xc000d56e40)" +"2019-11-19 05:22:43.487 UTC [common.deliver] Handle -> DEBU 1287 Waiting for new SeekInfo from 172.18.0.5:51614" +"2019-11-19 05:22:43.487 UTC [common.deliver] Handle -> DEBU 1288 Attempting to read seek info message from 172.18.0.5:51614" +"2019-11-19 05:22:43.497 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1289 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:43.498 UTC [common.deliver] Handle -> WARN 128a Error reading from 172.18.0.5:51614: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:43.498 UTC [orderer.common.server] func1 -> DEBU 128b Closing Deliver stream" +"2019-11-19 05:22:43.498 UTC [comm.grpc.server] 1 -> INFO 128d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51614 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.8595ms +"2019-11-19 05:22:43.500 UTC [grpc] infof -> DEBU 128e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:43.498 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128c Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs" +"2019-11-19 05:22:43.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.4261ms " +"2019-11-19 05:22:43.694 UTC [orderer.common.server] Deliver -> DEBU 1290 Starting new Deliver handler" +"2019-11-19 05:22:43.694 UTC [common.deliver] Handle -> DEBU 1291 Starting new deliver loop for 172.18.0.5:51616" +"2019-11-19 05:22:43.694 UTC [common.deliver] Handle -> DEBU 1292 Attempting to read seek info message from 172.18.0.5:51616" +"2019-11-19 05:22:43.695 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:43.695 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.696 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:43.696 UTC [policies] Evaluate -> DEBU 1296 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.696 UTC [policies] Evaluate -> DEBU 1297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:43.696 UTC [cauthdsl] func1 -> DEBU 1298 0xc000a832d0 gate 1574140963696818900 evaluation starts" +"2019-11-19 05:22:43.697 UTC [cauthdsl] func2 -> DEBU 1299 0xc000a832d0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.697 UTC [cauthdsl] func2 -> DEBU 129a 0xc000a832d0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.697 UTC [cauthdsl] func2 -> DEBU 129b 0xc000a832d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:43.698 UTC [cauthdsl] func2 -> DEBU 129c 0xc000a832d0 principal evaluation fails" +"2019-11-19 05:22:43.698 UTC [cauthdsl] func1 -> DEBU 129d 0xc000a832d0 gate 1574140963696818900 evaluation fails" +"2019-11-19 05:22:43.698 UTC [policies] Evaluate -> DEBU 129e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:43.698 UTC [policies] Evaluate -> DEBU 129f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:43.699 UTC [policies] Evaluate -> DEBU 12a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:43.699 UTC [cauthdsl] func1 -> DEBU 12a1 0xc000a83b10 gate 1574140963699426200 evaluation starts" +"2019-11-19 05:22:43.699 UTC [cauthdsl] func2 -> DEBU 12a2 0xc000a83b10 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.699 UTC [cauthdsl] func2 -> DEBU 12a3 0xc000a83b10 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.700 UTC [cauthdsl] func2 -> DEBU 12a4 0xc000a83b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:43.700 UTC [cauthdsl] func2 -> DEBU 12a5 0xc000a83b10 principal evaluation fails" +"2019-11-19 05:22:43.701 UTC [cauthdsl] func1 -> DEBU 12a6 0xc000a83b10 gate 1574140963699426200 evaluation fails" +"2019-11-19 05:22:43.701 UTC [policies] Evaluate -> DEBU 12a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:43.701 UTC [policies] Evaluate -> DEBU 12a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:43.702 UTC [policies] func1 -> DEBU 12a9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:43.702 UTC [policies] Evaluate -> DEBU 12aa Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:43.702 UTC [policies] Evaluate -> DEBU 12ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:43.702 UTC [policies] Evaluate -> DEBU 12ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:43.703 UTC [policies] Evaluate -> DEBU 12ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:43.703 UTC [policies] Evaluate -> DEBU 12ae == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:43.703 UTC [cauthdsl] func1 -> DEBU 12af 0xc00125c810 gate 1574140963703568800 evaluation starts" +"2019-11-19 05:22:43.703 UTC [cauthdsl] func2 -> DEBU 12b0 0xc00125c810 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:43.703 UTC [cauthdsl] func2 -> DEBU 12b1 0xc00125c810 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:43.704 UTC [cauthdsl] func2 -> DEBU 12b2 0xc00125c810 principal matched by identity 0" +"2019-11-19 05:22:43.704 UTC [msp.identity] Verify -> DEBU 12b3 Verify: digest = 00000000 5b 7b aa 88 8b 8b 3f 5e 2f 8a 06 7b 41 f4 33 34 |[{....?^/..{A.34| +00000010 31 99 6e e8 5a 18 34 f6 2f f8 2d a5 af a4 c5 4c |1.n.Z.4./.-....L|" +"2019-11-19 05:22:43.704 UTC [msp.identity] Verify -> DEBU 12b4 Verify: sig = 00000000 30 44 02 20 68 6c 85 47 e9 53 7e 01 fc d2 65 2a |0D. hl.G.S~...e*| +00000010 ad b3 72 f5 9d 5a b1 68 18 7d 5d c5 a3 83 b9 a7 |..r..Z.h.}].....| +00000020 61 e8 89 2c 02 20 3f a7 34 7d 91 a4 0c 9a 0c bc |a..,. ?.4}......| +00000030 1f 84 66 1f 6d b5 be e1 45 6a 66 63 b1 ef e1 f2 |..f.m...Ejfc....| +00000040 47 aa 6c f3 49 91 |G.l.I.|" +"2019-11-19 05:22:43.705 UTC [cauthdsl] func2 -> DEBU 12b5 0xc00125c810 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:43.705 UTC [cauthdsl] func1 -> DEBU 12b6 0xc00125c810 gate 1574140963703568800 evaluation succeeds" +"2019-11-19 05:22:43.705 UTC [policies] Evaluate -> DEBU 12b7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12b9 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12bb Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:43.706 UTC [policies] Evaluate -> DEBU 12bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:43.707 UTC [common.deliver] deliverBlocks -> DEBU 12bd [channel: businesschannel] Received seekInfo (0xc00125a4c0) start: > stop: > from 172.18.0.5:51616" +"2019-11-19 05:22:43.707 UTC [fsblkstorage] Next -> DEBU 12be Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-11-19 05:22:43.707 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85274]" +"2019-11-19 05:22:43.707 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c0 Remaining bytes=[3985], Going to peek [8] bytes" +"2019-11-19 05:22:43.707 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c1 Returning blockbytes - length=[3983], placementInfo={fileNum=[0], startOffset=[85274], bytesOffset=[85276]}" +"2019-11-19 05:22:43.707 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c2 blockbytes [3983] read from file [0]" +"2019-11-19 05:22:43.708 UTC [common.deliver] deliverBlocks -> DEBU 12c3 [channel: businesschannel] Delivering block for (0xc00125a4c0) for 172.18.0.5:51616" +"2019-11-19 05:22:43.708 UTC [common.deliver] deliverBlocks -> DEBU 12c4 [channel: businesschannel] Done delivering to 172.18.0.5:51616 for (0xc00125a4c0)" +"2019-11-19 05:22:43.709 UTC [common.deliver] Handle -> DEBU 12c5 Waiting for new SeekInfo from 172.18.0.5:51616" +"2019-11-19 05:22:43.709 UTC [common.deliver] Handle -> DEBU 12c6 Attempting to read seek info message from 172.18.0.5:51616" +"2019-11-19 05:22:43.714 UTC [common.deliver] Handle -> WARN 12c7 Error reading from 172.18.0.5:51616: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:43.714 UTC [grpc] infof -> DEBU 12c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:43.715 UTC [orderer.common.server] func1 -> DEBU 12c9 Closing Deliver stream" +"2019-11-19 05:22:43.715 UTC [comm.grpc.server] 1 -> INFO 12ca streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51616 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.5087ms +"2019-11-19 05:22:43.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cb Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +"2019-11-19 05:22:43.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cc Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +"2019-11-19 05:22:43.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.5µs " +"2019-11-19 05:22:43.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0208ms " +"2019-11-19 05:22:43.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cf Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:43.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:43.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:43.995 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d2 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2019-11-19 05:22:43.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +"2019-11-19 05:22:44.019 UTC [orderer.common.server] Deliver -> DEBU 12d4 Starting new Deliver handler" +"2019-11-19 05:22:44.020 UTC [common.deliver] Handle -> DEBU 12d5 Starting new deliver loop for 172.18.0.5:51618" +"2019-11-19 05:22:44.021 UTC [common.deliver] Handle -> DEBU 12d6 Attempting to read seek info message from 172.18.0.5:51618" +"2019-11-19 05:22:44.022 UTC [policies] Evaluate -> DEBU 12d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:44.023 UTC [policies] Evaluate -> DEBU 12d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.023 UTC [policies] Evaluate -> DEBU 12d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:44.024 UTC [policies] Evaluate -> DEBU 12da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.024 UTC [policies] Evaluate -> DEBU 12db == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:44.024 UTC [msp] DeserializeIdentity -> DEBU 12dc Obtaining identity" +"2019-11-19 05:22:44.025 UTC [msp.identity] newIdentity -> DEBU 12dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:22:44.025 UTC [cauthdsl] func1 -> DEBU 12de 0xc001247450 gate 1574140964025684900 evaluation starts" +"2019-11-19 05:22:44.025 UTC [cauthdsl] func2 -> DEBU 12df 0xc001247450 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:44.025 UTC [cauthdsl] func2 -> DEBU 12e0 0xc001247450 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:44.026 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 12e1 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-11-19 05:22:44.026 UTC [msp] Validate -> DEBU 12e2 MSP OrdererMSP validating identity" +"2019-11-19 05:22:44.026 UTC [cauthdsl] func2 -> DEBU 12e3 0xc001247450 principal matched by identity 0" +"2019-11-19 05:22:44.026 UTC [msp.identity] Verify -> DEBU 12e4 Verify: digest = 00000000 25 0a 6f c7 6e 07 2a d9 5d 32 ea 85 0f 68 d0 e4 |%.o.n.*.]2...h..| +00000010 d0 bd 75 6e 85 0c d8 cc 54 11 7f f9 ad 9c 31 c2 |..un....T.....1.|" +"2019-11-19 05:22:44.027 UTC [msp.identity] Verify -> DEBU 12e5 Verify: sig = 00000000 30 44 02 20 26 c8 81 e5 0f 31 65 e4 36 33 30 e5 |0D. &....1e.630.| +00000010 ac 61 88 bc 16 e1 10 85 8a 9f ef c2 cb c4 d2 71 |.a.............q| +00000020 9b 12 c5 fb 02 20 08 2f b4 0f 9c 16 5d 80 fe 5b |..... ./....]..[| +00000030 15 73 3a 58 13 47 0b ff 1c c4 c9 65 6b 09 3e d9 |.s:X.G.....ek.>.| +00000040 85 3f 5c 3e 05 6f |.?\>.o|" +"2019-11-19 05:22:44.027 UTC [cauthdsl] func2 -> DEBU 12e6 0xc001247450 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:44.027 UTC [cauthdsl] func1 -> DEBU 12e7 0xc001247450 gate 1574140964025684900 evaluation succeeds" +"2019-11-19 05:22:44.027 UTC [policies] Evaluate -> DEBU 12e8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12ea Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12ec Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:44.028 UTC [policies] Evaluate -> DEBU 12ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:44.028 UTC [common.deliver] deliverBlocks -> DEBU 12ee [channel: testchainid] Received seekInfo (0xc00125ac40) start: > stop: > from 172.18.0.5:51618" +"2019-11-19 05:22:44.029 UTC [fsblkstorage] Next -> DEBU 12ef Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:44.029 UTC [fsblkstorage] newBlockfileStream -> DEBU 12f0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-11-19 05:22:44.029 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f1 Remaining bytes=[27692], Going to peek [8] bytes" +"2019-11-19 05:22:44.029 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f2 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-11-19 05:22:44.029 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f3 blockbytes [27689] read from file [0]" +"2019-11-19 05:22:44.029 UTC [common.deliver] deliverBlocks -> DEBU 12f4 [channel: testchainid] Delivering block for (0xc00125ac40) for 172.18.0.5:51618" +"2019-11-19 05:22:44.030 UTC [common.deliver] deliverBlocks -> DEBU 12f5 [channel: testchainid] Done delivering to 172.18.0.5:51618 for (0xc00125ac40)" +"2019-11-19 05:22:44.030 UTC [common.deliver] Handle -> DEBU 12f6 Waiting for new SeekInfo from 172.18.0.5:51618" +"2019-11-19 05:22:44.030 UTC [common.deliver] Handle -> DEBU 12f7 Attempting to read seek info message from 172.18.0.5:51618" +"2019-11-19 05:22:44.042 UTC [grpc] warningf -> DEBU 12f8 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.5:51618: read: connection reset by peer" +"2019-11-19 05:22:44.042 UTC [common.deliver] Handle -> WARN 12f9 Error reading from 172.18.0.5:51618: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:44.042 UTC [orderer.common.server] func1 -> DEBU 12fa Closing Deliver stream" +"2019-11-19 05:22:44.042 UTC [comm.grpc.server] 1 -> INFO 12fb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51618 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.2486ms +"2019-11-19 05:22:44.042 UTC [grpc] infof -> DEBU 12fc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:44.265 UTC [orderer.common.server] Deliver -> DEBU 12fd Starting new Deliver handler" +"2019-11-19 05:22:44.265 UTC [common.deliver] Handle -> DEBU 12fe Starting new deliver loop for 172.18.0.5:51620" +"2019-11-19 05:22:44.265 UTC [common.deliver] Handle -> DEBU 12ff Attempting to read seek info message from 172.18.0.5:51620" +"2019-11-19 05:22:44.265 UTC [policies] Evaluate -> DEBU 1300 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:44.266 UTC [policies] Evaluate -> DEBU 1301 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.266 UTC [policies] Evaluate -> DEBU 1302 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:44.266 UTC [policies] Evaluate -> DEBU 1303 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.266 UTC [policies] Evaluate -> DEBU 1304 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:44.266 UTC [cauthdsl] func1 -> DEBU 1305 0xc0011fe680 gate 1574140964266540400 evaluation starts" +"2019-11-19 05:22:44.266 UTC [cauthdsl] func2 -> DEBU 1306 0xc0011fe680 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:44.266 UTC [cauthdsl] func2 -> DEBU 1307 0xc0011fe680 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:44.266 UTC [cauthdsl] func2 -> DEBU 1308 0xc0011fe680 principal matched by identity 0" +"2019-11-19 05:22:44.267 UTC [msp.identity] Verify -> DEBU 1309 Verify: digest = 00000000 c5 22 73 be eb f6 3b 86 94 f4 f5 a4 27 3b e0 a6 |."s...;.....';..| +00000010 ae d1 dd 33 af 40 84 c6 18 47 d6 00 c0 c8 01 ed |...3.@...G......|" +"2019-11-19 05:22:44.267 UTC [msp.identity] Verify -> DEBU 130a Verify: sig = 00000000 30 45 02 21 00 ee 7d 24 80 69 61 99 15 d8 4d d3 |0E.!..}$.ia...M.| +00000010 b2 8b 0d 03 66 27 58 0d 73 d4 9e ac b3 9f e5 43 |....f'X.s......C| +00000020 cf 59 4b 21 d5 02 20 58 f5 8c 74 86 71 a3 bd 10 |.YK!.. X..t.q...| +00000030 30 cf 0b 5b 72 62 5b 0d d4 d6 fc 54 74 56 93 7e |0..[rb[....TtV.~| +00000040 75 a8 2e 0d 16 1d 7f |u......|" +"2019-11-19 05:22:44.268 UTC [cauthdsl] func2 -> DEBU 130b 0xc0011fe680 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:44.268 UTC [cauthdsl] func1 -> DEBU 130c 0xc0011fe680 gate 1574140964266540400 evaluation succeeds" +"2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 130d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 130e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 130f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 1310 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.268 UTC [policies] Evaluate -> DEBU 1311 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:44.269 UTC [policies] Evaluate -> DEBU 1312 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:44.269 UTC [common.deliver] deliverBlocks -> DEBU 1313 [channel: testchainid] Received seekInfo (0xc0012aaac0) start: > stop: > from 172.18.0.5:51620" +"2019-11-19 05:22:44.269 UTC [fsblkstorage] Next -> DEBU 1314 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:44.269 UTC [fsblkstorage] newBlockfileStream -> DEBU 1315 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-11-19 05:22:44.270 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1316 Remaining bytes=[27692], Going to peek [8] bytes" +"2019-11-19 05:22:44.270 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1317 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-11-19 05:22:44.270 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1318 blockbytes [27689] read from file [0]" +"2019-11-19 05:22:44.270 UTC [common.deliver] deliverBlocks -> DEBU 1319 [channel: testchainid] Delivering block for (0xc0012aaac0) for 172.18.0.5:51620" +"2019-11-19 05:22:44.270 UTC [common.deliver] deliverBlocks -> DEBU 131a [channel: testchainid] Done delivering to 172.18.0.5:51620 for (0xc0012aaac0)" +"2019-11-19 05:22:44.271 UTC [common.deliver] Handle -> DEBU 131b Waiting for new SeekInfo from 172.18.0.5:51620" +"2019-11-19 05:22:44.271 UTC [common.deliver] Handle -> DEBU 131c Attempting to read seek info message from 172.18.0.5:51620" +"2019-11-19 05:22:44.278 UTC [policies] Evaluate -> DEBU 131d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:44.278 UTC [policies] Evaluate -> DEBU 131e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.278 UTC [policies] Evaluate -> DEBU 131f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:44.279 UTC [policies] Evaluate -> DEBU 1320 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.279 UTC [policies] Evaluate -> DEBU 1321 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:44.279 UTC [cauthdsl] func1 -> DEBU 1322 0xc0011e2580 gate 1574140964279831800 evaluation starts" +"2019-11-19 05:22:44.280 UTC [cauthdsl] func2 -> DEBU 1323 0xc0011e2580 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:44.280 UTC [cauthdsl] func2 -> DEBU 1324 0xc0011e2580 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:44.282 UTC [cauthdsl] func2 -> DEBU 1325 0xc0011e2580 principal matched by identity 0" +"2019-11-19 05:22:44.284 UTC [msp.identity] Verify -> DEBU 1326 Verify: digest = 00000000 59 13 e0 e1 4e 0d 71 17 bc 1b 97 d4 fc 81 3f fb |Y...N.q.......?.| +00000010 e5 87 7f 8d 08 92 76 2d b7 92 7c d1 ab ad 3e 25 |......v-..|...>%|" +"2019-11-19 05:22:44.297 UTC [msp.identity] Verify -> DEBU 1327 Verify: sig = 00000000 30 45 02 21 00 f7 1f 1c bf 2e 2e 18 65 b0 cf c8 |0E.!........e...| +00000010 f9 23 c1 44 5f a4 10 2d 16 82 d0 58 c0 20 58 4b |.#.D_..-...X. XK| +00000020 62 13 4f 83 e2 02 20 06 19 81 1e c2 58 25 b2 25 |b.O... .....X%.%| +00000030 ec 6b 08 97 01 74 e1 40 a9 c4 29 17 33 9b 6e d5 |.k...t.@..).3.n.| +00000040 09 e2 35 5a a0 37 a9 |..5Z.7.|" +"2019-11-19 05:22:44.298 UTC [cauthdsl] func2 -> DEBU 1328 0xc0011e2580 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:44.298 UTC [cauthdsl] func1 -> DEBU 1329 0xc0011e2580 gate 1574140964279831800 evaluation succeeds" +"2019-11-19 05:22:44.298 UTC [policies] Evaluate -> DEBU 132a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.298 UTC [policies] Evaluate -> DEBU 132b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.298 UTC [policies] Evaluate -> DEBU 132c Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.299 UTC [policies] Evaluate -> DEBU 132d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.299 UTC [policies] Evaluate -> DEBU 132e Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:44.299 UTC [policies] Evaluate -> DEBU 132f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:44.299 UTC [common.deliver] deliverBlocks -> DEBU 1330 [channel: testchainid] Received seekInfo (0xc00125b180) start: > stop: > from 172.18.0.5:51620" +"2019-11-19 05:22:44.300 UTC [fsblkstorage] Next -> DEBU 1331 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:44.300 UTC [fsblkstorage] newBlockfileStream -> DEBU 1332 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:22:44.300 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1333 Remaining bytes=[47979], Going to peek [8] bytes" +"2019-11-19 05:22:44.300 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1334 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:22:44.301 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1335 blockbytes [20284] read from file [0]" +"2019-11-19 05:22:44.301 UTC [common.deliver] deliverBlocks -> DEBU 1336 [channel: testchainid] Delivering block for (0xc00125b180) for 172.18.0.5:51620" +"2019-11-19 05:22:44.301 UTC [common.deliver] deliverBlocks -> DEBU 1337 [channel: testchainid] Done delivering to 172.18.0.5:51620 for (0xc00125b180)" +"2019-11-19 05:22:44.302 UTC [common.deliver] Handle -> DEBU 1338 Waiting for new SeekInfo from 172.18.0.5:51620" +"2019-11-19 05:22:44.304 UTC [common.deliver] Handle -> DEBU 1339 Attempting to read seek info message from 172.18.0.5:51620" +"2019-11-19 05:22:44.309 UTC [common.deliver] Handle -> WARN 133a Error reading from 172.18.0.5:51620: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:44.310 UTC [orderer.common.server] func1 -> DEBU 133c Closing Deliver stream" +"2019-11-19 05:22:44.309 UTC [grpc] infof -> DEBU 133b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:44.310 UTC [comm.grpc.server] 1 -> INFO 133d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51620 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.2188ms +"2019-11-19 05:22:44.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133e Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +"2019-11-19 05:22:44.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133f Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2019-11-19 05:22:44.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1340 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.2µs " +"2019-11-19 05:22:44.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1341 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 170.4µs " +"2019-11-19 05:22:44.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1342 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:44.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1343 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:44.449 UTC [orderer.common.server] Deliver -> DEBU 1344 Starting new Deliver handler" +"2019-11-19 05:22:44.450 UTC [common.deliver] Handle -> DEBU 1345 Starting new deliver loop for 172.18.0.5:51622" +"2019-11-19 05:22:44.450 UTC [common.deliver] Handle -> DEBU 1346 Attempting to read seek info message from 172.18.0.5:51622" +"2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 1347 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 1348 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 1349 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 134a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.450 UTC [policies] Evaluate -> DEBU 134b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:44.450 UTC [cauthdsl] func1 -> DEBU 134c 0xc000fe7010 gate 1574140964450932400 evaluation starts" +"2019-11-19 05:22:44.450 UTC [cauthdsl] func2 -> DEBU 134d 0xc000fe7010 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:44.451 UTC [cauthdsl] func2 -> DEBU 134e 0xc000fe7010 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:44.451 UTC [cauthdsl] func2 -> DEBU 134f 0xc000fe7010 principal matched by identity 0" +"2019-11-19 05:22:44.451 UTC [msp.identity] Verify -> DEBU 1350 Verify: digest = 00000000 ea 18 52 e9 6a 9b ff b1 de 32 dc 96 46 38 db a0 |..R.j....2..F8..| +00000010 cb 55 52 0e 94 45 3c a4 23 0f 1b 8a ba 8c 95 c4 |.UR..E<.#.......|" +"2019-11-19 05:22:44.451 UTC [msp.identity] Verify -> DEBU 1351 Verify: sig = 00000000 30 44 02 20 1a 01 54 a7 e7 f2 ec 36 20 2b c2 a8 |0D. ..T....6 +..| +00000010 3f 88 0e 5a ef 7e 87 a6 d3 a2 1f 63 a9 a8 35 02 |?..Z.~.....c..5.| +00000020 c3 de fb cb 02 20 31 6a 8f 85 68 e6 38 87 9e a5 |..... 1j..h.8...| +00000030 2b dc 87 c4 28 00 10 89 61 1a 45 c0 6b 81 f7 74 |+...(...a.E.k..t| +00000040 b2 69 91 3f e5 b5 |.i.?..|" +"2019-11-19 05:22:44.451 UTC [cauthdsl] func2 -> DEBU 1352 0xc000fe7010 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:44.451 UTC [cauthdsl] func1 -> DEBU 1353 0xc000fe7010 gate 1574140964450932400 evaluation succeeds" +"2019-11-19 05:22:44.452 UTC [policies] Evaluate -> DEBU 1354 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.452 UTC [policies] Evaluate -> DEBU 1355 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.453 UTC [policies] Evaluate -> DEBU 1356 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.453 UTC [policies] Evaluate -> DEBU 1357 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.453 UTC [policies] Evaluate -> DEBU 1358 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:44.453 UTC [policies] Evaluate -> DEBU 1359 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:44.453 UTC [common.deliver] deliverBlocks -> DEBU 135a [channel: testchainid] Received seekInfo (0xc0012ab300) start: > stop: > from 172.18.0.5:51622" +"2019-11-19 05:22:44.454 UTC [fsblkstorage] Next -> DEBU 135b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:44.454 UTC [fsblkstorage] newBlockfileStream -> DEBU 135c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:22:44.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 135d Remaining bytes=[47979], Going to peek [8] bytes" +"2019-11-19 05:22:44.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 135e Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:22:44.454 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 135f blockbytes [20284] read from file [0]" +"2019-11-19 05:22:44.454 UTC [common.deliver] deliverBlocks -> DEBU 1360 [channel: testchainid] Delivering block for (0xc0012ab300) for 172.18.0.5:51622" +"2019-11-19 05:22:44.455 UTC [common.deliver] deliverBlocks -> DEBU 1361 [channel: testchainid] Done delivering to 172.18.0.5:51622 for (0xc0012ab300)" +"2019-11-19 05:22:44.455 UTC [common.deliver] Handle -> DEBU 1362 Waiting for new SeekInfo from 172.18.0.5:51622" +"2019-11-19 05:22:44.455 UTC [common.deliver] Handle -> DEBU 1363 Attempting to read seek info message from 172.18.0.5:51622" +"2019-11-19 05:22:44.462 UTC [common.deliver] Handle -> WARN 1364 Error reading from 172.18.0.5:51622: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:44.462 UTC [orderer.common.server] func1 -> DEBU 1365 Closing Deliver stream" +"2019-11-19 05:22:44.463 UTC [comm.grpc.server] 1 -> INFO 1366 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51622 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.3634ms +"2019-11-19 05:22:44.463 UTC [grpc] infof -> DEBU 1367 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:44.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1368 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:44.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1369 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2019-11-19 05:22:44.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +"2019-11-19 05:22:44.788 UTC [orderer.common.server] Deliver -> DEBU 136b Starting new Deliver handler" +"2019-11-19 05:22:44.788 UTC [common.deliver] Handle -> DEBU 136c Starting new deliver loop for 172.18.0.5:51624" +"2019-11-19 05:22:44.788 UTC [common.deliver] Handle -> DEBU 136d Attempting to read seek info message from 172.18.0.5:51624" +"2019-11-19 05:22:44.791 UTC [policies] Evaluate -> DEBU 136e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:44.791 UTC [policies] Evaluate -> DEBU 136f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.792 UTC [policies] Evaluate -> DEBU 1370 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:44.793 UTC [policies] Evaluate -> DEBU 1371 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:44.793 UTC [policies] Evaluate -> DEBU 1372 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:44.794 UTC [cauthdsl] func1 -> DEBU 1373 0xc0011d1a10 gate 1574140964794431200 evaluation starts" +"2019-11-19 05:22:44.794 UTC [cauthdsl] func2 -> DEBU 1374 0xc0011d1a10 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:44.795 UTC [cauthdsl] func2 -> DEBU 1375 0xc0011d1a10 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:44.796 UTC [cauthdsl] func2 -> DEBU 1376 0xc0011d1a10 principal matched by identity 0" +"2019-11-19 05:22:44.796 UTC [msp.identity] Verify -> DEBU 1377 Verify: digest = 00000000 29 b2 d7 78 15 1c 42 39 0e 63 41 8a 69 8b cb b7 |)..x..B9.cA.i...| +00000010 cf 75 ba b1 70 54 f0 0d 18 78 2b a3 e1 7b f2 d2 |.u..pT...x+..{..|" +"2019-11-19 05:22:44.797 UTC [msp.identity] Verify -> DEBU 1378 Verify: sig = 00000000 30 44 02 20 27 07 e3 24 f5 30 1d 09 3a 02 90 5f |0D. '..$.0..:.._| +00000010 88 bf cd b0 db 8b 3c 84 17 83 26 eb b9 eb 4a ea |......<...&...J.| +00000020 c3 af 8c 49 02 20 56 c0 01 df 29 32 33 47 4d a0 |...I. V...)23GM.| +00000030 fe 84 96 e1 ae ed ea d4 46 44 1b 36 4f a0 a5 d5 |........FD.6O...| +00000040 d4 24 2c 63 4f 6a |.$,cOj|" +"2019-11-19 05:22:44.797 UTC [cauthdsl] func2 -> DEBU 1379 0xc0011d1a10 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:44.797 UTC [cauthdsl] func1 -> DEBU 137a 0xc0011d1a10 gate 1574140964794431200 evaluation succeeds" +"2019-11-19 05:22:44.798 UTC [policies] Evaluate -> DEBU 137b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.798 UTC [policies] Evaluate -> DEBU 137c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:44.799 UTC [policies] Evaluate -> DEBU 137d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.799 UTC [policies] Evaluate -> DEBU 137e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:44.799 UTC [policies] Evaluate -> DEBU 137f Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:44.799 UTC [policies] Evaluate -> DEBU 1380 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:44.799 UTC [common.deliver] deliverBlocks -> DEBU 1381 [channel: testchainid] Received seekInfo (0xc00125b9c0) start: > stop: > from 172.18.0.5:51624" +"2019-11-19 05:22:44.799 UTC [fsblkstorage] Next -> DEBU 1382 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:44.799 UTC [fsblkstorage] newBlockfileStream -> DEBU 1383 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-11-19 05:22:44.800 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1384 Remaining bytes=[27692], Going to peek [8] bytes" +"2019-11-19 05:22:44.800 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1385 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-11-19 05:22:44.800 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1386 blockbytes [27689] read from file [0]" +"2019-11-19 05:22:44.800 UTC [common.deliver] deliverBlocks -> DEBU 1387 [channel: testchainid] Delivering block for (0xc00125b9c0) for 172.18.0.5:51624" +"2019-11-19 05:22:44.800 UTC [common.deliver] deliverBlocks -> DEBU 1388 [channel: testchainid] Done delivering to 172.18.0.5:51624 for (0xc00125b9c0)" +"2019-11-19 05:22:44.800 UTC [common.deliver] Handle -> DEBU 1389 Waiting for new SeekInfo from 172.18.0.5:51624" +"2019-11-19 05:22:44.800 UTC [common.deliver] Handle -> DEBU 138a Attempting to read seek info message from 172.18.0.5:51624" +"2019-11-19 05:22:44.807 UTC [grpc] infof -> DEBU 138b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:44.807 UTC [common.deliver] Handle -> WARN 138c Error reading from 172.18.0.5:51624: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:44.808 UTC [orderer.common.server] func1 -> DEBU 138d Closing Deliver stream" +"2019-11-19 05:22:44.810 UTC [comm.grpc.server] 1 -> INFO 138e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51624 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.5442ms +"2019-11-19 05:22:44.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 138f Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2019-11-19 05:22:44.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1390 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2019-11-19 05:22:44.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1391 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +"2019-11-19 05:22:44.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1392 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.8µs " +"2019-11-19 05:22:44.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1393 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:44.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1394 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:44.998 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1395 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:45.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1396 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2019-11-19 05:22:45.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1397 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.2µs " +"2019-11-19 05:22:45.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1398 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2019-11-19 05:22:45.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1399 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2019-11-19 05:22:45.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 139a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.1µs " +"2019-11-19 05:22:45.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 139b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203µs " +"2019-11-19 05:22:45.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:45.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:45.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:45.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139f Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2019-11-19 05:22:45.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.8µs " +"2019-11-19 05:22:45.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a1 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-11-19 05:22:45.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +"2019-11-19 05:22:45.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +"2019-11-19 05:22:45.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.4µs " +"2019-11-19 05:22:45.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:45.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:45.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:45.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a8 Sending msg of 28 bytes to 3 on channel testchainid took 45.7µs" +"2019-11-19 05:22:45.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.7µs " +"2019-11-19 05:22:46.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13aa Sending msg of 28 bytes to 3 on channel businesschannel took 45.5µs" +"2019-11-19 05:22:46.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ab Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +"2019-11-19 05:22:46.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.3µs " +"2019-11-19 05:22:46.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.6µs " +"2019-11-19 05:22:46.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ae Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:46.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13af Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:46.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:46.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b1 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-11-19 05:22:46.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58µs " +"2019-11-19 05:22:46.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2019-11-19 05:22:46.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b4 Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +"2019-11-19 05:22:46.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " +"2019-11-19 05:22:46.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.3µs " +"2019-11-19 05:22:46.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:46.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:46.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:46.992 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ba Sending msg of 28 bytes to 3 on channel testchainid took 10.7µs" +"2019-11-19 05:22:46.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13bb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.1µs " +"2019-11-19 05:22:47.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bc Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +"2019-11-19 05:22:47.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bd Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2019-11-19 05:22:47.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.5µs " +"2019-11-19 05:22:47.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.7µs " +"2019-11-19 05:22:47.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:47.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:47.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:47.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c3 Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +"2019-11-19 05:22:47.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.5µs " +"2019-11-19 05:22:47.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c5 Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +"2019-11-19 05:22:47.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c6 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +"2019-11-19 05:22:47.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.6µs " +"2019-11-19 05:22:47.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192.7µs " +"2019-11-19 05:22:47.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c9 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:47.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ca Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:47.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13cb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:47.992 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cc Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-11-19 05:22:47.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +"2019-11-19 05:22:48.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ce Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" +"2019-11-19 05:22:48.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cf Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-11-19 05:22:48.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.7µs " +"2019-11-19 05:22:48.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +"2019-11-19 05:22:48.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:48.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:48.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:48.495 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.9µs " +"2019-11-19 05:22:48.497 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d6 Sending msg of 28 bytes to 3 on channel testchainid took 177.8µs" +"2019-11-19 05:22:48.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d7 Sending msg of 28 bytes to 2 on channel businesschannel took 36.9µs" +"2019-11-19 05:22:48.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d8 Sending msg of 28 bytes to 3 on channel businesschannel took 27.1µs" +"2019-11-19 05:22:48.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.3µs " +"2019-11-19 05:22:48.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.7µs " +"2019-11-19 05:22:48.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dc Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:48.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13db Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:49.016 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:49.016 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13de Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +"2019-11-19 05:22:49.016 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.4µs " +"2019-11-19 05:22:49.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e0 Sending msg of 28 bytes to 2 on channel businesschannel took 34.3µs" +"2019-11-19 05:22:49.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e1 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +"2019-11-19 05:22:49.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.2µs " +"2019-11-19 05:22:49.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.9µs " +"2019-11-19 05:22:49.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:49.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e5 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:49.497 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:49.498 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e7 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +"2019-11-19 05:22:49.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.6µs " +"2019-11-19 05:22:49.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e9 Sending msg of 28 bytes to 3 on channel businesschannel took 44µs" +"2019-11-19 05:22:49.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ea Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +"2019-11-19 05:22:49.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " +"2019-11-19 05:22:49.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.2µs " +"2019-11-19 05:22:49.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ed Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:49.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ee Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:49.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ef Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:49.995 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f0 Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" +"2019-11-19 05:22:49.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.4µs " +"2019-11-19 05:22:50.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f2 Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +"2019-11-19 05:22:50.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f4 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2019-11-19 05:22:50.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.5µs " +"2019-11-19 05:22:50.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.3µs " +"2019-11-19 05:22:50.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:50.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f7 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:50.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:50.495 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f9 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2019-11-19 05:22:50.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.7µs " +"2019-11-19 05:22:50.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fb Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2019-11-19 05:22:50.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fc Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-11-19 05:22:50.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.1µs " +"2019-11-19 05:22:50.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.4µs " +"2019-11-19 05:22:50.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ff Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:50.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1400 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:50.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1401 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:50.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1402 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +"2019-11-19 05:22:50.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1403 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.5µs " +"2019-11-19 05:22:51.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1404 Sending msg of 28 bytes to 2 on channel businesschannel took 29.4µs" +"2019-11-19 05:22:51.366 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1406 Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs" +"2019-11-19 05:22:51.367 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1407 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.8µs " +"2019-11-19 05:22:51.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1405 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.6µs " +"2019-11-19 05:22:51.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1408 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:51.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1409 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:51.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:51.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140b Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +"2019-11-19 05:22:51.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +"2019-11-19 05:22:51.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140d Sending msg of 28 bytes to 2 on channel businesschannel took 69.4µs" +"2019-11-19 05:22:51.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140e Sending msg of 28 bytes to 3 on channel businesschannel took 109.2µs" +"2019-11-19 05:22:51.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.1µs " +"2019-11-19 05:22:51.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1410 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.4µs " +"2019-11-19 05:22:51.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1411 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:51.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1412 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:51.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1413 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:51.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1414 Sending msg of 28 bytes to 3 on channel testchainid took 8.6µs" +"2019-11-19 05:22:51.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1415 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 533µs " +"2019-11-19 05:22:52.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1416 Sending msg of 28 bytes to 3 on channel businesschannel took 27.4µs" +"2019-11-19 05:22:52.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1417 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2019-11-19 05:22:52.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1418 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.2µs " +"2019-11-19 05:22:52.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1419 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +"2019-11-19 05:22:52.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:52.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141b Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:52.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:52.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141d Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +"2019-11-19 05:22:52.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " +"2019-11-19 05:22:52.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2019-11-19 05:22:52.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1420 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2019-11-19 05:22:52.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1421 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.5µs " +"2019-11-19 05:22:52.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1422 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.8µs " +"2019-11-19 05:22:52.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1423 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:52.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1424 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:52.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1425 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:52.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1426 Sending msg of 28 bytes to 3 on channel testchainid took 37µs" +"2019-11-19 05:22:52.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1427 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 250.9µs " +"2019-11-19 05:22:53.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1428 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.5µs " +"2019-11-19 05:22:53.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1429 Sending msg of 28 bytes to 2 on channel businesschannel took 33.8µs" +"2019-11-19 05:22:53.369 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142a Sending msg of 28 bytes to 3 on channel businesschannel took 30.4µs" +"2019-11-19 05:22:53.369 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +"2019-11-19 05:22:53.376 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:53.376 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:53.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:53.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142f Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2019-11-19 05:22:53.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1430 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.7µs " +"2019-11-19 05:22:53.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1431 Sending msg of 28 bytes to 2 on channel businesschannel took 98.2µs" +"2019-11-19 05:22:53.869 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1434 Sending msg of 28 bytes to 3 on channel businesschannel took 426.1µs" +"2019-11-19 05:22:53.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1432 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.5µs " +"2019-11-19 05:22:53.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1433 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:53.872 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1435 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.3µs " +"2019-11-19 05:22:53.873 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1436 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:53.925 UTC [orderer.common.server] Deliver -> DEBU 1437 Starting new Deliver handler" +"2019-11-19 05:22:53.926 UTC [common.deliver] Handle -> DEBU 1438 Starting new deliver loop for 172.18.0.5:51626" +"2019-11-19 05:22:53.926 UTC [common.deliver] Handle -> DEBU 1439 Attempting to read seek info message from 172.18.0.5:51626" +"2019-11-19 05:22:53.940 UTC [orderer.common.server] Broadcast -> DEBU 143a Starting new Broadcast handler" +"2019-11-19 05:22:53.940 UTC [orderer.common.broadcast] Handle -> DEBU 143b Starting new broadcast loop for 172.18.0.5:51628" +"2019-11-19 05:22:53.941 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 143c [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:51628" +"2019-11-19 05:22:53.942 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 143d Processing config update message for exisitng channel businesschannel" +"2019-11-19 05:22:53.942 UTC [policies] Evaluate -> DEBU 143e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:22:53.943 UTC [policies] Evaluate -> DEBU 143f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:53.943 UTC [policies] Evaluate -> DEBU 1440 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:22:53.943 UTC [policies] Evaluate -> DEBU 1441 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:53.943 UTC [policies] Evaluate -> DEBU 1442 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-11-19 05:22:53.943 UTC [cauthdsl] func1 -> DEBU 1443 0xc00024cdb0 gate 1574140973943453700 evaluation starts" +"2019-11-19 05:22:53.943 UTC [cauthdsl] func2 -> DEBU 1444 0xc00024cdb0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:53.943 UTC [cauthdsl] func2 -> DEBU 1445 0xc00024cdb0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:53.943 UTC [cauthdsl] func2 -> DEBU 1446 0xc00024cdb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-11-19 05:22:53.943 UTC [cauthdsl] func2 -> DEBU 1447 0xc00024cdb0 principal evaluation fails" +"2019-11-19 05:22:53.943 UTC [cauthdsl] func1 -> DEBU 1448 0xc00024cdb0 gate 1574140973943453700 evaluation fails" +"2019-11-19 05:22:53.944 UTC [policies] Evaluate -> DEBU 1449 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:53.944 UTC [policies] Evaluate -> DEBU 144a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:53.944 UTC [policies] Evaluate -> DEBU 144b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-11-19 05:22:53.944 UTC [cauthdsl] func1 -> DEBU 144c 0xc00024d740 gate 1574140973944298600 evaluation starts" +"2019-11-19 05:22:53.944 UTC [cauthdsl] func2 -> DEBU 144d 0xc00024d740 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:53.944 UTC [cauthdsl] func2 -> DEBU 144e 0xc00024d740 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:53.944 UTC [cauthdsl] func2 -> DEBU 144f 0xc00024d740 principal matched by identity 0" +"2019-11-19 05:22:53.944 UTC [msp.identity] Verify -> DEBU 1450 Verify: digest = 00000000 61 40 0c 25 40 2d 90 6d 19 c0 0b 83 e7 a4 59 1f |a@.%@-.m......Y.| +00000010 fc 71 90 a7 f5 e4 dc 78 6f 90 8d 04 67 26 10 02 |.q.....xo...g&..|" +"2019-11-19 05:22:53.944 UTC [msp.identity] Verify -> DEBU 1451 Verify: sig = 00000000 30 45 02 21 00 93 0c 4b a4 23 73 34 d3 a9 2f ea |0E.!...K.#s4../.| +00000010 e6 52 07 1e fd 49 e2 bc e4 e9 30 7b a0 a2 c4 89 |.R...I....0{....| +00000020 44 8f 13 ef 5d 02 20 03 5e 66 a7 fa a7 90 fc 6c |D...]. .^f.....l| +00000030 ce 0c bd df 63 de bd bc 16 81 03 40 11 64 49 3e |....c......@.dI>| +00000040 93 01 d3 49 f2 4b b3 |...I.K.|" +"2019-11-19 05:22:53.945 UTC [cauthdsl] func2 -> DEBU 1452 0xc00024d740 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:53.945 UTC [cauthdsl] func1 -> DEBU 1453 0xc00024d740 gate 1574140973944298600 evaluation succeeds" +"2019-11-19 05:22:53.945 UTC [policies] Evaluate -> DEBU 1454 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:53.945 UTC [policies] Evaluate -> DEBU 1455 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:53.945 UTC [policies] Evaluate -> DEBU 1456 Signature set satisfies policy /Channel/Application/Writers" +"2019-11-19 05:22:53.946 UTC [policies] Evaluate -> DEBU 1457 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:22:53.946 UTC [policies] Evaluate -> DEBU 1458 Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:22:53.947 UTC [policies] Evaluate -> DEBU 1459 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:22:53.947 UTC [common.configtx] addToMap -> DEBU 145a Adding to config map: [Group] /Channel" +"2019-11-19 05:22:53.948 UTC [common.configtx] addToMap -> DEBU 145b Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:22:53.948 UTC [common.configtx] addToMap -> DEBU 145c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:22:53.948 UTC [common.configtx] addToMap -> DEBU 145d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:22:53.949 UTC [common.configtx] addToMap -> DEBU 145e Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:22:53.949 UTC [common.configtx] addToMap -> DEBU 145f Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:22:53.949 UTC [common.configtx] addToMap -> DEBU 1460 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:22:53.949 UTC [common.configtx] addToMap -> DEBU 1461 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1462 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1463 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1464 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1465 Adding to config map: [Group] /Channel" +"2019-11-19 05:22:53.950 UTC [common.configtx] addToMap -> DEBU 1466 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:22:53.951 UTC [common.configtx] addToMap -> DEBU 1467 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:22:53.951 UTC [common.configtx] addToMap -> DEBU 1468 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:22:53.951 UTC [common.configtx] addToMap -> DEBU 1469 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-11-19 05:22:53.951 UTC [common.configtx] addToMap -> DEBU 146a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-11-19 05:22:53.952 UTC [common.configtx] addToMap -> DEBU 146b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-11-19 05:22:53.952 UTC [common.configtx] addToMap -> DEBU 146c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:53.952 UTC [common.configtx] addToMap -> DEBU 146d Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-11-19 05:22:53.952 UTC [common.configtx] addToMap -> DEBU 146e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-11-19 05:22:53.953 UTC [common.configtx] addToMap -> DEBU 146f Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:22:53.953 UTC [common.configtx] addToMap -> DEBU 1470 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:22:53.953 UTC [common.configtx] addToMap -> DEBU 1471 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:22:53.954 UTC [common.configtx] addToMap -> DEBU 1472 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:22:53.954 UTC [common.configtx] addToMap -> DEBU 1473 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:22:53.954 UTC [common.configtx] addToMap -> DEBU 1474 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:22:53.954 UTC [common.configtx] addToMap -> DEBU 1475 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:22:53.954 UTC [common.configtx] verifyDeltaSet -> DEBU 1476 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 1477 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 1478 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 1479 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 147a Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:53.955 UTC [common.configtx] verifyDeltaSet -> DEBU 147b Processing change to key: [Group] /Channel/Application" +"2019-11-19 05:22:53.956 UTC [common.configtx] policyForItem -> DEBU 147c Getting policy for item Application with mod_policy Admins" +"2019-11-19 05:22:53.956 UTC [policies] Manager -> DEBU 147d Manager Channel looking up path []" +"2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 147e Manager Channel has managers Application" +"2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 147f Manager Channel has managers Orderer" +"2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1480 Manager Channel looking up path [Application]" +"2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1481 Manager Channel has managers Application" +"2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1482 Manager Channel has managers Orderer" +"2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1483 Manager Channel/Application looking up path []" +"2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1484 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:22:53.957 UTC [policies] Manager -> DEBU 1485 Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:22:53.957 UTC [policies] Evaluate -> DEBU 1486 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-11-19 05:22:53.957 UTC [policies] Evaluate -> DEBU 1487 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:53.957 UTC [policies] Evaluate -> DEBU 1488 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-11-19 05:22:53.957 UTC [cauthdsl] deduplicate -> WARN 1489 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-11-19 05:22:53.957 UTC [cauthdsl] func1 -> DEBU 148a 0xc000c482d0 gate 1574140973957724600 evaluation starts" +"2019-11-19 05:22:53.957 UTC [cauthdsl] func2 -> DEBU 148b 0xc000c482d0 signed by 0 principal evaluation starts (used [false false false])" +"2019-11-19 05:22:53.957 UTC [cauthdsl] func2 -> DEBU 148c 0xc000c482d0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:53.957 UTC [cauthdsl] func2 -> DEBU 148d 0xc000c482d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-11-19 05:22:53.957 UTC [cauthdsl] func2 -> DEBU 148e 0xc000c482d0 processing identity 1 with bytes of fd6070" +"2019-11-19 05:22:53.957 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 148f Checking if identity has been named explicitly as an admin for Org2MSP" +"2019-11-19 05:22:53.957 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1490 Checking if identity carries the admin ou for Org2MSP" +"2019-11-19 05:22:53.957 UTC [msp] Validate -> DEBU 1491 MSP Org2MSP validating identity" +"2019-11-19 05:22:53.958 UTC [msp] getCertificationChain -> DEBU 1492 MSP Org2MSP getting certification chain" +"2019-11-19 05:22:53.958 UTC [msp] hasOURole -> DEBU 1493 MSP Org2MSP checking if the identity is a client" +"2019-11-19 05:22:53.958 UTC [msp] getCertificationChain -> DEBU 1494 MSP Org2MSP getting certification chain" +"2019-11-19 05:22:53.958 UTC [cauthdsl] func2 -> DEBU 1495 0xc000c482d0 principal matched by identity 1" +"2019-11-19 05:22:53.958 UTC [msp.identity] Verify -> DEBU 1496 Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...|" +"2019-11-19 05:22:53.958 UTC [msp.identity] Verify -> DEBU 1497 Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +00000040 46 bf 84 1c 8c 35 |F....5|" +"2019-11-19 05:22:53.958 UTC [cauthdsl] func2 -> DEBU 1498 0xc000c482d0 principal evaluation succeeds for identity 1" +"2019-11-19 05:22:53.958 UTC [cauthdsl] func1 -> DEBU 1499 0xc000c482d0 gate 1574140973957724600 evaluation succeeds" +"2019-11-19 05:22:53.958 UTC [policies] Evaluate -> DEBU 149a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:22:53.958 UTC [policies] Evaluate -> DEBU 149b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:22:53.958 UTC [policies] Evaluate -> DEBU 149c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-11-19 05:22:53.958 UTC [cauthdsl] deduplicate -> WARN 149d De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-11-19 05:22:53.958 UTC [cauthdsl] func1 -> DEBU 149e 0xc000c48c00 gate 1574140973958630200 evaluation starts" +"2019-11-19 05:22:53.958 UTC [cauthdsl] func2 -> DEBU 149f 0xc000c48c00 signed by 0 principal evaluation starts (used [false false false])" +"2019-11-19 05:22:53.958 UTC [cauthdsl] func2 -> DEBU 14a0 0xc000c48c00 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:53.958 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 14a1 Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-11-19 05:22:53.958 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 14a2 Checking if identity carries the admin ou for Org1MSP" +"2019-11-19 05:22:53.958 UTC [msp] Validate -> DEBU 14a3 MSP Org1MSP validating identity" +"2019-11-19 05:22:53.958 UTC [msp] getCertificationChain -> DEBU 14a4 MSP Org1MSP getting certification chain" +"2019-11-19 05:22:53.959 UTC [msp] hasOURole -> DEBU 14a5 MSP Org1MSP checking if the identity is a client" +"2019-11-19 05:22:53.959 UTC [msp] getCertificationChain -> DEBU 14a6 MSP Org1MSP getting certification chain" +"2019-11-19 05:22:53.959 UTC [cauthdsl] func2 -> DEBU 14a7 0xc000c48c00 principal matched by identity 0" +"2019-11-19 05:22:53.959 UTC [msp.identity] Verify -> DEBU 14a8 Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR|" +"2019-11-19 05:22:53.959 UTC [msp.identity] Verify -> DEBU 14a9 Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +00000040 28 40 4c 89 f5 38 |(@L..8|" +"2019-11-19 05:22:53.959 UTC [cauthdsl] func2 -> DEBU 14aa 0xc000c48c00 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:53.959 UTC [cauthdsl] func1 -> DEBU 14ab 0xc000c48c00 gate 1574140973958630200 evaluation succeeds" +"2019-11-19 05:22:53.959 UTC [policies] Evaluate -> DEBU 14ac Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:22:53.959 UTC [policies] Evaluate -> DEBU 14ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:22:53.960 UTC [policies] Evaluate -> DEBU 14ae Signature set satisfies policy /Channel/Application/Admins" +"2019-11-19 05:22:53.960 UTC [policies] Evaluate -> DEBU 14af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-11-19 05:22:53.960 UTC [common.configtx] verifyDeltaSet -> DEBU 14b0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-11-19 05:22:53.960 UTC [common.configtx] recurseConfigMap -> DEBU 14b1 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.961 UTC [common.configtx] recurseConfigMap -> DEBU 14b2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.961 UTC [common.configtx] recurseConfigMap -> DEBU 14b3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.962 UTC [common.configtx] recurseConfigMap -> DEBU 14b4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.962 UTC [common.configtx] recurseConfigMap -> DEBU 14b5 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.962 UTC [common.configtx] recurseConfigMap -> DEBU 14b6 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.963 UTC [common.configtx] recurseConfigMap -> DEBU 14b7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.963 UTC [common.configtx] recurseConfigMap -> DEBU 14b8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.964 UTC [common.configtx] recurseConfigMap -> DEBU 14b9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.965 UTC [common.configtx] recurseConfigMap -> DEBU 14ba Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.965 UTC [common.configtx] recurseConfigMap -> DEBU 14bb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.965 UTC [common.configtx] recurseConfigMap -> DEBU 14bc Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.966 UTC [common.configtx] recurseConfigMap -> DEBU 14bd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.966 UTC [common.configtx] recurseConfigMap -> DEBU 14be Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.967 UTC [common.configtx] recurseConfigMap -> DEBU 14bf Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.967 UTC [common.configtx] recurseConfigMap -> DEBU 14c0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.967 UTC [common.configtx] recurseConfigMap -> DEBU 14c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.967 UTC [common.configtx] recurseConfigMap -> DEBU 14c2 Setting policy for key Admins to " +"2019-11-19 05:22:53.968 UTC [common.configtx] recurseConfigMap -> DEBU 14c3 Setting policy for key Endorsement to " +"2019-11-19 05:22:53.968 UTC [common.configtx] recurseConfigMap -> DEBU 14c4 Setting policy for key LifecycleEndorsement to " +"2019-11-19 05:22:53.968 UTC [common.configtx] recurseConfigMap -> DEBU 14c5 Setting policy for key Readers to " +"2019-11-19 05:22:53.968 UTC [common.configtx] recurseConfigMap -> DEBU 14c6 Setting policy for key Writers to " +"2019-11-19 05:22:53.969 UTC [common.configtx] recurseConfigMap -> DEBU 14c7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.969 UTC [common.configtx] recurseConfigMap -> DEBU 14c8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.969 UTC [common.configtx] recurseConfigMap -> DEBU 14c9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:53.969 UTC [common.channelconfig] NewStandardValues -> DEBU 14ca Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:22:53.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14cb Processing field: HashingAlgorithm" +"2019-11-19 05:22:53.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14cc Processing field: BlockDataHashingStructure" +"2019-11-19 05:22:53.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14cd Processing field: OrdererAddresses" +"2019-11-19 05:22:53.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14ce Processing field: Consortium" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14cf Processing field: Capabilities" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] NewStandardValues -> DEBU 14d0 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d1 Processing field: ConsensusType" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d2 Processing field: BatchSize" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d3 Processing field: BatchTimeout" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d4 Processing field: KafkaBrokers" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d5 Processing field: ChannelRestrictions" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d6 Processing field: Capabilities" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] NewStandardValues -> DEBU 14d7 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14d8 Processing field: Endpoints" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] NewStandardValues -> DEBU 14d9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14da Processing field: MSP" +"2019-11-19 05:22:53.971 UTC [common.channelconfig] validateMSP -> DEBU 14db Setting up MSP for org OrdererOrg" +"2019-11-19 05:22:53.971 UTC [msp] newBccspMsp -> DEBU 14dc Creating BCCSP-based MSP instance" +"2019-11-19 05:22:53.971 UTC [msp] New -> DEBU 14dd Creating Cache-MSP instance" +"2019-11-19 05:22:53.971 UTC [msp] Setup -> DEBU 14de Setting up MSP instance OrdererMSP" +"2019-11-19 05:22:53.971 UTC [msp.identity] newIdentity -> DEBU 14df Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:22:53.971 UTC [msp.identity] newIdentity -> DEBU 14e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:22:53.972 UTC [msp] Validate -> DEBU 14e1 MSP OrdererMSP validating identity" +"2019-11-19 05:22:53.972 UTC [common.channelconfig] NewStandardValues -> DEBU 14e2 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:22:53.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e3 Processing field: ACLs" +"2019-11-19 05:22:53.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e4 Processing field: Capabilities" +"2019-11-19 05:22:53.972 UTC [common.channelconfig] NewStandardValues -> DEBU 14e5 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:53.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e6 Processing field: AnchorPeers" +"2019-11-19 05:22:53.972 UTC [common.channelconfig] NewStandardValues -> DEBU 14e7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:53.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14e8 Processing field: MSP" +"2019-11-19 05:22:53.972 UTC [common.channelconfig] Validate -> DEBU 14e9 Anchor peers for org Org3MSP are " +"2019-11-19 05:22:53.972 UTC [common.channelconfig] validateMSP -> DEBU 14ea Setting up MSP for org Org3MSP" +"2019-11-19 05:22:53.972 UTC [msp] newBccspMsp -> DEBU 14eb Creating BCCSP-based MSP instance" +"2019-11-19 05:22:53.973 UTC [msp] New -> DEBU 14ec Creating Cache-MSP instance" +"2019-11-19 05:22:53.973 UTC [msp] Setup -> DEBU 14ed Setting up MSP instance Org3MSP" +"2019-11-19 05:22:53.973 UTC [msp.identity] newIdentity -> DEBU 14ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE-----" +"2019-11-19 05:22:53.974 UTC [common.channelconfig] NewStandardValues -> DEBU 14ef Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:53.974 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14f0 Processing field: AnchorPeers" +"2019-11-19 05:22:53.974 UTC [common.channelconfig] NewStandardValues -> DEBU 14f1 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:53.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14f2 Processing field: MSP" +"2019-11-19 05:22:53.975 UTC [common.channelconfig] Validate -> DEBU 14f3 Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:22:53.975 UTC [common.channelconfig] validateMSP -> DEBU 14f4 Setting up MSP for org Org1MSP" +"2019-11-19 05:22:53.975 UTC [msp] newBccspMsp -> DEBU 14f5 Creating BCCSP-based MSP instance" +"2019-11-19 05:22:53.976 UTC [msp] New -> DEBU 14f6 Creating Cache-MSP instance" +"2019-11-19 05:22:53.976 UTC [msp] Setup -> DEBU 14f7 Setting up MSP instance Org1MSP" +"2019-11-19 05:22:53.976 UTC [msp.identity] newIdentity -> DEBU 14f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:22:53.977 UTC [common.channelconfig] NewStandardValues -> DEBU 14f9 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:53.977 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14fa Processing field: AnchorPeers" +"2019-11-19 05:22:53.977 UTC [common.channelconfig] NewStandardValues -> DEBU 14fb Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:53.978 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14fc Processing field: MSP" +"2019-11-19 05:22:53.978 UTC [common.channelconfig] Validate -> DEBU 14fd Anchor peers for org Org2MSP are anchor_peers: " +"2019-11-19 05:22:53.978 UTC [common.channelconfig] validateMSP -> DEBU 14fe Setting up MSP for org Org2MSP" +"2019-11-19 05:22:53.978 UTC [msp] newBccspMsp -> DEBU 14ff Creating BCCSP-based MSP instance" +"2019-11-19 05:22:53.979 UTC [msp] New -> DEBU 1500 Creating Cache-MSP instance" +"2019-11-19 05:22:53.979 UTC [msp] Setup -> DEBU 1501 Setting up MSP instance Org2MSP" +"2019-11-19 05:22:53.979 UTC [msp.identity] newIdentity -> DEBU 1502 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:22:53.980 UTC [msp] Setup -> DEBU 1503 Setting up the MSP manager (4 msps)" +"2019-11-19 05:22:53.980 UTC [msp] Setup -> DEBU 1504 MSP manager setup complete, setup 4 msps" +"2019-11-19 05:22:53.980 UTC [policies] NewManagerImpl -> DEBU 1505 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-11-19 05:22:53.981 UTC [policies] NewManagerImpl -> DEBU 1506 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-11-19 05:22:53.981 UTC [policies] NewManagerImpl -> DEBU 1507 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-11-19 05:22:53.981 UTC [policies] NewManagerImpl -> DEBU 1508 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-11-19 05:22:53.981 UTC [policies] NewManagerImpl -> DEBU 1509 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:22:53.982 UTC [policies] NewManagerImpl -> DEBU 150a Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:22:53.982 UTC [policies] NewManagerImpl -> DEBU 150b Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:22:53.982 UTC [policies] NewManagerImpl -> DEBU 150c Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:22:53.983 UTC [policies] NewManagerImpl -> DEBU 150d Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:22:53.983 UTC [policies] NewManagerImpl -> DEBU 150e Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:22:53.983 UTC [policies] NewManagerImpl -> DEBU 150f Proposed new policy Admins for Channel/Application" +"2019-11-19 05:22:53.983 UTC [policies] GetPolicy -> DEBU 1510 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:22:53.983 UTC [policies] GetPolicy -> DEBU 1511 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:22:53.983 UTC [policies] NewManagerImpl -> DEBU 1512 Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:22:53.983 UTC [policies] GetPolicy -> DEBU 1513 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:22:53.984 UTC [policies] GetPolicy -> DEBU 1514 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1515 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1516 Proposed new policy Readers for Channel/Application" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1517 Proposed new policy Writers for Channel/Application" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1518 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1519 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151b Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151c Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151d Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151e Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 151f Proposed new policy Writers for Channel" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1520 Proposed new policy Admins for Channel" +"2019-11-19 05:22:53.984 UTC [policies] NewManagerImpl -> DEBU 1521 Proposed new policy Readers for Channel" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1522 Adding to config map: [Group] /Channel" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1523 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1524 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1525 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1526 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1527 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1528 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 1529 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:22:53.984 UTC [common.configtx] addToMap -> DEBU 152a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152b Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152d Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152e Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 152f Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1530 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1531 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1532 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1533 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1534 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1535 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1536 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1537 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1538 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1539 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153b Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 153f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1540 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1541 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1542 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1543 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1544 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1545 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1546 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1547 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1548 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 1549 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 154a Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 154b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 154c Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:22:53.985 UTC [common.configtx] addToMap -> DEBU 154d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 154e Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 154f Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 1550 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 1551 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 1552 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:22:53.986 UTC [common.configtx] addToMap -> DEBU 1553 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1554 As expected, current configuration has policy '/Channel/Readers'" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1555 As expected, current configuration has policy '/Channel/Writers'" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1556 Manager Channel looking up path [Application]" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1557 Manager Channel has managers Application" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1558 Manager Channel has managers Orderer" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1559 Manager Channel/Application looking up path []" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 155a Manager Channel/Application has managers Org3MSP" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 155b Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 155c Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 155d As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 155e As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 155f As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1560 Manager Channel looking up path [Orderer]" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1561 Manager Channel has managers Application" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1562 Manager Channel has managers Orderer" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1563 Manager Channel/Orderer looking up path []" +"2019-11-19 05:22:53.986 UTC [policies] Manager -> DEBU 1564 Manager Channel/Orderer has managers OrdererOrg" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1565 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1566 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1567 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-11-19 05:22:53.986 UTC [common.channelconfig] LogSanityChecks -> DEBU 1568 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-11-19 05:22:53.986 UTC [common.capabilities] Supported -> DEBU 1569 Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:22:53.986 UTC [common.capabilities] Supported -> DEBU 156a Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:22:53.986 UTC [msp] GetDefaultSigningIdentity -> DEBU 156b Obtaining default signing identity" +"2019-11-19 05:22:53.986 UTC [msp] GetDefaultSigningIdentity -> DEBU 156c Obtaining default signing identity" +"2019-11-19 05:22:53.987 UTC [msp.identity] Sign -> DEBU 156d Sign: plaintext: 0AD2060A1B08011A0608ADF8CDEE0522...BC168103401164493E9301D349F24BB3 " +"2019-11-19 05:22:53.987 UTC [msp.identity] Sign -> DEBU 156e Sign: digest: 90179FC3741B52698B1B6104BD5F6EFC233F14B1DA98C7EB83D0995B692CD6FB " +"2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 156f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 1570 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 1571 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 1572 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:53.987 UTC [policies] Evaluate -> DEBU 1573 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-11-19 05:22:53.987 UTC [msp] DeserializeIdentity -> DEBU 1574 Obtaining identity" +"2019-11-19 05:22:53.987 UTC [msp.identity] newIdentity -> DEBU 1575 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-11-19 05:22:53.987 UTC [cauthdsl] func1 -> DEBU 1576 0xc0010b8eb0 gate 1574140973987567900 evaluation starts" +"2019-11-19 05:22:53.987 UTC [cauthdsl] func2 -> DEBU 1577 0xc0010b8eb0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:53.987 UTC [cauthdsl] func2 -> DEBU 1578 0xc0010b8eb0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:53.987 UTC [cauthdsl] func2 -> DEBU 1579 0xc0010b8eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:53.987 UTC [cauthdsl] func2 -> DEBU 157a 0xc0010b8eb0 principal evaluation fails" +"2019-11-19 05:22:53.987 UTC [cauthdsl] func1 -> DEBU 157b 0xc0010b8eb0 gate 1574140973987567900 evaluation fails" +"2019-11-19 05:22:53.988 UTC [policies] Evaluate -> DEBU 157c Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:53.988 UTC [policies] Evaluate -> DEBU 157d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:53.989 UTC [policies] Evaluate -> DEBU 157e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-11-19 05:22:53.989 UTC [cauthdsl] func1 -> DEBU 157f 0xc0010b9ff0 gate 1574140973989514100 evaluation starts" +"2019-11-19 05:22:53.989 UTC [cauthdsl] func2 -> DEBU 1580 0xc0010b9ff0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:53.989 UTC [cauthdsl] func2 -> DEBU 1581 0xc0010b9ff0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:53.990 UTC [cauthdsl] func2 -> DEBU 1582 0xc0010b9ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:53.990 UTC [cauthdsl] func2 -> DEBU 1583 0xc0010b9ff0 principal evaluation fails" +"2019-11-19 05:22:53.990 UTC [cauthdsl] func1 -> DEBU 1584 0xc0010b9ff0 gate 1574140973989514100 evaluation fails" +"2019-11-19 05:22:53.990 UTC [policies] Evaluate -> DEBU 1585 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:53.990 UTC [policies] Evaluate -> DEBU 1586 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:53.991 UTC [policies] func1 -> DEBU 1587 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]" +"2019-11-19 05:22:53.991 UTC [policies] Evaluate -> DEBU 1588 Signature set did not satisfy policy /Channel/Application/Writers" +"2019-11-19 05:22:53.991 UTC [policies] Evaluate -> DEBU 1589 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-11-19 05:22:53.991 UTC [policies] Evaluate -> DEBU 158a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-11-19 05:22:53.991 UTC [policies] Evaluate -> DEBU 158b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:53.993 UTC [policies] Evaluate -> DEBU 158d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-11-19 05:22:53.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 158c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:53.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 158e Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-11-19 05:22:53.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 158f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.2µs " +"2019-11-19 05:22:53.994 UTC [cauthdsl] func1 -> DEBU 1590 0xc0012dcde0 gate 1574140973994662500 evaluation starts" +"2019-11-19 05:22:53.994 UTC [cauthdsl] func2 -> DEBU 1591 0xc0012dcde0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:53.995 UTC [cauthdsl] func2 -> DEBU 1592 0xc0012dcde0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:53.995 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1593 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-11-19 05:22:53.995 UTC [msp] Validate -> DEBU 1594 MSP OrdererMSP validating identity" +"2019-11-19 05:22:53.995 UTC [cauthdsl] func2 -> DEBU 1595 0xc0012dcde0 principal matched by identity 0" +"2019-11-19 05:22:53.996 UTC [msp.identity] Verify -> DEBU 1596 Verify: digest = 00000000 90 17 9f c3 74 1b 52 69 8b 1b 61 04 bd 5f 6e fc |....t.Ri..a.._n.| +00000010 23 3f 14 b1 da 98 c7 eb 83 d0 99 5b 69 2c d6 fb |#?.........[i,..|" +"2019-11-19 05:22:53.996 UTC [msp.identity] Verify -> DEBU 1597 Verify: sig = 00000000 30 44 02 20 52 c1 b9 60 ac e7 e3 8e 4c 35 f5 e3 |0D. R..`....L5..| +00000010 d0 57 4c 17 2b 63 e9 4e 0f 90 1b 11 66 33 ac 45 |.WL.+c.N....f3.E| +00000020 36 ba 41 a0 02 20 68 1d 3d 55 3a d4 2c 2e 3b ec |6.A.. h.=U:.,.;.| +00000030 b5 d4 40 5a 67 23 76 05 76 b9 63 e3 ff 94 86 d4 |..@Zg#v.v.c.....| +00000040 35 94 c1 49 86 f1 |5..I..|" +"2019-11-19 05:22:53.996 UTC [cauthdsl] func2 -> DEBU 1598 0xc0012dcde0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:53.996 UTC [cauthdsl] func1 -> DEBU 1599 0xc0012dcde0 gate 1574140973994662500 evaluation succeeds" +"2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159c Signature set satisfies policy /Channel/Orderer/Writers" +"2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-11-19 05:22:53.997 UTC [policies] Evaluate -> DEBU 159e Signature set satisfies policy /Channel/Writers" +"2019-11-19 05:22:53.998 UTC [policies] Evaluate -> DEBU 159f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-11-19 05:22:53.998 UTC [orderer.common.msgprocessor] Apply -> DEBU 15a0 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-11-19 05:22:53.998 UTC [common.channelconfig] NewStandardValues -> DEBU 15a1 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:22:53.999 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a2 Processing field: HashingAlgorithm" +"2019-11-19 05:22:53.999 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a3 Processing field: BlockDataHashingStructure" +"2019-11-19 05:22:53.999 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a4 Processing field: OrdererAddresses" +"2019-11-19 05:22:53.999 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a5 Processing field: Consortium" +"2019-11-19 05:22:54.000 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a6 Processing field: Capabilities" +"2019-11-19 05:22:54.000 UTC [common.channelconfig] NewStandardValues -> DEBU 15a7 Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:22:54.000 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a8 Processing field: ConsensusType" +"2019-11-19 05:22:54.000 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a9 Processing field: BatchSize" +"2019-11-19 05:22:54.000 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15aa Processing field: BatchTimeout" +"2019-11-19 05:22:54.001 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ab Processing field: KafkaBrokers" +"2019-11-19 05:22:54.001 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ac Processing field: ChannelRestrictions" +"2019-11-19 05:22:54.001 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ad Processing field: Capabilities" +"2019-11-19 05:22:54.002 UTC [common.channelconfig] NewStandardValues -> DEBU 15ae Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:22:54.002 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15af Processing field: Endpoints" +"2019-11-19 05:22:54.002 UTC [common.channelconfig] NewStandardValues -> DEBU 15b0 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:54.002 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b1 Processing field: MSP" +"2019-11-19 05:22:54.002 UTC [common.channelconfig] validateMSP -> DEBU 15b2 Setting up MSP for org OrdererOrg" +"2019-11-19 05:22:54.003 UTC [msp] newBccspMsp -> DEBU 15b3 Creating BCCSP-based MSP instance" +"2019-11-19 05:22:54.003 UTC [msp] New -> DEBU 15b4 Creating Cache-MSP instance" +"2019-11-19 05:22:54.003 UTC [msp] Setup -> DEBU 15b5 Setting up MSP instance OrdererMSP" +"2019-11-19 05:22:54.004 UTC [msp.identity] newIdentity -> DEBU 15b6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.004 UTC [msp.identity] newIdentity -> DEBU 15b7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.005 UTC [msp] Validate -> DEBU 15b8 MSP OrdererMSP validating identity" +"2019-11-19 05:22:54.005 UTC [common.channelconfig] NewStandardValues -> DEBU 15b9 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:22:54.005 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ba Processing field: ACLs" +"2019-11-19 05:22:54.005 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15bb Processing field: Capabilities" +"2019-11-19 05:22:54.006 UTC [common.channelconfig] NewStandardValues -> DEBU 15bc Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:54.006 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15bd Processing field: AnchorPeers" +"2019-11-19 05:22:54.006 UTC [common.channelconfig] NewStandardValues -> DEBU 15be Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:54.006 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15bf Processing field: MSP" +"2019-11-19 05:22:54.006 UTC [common.channelconfig] Validate -> DEBU 15c0 Anchor peers for org Org2MSP are anchor_peers: " +"2019-11-19 05:22:54.006 UTC [common.channelconfig] validateMSP -> DEBU 15c1 Setting up MSP for org Org2MSP" +"2019-11-19 05:22:54.006 UTC [msp] newBccspMsp -> DEBU 15c2 Creating BCCSP-based MSP instance" +"2019-11-19 05:22:54.006 UTC [msp] New -> DEBU 15c3 Creating Cache-MSP instance" +"2019-11-19 05:22:54.006 UTC [msp] Setup -> DEBU 15c4 Setting up MSP instance Org2MSP" +"2019-11-19 05:22:54.006 UTC [msp.identity] newIdentity -> DEBU 15c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] NewStandardValues -> DEBU 15c6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c7 Processing field: AnchorPeers" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] NewStandardValues -> DEBU 15c8 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c9 Processing field: MSP" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] Validate -> DEBU 15ca Anchor peers for org Org3MSP are " +"2019-11-19 05:22:54.007 UTC [common.channelconfig] validateMSP -> DEBU 15cb Setting up MSP for org Org3MSP" +"2019-11-19 05:22:54.007 UTC [msp] newBccspMsp -> DEBU 15cc Creating BCCSP-based MSP instance" +"2019-11-19 05:22:54.007 UTC [msp] New -> DEBU 15cd Creating Cache-MSP instance" +"2019-11-19 05:22:54.007 UTC [msp] Setup -> DEBU 15ce Setting up MSP instance Org3MSP" +"2019-11-19 05:22:54.007 UTC [msp.identity] newIdentity -> DEBU 15cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] NewStandardValues -> DEBU 15d0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d1 Processing field: AnchorPeers" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] NewStandardValues -> DEBU 15d2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d3 Processing field: MSP" +"2019-11-19 05:22:54.007 UTC [common.channelconfig] Validate -> DEBU 15d4 Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:22:54.008 UTC [common.channelconfig] validateMSP -> DEBU 15d5 Setting up MSP for org Org1MSP" +"2019-11-19 05:22:54.008 UTC [msp] newBccspMsp -> DEBU 15d6 Creating BCCSP-based MSP instance" +"2019-11-19 05:22:54.008 UTC [msp] New -> DEBU 15d7 Creating Cache-MSP instance" +"2019-11-19 05:22:54.008 UTC [msp] Setup -> DEBU 15d8 Setting up MSP instance Org1MSP" +"2019-11-19 05:22:54.008 UTC [msp.identity] newIdentity -> DEBU 15d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.008 UTC [msp] Setup -> DEBU 15da Setting up the MSP manager (4 msps)" +"2019-11-19 05:22:54.008 UTC [msp] Setup -> DEBU 15db MSP manager setup complete, setup 4 msps" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15dc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15dd Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15de Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15df Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e0 Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e1 Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e2 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e3 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e4 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e5 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e6 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e7 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e8 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15e9 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15ea Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:22:54.008 UTC [policies] NewManagerImpl -> DEBU 15eb Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:22:54.009 UTC [policies] NewManagerImpl -> DEBU 15ec Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:22:54.009 UTC [policies] NewManagerImpl -> DEBU 15ed Proposed new policy Admins for Channel/Application" +"2019-11-19 05:22:54.009 UTC [policies] GetPolicy -> DEBU 15ee Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:22:54.009 UTC [policies] GetPolicy -> DEBU 15ef Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:22:54.009 UTC [policies] NewManagerImpl -> DEBU 15f0 Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:22:54.009 UTC [policies] GetPolicy -> DEBU 15f1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:22:54.010 UTC [policies] GetPolicy -> DEBU 15f2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:22:54.010 UTC [policies] NewManagerImpl -> DEBU 15f3 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:22:54.010 UTC [policies] NewManagerImpl -> DEBU 15f4 Proposed new policy Readers for Channel/Application" +"2019-11-19 05:22:54.010 UTC [policies] NewManagerImpl -> DEBU 15f5 Proposed new policy Writers for Channel/Application" +"2019-11-19 05:22:54.010 UTC [policies] NewManagerImpl -> DEBU 15f6 Proposed new policy Writers for Channel" +"2019-11-19 05:22:54.011 UTC [policies] NewManagerImpl -> DEBU 15f7 Proposed new policy Admins for Channel" +"2019-11-19 05:22:54.011 UTC [policies] NewManagerImpl -> DEBU 15f8 Proposed new policy Readers for Channel" +"2019-11-19 05:22:54.011 UTC [common.configtx] addToMap -> DEBU 15f9 Adding to config map: [Group] /Channel" +"2019-11-19 05:22:54.011 UTC [common.configtx] addToMap -> DEBU 15fa Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15fb Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15fc Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15fd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15fe Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 15ff Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:54.012 UTC [common.configtx] addToMap -> DEBU 1600 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:22:54.013 UTC [common.configtx] addToMap -> DEBU 1601 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:22:54.013 UTC [common.configtx] addToMap -> DEBU 1602 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:22:54.013 UTC [common.configtx] addToMap -> DEBU 1603 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:22:54.013 UTC [common.configtx] addToMap -> DEBU 1604 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1605 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1606 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1607 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1608 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 1609 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160a Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:54.014 UTC [common.configtx] addToMap -> DEBU 160f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1610 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1611 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1612 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1613 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1614 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1615 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1616 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1617 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1618 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1619 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161c Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161d Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161e Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 161f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1620 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1621 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1622 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1623 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1624 Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1625 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1626 Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1627 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1628 Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 1629 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:22:54.015 UTC [common.configtx] addToMap -> DEBU 162a Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:22:54.016 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 162b [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:51628" +"2019-11-19 05:22:54.016 UTC [orderer.consensus.etcdraft] propose -> INFO 162c Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-11-19 05:22:54.017 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 162d Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-11-19 05:22:54.017 UTC [orderer.consensus.etcdraft] 2 -> DEBU 162e Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2019-11-19 05:22:54.019 UTC [orderer.common.broadcast] Handle -> WARN 162f Error reading from 172.18.0.5:51628: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:54.019 UTC [orderer.common.server] func1 -> DEBU 1630 Closing Broadcast stream" +"2019-11-19 05:22:54.019 UTC [comm.grpc.server] 1 -> INFO 1631 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:51628 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=78.4558ms +"2019-11-19 05:22:54.019 UTC [grpc] infof -> DEBU 1632 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:54.020 UTC [common.deliver] Handle -> WARN 1633 Error reading from 172.18.0.5:51626: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:54.020 UTC [orderer.common.server] func1 -> DEBU 1634 Closing Deliver stream" +"2019-11-19 05:22:54.020 UTC [comm.grpc.server] 1 -> INFO 1635 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51626 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=94.4394ms +"2019-11-19 05:22:54.020 UTC [grpc] infof -> DEBU 1636 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:54.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1637 Sending msg of 37609 bytes to 2 on channel businesschannel took 21.6µs" +"2019-11-19 05:22:54.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1638 Sending msg of 37609 bytes to 3 on channel businesschannel took 16.6µs" +"2019-11-19 05:22:54.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1639 Send of ConsensusRequest for channel businesschannel with payload of size 37609 to orderer2.example.com(orderer2.example.com:7050) took 304.7µs " +"2019-11-19 05:22:54.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163a Send of ConsensusRequest for channel businesschannel with payload of size 37609 to orderer1.example.com(orderer1.example.com:7050) took 165.6µs " +"2019-11-19 05:22:54.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:54.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163c Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" +"2019-11-19 05:22:54.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163d Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2019-11-19 05:22:54.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.2µs " +"2019-11-19 05:22:54.088 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 163f Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2019-11-19 05:22:54.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1640 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:54.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1641 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.8µs " +"2019-11-19 05:22:54.089 UTC [common.configtx] addToMap -> DEBU 1642 Adding to config map: [Group] /Channel" +"2019-11-19 05:22:54.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1643 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:54.095 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1644 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1645 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1646 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1647 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1648 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:22:54.110 UTC [common.configtx] addToMap -> DEBU 1649 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:22:54.111 UTC [common.configtx] addToMap -> DEBU 164a Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:22:54.111 UTC [common.configtx] addToMap -> DEBU 164b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:22:54.111 UTC [common.configtx] addToMap -> DEBU 164c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 164d Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 164e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 164f Adding to config map: [Group] /Channel" +"2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 1650 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:22:54.112 UTC [common.configtx] addToMap -> DEBU 1651 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:22:54.113 UTC [common.configtx] addToMap -> DEBU 1652 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:22:54.113 UTC [common.configtx] addToMap -> DEBU 1653 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-11-19 05:22:54.113 UTC [common.configtx] addToMap -> DEBU 1654 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-11-19 05:22:54.114 UTC [common.configtx] addToMap -> DEBU 1655 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-11-19 05:22:54.114 UTC [common.configtx] addToMap -> DEBU 1656 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-11-19 05:22:54.114 UTC [common.configtx] addToMap -> DEBU 1657 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:54.116 UTC [common.configtx] addToMap -> DEBU 1658 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-11-19 05:22:54.116 UTC [common.configtx] addToMap -> DEBU 1659 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:22:54.117 UTC [common.configtx] addToMap -> DEBU 165a Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:22:54.117 UTC [common.configtx] addToMap -> DEBU 165b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:22:54.117 UTC [common.configtx] addToMap -> DEBU 165c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:22:54.118 UTC [common.configtx] addToMap -> DEBU 165d Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:22:54.120 UTC [common.configtx] addToMap -> DEBU 165e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:22:54.120 UTC [common.configtx] addToMap -> DEBU 165f Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:22:54.120 UTC [common.configtx] verifyDeltaSet -> DEBU 1660 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-11-19 05:22:54.121 UTC [common.configtx] verifyDeltaSet -> DEBU 1661 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-11-19 05:22:54.121 UTC [common.configtx] verifyDeltaSet -> DEBU 1662 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:54.121 UTC [common.configtx] verifyDeltaSet -> DEBU 1663 Processing change to key: [Group] /Channel/Application" +"2019-11-19 05:22:54.121 UTC [common.configtx] policyForItem -> DEBU 1664 Getting policy for item Application with mod_policy Admins" +"2019-11-19 05:22:54.122 UTC [policies] Manager -> DEBU 1665 Manager Channel looking up path []" +"2019-11-19 05:22:54.124 UTC [policies] Manager -> DEBU 1666 Manager Channel has managers Application" +"2019-11-19 05:22:54.124 UTC [policies] Manager -> DEBU 1667 Manager Channel has managers Orderer" +"2019-11-19 05:22:54.124 UTC [policies] Manager -> DEBU 1668 Manager Channel looking up path [Application]" +"2019-11-19 05:22:54.125 UTC [policies] Manager -> DEBU 1669 Manager Channel has managers Orderer" +"2019-11-19 05:22:54.125 UTC [policies] Manager -> DEBU 166a Manager Channel has managers Application" +"2019-11-19 05:22:54.125 UTC [policies] Manager -> DEBU 166b Manager Channel/Application looking up path []" +"2019-11-19 05:22:54.125 UTC [policies] Manager -> DEBU 166c Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:22:54.126 UTC [policies] Manager -> DEBU 166d Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:22:54.126 UTC [policies] Evaluate -> DEBU 166e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-11-19 05:22:54.126 UTC [policies] Evaluate -> DEBU 166f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:54.127 UTC [policies] Evaluate -> DEBU 1670 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-11-19 05:22:54.127 UTC [cauthdsl] deduplicate -> WARN 1671 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-11-19 05:22:54.127 UTC [cauthdsl] func1 -> DEBU 1672 0xc000afab70 gate 1574140974127434600 evaluation starts" +"2019-11-19 05:22:54.128 UTC [cauthdsl] func2 -> DEBU 1673 0xc000afab70 signed by 0 principal evaluation starts (used [false false false])" +"2019-11-19 05:22:54.128 UTC [cauthdsl] func2 -> DEBU 1674 0xc000afab70 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:54.128 UTC [cauthdsl] func2 -> DEBU 1675 0xc000afab70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-11-19 05:22:54.128 UTC [cauthdsl] func2 -> DEBU 1676 0xc000afab70 processing identity 1 with bytes of fd6070" +"2019-11-19 05:22:54.129 UTC [cauthdsl] func2 -> DEBU 1677 0xc000afab70 principal matched by identity 1" +"2019-11-19 05:22:54.129 UTC [msp.identity] Verify -> DEBU 1678 Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...|" +"2019-11-19 05:22:54.129 UTC [msp.identity] Verify -> DEBU 1679 Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +00000040 46 bf 84 1c 8c 35 |F....5|" +"2019-11-19 05:22:54.130 UTC [cauthdsl] func2 -> DEBU 167a 0xc000afab70 principal evaluation succeeds for identity 1" +"2019-11-19 05:22:54.133 UTC [cauthdsl] func1 -> DEBU 167b 0xc000afab70 gate 1574140974127434600 evaluation succeeds" +"2019-11-19 05:22:54.134 UTC [policies] Evaluate -> DEBU 167c Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:22:54.134 UTC [policies] Evaluate -> DEBU 167d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:22:54.134 UTC [policies] Evaluate -> DEBU 167e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-11-19 05:22:54.135 UTC [cauthdsl] deduplicate -> WARN 167f De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-11-19 05:22:54.135 UTC [cauthdsl] func1 -> DEBU 1680 0xc000afb1a0 gate 1574140974135166300 evaluation starts" +"2019-11-19 05:22:54.135 UTC [cauthdsl] func2 -> DEBU 1681 0xc000afb1a0 signed by 0 principal evaluation starts (used [false false false])" +"2019-11-19 05:22:54.136 UTC [cauthdsl] func2 -> DEBU 1682 0xc000afb1a0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:54.137 UTC [cauthdsl] func2 -> DEBU 1683 0xc000afb1a0 principal matched by identity 0" +"2019-11-19 05:22:54.137 UTC [msp.identity] Verify -> DEBU 1684 Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR|" +"2019-11-19 05:22:54.137 UTC [msp.identity] Verify -> DEBU 1685 Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +00000040 28 40 4c 89 f5 38 |(@L..8|" +"2019-11-19 05:22:54.138 UTC [cauthdsl] func2 -> DEBU 1686 0xc000afb1a0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:54.138 UTC [cauthdsl] func1 -> DEBU 1687 0xc000afb1a0 gate 1574140974135166300 evaluation succeeds" +"2019-11-19 05:22:54.138 UTC [policies] Evaluate -> DEBU 1688 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:22:54.139 UTC [policies] Evaluate -> DEBU 1689 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:22:54.139 UTC [policies] Evaluate -> DEBU 168a Signature set satisfies policy /Channel/Application/Admins" +"2019-11-19 05:22:54.140 UTC [policies] Evaluate -> DEBU 168b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-11-19 05:22:54.140 UTC [common.configtx] verifyDeltaSet -> DEBU 168c Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-11-19 05:22:54.140 UTC [common.configtx] verifyDeltaSet -> DEBU 168d Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-11-19 05:22:54.141 UTC [common.configtx] verifyDeltaSet -> DEBU 168e Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-11-19 05:22:54.142 UTC [common.configtx] recurseConfigMap -> DEBU 168f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.142 UTC [common.configtx] recurseConfigMap -> DEBU 1690 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.142 UTC [common.configtx] recurseConfigMap -> DEBU 1691 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.143 UTC [common.configtx] recurseConfigMap -> DEBU 1692 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.144 UTC [common.configtx] recurseConfigMap -> DEBU 1693 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.144 UTC [common.configtx] recurseConfigMap -> DEBU 1694 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.145 UTC [common.configtx] recurseConfigMap -> DEBU 1695 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.152 UTC [common.configtx] recurseConfigMap -> DEBU 1696 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.168 UTC [common.configtx] recurseConfigMap -> DEBU 1697 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.168 UTC [common.configtx] recurseConfigMap -> DEBU 1698 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.169 UTC [common.configtx] recurseConfigMap -> DEBU 1699 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.169 UTC [common.configtx] recurseConfigMap -> DEBU 169a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.169 UTC [common.configtx] recurseConfigMap -> DEBU 169b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.188 UTC [common.configtx] recurseConfigMap -> DEBU 169c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.189 UTC [common.configtx] recurseConfigMap -> DEBU 169d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.189 UTC [common.configtx] recurseConfigMap -> DEBU 169e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.192 UTC [common.configtx] recurseConfigMap -> DEBU 169f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.192 UTC [common.configtx] recurseConfigMap -> DEBU 16a0 Setting policy for key Admins to " +"2019-11-19 05:22:54.192 UTC [common.configtx] recurseConfigMap -> DEBU 16a1 Setting policy for key Endorsement to " +"2019-11-19 05:22:54.192 UTC [common.configtx] recurseConfigMap -> DEBU 16a2 Setting policy for key LifecycleEndorsement to " +"2019-11-19 05:22:54.193 UTC [common.configtx] recurseConfigMap -> DEBU 16a3 Setting policy for key Readers to " +"2019-11-19 05:22:54.194 UTC [common.configtx] recurseConfigMap -> DEBU 16a4 Setting policy for key Writers to " +"2019-11-19 05:22:54.194 UTC [common.configtx] recurseConfigMap -> DEBU 16a5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.195 UTC [common.configtx] recurseConfigMap -> DEBU 16a6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.195 UTC [common.configtx] recurseConfigMap -> DEBU 16a7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-11-19 05:22:54.198 UTC [common.channelconfig] NewStandardValues -> DEBU 16a8 Initializing protos for *channelconfig.ChannelProtos" +"2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a9 Processing field: HashingAlgorithm" +"2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16aa Processing field: BlockDataHashingStructure" +"2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ab Processing field: OrdererAddresses" +"2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ac Processing field: Consortium" +"2019-11-19 05:22:54.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ad Processing field: Capabilities" +"2019-11-19 05:22:54.199 UTC [common.channelconfig] NewStandardValues -> DEBU 16ae Initializing protos for *channelconfig.OrdererProtos" +"2019-11-19 05:22:54.199 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16af Processing field: ConsensusType" +"2019-11-19 05:22:54.199 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b0 Processing field: BatchSize" +"2019-11-19 05:22:54.199 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b1 Processing field: BatchTimeout" +"2019-11-19 05:22:54.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b2 Processing field: KafkaBrokers" +"2019-11-19 05:22:54.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b3 Processing field: ChannelRestrictions" +"2019-11-19 05:22:54.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b4 Processing field: Capabilities" +"2019-11-19 05:22:54.202 UTC [common.channelconfig] NewStandardValues -> DEBU 16b5 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-11-19 05:22:54.202 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b6 Processing field: Endpoints" +"2019-11-19 05:22:54.202 UTC [common.channelconfig] NewStandardValues -> DEBU 16b7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:54.202 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b8 Processing field: MSP" +"2019-11-19 05:22:54.203 UTC [common.channelconfig] validateMSP -> DEBU 16b9 Setting up MSP for org OrdererOrg" +"2019-11-19 05:22:54.204 UTC [msp] newBccspMsp -> DEBU 16ba Creating BCCSP-based MSP instance" +"2019-11-19 05:22:54.204 UTC [msp] New -> DEBU 16bb Creating Cache-MSP instance" +"2019-11-19 05:22:54.206 UTC [msp] Setup -> DEBU 16bc Setting up MSP instance OrdererMSP" +"2019-11-19 05:22:54.206 UTC [msp.identity] newIdentity -> DEBU 16bd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.212 UTC [msp.identity] newIdentity -> DEBU 16be Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.213 UTC [msp] Validate -> DEBU 16bf MSP OrdererMSP validating identity" +"2019-11-19 05:22:54.213 UTC [common.channelconfig] NewStandardValues -> DEBU 16c0 Initializing protos for *channelconfig.ApplicationProtos" +"2019-11-19 05:22:54.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c1 Processing field: ACLs" +"2019-11-19 05:22:54.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c2 Processing field: Capabilities" +"2019-11-19 05:22:54.215 UTC [common.channelconfig] NewStandardValues -> DEBU 16c3 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:54.215 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c4 Processing field: AnchorPeers" +"2019-11-19 05:22:54.215 UTC [common.channelconfig] NewStandardValues -> DEBU 16c5 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:54.215 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c6 Processing field: MSP" +"2019-11-19 05:22:54.215 UTC [common.channelconfig] Validate -> DEBU 16c7 Anchor peers for org Org2MSP are anchor_peers: " +"2019-11-19 05:22:54.215 UTC [common.channelconfig] validateMSP -> DEBU 16c8 Setting up MSP for org Org2MSP" +"2019-11-19 05:22:54.216 UTC [msp] newBccspMsp -> DEBU 16c9 Creating BCCSP-based MSP instance" +"2019-11-19 05:22:54.216 UTC [msp] New -> DEBU 16ca Creating Cache-MSP instance" +"2019-11-19 05:22:54.216 UTC [msp] Setup -> DEBU 16cb Setting up MSP instance Org2MSP" +"2019-11-19 05:22:54.218 UTC [msp.identity] newIdentity -> DEBU 16cc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.224 UTC [common.channelconfig] NewStandardValues -> DEBU 16cd Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ce Processing field: AnchorPeers" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] NewStandardValues -> DEBU 16cf Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d0 Processing field: MSP" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] Validate -> DEBU 16d1 Anchor peers for org Org3MSP are " +"2019-11-19 05:22:54.226 UTC [common.channelconfig] validateMSP -> DEBU 16d2 Setting up MSP for org Org3MSP" +"2019-11-19 05:22:54.226 UTC [msp] newBccspMsp -> DEBU 16d3 Creating BCCSP-based MSP instance" +"2019-11-19 05:22:54.226 UTC [msp] New -> DEBU 16d4 Creating Cache-MSP instance" +"2019-11-19 05:22:54.226 UTC [msp] Setup -> DEBU 16d5 Setting up MSP instance Org3MSP" +"2019-11-19 05:22:54.226 UTC [msp.identity] newIdentity -> DEBU 16d6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] NewStandardValues -> DEBU 16d7 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d8 Processing field: AnchorPeers" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] NewStandardValues -> DEBU 16d9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16da Processing field: MSP" +"2019-11-19 05:22:54.226 UTC [common.channelconfig] Validate -> DEBU 16db Anchor peers for org Org1MSP are anchor_peers: " +"2019-11-19 05:22:54.226 UTC [common.channelconfig] validateMSP -> DEBU 16dc Setting up MSP for org Org1MSP" +"2019-11-19 05:22:54.226 UTC [msp] newBccspMsp -> DEBU 16dd Creating BCCSP-based MSP instance" +"2019-11-19 05:22:54.226 UTC [msp] New -> DEBU 16de Creating Cache-MSP instance" +"2019-11-19 05:22:54.227 UTC [msp] Setup -> DEBU 16df Setting up MSP instance Org1MSP" +"2019-11-19 05:22:54.227 UTC [msp.identity] newIdentity -> DEBU 16e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-11-19 05:22:54.227 UTC [msp] Setup -> DEBU 16e1 Setting up the MSP manager (4 msps)" +"2019-11-19 05:22:54.227 UTC [msp] Setup -> DEBU 16e2 MSP manager setup complete, setup 4 msps" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e3 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e4 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e5 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e6 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e7 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e8 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16e9 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16ea Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16eb Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16ec Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16ed Proposed new policy Writers for Channel/Application" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16ee Proposed new policy Admins for Channel/Application" +"2019-11-19 05:22:54.227 UTC [policies] GetPolicy -> DEBU 16ef Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:22:54.227 UTC [policies] GetPolicy -> DEBU 16f0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:22:54.227 UTC [policies] NewManagerImpl -> DEBU 16f1 Proposed new policy Endorsement for Channel/Application" +"2019-11-19 05:22:54.227 UTC [policies] GetPolicy -> DEBU 16f2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-11-19 05:22:54.227 UTC [policies] GetPolicy -> DEBU 16f3 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f4 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f5 Proposed new policy Readers for Channel/Application" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16f9 Proposed new policy Admins for Channel/Orderer" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fa Proposed new policy BlockValidation for Channel/Orderer" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fb Proposed new policy Readers for Channel/Orderer" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fc Proposed new policy Writers for Channel/Orderer" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fd Proposed new policy Writers for Channel" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16fe Proposed new policy Admins for Channel" +"2019-11-19 05:22:54.228 UTC [policies] NewManagerImpl -> DEBU 16ff Proposed new policy Readers for Channel" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1700 Adding to config map: [Group] /Channel" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1701 Adding to config map: [Group] /Channel/Orderer" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1702 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1703 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1704 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1705 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1706 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1707 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1708 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1709 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170b Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170d Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170e Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 170f Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1710 Adding to config map: [Group] /Channel/Application" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1711 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1712 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-11-19 05:22:54.228 UTC [common.configtx] addToMap -> DEBU 1713 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1714 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1715 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1716 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1717 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-11-19 05:22:54.229 UTC [common.configtx] addToMap -> DEBU 1718 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-11-19 05:22:54.256 UTC [common.configtx] addToMap -> DEBU 1719 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-11-19 05:22:54.257 UTC [common.configtx] addToMap -> DEBU 171a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-11-19 05:22:54.260 UTC [common.configtx] addToMap -> DEBU 171b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-11-19 05:22:54.260 UTC [common.configtx] addToMap -> DEBU 171c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:54.261 UTC [common.configtx] addToMap -> DEBU 171d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-11-19 05:22:54.261 UTC [common.configtx] addToMap -> DEBU 171e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-11-19 05:22:54.262 UTC [common.configtx] addToMap -> DEBU 171f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-11-19 05:22:54.262 UTC [common.configtx] addToMap -> DEBU 1720 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:54.263 UTC [common.configtx] addToMap -> DEBU 1721 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-11-19 05:22:54.263 UTC [common.configtx] addToMap -> DEBU 1722 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-11-19 05:22:54.264 UTC [common.configtx] addToMap -> DEBU 1723 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-11-19 05:22:54.264 UTC [common.configtx] addToMap -> DEBU 1724 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-11-19 05:22:54.265 UTC [common.configtx] addToMap -> DEBU 1725 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-11-19 05:22:54.265 UTC [common.configtx] addToMap -> DEBU 1726 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-11-19 05:22:54.266 UTC [common.configtx] addToMap -> DEBU 1727 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-11-19 05:22:54.266 UTC [common.configtx] addToMap -> DEBU 1728 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-11-19 05:22:54.268 UTC [common.configtx] addToMap -> DEBU 1729 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-11-19 05:22:54.268 UTC [common.configtx] addToMap -> DEBU 172a Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-11-19 05:22:54.268 UTC [common.configtx] addToMap -> DEBU 172b Adding to config map: [Value] /Channel/Capabilities" +"2019-11-19 05:22:54.268 UTC [common.configtx] addToMap -> DEBU 172c Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-11-19 05:22:54.269 UTC [common.configtx] addToMap -> DEBU 172d Adding to config map: [Value] /Channel/Consortium" +"2019-11-19 05:22:54.269 UTC [common.configtx] addToMap -> DEBU 172e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-11-19 05:22:54.269 UTC [common.configtx] addToMap -> DEBU 172f Adding to config map: [Policy] /Channel/Writers" +"2019-11-19 05:22:54.272 UTC [common.configtx] addToMap -> DEBU 1730 Adding to config map: [Policy] /Channel/Admins" +"2019-11-19 05:22:54.272 UTC [common.configtx] addToMap -> DEBU 1731 Adding to config map: [Policy] /Channel/Readers" +"2019-11-19 05:22:54.272 UTC [common.channelconfig] LogSanityChecks -> DEBU 1732 As expected, current configuration has policy '/Channel/Readers'" +"2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1733 As expected, current configuration has policy '/Channel/Writers'" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1734 Manager Channel looking up path [Application]" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1735 Manager Channel has managers Application" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1736 Manager Channel has managers Orderer" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1737 Manager Channel/Application looking up path []" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1738 Manager Channel/Application has managers Org2MSP" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1739 Manager Channel/Application has managers Org3MSP" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 173a Manager Channel/Application has managers Org1MSP" +"2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 173b As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 173c As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 173d As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 173e Manager Channel looking up path [Orderer]" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 173f Manager Channel has managers Orderer" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1740 Manager Channel has managers Application" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1741 Manager Channel/Orderer looking up path []" +"2019-11-19 05:22:54.273 UTC [policies] Manager -> DEBU 1742 Manager Channel/Orderer has managers OrdererOrg" +"2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1743 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1744 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1745 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-11-19 05:22:54.273 UTC [common.channelconfig] LogSanityChecks -> DEBU 1746 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-11-19 05:22:54.273 UTC [common.capabilities] Supported -> DEBU 1747 Orderer capability V1_4_2 is supported and is enabled" +"2019-11-19 05:22:54.273 UTC [common.capabilities] Supported -> DEBU 1748 Channel capability V1_4_3 is supported and is enabled" +"2019-11-19 05:22:54.273 UTC [orderer.common.server] func1 -> DEBU 1749 Executing callback to update root CAs" +"2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174a updating root CAs for channel [businesschannel]" +"2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174b adding orderer root CAs for MSP [OrdererMSP]" +"2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174c adding app root CAs for MSP [Org2MSP]" +"2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174d adding app root CAs for MSP [Org3MSP]" +"2019-11-19 05:22:54.273 UTC [orderer.common.server] updateTrustedRoots -> DEBU 174e adding app root CAs for MSP [Org1MSP]" +"2019-11-19 05:22:54.275 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 174f [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +"2019-11-19 05:22:54.295 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1750 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +"2019-11-19 05:22:54.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 1751 Obtaining default signing identity" +"2019-11-19 05:22:54.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 1752 Obtaining default signing identity" +"2019-11-19 05:22:54.298 UTC [msp.identity] Sign -> DEBU 1753 Sign: plaintext: 0A020806120B0A090A03010203100418...CBE7A2AB994C49C654FF8FB03F07758D " +"2019-11-19 05:22:54.299 UTC [msp.identity] Sign -> DEBU 1754 Sign: digest: 4F3110DCF596C6E56C2F89A0887F4185C4451BE9F10E18A11D6CF0A45FB44591 " +"2019-11-19 05:22:54.303 UTC [fsblkstorage] indexBlock -> DEBU 1755 Indexing block [blockNum=6, blockHash=[]byte{0xa2, 0x69, 0x20, 0xe7, 0x6, 0xba, 0xc2, 0x3, 0x29, 0x26, 0xfe, 0xbd, 0x9b, 0x32, 0xd3, 0x6e, 0x64, 0xfd, 0x5e, 0xe2, 0x9c, 0x95, 0x4, 0xb3, 0xa2, 0x44, 0xc8, 0xfa, 0x28, 0x5a, 0x80, 0x58} txOffsets= +txId=546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf locPointer=offset=71, bytesLength=37478 +]" +"2019-11-19 05:22:54.305 UTC [fsblkstorage] updateCheckpoint -> DEBU 1756 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127745], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-11-19 05:22:54.306 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1757 [channel: businesschannel] Wrote block [6]" +"2019-11-19 05:22:54.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1758 Sending msg of 28 bytes to 2 on channel businesschannel took 81µs" +"2019-11-19 05:22:54.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1759 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +"2019-11-19 05:22:54.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 175a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.9µs " +"2019-11-19 05:22:54.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 175b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 325.9µs " +"2019-11-19 05:22:54.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:54.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:54.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:54.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 175f Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2019-11-19 05:22:54.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1760 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.8µs " +"2019-11-19 05:22:54.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1761 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +"2019-11-19 05:22:54.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1762 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +"2019-11-19 05:22:54.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1763 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.5µs " +"2019-11-19 05:22:54.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1764 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1382ms " +"2019-11-19 05:22:54.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1765 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:54.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1766 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:54.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1767 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:54.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1768 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-11-19 05:22:54.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1769 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 649.4µs " +"2019-11-19 05:22:55.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 176a Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2019-11-19 05:22:55.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 176b Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2019-11-19 05:22:55.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 176c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.9µs " +"2019-11-19 05:22:55.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 176d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.4µs " +"2019-11-19 05:22:55.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 176e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:55.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 176f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:55.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1770 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:55.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1771 Sending msg of 28 bytes to 3 on channel testchainid took 69.8µs" +"2019-11-19 05:22:55.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1772 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +"2019-11-19 05:22:55.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1773 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2019-11-19 05:22:55.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1774 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-11-19 05:22:55.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1775 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.6µs " +"2019-11-19 05:22:55.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1776 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 263.1µs " +"2019-11-19 05:22:55.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1777 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:55.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1778 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:55.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1779 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:55.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 177a Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2019-11-19 05:22:55.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 177b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.2µs " +"2019-11-19 05:22:56.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 177c Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2019-11-19 05:22:56.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 177d Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +"2019-11-19 05:22:56.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 177e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.6µs " +"2019-11-19 05:22:56.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 177f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 898µs " +"2019-11-19 05:22:56.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1780 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:56.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1781 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:56.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1782 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:56.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1783 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +"2019-11-19 05:22:56.495 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1784 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.4µs " +"2019-11-19 05:22:56.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1785 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120.2µs " +"2019-11-19 05:22:56.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1786 Sending msg of 28 bytes to 2 on channel businesschannel took 176.7µs" +"2019-11-19 05:22:56.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1787 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.1µs " +"2019-11-19 05:22:56.868 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1788 Sending msg of 28 bytes to 3 on channel businesschannel took 1.6688ms" +"2019-11-19 05:22:56.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1789 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:56.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 178a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:56.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 178b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:56.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 178c Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +"2019-11-19 05:22:56.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 178d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.2µs " +"2019-11-19 05:22:57.157 UTC [orderer.common.server] Deliver -> DEBU 178e Starting new Deliver handler" +"2019-11-19 05:22:57.157 UTC [common.deliver] Handle -> DEBU 178f Starting new deliver loop for 172.18.0.5:51662" +"2019-11-19 05:22:57.157 UTC [common.deliver] Handle -> DEBU 1790 Attempting to read seek info message from 172.18.0.5:51662" +"2019-11-19 05:22:57.158 UTC [policies] Evaluate -> DEBU 1791 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:57.158 UTC [policies] Evaluate -> DEBU 1792 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.159 UTC [policies] Evaluate -> DEBU 1793 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:57.159 UTC [policies] Evaluate -> DEBU 1794 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.159 UTC [policies] Evaluate -> DEBU 1795 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:57.160 UTC [msp] DeserializeIdentity -> DEBU 1796 Obtaining identity" +"2019-11-19 05:22:57.160 UTC [msp.identity] newIdentity -> DEBU 1797 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-11-19 05:22:57.160 UTC [cauthdsl] func1 -> DEBU 1798 0xc0003266c0 gate 1574140977160877300 evaluation starts" +"2019-11-19 05:22:57.161 UTC [cauthdsl] func2 -> DEBU 1799 0xc0003266c0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.161 UTC [cauthdsl] func2 -> DEBU 179a 0xc0003266c0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.161 UTC [cauthdsl] func2 -> DEBU 179b 0xc0003266c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:57.161 UTC [cauthdsl] func2 -> DEBU 179c 0xc0003266c0 principal evaluation fails" +"2019-11-19 05:22:57.162 UTC [cauthdsl] func1 -> DEBU 179d 0xc0003266c0 gate 1574140977160877300 evaluation fails" +"2019-11-19 05:22:57.162 UTC [policies] Evaluate -> DEBU 179e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:57.162 UTC [policies] Evaluate -> DEBU 179f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:57.162 UTC [policies] Evaluate -> DEBU 17a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:57.162 UTC [cauthdsl] func1 -> DEBU 17a1 0xc000327a40 gate 1574140977162977300 evaluation starts" +"2019-11-19 05:22:57.163 UTC [cauthdsl] func2 -> DEBU 17a2 0xc000327a40 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.163 UTC [cauthdsl] func2 -> DEBU 17a3 0xc000327a40 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.163 UTC [cauthdsl] func2 -> DEBU 17a4 0xc000327a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:57.163 UTC [cauthdsl] func2 -> DEBU 17a5 0xc000327a40 principal evaluation fails" +"2019-11-19 05:22:57.163 UTC [cauthdsl] func1 -> DEBU 17a6 0xc000327a40 gate 1574140977162977300 evaluation fails" +"2019-11-19 05:22:57.164 UTC [policies] Evaluate -> DEBU 17a7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:57.165 UTC [policies] Evaluate -> DEBU 17a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:57.165 UTC [policies] Evaluate -> DEBU 17a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:57.165 UTC [cauthdsl] func1 -> DEBU 17aa 0xc00024c000 gate 1574140977165676700 evaluation starts" +"2019-11-19 05:22:57.166 UTC [cauthdsl] func2 -> DEBU 17ab 0xc00024c000 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.166 UTC [cauthdsl] func2 -> DEBU 17ac 0xc00024c000 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.166 UTC [cauthdsl] func2 -> DEBU 17ad 0xc00024c000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:57.166 UTC [cauthdsl] func2 -> DEBU 17ae 0xc00024c000 principal evaluation fails" +"2019-11-19 05:22:57.167 UTC [cauthdsl] func1 -> DEBU 17af 0xc00024c000 gate 1574140977165676700 evaluation fails" +"2019-11-19 05:22:57.167 UTC [policies] Evaluate -> DEBU 17b0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:57.167 UTC [policies] Evaluate -> DEBU 17b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:57.167 UTC [policies] func1 -> DEBU 17b2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b3 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.168 UTC [policies] Evaluate -> DEBU 17b7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:57.169 UTC [cauthdsl] func1 -> DEBU 17b8 0xc00024ce90 gate 1574140977169238900 evaluation starts" +"2019-11-19 05:22:57.169 UTC [cauthdsl] func2 -> DEBU 17b9 0xc00024ce90 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.169 UTC [cauthdsl] func2 -> DEBU 17ba 0xc00024ce90 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.169 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17bb Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-11-19 05:22:57.170 UTC [msp] Validate -> DEBU 17bc MSP OrdererMSP validating identity" +"2019-11-19 05:22:57.170 UTC [cauthdsl] func2 -> DEBU 17bd 0xc00024ce90 principal matched by identity 0" +"2019-11-19 05:22:57.170 UTC [msp.identity] Verify -> DEBU 17be Verify: digest = 00000000 24 76 5c e9 59 95 9d dc d5 13 44 9a f3 00 ac 7f |$v\.Y.....D.....| +00000010 e7 88 eb 71 4a e5 78 db bd 70 f6 2d 02 29 d0 dc |...qJ.x..p.-.)..|" +"2019-11-19 05:22:57.170 UTC [msp.identity] Verify -> DEBU 17bf Verify: sig = 00000000 30 45 02 21 00 85 70 dd 5a 70 b2 ea 42 b7 9c 62 |0E.!..p.Zp..B..b| +00000010 83 53 aa 49 be 10 c4 01 f4 56 e8 15 57 58 01 6f |.S.I.....V..WX.o| +00000020 61 55 94 1e cd 02 20 23 c2 03 c7 79 9b 3e 47 ae |aU.... #...y.>G.| +00000030 66 30 e2 ac 1f d2 a6 3e 1f 19 de e6 43 5f fd 45 |f0.....>....C_.E| +00000040 bf da ba a6 a1 92 ee |.......|" +"2019-11-19 05:22:57.171 UTC [cauthdsl] func2 -> DEBU 17c0 0xc00024ce90 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:57.171 UTC [cauthdsl] func1 -> DEBU 17c1 0xc00024ce90 gate 1574140977169238900 evaluation succeeds" +"2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c4 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c6 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:57.171 UTC [policies] Evaluate -> DEBU 17c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:57.171 UTC [common.deliver] deliverBlocks -> DEBU 17c8 [channel: businesschannel] Received seekInfo (0xc000089e40) start: > stop: > from 172.18.0.5:51662" +"2019-11-19 05:22:57.171 UTC [fsblkstorage] Next -> DEBU 17c9 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:57.171 UTC [fsblkstorage] newBlockfileStream -> DEBU 17ca newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +"2019-11-19 05:22:57.172 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17cb Remaining bytes=[38486], Going to peek [8] bytes" +"2019-11-19 05:22:57.172 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17cc Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +"2019-11-19 05:22:57.172 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17cd blockbytes [38483] read from file [0]" +"2019-11-19 05:22:57.172 UTC [common.deliver] deliverBlocks -> DEBU 17ce [channel: businesschannel] Delivering block for (0xc000089e40) for 172.18.0.5:51662" +"2019-11-19 05:22:57.172 UTC [common.deliver] deliverBlocks -> DEBU 17cf [channel: businesschannel] Done delivering to 172.18.0.5:51662 for (0xc000089e40)" +"2019-11-19 05:22:57.173 UTC [common.deliver] Handle -> DEBU 17d0 Waiting for new SeekInfo from 172.18.0.5:51662" +"2019-11-19 05:22:57.174 UTC [common.deliver] Handle -> DEBU 17d1 Attempting to read seek info message from 172.18.0.5:51662" +"2019-11-19 05:22:57.178 UTC [common.deliver] Handle -> WARN 17d3 Error reading from 172.18.0.5:51662: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:57.178 UTC [orderer.common.server] func1 -> DEBU 17d4 Closing Deliver stream" +"2019-11-19 05:22:57.178 UTC [comm.grpc.server] 1 -> INFO 17d5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51662 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.9798ms +"2019-11-19 05:22:57.177 UTC [grpc] infof -> DEBU 17d2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:57.310 UTC [orderer.common.server] Deliver -> DEBU 17d6 Starting new Deliver handler" +"2019-11-19 05:22:57.310 UTC [common.deliver] Handle -> DEBU 17d7 Starting new deliver loop for 172.18.0.5:51664" +"2019-11-19 05:22:57.310 UTC [common.deliver] Handle -> DEBU 17d8 Attempting to read seek info message from 172.18.0.5:51664" +"2019-11-19 05:22:57.311 UTC [policies] Evaluate -> DEBU 17d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:57.311 UTC [policies] Evaluate -> DEBU 17da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func1 -> DEBU 17de 0xc00043d940 gate 1574140977312225800 evaluation starts" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17df 0xc00043d940 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e0 0xc00043d940 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e1 0xc00043d940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e2 0xc00043d940 principal evaluation fails" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func1 -> DEBU 17e3 0xc00043d940 gate 1574140977312225800 evaluation fails" +"2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:57.312 UTC [policies] Evaluate -> DEBU 17e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func1 -> DEBU 17e7 0xc0001f6450 gate 1574140977312798100 evaluation starts" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e8 0xc0001f6450 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.312 UTC [cauthdsl] func2 -> DEBU 17e9 0xc0001f6450 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17ea 0xc0001f6450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17eb 0xc0001f6450 principal evaluation fails" +"2019-11-19 05:22:57.313 UTC [cauthdsl] func1 -> DEBU 17ec 0xc0001f6450 gate 1574140977312798100 evaluation fails" +"2019-11-19 05:22:57.313 UTC [policies] Evaluate -> DEBU 17ed Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:57.313 UTC [policies] Evaluate -> DEBU 17ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:57.313 UTC [policies] Evaluate -> DEBU 17ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:57.313 UTC [cauthdsl] func1 -> DEBU 17f0 0xc0001f6ce0 gate 1574140977313393900 evaluation starts" +"2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17f1 0xc0001f6ce0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17f2 0xc0001f6ce0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.313 UTC [cauthdsl] func2 -> DEBU 17f3 0xc0001f6ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:57.314 UTC [cauthdsl] func2 -> DEBU 17f4 0xc0001f6ce0 principal evaluation fails" +"2019-11-19 05:22:57.314 UTC [cauthdsl] func1 -> DEBU 17f5 0xc0001f6ce0 gate 1574140977313393900 evaluation fails" +"2019-11-19 05:22:57.315 UTC [policies] Evaluate -> DEBU 17f6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:57.315 UTC [policies] Evaluate -> DEBU 17f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:57.315 UTC [policies] func1 -> DEBU 17f8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:57.315 UTC [policies] Evaluate -> DEBU 17f9 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:57.316 UTC [policies] Evaluate -> DEBU 17fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:57.316 UTC [policies] Evaluate -> DEBU 17fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:57.316 UTC [policies] Evaluate -> DEBU 17fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.316 UTC [policies] Evaluate -> DEBU 17fd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:57.316 UTC [cauthdsl] func1 -> DEBU 17fe 0xc0001f79d0 gate 1574140977316554400 evaluation starts" +"2019-11-19 05:22:57.316 UTC [cauthdsl] func2 -> DEBU 17ff 0xc0001f79d0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.316 UTC [cauthdsl] func2 -> DEBU 1800 0xc0001f79d0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.316 UTC [cauthdsl] func2 -> DEBU 1801 0xc0001f79d0 principal matched by identity 0" +"2019-11-19 05:22:57.316 UTC [msp.identity] Verify -> DEBU 1802 Verify: digest = 00000000 df 1b 6e a3 53 96 5a 4a 1e 41 b9 30 ac af 62 35 |..n.S.ZJ.A.0..b5| +00000010 90 cd 63 95 f5 29 e6 46 e0 c9 80 f4 dc 2f 08 c3 |..c..).F...../..|" +"2019-11-19 05:22:57.316 UTC [msp.identity] Verify -> DEBU 1803 Verify: sig = 00000000 30 44 02 20 46 6e 18 72 6e c6 18 b2 4f fc 47 0c |0D. Fn.rn...O.G.| +00000010 c5 03 4c b1 9e 58 9c 90 9f 19 6b a3 a3 d5 07 28 |..L..X....k....(| +00000020 d2 96 a0 87 02 20 4e 87 3a 15 68 8a c4 0a d4 80 |..... N.:.h.....| +00000030 b4 73 9c 6d 5f 1d b0 11 5d 88 db 20 dd f9 bc 53 |.s.m_...].. ...S| +00000040 74 b1 ae 26 cd ad |t..&..|" +"2019-11-19 05:22:57.317 UTC [cauthdsl] func2 -> DEBU 1804 0xc0001f79d0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:57.317 UTC [cauthdsl] func1 -> DEBU 1805 0xc0001f79d0 gate 1574140977316554400 evaluation succeeds" +"2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 1806 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 1807 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 1808 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 1809 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:57.317 UTC [policies] Evaluate -> DEBU 180b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:57.317 UTC [common.deliver] deliverBlocks -> DEBU 180c [channel: businesschannel] Received seekInfo (0xc000c6a9c0) start: > stop: > from 172.18.0.5:51664" +"2019-11-19 05:22:57.317 UTC [fsblkstorage] Next -> DEBU 180d Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:57.317 UTC [fsblkstorage] newBlockfileStream -> DEBU 180e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +"2019-11-19 05:22:57.317 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 180f Remaining bytes=[38486], Going to peek [8] bytes" +"2019-11-19 05:22:57.317 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1810 Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +"2019-11-19 05:22:57.317 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1811 blockbytes [38483] read from file [0]" +"2019-11-19 05:22:57.318 UTC [common.deliver] deliverBlocks -> DEBU 1812 [channel: businesschannel] Delivering block for (0xc000c6a9c0) for 172.18.0.5:51664" +"2019-11-19 05:22:57.318 UTC [common.deliver] deliverBlocks -> DEBU 1813 [channel: businesschannel] Done delivering to 172.18.0.5:51664 for (0xc000c6a9c0)" +"2019-11-19 05:22:57.319 UTC [common.deliver] Handle -> DEBU 1814 Waiting for new SeekInfo from 172.18.0.5:51664" +"2019-11-19 05:22:57.319 UTC [common.deliver] Handle -> DEBU 1815 Attempting to read seek info message from 172.18.0.5:51664" +"2019-11-19 05:22:57.321 UTC [grpc] infof -> DEBU 1816 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:57.321 UTC [common.deliver] Handle -> WARN 1817 Error reading from 172.18.0.5:51664: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:57.322 UTC [orderer.common.server] func1 -> DEBU 1818 Closing Deliver stream" +"2019-11-19 05:22:57.322 UTC [comm.grpc.server] 1 -> INFO 1819 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51664 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.0602ms +"2019-11-19 05:22:57.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 181a Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2019-11-19 05:22:57.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 181b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.3µs " +"2019-11-19 05:22:57.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 181c Sending msg of 28 bytes to 3 on channel businesschannel took 46.2µs" +"2019-11-19 05:22:57.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 181d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +"2019-11-19 05:22:57.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 181e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:57.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 181f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:57.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1820 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:57.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1821 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2019-11-19 05:22:57.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1822 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +"2019-11-19 05:22:57.808 UTC [orderer.common.server] Deliver -> DEBU 1823 Starting new Deliver handler" +"2019-11-19 05:22:57.809 UTC [common.deliver] Handle -> DEBU 1824 Starting new deliver loop for 172.18.0.5:51666" +"2019-11-19 05:22:57.809 UTC [common.deliver] Handle -> DEBU 1825 Attempting to read seek info message from 172.18.0.5:51666" +"2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 1826 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 1827 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 1828 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 1829 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.810 UTC [policies] Evaluate -> DEBU 182a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:57.811 UTC [cauthdsl] func1 -> DEBU 182b 0xc00097e610 gate 1574140977811015900 evaluation starts" +"2019-11-19 05:22:57.811 UTC [cauthdsl] func2 -> DEBU 182c 0xc00097e610 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.811 UTC [cauthdsl] func2 -> DEBU 182d 0xc00097e610 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.811 UTC [cauthdsl] func2 -> DEBU 182e 0xc00097e610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:57.811 UTC [cauthdsl] func2 -> DEBU 182f 0xc00097e610 principal evaluation fails" +"2019-11-19 05:22:57.811 UTC [cauthdsl] func1 -> DEBU 1830 0xc00097e610 gate 1574140977811015900 evaluation fails" +"2019-11-19 05:22:57.812 UTC [policies] Evaluate -> DEBU 1831 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:57.812 UTC [policies] Evaluate -> DEBU 1832 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:57.813 UTC [policies] Evaluate -> DEBU 1833 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:57.813 UTC [cauthdsl] func1 -> DEBU 1834 0xc00097ee60 gate 1574140977813440000 evaluation starts" +"2019-11-19 05:22:57.813 UTC [cauthdsl] func2 -> DEBU 1835 0xc00097ee60 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.813 UTC [cauthdsl] func2 -> DEBU 1836 0xc00097ee60 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.814 UTC [cauthdsl] func2 -> DEBU 1837 0xc00097ee60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:57.814 UTC [cauthdsl] func2 -> DEBU 1838 0xc00097ee60 principal evaluation fails" +"2019-11-19 05:22:57.814 UTC [cauthdsl] func1 -> DEBU 1839 0xc00097ee60 gate 1574140977813440000 evaluation fails" +"2019-11-19 05:22:57.815 UTC [policies] Evaluate -> DEBU 183a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:57.815 UTC [policies] Evaluate -> DEBU 183b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:57.815 UTC [policies] Evaluate -> DEBU 183c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:57.815 UTC [cauthdsl] func1 -> DEBU 183d 0xc00097f790 gate 1574140977815722100 evaluation starts" +"2019-11-19 05:22:57.816 UTC [cauthdsl] func2 -> DEBU 183e 0xc00097f790 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.816 UTC [cauthdsl] func2 -> DEBU 183f 0xc00097f790 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.816 UTC [cauthdsl] func2 -> DEBU 1840 0xc00097f790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:57.816 UTC [cauthdsl] func2 -> DEBU 1841 0xc00097f790 principal evaluation fails" +"2019-11-19 05:22:57.817 UTC [cauthdsl] func1 -> DEBU 1842 0xc00097f790 gate 1574140977815722100 evaluation fails" +"2019-11-19 05:22:57.817 UTC [policies] Evaluate -> DEBU 1843 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:57.817 UTC [policies] Evaluate -> DEBU 1844 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:57.817 UTC [policies] func1 -> DEBU 1845 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:57.818 UTC [policies] Evaluate -> DEBU 1846 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:57.818 UTC [policies] Evaluate -> DEBU 1847 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:57.818 UTC [policies] Evaluate -> DEBU 1848 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:57.819 UTC [policies] Evaluate -> DEBU 1849 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.819 UTC [policies] Evaluate -> DEBU 184a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:57.820 UTC [cauthdsl] func1 -> DEBU 184b 0xc000bce490 gate 1574140977820032300 evaluation starts" +"2019-11-19 05:22:57.820 UTC [cauthdsl] func2 -> DEBU 184c 0xc000bce490 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.820 UTC [cauthdsl] func2 -> DEBU 184d 0xc000bce490 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.821 UTC [cauthdsl] func2 -> DEBU 184e 0xc000bce490 principal matched by identity 0" +"2019-11-19 05:22:57.821 UTC [msp.identity] Verify -> DEBU 184f Verify: digest = 00000000 13 1c 79 6b 3b ac b8 e8 e3 fa fb 07 c8 4c b9 3c |..yk;........L.<| +00000010 bd e9 a5 59 d2 a7 70 c4 e0 25 f4 f5 79 2a 84 63 |...Y..p..%..y*.c|" +"2019-11-19 05:22:57.821 UTC [msp.identity] Verify -> DEBU 1850 Verify: sig = 00000000 30 45 02 21 00 a3 c9 0b 69 58 c5 ea 5e 4e 63 af |0E.!....iX..^Nc.| +00000010 ee 8f 29 8c ca d2 8f c8 57 62 1b 2b b2 0d 58 c2 |..).....Wb.+..X.| +00000020 b7 e9 e6 5f a3 02 20 2d 1a 27 89 5f ff 23 97 64 |..._.. -.'._.#.d| +00000030 36 ff 36 ab 22 89 93 ff 14 24 66 06 e8 53 76 a0 |6.6."....$f..Sv.| +00000040 14 8f c8 91 5e b1 eb |....^..|" +"2019-11-19 05:22:57.821 UTC [cauthdsl] func2 -> DEBU 1851 0xc000bce490 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:57.822 UTC [cauthdsl] func1 -> DEBU 1852 0xc000bce490 gate 1574140977820032300 evaluation succeeds" +"2019-11-19 05:22:57.822 UTC [policies] Evaluate -> DEBU 1853 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:57.822 UTC [policies] Evaluate -> DEBU 1854 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:57.823 UTC [policies] Evaluate -> DEBU 1855 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:57.823 UTC [policies] Evaluate -> DEBU 1856 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:57.823 UTC [policies] Evaluate -> DEBU 1857 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:57.823 UTC [policies] Evaluate -> DEBU 1858 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:57.823 UTC [common.deliver] deliverBlocks -> DEBU 1859 [channel: businesschannel] Received seekInfo (0xc000c6b340) start: > stop: > from 172.18.0.5:51666" +"2019-11-19 05:22:57.824 UTC [fsblkstorage] Next -> DEBU 185a Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:57.824 UTC [fsblkstorage] newBlockfileStream -> DEBU 185b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +"2019-11-19 05:22:57.824 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 185c Remaining bytes=[38486], Going to peek [8] bytes" +"2019-11-19 05:22:57.825 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 185d Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +"2019-11-19 05:22:57.825 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 185e blockbytes [38483] read from file [0]" +"2019-11-19 05:22:57.825 UTC [common.deliver] deliverBlocks -> DEBU 185f [channel: businesschannel] Delivering block for (0xc000c6b340) for 172.18.0.5:51666" +"2019-11-19 05:22:57.826 UTC [common.deliver] deliverBlocks -> DEBU 1860 [channel: businesschannel] Done delivering to 172.18.0.5:51666 for (0xc000c6b340)" +"2019-11-19 05:22:57.827 UTC [common.deliver] Handle -> DEBU 1861 Waiting for new SeekInfo from 172.18.0.5:51666" +"2019-11-19 05:22:57.827 UTC [common.deliver] Handle -> DEBU 1862 Attempting to read seek info message from 172.18.0.5:51666" +"2019-11-19 05:22:57.830 UTC [grpc] infof -> DEBU 1863 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:57.830 UTC [common.deliver] Handle -> WARN 1864 Error reading from 172.18.0.5:51666: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:57.830 UTC [orderer.common.server] func1 -> DEBU 1865 Closing Deliver stream" +"2019-11-19 05:22:57.831 UTC [comm.grpc.server] 1 -> INFO 1866 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51666 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.9555ms +"2019-11-19 05:22:57.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1867 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +"2019-11-19 05:22:57.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1868 Sending msg of 28 bytes to 3 on channel businesschannel took 92.2µs" +"2019-11-19 05:22:57.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1869 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.3µs " +"2019-11-19 05:22:57.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 186a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.4µs " +"2019-11-19 05:22:57.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:57.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:57.988 UTC [orderer.common.server] Deliver -> DEBU 186d Starting new Deliver handler" +"2019-11-19 05:22:57.988 UTC [common.deliver] Handle -> DEBU 186e Starting new deliver loop for 172.18.0.5:51668" +"2019-11-19 05:22:57.988 UTC [common.deliver] Handle -> DEBU 186f Attempting to read seek info message from 172.18.0.5:51668" +"2019-11-19 05:22:57.991 UTC [policies] Evaluate -> DEBU 1870 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:57.991 UTC [policies] Evaluate -> DEBU 1871 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.992 UTC [policies] Evaluate -> DEBU 1872 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:57.992 UTC [policies] Evaluate -> DEBU 1873 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:57.992 UTC [policies] Evaluate -> DEBU 1874 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:57.993 UTC [cauthdsl] func1 -> DEBU 1875 0xc000c42b60 gate 1574140977993027900 evaluation starts" +"2019-11-19 05:22:57.993 UTC [cauthdsl] func2 -> DEBU 1876 0xc000c42b60 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.994 UTC [cauthdsl] func2 -> DEBU 1877 0xc000c42b60 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.994 UTC [cauthdsl] func2 -> DEBU 1878 0xc000c42b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:57.994 UTC [cauthdsl] func2 -> DEBU 1879 0xc000c42b60 principal evaluation fails" +"2019-11-19 05:22:57.994 UTC [cauthdsl] func1 -> DEBU 187a 0xc000c42b60 gate 1574140977993027900 evaluation fails" +"2019-11-19 05:22:57.994 UTC [policies] Evaluate -> DEBU 187b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:57.994 UTC [policies] Evaluate -> DEBU 187c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:57.995 UTC [policies] Evaluate -> DEBU 187d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:57.995 UTC [cauthdsl] func1 -> DEBU 187e 0xc000c433a0 gate 1574140977995405700 evaluation starts" +"2019-11-19 05:22:57.995 UTC [cauthdsl] func2 -> DEBU 187f 0xc000c433a0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.996 UTC [cauthdsl] func2 -> DEBU 1880 0xc000c433a0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.996 UTC [cauthdsl] func2 -> DEBU 1881 0xc000c433a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:57.996 UTC [cauthdsl] func2 -> DEBU 1882 0xc000c433a0 principal evaluation fails" +"2019-11-19 05:22:57.996 UTC [cauthdsl] func1 -> DEBU 1883 0xc000c433a0 gate 1574140977995405700 evaluation fails" +"2019-11-19 05:22:57.997 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:57.997 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:57.997 UTC [policies] Evaluate -> DEBU 1887 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:57.997 UTC [cauthdsl] func1 -> DEBU 1888 0xc000c43be0 gate 1574140977997728500 evaluation starts" +"2019-11-19 05:22:57.997 UTC [cauthdsl] func2 -> DEBU 1889 0xc000c43be0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:57.997 UTC [cauthdsl] func2 -> DEBU 188a 0xc000c43be0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:57.997 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1886 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:57.998 UTC [cauthdsl] func2 -> DEBU 188b 0xc000c43be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:57.998 UTC [cauthdsl] func2 -> DEBU 188c 0xc000c43be0 principal evaluation fails" +"2019-11-19 05:22:57.998 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188d Sending msg of 28 bytes to 3 on channel testchainid took 171.2µs" +"2019-11-19 05:22:57.998 UTC [cauthdsl] func1 -> DEBU 188e 0xc000c43be0 gate 1574140977997728500 evaluation fails" +"2019-11-19 05:22:57.998 UTC [policies] Evaluate -> DEBU 188f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1890 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:57.999 UTC [policies] func1 -> DEBU 1891 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1892 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1893 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:57.999 UTC [policies] Evaluate -> DEBU 1896 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.000 UTC [policies] Evaluate -> DEBU 1897 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:58.000 UTC [cauthdsl] func1 -> DEBU 1898 0xc000d70d50 gate 1574140978000580900 evaluation starts" +"2019-11-19 05:22:58.000 UTC [cauthdsl] func2 -> DEBU 1899 0xc000d70d50 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.001 UTC [cauthdsl] func2 -> DEBU 189a 0xc000d70d50 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.001 UTC [cauthdsl] func2 -> DEBU 189b 0xc000d70d50 principal matched by identity 0" +"2019-11-19 05:22:58.001 UTC [msp.identity] Verify -> DEBU 189c Verify: digest = 00000000 63 36 e4 f7 77 93 88 22 a3 7d b7 c4 c7 9d ac 39 |c6..w..".}.....9| +00000010 16 de ac 32 2c ab 11 35 5a 60 0b 7f 65 a4 33 d1 |...2,..5Z`..e.3.|" +"2019-11-19 05:22:58.002 UTC [msp.identity] Verify -> DEBU 189d Verify: sig = 00000000 30 45 02 21 00 8e 96 0a 55 61 1c f2 73 70 da 16 |0E.!....Ua..sp..| +00000010 de e1 b8 87 48 cd 4e ef 51 31 58 1b 6b a5 56 3c |....H.N.Q1X.k.V<| +00000020 02 6b a9 bb 40 02 20 32 b2 f2 d2 40 e3 b6 ba 66 |.k..@. 2...@...f| +00000030 91 04 5c ff 1c 14 25 ad 6c 4d d1 26 f4 52 ec 18 |..\...%.lM.&.R..| +00000040 20 c7 2c 48 81 41 18 | .,H.A.|" +"2019-11-19 05:22:58.002 UTC [cauthdsl] func2 -> DEBU 189e 0xc000d70d50 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:58.002 UTC [cauthdsl] func1 -> DEBU 189f 0xc000d70d50 gate 1574140978000580900 evaluation succeeds" +"2019-11-19 05:22:58.002 UTC [policies] Evaluate -> DEBU 18a0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.002 UTC [policies] Evaluate -> DEBU 18a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.003 UTC [policies] Evaluate -> DEBU 18a2 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.003 UTC [policies] Evaluate -> DEBU 18a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.003 UTC [policies] Evaluate -> DEBU 18a4 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:58.003 UTC [policies] Evaluate -> DEBU 18a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:58.004 UTC [common.deliver] deliverBlocks -> DEBU 18a6 [channel: businesschannel] Received seekInfo (0xc0000c0500) start: > stop: > from 172.18.0.5:51668" +"2019-11-19 05:22:58.004 UTC [fsblkstorage] Next -> DEBU 18a7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:58.004 UTC [fsblkstorage] newBlockfileStream -> DEBU 18a8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +"2019-11-19 05:22:58.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18a9 Remaining bytes=[38486], Going to peek [8] bytes" +"2019-11-19 05:22:58.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18aa Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +"2019-11-19 05:22:58.005 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ab blockbytes [38483] read from file [0]" +"2019-11-19 05:22:58.005 UTC [common.deliver] deliverBlocks -> DEBU 18ac [channel: businesschannel] Delivering block for (0xc0000c0500) for 172.18.0.5:51668" +"2019-11-19 05:22:57.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1895 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 720.5µs " +"2019-11-19 05:22:58.005 UTC [common.deliver] deliverBlocks -> DEBU 18ad [channel: businesschannel] Done delivering to 172.18.0.5:51668 for (0xc0000c0500)" +"2019-11-19 05:22:58.006 UTC [common.deliver] Handle -> DEBU 18ae Waiting for new SeekInfo from 172.18.0.5:51668" +"2019-11-19 05:22:58.006 UTC [common.deliver] Handle -> DEBU 18af Attempting to read seek info message from 172.18.0.5:51668" +"2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.010 UTC [policies] Evaluate -> DEBU 18b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:58.011 UTC [cauthdsl] func1 -> DEBU 18b5 0xc000fe6c80 gate 1574140978011090400 evaluation starts" +"2019-11-19 05:22:58.011 UTC [cauthdsl] func2 -> DEBU 18b6 0xc000fe6c80 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.011 UTC [cauthdsl] func2 -> DEBU 18b7 0xc000fe6c80 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.011 UTC [cauthdsl] func2 -> DEBU 18b8 0xc000fe6c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:58.011 UTC [cauthdsl] func2 -> DEBU 18b9 0xc000fe6c80 principal evaluation fails" +"2019-11-19 05:22:58.011 UTC [cauthdsl] func1 -> DEBU 18ba 0xc000fe6c80 gate 1574140978011090400 evaluation fails" +"2019-11-19 05:22:58.012 UTC [policies] Evaluate -> DEBU 18bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.012 UTC [policies] Evaluate -> DEBU 18bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.012 UTC [policies] Evaluate -> DEBU 18bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:58.012 UTC [cauthdsl] func1 -> DEBU 18be 0xc000fe74c0 gate 1574140978012677300 evaluation starts" +"2019-11-19 05:22:58.013 UTC [cauthdsl] func2 -> DEBU 18bf 0xc000fe74c0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.013 UTC [cauthdsl] func2 -> DEBU 18c0 0xc000fe74c0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.013 UTC [cauthdsl] func2 -> DEBU 18c1 0xc000fe74c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:58.013 UTC [cauthdsl] func2 -> DEBU 18c2 0xc000fe74c0 principal evaluation fails" +"2019-11-19 05:22:58.013 UTC [cauthdsl] func1 -> DEBU 18c3 0xc000fe74c0 gate 1574140978012677300 evaluation fails" +"2019-11-19 05:22:58.013 UTC [policies] Evaluate -> DEBU 18c4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.013 UTC [policies] Evaluate -> DEBU 18c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.014 UTC [policies] Evaluate -> DEBU 18c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:58.014 UTC [cauthdsl] func1 -> DEBU 18c7 0xc000fe7d00 gate 1574140978014325500 evaluation starts" +"2019-11-19 05:22:58.014 UTC [cauthdsl] func2 -> DEBU 18c8 0xc000fe7d00 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.014 UTC [cauthdsl] func2 -> DEBU 18c9 0xc000fe7d00 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.014 UTC [cauthdsl] func2 -> DEBU 18ca 0xc000fe7d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:58.015 UTC [cauthdsl] func2 -> DEBU 18cb 0xc000fe7d00 principal evaluation fails" +"2019-11-19 05:22:58.015 UTC [cauthdsl] func1 -> DEBU 18cc 0xc000fe7d00 gate 1574140978014325500 evaluation fails" +"2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18cd Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.015 UTC [policies] func1 -> DEBU 18cf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18d0 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18d1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:58.015 UTC [policies] Evaluate -> DEBU 18d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:58.016 UTC [policies] Evaluate -> DEBU 18d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.016 UTC [policies] Evaluate -> DEBU 18d4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:58.016 UTC [cauthdsl] func1 -> DEBU 18d5 0xc0011d09f0 gate 1574140978016610300 evaluation starts" +"2019-11-19 05:22:58.016 UTC [cauthdsl] func2 -> DEBU 18d6 0xc0011d09f0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.016 UTC [cauthdsl] func2 -> DEBU 18d7 0xc0011d09f0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.017 UTC [cauthdsl] func2 -> DEBU 18d8 0xc0011d09f0 principal matched by identity 0" +"2019-11-19 05:22:58.017 UTC [msp.identity] Verify -> DEBU 18d9 Verify: digest = 00000000 d4 39 b1 17 22 b4 a1 6c d2 01 a1 d6 03 aa 8e dd |.9.."..l........| +00000010 6b 11 db ce 29 fe fb c4 cf 80 35 23 b6 50 25 37 |k...).....5#.P%7|" +"2019-11-19 05:22:58.017 UTC [msp.identity] Verify -> DEBU 18da Verify: sig = 00000000 30 45 02 21 00 a9 6e 95 69 c1 30 78 d7 f0 4f 28 |0E.!..n.i.0x..O(| +00000010 df fe 41 a1 b1 44 ff fc 17 ef 3e 7a 4e b3 98 50 |..A..D....>zN..P| +00000020 e1 2f f3 3e e1 02 20 1e fc c8 ca f7 1d f2 a0 21 |./.>.. ........!| +00000030 b4 3c ed c2 37 2d ae 2c cd bc 36 24 07 61 3e d8 |.<..7-.,..6$.a>.| +00000040 e7 96 bd cf f5 49 a1 |.....I.|" +"2019-11-19 05:22:58.018 UTC [cauthdsl] func2 -> DEBU 18db 0xc0011d09f0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:58.018 UTC [cauthdsl] func1 -> DEBU 18dc 0xc0011d09f0 gate 1574140978016610300 evaluation succeeds" +"2019-11-19 05:22:58.018 UTC [policies] Evaluate -> DEBU 18dd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.018 UTC [policies] Evaluate -> DEBU 18de == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.019 UTC [policies] Evaluate -> DEBU 18df Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.019 UTC [policies] Evaluate -> DEBU 18e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.019 UTC [policies] Evaluate -> DEBU 18e1 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:58.019 UTC [policies] Evaluate -> DEBU 18e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:58.019 UTC [common.deliver] deliverBlocks -> DEBU 18e3 [channel: businesschannel] Received seekInfo (0xc000c6bbc0) start: > stop: > from 172.18.0.5:51668" +"2019-11-19 05:22:58.020 UTC [fsblkstorage] Next -> DEBU 18e4 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:58.020 UTC [fsblkstorage] newBlockfileStream -> DEBU 18e5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +"2019-11-19 05:22:58.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e6 Remaining bytes=[38486], Going to peek [8] bytes" +"2019-11-19 05:22:58.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e7 Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +"2019-11-19 05:22:58.021 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e8 blockbytes [38483] read from file [0]" +"2019-11-19 05:22:58.021 UTC [common.deliver] deliverBlocks -> DEBU 18e9 [channel: businesschannel] Delivering block for (0xc000c6bbc0) for 172.18.0.5:51668" +"2019-11-19 05:22:58.022 UTC [common.deliver] deliverBlocks -> DEBU 18ea [channel: businesschannel] Done delivering to 172.18.0.5:51668 for (0xc000c6bbc0)" +"2019-11-19 05:22:58.022 UTC [common.deliver] Handle -> DEBU 18eb Waiting for new SeekInfo from 172.18.0.5:51668" +"2019-11-19 05:22:58.022 UTC [common.deliver] Handle -> DEBU 18ec Attempting to read seek info message from 172.18.0.5:51668" +"2019-11-19 05:22:58.028 UTC [common.deliver] Handle -> WARN 18ee Error reading from 172.18.0.5:51668: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:58.028 UTC [grpc] infof -> DEBU 18ed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:58.028 UTC [orderer.common.server] func1 -> DEBU 18ef Closing Deliver stream" +"2019-11-19 05:22:58.029 UTC [comm.grpc.server] 1 -> INFO 18f0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51668 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.8153ms +"2019-11-19 05:22:58.170 UTC [orderer.common.server] Deliver -> DEBU 18f1 Starting new Deliver handler" +"2019-11-19 05:22:58.171 UTC [common.deliver] Handle -> DEBU 18f2 Starting new deliver loop for 172.18.0.5:51670" +"2019-11-19 05:22:58.171 UTC [common.deliver] Handle -> DEBU 18f3 Attempting to read seek info message from 172.18.0.5:51670" +"2019-11-19 05:22:58.171 UTC [policies] Evaluate -> DEBU 18f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:58.172 UTC [policies] Evaluate -> DEBU 18f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.172 UTC [policies] Evaluate -> DEBU 18f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:58.172 UTC [policies] Evaluate -> DEBU 18f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.172 UTC [policies] Evaluate -> DEBU 18f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:58.172 UTC [cauthdsl] func1 -> DEBU 18f9 0xc000c75840 gate 1574140978172607100 evaluation starts" +"2019-11-19 05:22:58.172 UTC [cauthdsl] func2 -> DEBU 18fa 0xc000c75840 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.173 UTC [cauthdsl] func2 -> DEBU 18fb 0xc000c75840 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.173 UTC [cauthdsl] func2 -> DEBU 18fc 0xc000c75840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:58.173 UTC [cauthdsl] func2 -> DEBU 18fd 0xc000c75840 principal evaluation fails" +"2019-11-19 05:22:58.173 UTC [cauthdsl] func1 -> DEBU 18fe 0xc000c75840 gate 1574140978172607100 evaluation fails" +"2019-11-19 05:22:58.173 UTC [policies] Evaluate -> DEBU 18ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.173 UTC [policies] Evaluate -> DEBU 1900 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.173 UTC [policies] Evaluate -> DEBU 1901 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:58.174 UTC [cauthdsl] func1 -> DEBU 1902 0xc0011fe080 gate 1574140978174116300 evaluation starts" +"2019-11-19 05:22:58.174 UTC [cauthdsl] func2 -> DEBU 1903 0xc0011fe080 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.174 UTC [cauthdsl] func2 -> DEBU 1904 0xc0011fe080 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.174 UTC [cauthdsl] func2 -> DEBU 1905 0xc0011fe080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:58.174 UTC [cauthdsl] func2 -> DEBU 1906 0xc0011fe080 principal evaluation fails" +"2019-11-19 05:22:58.174 UTC [cauthdsl] func1 -> DEBU 1907 0xc0011fe080 gate 1574140978174116300 evaluation fails" +"2019-11-19 05:22:58.175 UTC [policies] Evaluate -> DEBU 1908 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.175 UTC [policies] Evaluate -> DEBU 1909 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.175 UTC [policies] Evaluate -> DEBU 190a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:58.175 UTC [cauthdsl] func1 -> DEBU 190b 0xc0011fe8c0 gate 1574140978175378100 evaluation starts" +"2019-11-19 05:22:58.175 UTC [cauthdsl] func2 -> DEBU 190c 0xc0011fe8c0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.175 UTC [cauthdsl] func2 -> DEBU 190d 0xc0011fe8c0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.175 UTC [cauthdsl] func2 -> DEBU 190e 0xc0011fe8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:58.176 UTC [cauthdsl] func2 -> DEBU 190f 0xc0011fe8c0 principal evaluation fails" +"2019-11-19 05:22:58.176 UTC [cauthdsl] func1 -> DEBU 1910 0xc0011fe8c0 gate 1574140978175378100 evaluation fails" +"2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1911 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1912 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.176 UTC [policies] func1 -> DEBU 1913 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1914 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1915 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:58.176 UTC [policies] Evaluate -> DEBU 1916 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:58.177 UTC [policies] Evaluate -> DEBU 1917 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.177 UTC [policies] Evaluate -> DEBU 1918 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:58.177 UTC [cauthdsl] func1 -> DEBU 1919 0xc0011ff5f0 gate 1574140978177217800 evaluation starts" +"2019-11-19 05:22:58.177 UTC [cauthdsl] func2 -> DEBU 191a 0xc0011ff5f0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.177 UTC [cauthdsl] func2 -> DEBU 191b 0xc0011ff5f0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.177 UTC [cauthdsl] func2 -> DEBU 191c 0xc0011ff5f0 principal matched by identity 0" +"2019-11-19 05:22:58.177 UTC [msp.identity] Verify -> DEBU 191d Verify: digest = 00000000 4f f0 f8 e4 60 ad cb 2f 53 cc f8 fa aa 4d a0 2a |O...`../S....M.*| +00000010 af d7 61 14 5f c6 32 df 15 1c 92 4e 17 b3 17 0f |..a._.2....N....|" +"2019-11-19 05:22:58.177 UTC [msp.identity] Verify -> DEBU 191e Verify: sig = 00000000 30 45 02 21 00 f6 ed bc ea 9c bf 33 48 9f a5 8f |0E.!.......3H...| +00000010 80 47 e9 db 51 ea dd d1 a8 9a a6 0e 35 7e 67 fd |.G..Q.......5~g.| +00000020 d7 94 c7 9f 42 02 20 53 98 41 15 4f 9d e5 fd e5 |....B. S.A.O....| +00000030 51 62 19 ed 98 75 90 81 9c a5 bc 35 fc 74 f0 30 |Qb...u.....5.t.0| +00000040 b8 04 b5 52 23 14 15 |...R#..|" +"2019-11-19 05:22:58.178 UTC [cauthdsl] func2 -> DEBU 191f 0xc0011ff5f0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:58.178 UTC [cauthdsl] func1 -> DEBU 1920 0xc0011ff5f0 gate 1574140978177217800 evaluation succeeds" +"2019-11-19 05:22:58.178 UTC [policies] Evaluate -> DEBU 1921 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.178 UTC [policies] Evaluate -> DEBU 1922 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.178 UTC [policies] Evaluate -> DEBU 1923 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.178 UTC [policies] Evaluate -> DEBU 1924 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.179 UTC [policies] Evaluate -> DEBU 1925 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:58.179 UTC [policies] Evaluate -> DEBU 1926 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:58.179 UTC [common.deliver] deliverBlocks -> DEBU 1927 [channel: businesschannel] Received seekInfo (0xc0000c1280) start: > stop: > from 172.18.0.5:51670" +"2019-11-19 05:22:58.179 UTC [fsblkstorage] Next -> DEBU 1928 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:58.179 UTC [fsblkstorage] newBlockfileStream -> DEBU 1929 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-11-19 05:22:58.179 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 192a Remaining bytes=[127745], Going to peek [8] bytes" +"2019-11-19 05:22:58.180 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 192b Returning blockbytes - length=[25803], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:22:58.180 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 192c blockbytes [25803] read from file [0]" +"2019-11-19 05:22:58.180 UTC [common.deliver] deliverBlocks -> DEBU 192d [channel: businesschannel] Delivering block for (0xc0000c1280) for 172.18.0.5:51670" +"2019-11-19 05:22:58.180 UTC [common.deliver] deliverBlocks -> DEBU 192e [channel: businesschannel] Done delivering to 172.18.0.5:51670 for (0xc0000c1280)" +"2019-11-19 05:22:58.181 UTC [common.deliver] Handle -> DEBU 192f Waiting for new SeekInfo from 172.18.0.5:51670" +"2019-11-19 05:22:58.181 UTC [common.deliver] Handle -> DEBU 1930 Attempting to read seek info message from 172.18.0.5:51670" +"2019-11-19 05:22:58.195 UTC [grpc] infof -> DEBU 1931 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:58.195 UTC [common.deliver] Handle -> WARN 1932 Error reading from 172.18.0.5:51670: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:58.195 UTC [orderer.common.server] func1 -> DEBU 1933 Closing Deliver stream" +"2019-11-19 05:22:58.195 UTC [comm.grpc.server] 1 -> INFO 1934 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51670 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.9238ms +"2019-11-19 05:22:58.341 UTC [orderer.common.server] Deliver -> DEBU 1935 Starting new Deliver handler" +"2019-11-19 05:22:58.341 UTC [common.deliver] Handle -> DEBU 1936 Starting new deliver loop for 172.18.0.5:51672" +"2019-11-19 05:22:58.341 UTC [common.deliver] Handle -> DEBU 1937 Attempting to read seek info message from 172.18.0.5:51672" +"2019-11-19 05:22:58.342 UTC [policies] Evaluate -> DEBU 1938 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:58.342 UTC [policies] Evaluate -> DEBU 1939 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.343 UTC [policies] Evaluate -> DEBU 193a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:58.343 UTC [policies] Evaluate -> DEBU 193b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.343 UTC [policies] Evaluate -> DEBU 193c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:58.344 UTC [cauthdsl] func1 -> DEBU 193d 0xc00122dba0 gate 1574140978344106500 evaluation starts" +"2019-11-19 05:22:58.344 UTC [cauthdsl] func2 -> DEBU 193e 0xc00122dba0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.345 UTC [cauthdsl] func2 -> DEBU 193f 0xc00122dba0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.345 UTC [cauthdsl] func2 -> DEBU 1940 0xc00122dba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:58.345 UTC [cauthdsl] func2 -> DEBU 1941 0xc00122dba0 principal evaluation fails" +"2019-11-19 05:22:58.345 UTC [cauthdsl] func1 -> DEBU 1942 0xc00122dba0 gate 1574140978344106500 evaluation fails" +"2019-11-19 05:22:58.345 UTC [policies] Evaluate -> DEBU 1943 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.346 UTC [policies] Evaluate -> DEBU 1944 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.346 UTC [policies] Evaluate -> DEBU 1945 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:58.346 UTC [cauthdsl] func1 -> DEBU 1946 0xc0012464f0 gate 1574140978346708900 evaluation starts" +"2019-11-19 05:22:58.347 UTC [cauthdsl] func2 -> DEBU 1947 0xc0012464f0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.347 UTC [cauthdsl] func2 -> DEBU 1948 0xc0012464f0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.347 UTC [cauthdsl] func2 -> DEBU 1949 0xc0012464f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:58.347 UTC [cauthdsl] func2 -> DEBU 194a 0xc0012464f0 principal evaluation fails" +"2019-11-19 05:22:58.348 UTC [cauthdsl] func1 -> DEBU 194b 0xc0012464f0 gate 1574140978346708900 evaluation fails" +"2019-11-19 05:22:58.348 UTC [policies] Evaluate -> DEBU 194c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.348 UTC [policies] Evaluate -> DEBU 194d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.348 UTC [policies] Evaluate -> DEBU 194e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:58.349 UTC [cauthdsl] func1 -> DEBU 194f 0xc001246d80 gate 1574140978349463600 evaluation starts" +"2019-11-19 05:22:58.349 UTC [cauthdsl] func2 -> DEBU 1950 0xc001246d80 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.349 UTC [cauthdsl] func2 -> DEBU 1951 0xc001246d80 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.350 UTC [cauthdsl] func2 -> DEBU 1952 0xc001246d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:58.350 UTC [cauthdsl] func2 -> DEBU 1953 0xc001246d80 principal evaluation fails" +"2019-11-19 05:22:58.350 UTC [cauthdsl] func1 -> DEBU 1954 0xc001246d80 gate 1574140978349463600 evaluation fails" +"2019-11-19 05:22:58.350 UTC [policies] Evaluate -> DEBU 1955 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.350 UTC [policies] Evaluate -> DEBU 1956 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.350 UTC [policies] func1 -> DEBU 1957 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:58.351 UTC [policies] Evaluate -> DEBU 1958 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:58.351 UTC [policies] Evaluate -> DEBU 1959 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:58.351 UTC [policies] Evaluate -> DEBU 195a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:58.352 UTC [policies] Evaluate -> DEBU 195b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.352 UTC [policies] Evaluate -> DEBU 195c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:58.353 UTC [cauthdsl] func1 -> DEBU 195d 0xc001247bb0 gate 1574140978353006900 evaluation starts" +"2019-11-19 05:22:58.353 UTC [cauthdsl] func2 -> DEBU 195e 0xc001247bb0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.353 UTC [cauthdsl] func2 -> DEBU 195f 0xc001247bb0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.353 UTC [cauthdsl] func2 -> DEBU 1960 0xc001247bb0 principal matched by identity 0" +"2019-11-19 05:22:58.353 UTC [msp.identity] Verify -> DEBU 1961 Verify: digest = 00000000 b4 2a 0b 2a 55 3f f2 73 fa ed 58 51 df d3 6c 55 |.*.*U?.s..XQ..lU| +00000010 ac c4 19 0f 11 53 58 6e bb b2 cc d6 13 78 c2 8e |.....SXn.....x..|" +"2019-11-19 05:22:58.353 UTC [msp.identity] Verify -> DEBU 1962 Verify: sig = 00000000 30 44 02 20 62 09 af 78 71 3d e4 28 64 33 ec f9 |0D. b..xq=.(d3..| +00000010 35 41 1b 12 4f f2 66 3d 85 ff d7 40 4a 42 fb 1e |5A..O.f=...@JB..| +00000020 31 0b f6 c0 02 20 68 c8 06 03 58 34 25 7c f9 93 |1.... h...X4%|..| +00000030 23 79 35 f4 a3 63 78 51 18 c7 d4 b1 2e 75 eb 66 |#y5..cxQ.....u.f| +00000040 05 ae 64 ff 57 66 |..d.Wf|" +"2019-11-19 05:22:58.354 UTC [cauthdsl] func2 -> DEBU 1963 0xc001247bb0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:58.354 UTC [cauthdsl] func1 -> DEBU 1964 0xc001247bb0 gate 1574140978353006900 evaluation succeeds" +"2019-11-19 05:22:58.354 UTC [policies] Evaluate -> DEBU 1965 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.354 UTC [policies] Evaluate -> DEBU 1966 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.354 UTC [policies] Evaluate -> DEBU 1967 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.354 UTC [policies] Evaluate -> DEBU 1968 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.355 UTC [policies] Evaluate -> DEBU 1969 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:58.355 UTC [policies] Evaluate -> DEBU 196a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:58.356 UTC [common.deliver] deliverBlocks -> DEBU 196b [channel: businesschannel] Received seekInfo (0xc0000c1c00) start: > stop: > from 172.18.0.5:51672" +"2019-11-19 05:22:58.356 UTC [fsblkstorage] Next -> DEBU 196c Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:58.357 UTC [fsblkstorage] newBlockfileStream -> DEBU 196d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25806]" +"2019-11-19 05:22:58.357 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196e Remaining bytes=[101939], Going to peek [8] bytes" +"2019-11-19 05:22:58.357 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196f Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25806], bytesOffset=[25809]}" +"2019-11-19 05:22:58.357 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1970 blockbytes [25475] read from file [0]" +"2019-11-19 05:22:58.358 UTC [common.deliver] deliverBlocks -> DEBU 1971 [channel: businesschannel] Delivering block for (0xc0000c1c00) for 172.18.0.5:51672" +"2019-11-19 05:22:58.358 UTC [common.deliver] deliverBlocks -> DEBU 1972 [channel: businesschannel] Done delivering to 172.18.0.5:51672 for (0xc0000c1c00)" +"2019-11-19 05:22:58.359 UTC [common.deliver] Handle -> DEBU 1973 Waiting for new SeekInfo from 172.18.0.5:51672" +"2019-11-19 05:22:58.359 UTC [common.deliver] Handle -> DEBU 1974 Attempting to read seek info message from 172.18.0.5:51672" +"2019-11-19 05:22:58.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1975 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2019-11-19 05:22:58.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1976 Sending msg of 28 bytes to 3 on channel businesschannel took 74.9µs" +"2019-11-19 05:22:58.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1977 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 426µs " +"2019-11-19 05:22:58.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1978 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.2µs " +"2019-11-19 05:22:58.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1979 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:58.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 197a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:58.369 UTC [grpc] infof -> DEBU 197b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:58.369 UTC [common.deliver] Handle -> WARN 197c Error reading from 172.18.0.5:51672: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:58.369 UTC [orderer.common.server] func1 -> DEBU 197d Closing Deliver stream" +"2019-11-19 05:22:58.370 UTC [comm.grpc.server] 1 -> INFO 197e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51672 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.1214ms +"2019-11-19 05:22:58.495 UTC [orderer.common.cluster.step] handleMessage -> DEBU 197f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:58.496 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1980 Sending msg of 28 bytes to 3 on channel testchainid took 114.7µs" +"2019-11-19 05:22:58.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1981 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.7µs " +"2019-11-19 05:22:58.530 UTC [orderer.common.server] Deliver -> DEBU 1982 Starting new Deliver handler" +"2019-11-19 05:22:58.530 UTC [common.deliver] Handle -> DEBU 1983 Starting new deliver loop for 172.18.0.5:51674" +"2019-11-19 05:22:58.531 UTC [common.deliver] Handle -> DEBU 1984 Attempting to read seek info message from 172.18.0.5:51674" +"2019-11-19 05:22:58.532 UTC [policies] Evaluate -> DEBU 1985 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:58.532 UTC [policies] Evaluate -> DEBU 1986 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.533 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:58.533 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.537 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:58.539 UTC [cauthdsl] func1 -> DEBU 198a 0xc000f90490 gate 1574140978539004800 evaluation starts" +"2019-11-19 05:22:58.540 UTC [cauthdsl] func2 -> DEBU 198b 0xc000f90490 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.542 UTC [cauthdsl] func2 -> DEBU 198c 0xc000f90490 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.543 UTC [cauthdsl] func2 -> DEBU 198d 0xc000f90490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:58.543 UTC [cauthdsl] func2 -> DEBU 198e 0xc000f90490 principal evaluation fails" +"2019-11-19 05:22:58.544 UTC [cauthdsl] func1 -> DEBU 198f 0xc000f90490 gate 1574140978539004800 evaluation fails" +"2019-11-19 05:22:58.544 UTC [policies] Evaluate -> DEBU 1990 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.545 UTC [policies] Evaluate -> DEBU 1991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.545 UTC [policies] Evaluate -> DEBU 1992 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:58.545 UTC [cauthdsl] func1 -> DEBU 1993 0xc000f90cd0 gate 1574140978545929200 evaluation starts" +"2019-11-19 05:22:58.546 UTC [cauthdsl] func2 -> DEBU 1994 0xc000f90cd0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.546 UTC [cauthdsl] func2 -> DEBU 1995 0xc000f90cd0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.546 UTC [cauthdsl] func2 -> DEBU 1996 0xc000f90cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:58.546 UTC [cauthdsl] func2 -> DEBU 1997 0xc000f90cd0 principal evaluation fails" +"2019-11-19 05:22:58.546 UTC [cauthdsl] func1 -> DEBU 1998 0xc000f90cd0 gate 1574140978545929200 evaluation fails" +"2019-11-19 05:22:58.547 UTC [policies] Evaluate -> DEBU 1999 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.547 UTC [policies] Evaluate -> DEBU 199a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.547 UTC [policies] Evaluate -> DEBU 199b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:58.547 UTC [cauthdsl] func1 -> DEBU 199c 0xc000f91510 gate 1574140978547457800 evaluation starts" +"2019-11-19 05:22:58.547 UTC [cauthdsl] func2 -> DEBU 199d 0xc000f91510 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.547 UTC [cauthdsl] func2 -> DEBU 199e 0xc000f91510 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.547 UTC [cauthdsl] func2 -> DEBU 199f 0xc000f91510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:58.547 UTC [cauthdsl] func2 -> DEBU 19a0 0xc000f91510 principal evaluation fails" +"2019-11-19 05:22:58.548 UTC [cauthdsl] func1 -> DEBU 19a1 0xc000f91510 gate 1574140978547457800 evaluation fails" +"2019-11-19 05:22:58.548 UTC [policies] Evaluate -> DEBU 19a2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.548 UTC [policies] Evaluate -> DEBU 19a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.548 UTC [policies] func1 -> DEBU 19a4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:58.548 UTC [policies] Evaluate -> DEBU 19a5 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:58.548 UTC [policies] Evaluate -> DEBU 19a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:58.549 UTC [policies] Evaluate -> DEBU 19a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:58.549 UTC [policies] Evaluate -> DEBU 19a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.549 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:58.549 UTC [cauthdsl] func1 -> DEBU 19aa 0xc0011bc200 gate 1574140978549522600 evaluation starts" +"2019-11-19 05:22:58.549 UTC [cauthdsl] func2 -> DEBU 19ab 0xc0011bc200 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.549 UTC [cauthdsl] func2 -> DEBU 19ac 0xc0011bc200 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.549 UTC [cauthdsl] func2 -> DEBU 19ad 0xc0011bc200 principal matched by identity 0" +"2019-11-19 05:22:58.550 UTC [msp.identity] Verify -> DEBU 19ae Verify: digest = 00000000 7f 23 1a b3 37 ff d0 87 71 f2 0c 75 cb fb 2b 5c |.#..7...q..u..+\| +00000010 c4 26 a7 25 05 fb 5a c0 b0 1b 55 6d 32 91 f2 f2 |.&.%..Z...Um2...|" +"2019-11-19 05:22:58.550 UTC [msp.identity] Verify -> DEBU 19af Verify: sig = 00000000 30 45 02 21 00 bf 5b 51 a6 88 b5 be 3c 70 6d e2 |0E.!..[Q.... DEBU 19b0 0xc0011bc200 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:58.550 UTC [cauthdsl] func1 -> DEBU 19b1 0xc0011bc200 gate 1574140978549522600 evaluation succeeds" +"2019-11-19 05:22:58.550 UTC [policies] Evaluate -> DEBU 19b2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b4 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b6 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:58.551 UTC [policies] Evaluate -> DEBU 19b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:58.551 UTC [common.deliver] deliverBlocks -> DEBU 19b8 [channel: businesschannel] Received seekInfo (0xc000269800) start: > stop: > from 172.18.0.5:51674" +"2019-11-19 05:22:58.551 UTC [fsblkstorage] Next -> DEBU 19b9 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:58.552 UTC [fsblkstorage] newBlockfileStream -> DEBU 19ba newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51284]" +"2019-11-19 05:22:58.552 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bb Remaining bytes=[76461], Going to peek [8] bytes" +"2019-11-19 05:22:58.552 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bc Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51284], bytesOffset=[51287]}" +"2019-11-19 05:22:58.552 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd blockbytes [25480] read from file [0]" +"2019-11-19 05:22:58.553 UTC [common.deliver] deliverBlocks -> DEBU 19be [channel: businesschannel] Delivering block for (0xc000269800) for 172.18.0.5:51674" +"2019-11-19 05:22:58.553 UTC [common.deliver] deliverBlocks -> DEBU 19bf [channel: businesschannel] Done delivering to 172.18.0.5:51674 for (0xc000269800)" +"2019-11-19 05:22:58.555 UTC [common.deliver] Handle -> DEBU 19c0 Waiting for new SeekInfo from 172.18.0.5:51674" +"2019-11-19 05:22:58.555 UTC [common.deliver] Handle -> DEBU 19c1 Attempting to read seek info message from 172.18.0.5:51674" +"2019-11-19 05:22:58.561 UTC [common.deliver] Handle -> WARN 19c2 Error reading from 172.18.0.5:51674: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:58.561 UTC [orderer.common.server] func1 -> DEBU 19c3 Closing Deliver stream" +"2019-11-19 05:22:58.561 UTC [comm.grpc.server] 1 -> INFO 19c4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51674 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.2307ms +"2019-11-19 05:22:58.562 UTC [grpc] infof -> DEBU 19c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:58.720 UTC [orderer.common.server] Deliver -> DEBU 19c6 Starting new Deliver handler" +"2019-11-19 05:22:58.720 UTC [common.deliver] Handle -> DEBU 19c7 Starting new deliver loop for 172.18.0.5:51676" +"2019-11-19 05:22:58.720 UTC [common.deliver] Handle -> DEBU 19c8 Attempting to read seek info message from 172.18.0.5:51676" +"2019-11-19 05:22:58.721 UTC [policies] Evaluate -> DEBU 19c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:58.721 UTC [policies] Evaluate -> DEBU 19ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.721 UTC [policies] Evaluate -> DEBU 19cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:58.721 UTC [policies] Evaluate -> DEBU 19cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.722 UTC [policies] Evaluate -> DEBU 19cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:58.722 UTC [cauthdsl] func1 -> DEBU 19ce 0xc0012c8320 gate 1574140978722162100 evaluation starts" +"2019-11-19 05:22:58.722 UTC [cauthdsl] func2 -> DEBU 19cf 0xc0012c8320 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.722 UTC [cauthdsl] func2 -> DEBU 19d0 0xc0012c8320 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.722 UTC [cauthdsl] func2 -> DEBU 19d1 0xc0012c8320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:58.723 UTC [cauthdsl] func2 -> DEBU 19d2 0xc0012c8320 principal evaluation fails" +"2019-11-19 05:22:58.723 UTC [cauthdsl] func1 -> DEBU 19d3 0xc0012c8320 gate 1574140978722162100 evaluation fails" +"2019-11-19 05:22:58.723 UTC [policies] Evaluate -> DEBU 19d4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.723 UTC [policies] Evaluate -> DEBU 19d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.724 UTC [policies] Evaluate -> DEBU 19d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:58.724 UTC [cauthdsl] func1 -> DEBU 19d7 0xc0012c8b60 gate 1574140978724236300 evaluation starts" +"2019-11-19 05:22:58.724 UTC [cauthdsl] func2 -> DEBU 19d8 0xc0012c8b60 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.724 UTC [cauthdsl] func2 -> DEBU 19d9 0xc0012c8b60 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.724 UTC [cauthdsl] func2 -> DEBU 19da 0xc0012c8b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:58.724 UTC [cauthdsl] func2 -> DEBU 19db 0xc0012c8b60 principal evaluation fails" +"2019-11-19 05:22:58.724 UTC [cauthdsl] func1 -> DEBU 19dc 0xc0012c8b60 gate 1574140978724236300 evaluation fails" +"2019-11-19 05:22:58.725 UTC [policies] Evaluate -> DEBU 19dd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.725 UTC [policies] Evaluate -> DEBU 19de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.725 UTC [policies] Evaluate -> DEBU 19df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:58.725 UTC [cauthdsl] func1 -> DEBU 19e0 0xc0012c93a0 gate 1574140978725494900 evaluation starts" +"2019-11-19 05:22:58.725 UTC [cauthdsl] func2 -> DEBU 19e1 0xc0012c93a0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.725 UTC [cauthdsl] func2 -> DEBU 19e2 0xc0012c93a0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.725 UTC [cauthdsl] func2 -> DEBU 19e3 0xc0012c93a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:58.725 UTC [cauthdsl] func2 -> DEBU 19e4 0xc0012c93a0 principal evaluation fails" +"2019-11-19 05:22:58.726 UTC [cauthdsl] func1 -> DEBU 19e5 0xc0012c93a0 gate 1574140978725494900 evaluation fails" +"2019-11-19 05:22:58.726 UTC [policies] Evaluate -> DEBU 19e6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.726 UTC [policies] Evaluate -> DEBU 19e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.726 UTC [policies] func1 -> DEBU 19e8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:58.726 UTC [policies] Evaluate -> DEBU 19e9 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:58.726 UTC [policies] Evaluate -> DEBU 19ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:58.727 UTC [policies] Evaluate -> DEBU 19eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:58.727 UTC [policies] Evaluate -> DEBU 19ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.727 UTC [policies] Evaluate -> DEBU 19ed == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:58.727 UTC [cauthdsl] func1 -> DEBU 19ee 0xc00127a090 gate 1574140978727455300 evaluation starts" +"2019-11-19 05:22:58.727 UTC [cauthdsl] func2 -> DEBU 19ef 0xc00127a090 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.727 UTC [cauthdsl] func2 -> DEBU 19f0 0xc00127a090 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.727 UTC [cauthdsl] func2 -> DEBU 19f1 0xc00127a090 principal matched by identity 0" +"2019-11-19 05:22:58.727 UTC [msp.identity] Verify -> DEBU 19f2 Verify: digest = 00000000 03 0e 2d a5 1c 82 c7 04 d6 23 b6 ea 31 eb 9b 46 |..-......#..1..F| +00000010 ab 3e 55 19 61 bf 4a 66 bc c9 6f 3e aa 83 58 5d |.>U.a.Jf..o>..X]|" +"2019-11-19 05:22:58.728 UTC [msp.identity] Verify -> DEBU 19f3 Verify: sig = 00000000 30 45 02 21 00 c2 30 85 05 a8 c5 b7 82 92 e8 87 |0E.!..0.........| +00000010 8b 09 4c 13 ef b4 3b 90 c5 8b b6 c7 21 2b 49 4a |..L...;.....!+IJ| +00000020 5c 9a d4 5b 19 02 20 6d 82 2f c1 65 22 27 d5 6a |\..[.. m./.e"'.j| +00000030 28 1e 81 79 9e 48 19 76 b5 a9 b4 6e 7d ba ca 48 |(..y.H.v...n}..H| +00000040 c4 bb da d8 d5 f5 e9 |.......|" +"2019-11-19 05:22:58.728 UTC [cauthdsl] func2 -> DEBU 19f4 0xc00127a090 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:58.728 UTC [cauthdsl] func1 -> DEBU 19f5 0xc00127a090 gate 1574140978727455300 evaluation succeeds" +"2019-11-19 05:22:58.728 UTC [policies] Evaluate -> DEBU 19f6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.728 UTC [policies] Evaluate -> DEBU 19f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.728 UTC [policies] Evaluate -> DEBU 19f8 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.728 UTC [policies] Evaluate -> DEBU 19f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.729 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:58.729 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:58.729 UTC [common.deliver] deliverBlocks -> DEBU 19fc [channel: businesschannel] Received seekInfo (0xc000bb40c0) start: > stop: > from 172.18.0.5:51676" +"2019-11-19 05:22:58.729 UTC [fsblkstorage] Next -> DEBU 19fd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:58.729 UTC [fsblkstorage] newBlockfileStream -> DEBU 19fe newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76767]" +"2019-11-19 05:22:58.729 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19ff Remaining bytes=[50978], Going to peek [8] bytes" +"2019-11-19 05:22:58.729 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a00 Returning blockbytes - length=[4521], placementInfo={fileNum=[0], startOffset=[76767], bytesOffset=[76769]}" +"2019-11-19 05:22:58.730 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a01 blockbytes [4521] read from file [0]" +"2019-11-19 05:22:58.730 UTC [common.deliver] deliverBlocks -> DEBU 1a02 [channel: businesschannel] Delivering block for (0xc000bb40c0) for 172.18.0.5:51676" +"2019-11-19 05:22:58.730 UTC [common.deliver] deliverBlocks -> DEBU 1a03 [channel: businesschannel] Done delivering to 172.18.0.5:51676 for (0xc000bb40c0)" +"2019-11-19 05:22:58.730 UTC [common.deliver] Handle -> DEBU 1a04 Waiting for new SeekInfo from 172.18.0.5:51676" +"2019-11-19 05:22:58.730 UTC [common.deliver] Handle -> DEBU 1a05 Attempting to read seek info message from 172.18.0.5:51676" +"2019-11-19 05:22:58.737 UTC [grpc] infof -> DEBU 1a07 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:58.737 UTC [common.deliver] Handle -> WARN 1a06 Error reading from 172.18.0.5:51676: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:58.739 UTC [orderer.common.server] func1 -> DEBU 1a08 Closing Deliver stream" +"2019-11-19 05:22:58.739 UTC [comm.grpc.server] 1 -> INFO 1a09 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51676 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.9644ms +"2019-11-19 05:22:58.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0a Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +"2019-11-19 05:22:58.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 173.1µs " +"2019-11-19 05:22:58.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0c Sending msg of 28 bytes to 3 on channel businesschannel took 382µs" +"2019-11-19 05:22:58.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a0d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.9µs " +"2019-11-19 05:22:58.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a0e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:58.866 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a0f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:58.921 UTC [orderer.common.server] Deliver -> DEBU 1a10 Starting new Deliver handler" +"2019-11-19 05:22:58.921 UTC [common.deliver] Handle -> DEBU 1a11 Starting new deliver loop for 172.18.0.5:51678" +"2019-11-19 05:22:58.921 UTC [common.deliver] Handle -> DEBU 1a12 Attempting to read seek info message from 172.18.0.5:51678" +"2019-11-19 05:22:58.923 UTC [policies] Evaluate -> DEBU 1a13 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:58.923 UTC [policies] Evaluate -> DEBU 1a14 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.924 UTC [policies] Evaluate -> DEBU 1a15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:58.924 UTC [policies] Evaluate -> DEBU 1a16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.924 UTC [policies] Evaluate -> DEBU 1a17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:58.925 UTC [cauthdsl] func1 -> DEBU 1a18 0xc0010069f0 gate 1574140978925150000 evaluation starts" +"2019-11-19 05:22:58.925 UTC [cauthdsl] func2 -> DEBU 1a19 0xc0010069f0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.925 UTC [cauthdsl] func2 -> DEBU 1a1a 0xc0010069f0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.926 UTC [cauthdsl] func2 -> DEBU 1a1b 0xc0010069f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:58.926 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc0010069f0 principal evaluation fails" +"2019-11-19 05:22:58.926 UTC [cauthdsl] func1 -> DEBU 1a1d 0xc0010069f0 gate 1574140978925150000 evaluation fails" +"2019-11-19 05:22:58.926 UTC [policies] Evaluate -> DEBU 1a1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.926 UTC [policies] Evaluate -> DEBU 1a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:58.926 UTC [policies] Evaluate -> DEBU 1a20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:58.926 UTC [cauthdsl] func1 -> DEBU 1a21 0xc001007230 gate 1574140978926740600 evaluation starts" +"2019-11-19 05:22:58.926 UTC [cauthdsl] func2 -> DEBU 1a22 0xc001007230 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.926 UTC [cauthdsl] func2 -> DEBU 1a23 0xc001007230 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.927 UTC [cauthdsl] func2 -> DEBU 1a24 0xc001007230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:58.927 UTC [cauthdsl] func2 -> DEBU 1a25 0xc001007230 principal evaluation fails" +"2019-11-19 05:22:58.927 UTC [cauthdsl] func1 -> DEBU 1a26 0xc001007230 gate 1574140978926740600 evaluation fails" +"2019-11-19 05:22:58.927 UTC [policies] Evaluate -> DEBU 1a27 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.927 UTC [policies] Evaluate -> DEBU 1a28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:58.927 UTC [policies] Evaluate -> DEBU 1a29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:58.928 UTC [cauthdsl] func1 -> DEBU 1a2a 0xc001007a70 gate 1574140978928000500 evaluation starts" +"2019-11-19 05:22:58.928 UTC [cauthdsl] func2 -> DEBU 1a2b 0xc001007a70 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.928 UTC [cauthdsl] func2 -> DEBU 1a2c 0xc001007a70 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.928 UTC [cauthdsl] func2 -> DEBU 1a2d 0xc001007a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:58.928 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc001007a70 principal evaluation fails" +"2019-11-19 05:22:58.928 UTC [cauthdsl] func1 -> DEBU 1a2f 0xc001007a70 gate 1574140978928000500 evaluation fails" +"2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a30 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:58.929 UTC [policies] func1 -> DEBU 1a32 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a33 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a34 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:58.929 UTC [policies] Evaluate -> DEBU 1a35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:58.930 UTC [policies] Evaluate -> DEBU 1a36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:58.930 UTC [policies] Evaluate -> DEBU 1a37 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:58.930 UTC [cauthdsl] func1 -> DEBU 1a38 0xc00117a760 gate 1574140978930343800 evaluation starts" +"2019-11-19 05:22:58.930 UTC [cauthdsl] func2 -> DEBU 1a39 0xc00117a760 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:58.930 UTC [cauthdsl] func2 -> DEBU 1a3a 0xc00117a760 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:58.930 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc00117a760 principal matched by identity 0" +"2019-11-19 05:22:58.931 UTC [msp.identity] Verify -> DEBU 1a3c Verify: digest = 00000000 e5 cf 0c c8 2f 5e 55 53 25 05 f1 c0 7e 7a a0 cc |..../^US%...~z..| +00000010 ee 2b a9 15 09 73 75 e0 c8 1e cf 78 fa d3 58 83 |.+...su....x..X.|" +"2019-11-19 05:22:58.931 UTC [msp.identity] Verify -> DEBU 1a3d Verify: sig = 00000000 30 44 02 20 53 0f 5f 88 d1 d3 4f 7e 50 d3 80 b8 |0D. S._...O~P...| +00000010 0f 2a ed 0d 69 14 3b da 95 fc 7f 05 72 24 1b db |.*..i.;.....r$..| +00000020 10 9b 74 fa 02 20 0d 70 ff d0 6c 8b ed d4 40 1a |..t.. .p..l...@.| +00000030 21 25 ac 3e bb 35 69 e6 b0 6d 8d 82 c6 b1 eb 89 |!%.>.5i..m......| +00000040 22 1e ab f2 3a 64 |"...:d|" +"2019-11-19 05:22:58.931 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc00117a760 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:58.932 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc00117a760 gate 1574140978930343800 evaluation succeeds" +"2019-11-19 05:22:58.932 UTC [policies] Evaluate -> DEBU 1a40 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.932 UTC [policies] Evaluate -> DEBU 1a41 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:58.932 UTC [policies] Evaluate -> DEBU 1a42 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.932 UTC [policies] Evaluate -> DEBU 1a43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:58.933 UTC [policies] Evaluate -> DEBU 1a44 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:58.933 UTC [policies] Evaluate -> DEBU 1a45 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:58.933 UTC [common.deliver] deliverBlocks -> DEBU 1a46 [channel: businesschannel] Received seekInfo (0xc000bb49c0) start: > stop: > from 172.18.0.5:51678" +"2019-11-19 05:22:58.934 UTC [fsblkstorage] Next -> DEBU 1a47 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:58.934 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a48 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[81290]" +"2019-11-19 05:22:58.934 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a49 Remaining bytes=[46455], Going to peek [8] bytes" +"2019-11-19 05:22:58.934 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4a Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81290], bytesOffset=[81292]}" +"2019-11-19 05:22:58.934 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4b blockbytes [3982] read from file [0]" +"2019-11-19 05:22:58.935 UTC [common.deliver] deliverBlocks -> DEBU 1a4c [channel: businesschannel] Delivering block for (0xc000bb49c0) for 172.18.0.5:51678" +"2019-11-19 05:22:58.935 UTC [common.deliver] deliverBlocks -> DEBU 1a4d [channel: businesschannel] Done delivering to 172.18.0.5:51678 for (0xc000bb49c0)" +"2019-11-19 05:22:58.935 UTC [common.deliver] Handle -> DEBU 1a4e Waiting for new SeekInfo from 172.18.0.5:51678" +"2019-11-19 05:22:58.935 UTC [common.deliver] Handle -> DEBU 1a4f Attempting to read seek info message from 172.18.0.5:51678" +"2019-11-19 05:22:58.940 UTC [common.deliver] Handle -> WARN 1a50 Error reading from 172.18.0.5:51678: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:58.940 UTC [orderer.common.server] func1 -> DEBU 1a51 Closing Deliver stream" +"2019-11-19 05:22:58.940 UTC [comm.grpc.server] 1 -> INFO 1a52 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51678 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.655ms +"2019-11-19 05:22:58.940 UTC [grpc] infof -> DEBU 1a53 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:58.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a54 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:58.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a55 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2019-11-19 05:22:58.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.3µs " +"2019-11-19 05:22:59.094 UTC [orderer.common.server] Deliver -> DEBU 1a57 Starting new Deliver handler" +"2019-11-19 05:22:59.094 UTC [common.deliver] Handle -> DEBU 1a58 Starting new deliver loop for 172.18.0.5:51680" +"2019-11-19 05:22:59.095 UTC [common.deliver] Handle -> DEBU 1a59 Attempting to read seek info message from 172.18.0.5:51680" +"2019-11-19 05:22:59.095 UTC [policies] Evaluate -> DEBU 1a5a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:59.095 UTC [policies] Evaluate -> DEBU 1a5b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.095 UTC [policies] Evaluate -> DEBU 1a5c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:59.095 UTC [policies] Evaluate -> DEBU 1a5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.096 UTC [policies] Evaluate -> DEBU 1a5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:59.096 UTC [cauthdsl] func1 -> DEBU 1a5f 0xc00118f0b0 gate 1574140979096387700 evaluation starts" +"2019-11-19 05:22:59.096 UTC [cauthdsl] func2 -> DEBU 1a60 0xc00118f0b0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.096 UTC [cauthdsl] func2 -> DEBU 1a61 0xc00118f0b0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.096 UTC [cauthdsl] func2 -> DEBU 1a62 0xc00118f0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:59.096 UTC [cauthdsl] func2 -> DEBU 1a63 0xc00118f0b0 principal evaluation fails" +"2019-11-19 05:22:59.097 UTC [cauthdsl] func1 -> DEBU 1a64 0xc00118f0b0 gate 1574140979096387700 evaluation fails" +"2019-11-19 05:22:59.097 UTC [policies] Evaluate -> DEBU 1a65 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:59.098 UTC [policies] Evaluate -> DEBU 1a66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:59.098 UTC [policies] Evaluate -> DEBU 1a67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:59.098 UTC [cauthdsl] func1 -> DEBU 1a68 0xc0012c4f30 gate 1574140979098504200 evaluation starts" +"2019-11-19 05:22:59.098 UTC [cauthdsl] func2 -> DEBU 1a69 0xc0012c4f30 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.098 UTC [cauthdsl] func2 -> DEBU 1a6a 0xc0012c4f30 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.098 UTC [cauthdsl] func2 -> DEBU 1a6b 0xc0012c4f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:59.099 UTC [cauthdsl] func2 -> DEBU 1a6c 0xc0012c4f30 principal evaluation fails" +"2019-11-19 05:22:59.099 UTC [cauthdsl] func1 -> DEBU 1a6d 0xc0012c4f30 gate 1574140979098504200 evaluation fails" +"2019-11-19 05:22:59.099 UTC [policies] Evaluate -> DEBU 1a6e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:59.099 UTC [policies] Evaluate -> DEBU 1a6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:59.099 UTC [policies] Evaluate -> DEBU 1a70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:59.100 UTC [cauthdsl] func1 -> DEBU 1a71 0xc0012c5770 gate 1574140979100192800 evaluation starts" +"2019-11-19 05:22:59.100 UTC [cauthdsl] func2 -> DEBU 1a72 0xc0012c5770 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.100 UTC [cauthdsl] func2 -> DEBU 1a73 0xc0012c5770 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.100 UTC [cauthdsl] func2 -> DEBU 1a74 0xc0012c5770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:59.100 UTC [cauthdsl] func2 -> DEBU 1a75 0xc0012c5770 principal evaluation fails" +"2019-11-19 05:22:59.100 UTC [cauthdsl] func1 -> DEBU 1a76 0xc0012c5770 gate 1574140979100192800 evaluation fails" +"2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a77 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:59.101 UTC [policies] func1 -> DEBU 1a79 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a7a Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:59.101 UTC [policies] Evaluate -> DEBU 1a7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.102 UTC [policies] Evaluate -> DEBU 1a7e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:59.102 UTC [cauthdsl] func1 -> DEBU 1a7f 0xc00112a460 gate 1574140979102259600 evaluation starts" +"2019-11-19 05:22:59.102 UTC [cauthdsl] func2 -> DEBU 1a80 0xc00112a460 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.102 UTC [cauthdsl] func2 -> DEBU 1a81 0xc00112a460 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.102 UTC [cauthdsl] func2 -> DEBU 1a82 0xc00112a460 principal matched by identity 0" +"2019-11-19 05:22:59.102 UTC [msp.identity] Verify -> DEBU 1a83 Verify: digest = 00000000 8f be 6e 4e df 97 f0 ab 19 17 75 b3 8c 0f c8 5c |..nN......u....\| +00000010 82 ee f5 5c 32 ca ed 46 b4 4e 9d cf 38 5d 2c 07 |...\2..F.N..8],.|" +"2019-11-19 05:22:59.103 UTC [msp.identity] Verify -> DEBU 1a84 Verify: sig = 00000000 30 45 02 21 00 84 6c 54 8e 9f 87 d6 41 e0 2b b4 |0E.!..lT....A.+.| +00000010 e5 47 ac 6d f0 0f 6a f5 c7 9f 63 16 d4 3d 89 55 |.G.m..j...c..=.U| +00000020 1e a9 4a 37 6a 02 20 73 31 44 84 01 36 5b dd a1 |..J7j. s1D..6[..| +00000030 8b 14 52 b8 d9 f3 4d be e7 f3 2a 41 57 64 41 f8 |..R...M...*AWdA.| +00000040 71 ff 1f bf 63 e8 39 |q...c.9|" +"2019-11-19 05:22:59.103 UTC [cauthdsl] func2 -> DEBU 1a85 0xc00112a460 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:59.103 UTC [cauthdsl] func1 -> DEBU 1a86 0xc00112a460 gate 1574140979102259600 evaluation succeeds" +"2019-11-19 05:22:59.103 UTC [policies] Evaluate -> DEBU 1a87 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.103 UTC [policies] Evaluate -> DEBU 1a88 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.104 UTC [policies] Evaluate -> DEBU 1a89 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.104 UTC [policies] Evaluate -> DEBU 1a8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.104 UTC [policies] Evaluate -> DEBU 1a8b Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:59.104 UTC [policies] Evaluate -> DEBU 1a8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:59.104 UTC [common.deliver] deliverBlocks -> DEBU 1a8d [channel: businesschannel] Received seekInfo (0xc000bb5080) start: > stop: > from 172.18.0.5:51680" +"2019-11-19 05:22:59.104 UTC [fsblkstorage] Next -> DEBU 1a8e Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:59.105 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a8f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85274]" +"2019-11-19 05:22:59.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a90 Remaining bytes=[42471], Going to peek [8] bytes" +"2019-11-19 05:22:59.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a91 Returning blockbytes - length=[3983], placementInfo={fileNum=[0], startOffset=[85274], bytesOffset=[85276]}" +"2019-11-19 05:22:59.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a92 blockbytes [3983] read from file [0]" +"2019-11-19 05:22:59.105 UTC [common.deliver] deliverBlocks -> DEBU 1a93 [channel: businesschannel] Delivering block for (0xc000bb5080) for 172.18.0.5:51680" +"2019-11-19 05:22:59.106 UTC [common.deliver] deliverBlocks -> DEBU 1a94 [channel: businesschannel] Done delivering to 172.18.0.5:51680 for (0xc000bb5080)" +"2019-11-19 05:22:59.106 UTC [common.deliver] Handle -> DEBU 1a95 Waiting for new SeekInfo from 172.18.0.5:51680" +"2019-11-19 05:22:59.106 UTC [common.deliver] Handle -> DEBU 1a96 Attempting to read seek info message from 172.18.0.5:51680" +"2019-11-19 05:22:59.112 UTC [common.deliver] Handle -> WARN 1a98 Error reading from 172.18.0.5:51680: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:59.112 UTC [grpc] infof -> DEBU 1a97 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:59.112 UTC [orderer.common.server] func1 -> DEBU 1a99 Closing Deliver stream" +"2019-11-19 05:22:59.113 UTC [comm.grpc.server] 1 -> INFO 1a9a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51680 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.6497ms +"2019-11-19 05:22:59.258 UTC [orderer.common.server] Deliver -> DEBU 1a9b Starting new Deliver handler" +"2019-11-19 05:22:59.258 UTC [common.deliver] Handle -> DEBU 1a9c Starting new deliver loop for 172.18.0.5:51682" +"2019-11-19 05:22:59.258 UTC [common.deliver] Handle -> DEBU 1a9d Attempting to read seek info message from 172.18.0.5:51682" +"2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1a9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1a9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.259 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-11-19 05:22:59.259 UTC [cauthdsl] func1 -> DEBU 1aa3 0xc00129c7c0 gate 1574140979259795000 evaluation starts" +"2019-11-19 05:22:59.259 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc00129c7c0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.260 UTC [cauthdsl] func2 -> DEBU 1aa5 0xc00129c7c0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.260 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc00129c7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-11-19 05:22:59.260 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc00129c7c0 principal evaluation fails" +"2019-11-19 05:22:59.260 UTC [cauthdsl] func1 -> DEBU 1aa8 0xc00129c7c0 gate 1574140979259795000 evaluation fails" +"2019-11-19 05:22:59.260 UTC [policies] Evaluate -> DEBU 1aa9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:59.261 UTC [policies] Evaluate -> DEBU 1aaa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-11-19 05:22:59.261 UTC [policies] Evaluate -> DEBU 1aab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-11-19 05:22:59.261 UTC [cauthdsl] func1 -> DEBU 1aac 0xc00129d000 gate 1574140979261393500 evaluation starts" +"2019-11-19 05:22:59.261 UTC [cauthdsl] func2 -> DEBU 1aad 0xc00129d000 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.261 UTC [cauthdsl] func2 -> DEBU 1aae 0xc00129d000 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.261 UTC [cauthdsl] func2 -> DEBU 1aaf 0xc00129d000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-11-19 05:22:59.261 UTC [cauthdsl] func2 -> DEBU 1ab0 0xc00129d000 principal evaluation fails" +"2019-11-19 05:22:59.262 UTC [cauthdsl] func1 -> DEBU 1ab1 0xc00129d000 gate 1574140979261393500 evaluation fails" +"2019-11-19 05:22:59.262 UTC [policies] Evaluate -> DEBU 1ab2 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:59.262 UTC [policies] Evaluate -> DEBU 1ab3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-11-19 05:22:59.262 UTC [policies] Evaluate -> DEBU 1ab4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-11-19 05:22:59.262 UTC [cauthdsl] func1 -> DEBU 1ab5 0xc00129d840 gate 1574140979262593000 evaluation starts" +"2019-11-19 05:22:59.262 UTC [cauthdsl] func2 -> DEBU 1ab6 0xc00129d840 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.262 UTC [cauthdsl] func2 -> DEBU 1ab7 0xc00129d840 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.263 UTC [cauthdsl] func2 -> DEBU 1ab8 0xc00129d840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-11-19 05:22:59.263 UTC [cauthdsl] func2 -> DEBU 1ab9 0xc00129d840 principal evaluation fails" +"2019-11-19 05:22:59.263 UTC [cauthdsl] func1 -> DEBU 1aba 0xc00129d840 gate 1574140979262593000 evaluation fails" +"2019-11-19 05:22:59.263 UTC [policies] Evaluate -> DEBU 1abb Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:59.263 UTC [policies] Evaluate -> DEBU 1abc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-11-19 05:22:59.263 UTC [policies] func1 -> DEBU 1abd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-11-19 05:22:59.263 UTC [policies] Evaluate -> DEBU 1abe Signature set did not satisfy policy /Channel/Application/Readers" +"2019-11-19 05:22:59.264 UTC [policies] Evaluate -> DEBU 1abf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-11-19 05:22:59.264 UTC [policies] Evaluate -> DEBU 1ac0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:59.264 UTC [policies] Evaluate -> DEBU 1ac1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.264 UTC [policies] Evaluate -> DEBU 1ac2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:59.264 UTC [cauthdsl] func1 -> DEBU 1ac3 0xc0012a6530 gate 1574140979264549300 evaluation starts" +"2019-11-19 05:22:59.264 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc0012a6530 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.264 UTC [cauthdsl] func2 -> DEBU 1ac5 0xc0012a6530 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.264 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0012a6530 principal matched by identity 0" +"2019-11-19 05:22:59.265 UTC [msp.identity] Verify -> DEBU 1ac7 Verify: digest = 00000000 40 1a 8d 08 ea 55 8c 86 07 61 56 1b ae af 2f 40 |@....U...aV.../@| +00000010 69 dd f1 71 27 f1 c4 34 27 40 0a cc 03 6a 5e 7f |i..q'..4'@...j^.|" +"2019-11-19 05:22:59.265 UTC [msp.identity] Verify -> DEBU 1ac8 Verify: sig = 00000000 30 44 02 20 6e b9 a7 1f a3 55 9a be 5c d6 ac da |0D. n....U..\...| +00000010 23 5f c5 8e 85 23 1c 9d 9a 96 3b fb 77 68 52 97 |#_...#....;.whR.| +00000020 d1 13 ab 49 02 20 68 1a a9 8e fa a3 46 d5 39 73 |...I. h.....F.9s| +00000030 bc e3 b3 3a 6b 3d b2 e5 6f 00 fb 5b 87 e9 69 b1 |...:k=..o..[..i.| +00000040 60 47 f5 c1 d7 a8 |`G....|" +"2019-11-19 05:22:59.265 UTC [cauthdsl] func2 -> DEBU 1ac9 0xc0012a6530 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:59.265 UTC [cauthdsl] func1 -> DEBU 1aca 0xc0012a6530 gate 1574140979264549300 evaluation succeeds" +"2019-11-19 05:22:59.265 UTC [policies] Evaluate -> DEBU 1acb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.265 UTC [policies] Evaluate -> DEBU 1acc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.266 UTC [policies] Evaluate -> DEBU 1acd Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.266 UTC [policies] Evaluate -> DEBU 1ace == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.266 UTC [policies] Evaluate -> DEBU 1acf Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:59.266 UTC [policies] Evaluate -> DEBU 1ad0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:59.266 UTC [common.deliver] deliverBlocks -> DEBU 1ad1 [channel: businesschannel] Received seekInfo (0xc000bb5540) start: > stop: > from 172.18.0.5:51682" +"2019-11-19 05:22:59.266 UTC [fsblkstorage] Next -> DEBU 1ad2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-11-19 05:22:59.266 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89259]" +"2019-11-19 05:22:59.267 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad4 Remaining bytes=[38486], Going to peek [8] bytes" +"2019-11-19 05:22:59.267 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad5 Returning blockbytes - length=[38483], placementInfo={fileNum=[0], startOffset=[89259], bytesOffset=[89262]}" +"2019-11-19 05:22:59.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad6 blockbytes [38483] read from file [0]" +"2019-11-19 05:22:59.268 UTC [common.deliver] deliverBlocks -> DEBU 1ad7 [channel: businesschannel] Delivering block for (0xc000bb5540) for 172.18.0.5:51682" +"2019-11-19 05:22:59.268 UTC [common.deliver] deliverBlocks -> DEBU 1ad8 [channel: businesschannel] Done delivering to 172.18.0.5:51682 for (0xc000bb5540)" +"2019-11-19 05:22:59.269 UTC [common.deliver] Handle -> DEBU 1ad9 Waiting for new SeekInfo from 172.18.0.5:51682" +"2019-11-19 05:22:59.269 UTC [common.deliver] Handle -> DEBU 1ada Attempting to read seek info message from 172.18.0.5:51682" +"2019-11-19 05:22:59.291 UTC [common.deliver] Handle -> WARN 1adb Error reading from 172.18.0.5:51682: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:59.291 UTC [orderer.common.server] func1 -> DEBU 1add Closing Deliver stream" +"2019-11-19 05:22:59.292 UTC [comm.grpc.server] 1 -> INFO 1ade streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51682 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.0601ms +"2019-11-19 05:22:59.291 UTC [grpc] infof -> DEBU 1adc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:59.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1adf Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2019-11-19 05:22:59.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ae0 Sending msg of 28 bytes to 3 on channel businesschannel took 23.8µs" +"2019-11-19 05:22:59.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ae1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.4µs " +"2019-11-19 05:22:59.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ae2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125µs " +"2019-11-19 05:22:59.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae3 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:59.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae4 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:59.471 UTC [orderer.common.server] Deliver -> DEBU 1ae5 Starting new Deliver handler" +"2019-11-19 05:22:59.472 UTC [common.deliver] Handle -> DEBU 1ae6 Starting new deliver loop for 172.18.0.5:51684" +"2019-11-19 05:22:59.472 UTC [common.deliver] Handle -> DEBU 1ae7 Attempting to read seek info message from 172.18.0.5:51684" +"2019-11-19 05:22:59.473 UTC [policies] Evaluate -> DEBU 1ae8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:59.483 UTC [policies] Evaluate -> DEBU 1ae9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.483 UTC [policies] Evaluate -> DEBU 1aea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:59.483 UTC [policies] Evaluate -> DEBU 1aeb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.483 UTC [policies] Evaluate -> DEBU 1aec == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:59.484 UTC [cauthdsl] func1 -> DEBU 1aed 0xc001125470 gate 1574140979484034600 evaluation starts" +"2019-11-19 05:22:59.484 UTC [cauthdsl] func2 -> DEBU 1aee 0xc001125470 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.484 UTC [cauthdsl] func2 -> DEBU 1aef 0xc001125470 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.484 UTC [cauthdsl] func2 -> DEBU 1af0 0xc001125470 principal matched by identity 0" +"2019-11-19 05:22:59.484 UTC [msp.identity] Verify -> DEBU 1af1 Verify: digest = 00000000 0f 09 98 c6 fc 52 2c 57 ee 35 dd 6f ed bc 6c e8 |.....R,W.5.o..l.| +00000010 6b ff bc 67 33 38 b6 f0 f4 d8 07 3e 22 a5 aa 5e |k..g38.....>"..^|" +"2019-11-19 05:22:59.484 UTC [msp.identity] Verify -> DEBU 1af2 Verify: sig = 00000000 30 44 02 20 48 56 02 a3 77 5c 65 41 73 a4 74 60 |0D. HV..w\eAs.t`| +00000010 81 06 60 91 2b 49 6a 3b 63 b9 35 b5 3a 8b 56 31 |..`.+Ij;c.5.:.V1| +00000020 ce 28 d6 75 02 20 59 56 85 17 1a df b2 d3 0d 07 |.(.u. YV........| +00000030 81 92 8a 26 83 15 b7 07 cd bb 32 0c 5d b0 3c 25 |...&......2.].<%| +00000040 5f 49 51 30 ff ba |_IQ0..|" +"2019-11-19 05:22:59.485 UTC [cauthdsl] func2 -> DEBU 1af3 0xc001125470 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:59.485 UTC [cauthdsl] func1 -> DEBU 1af4 0xc001125470 gate 1574140979484034600 evaluation succeeds" +"2019-11-19 05:22:59.485 UTC [policies] Evaluate -> DEBU 1af5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.485 UTC [policies] Evaluate -> DEBU 1af6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.485 UTC [policies] Evaluate -> DEBU 1af7 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.486 UTC [policies] Evaluate -> DEBU 1af8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.486 UTC [policies] Evaluate -> DEBU 1af9 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:59.487 UTC [policies] Evaluate -> DEBU 1afa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:59.487 UTC [common.deliver] deliverBlocks -> DEBU 1afb [channel: testchainid] Received seekInfo (0xc00095f380) start: > stop: > from 172.18.0.5:51684" +"2019-11-19 05:22:59.487 UTC [fsblkstorage] Next -> DEBU 1afc Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:59.488 UTC [fsblkstorage] newBlockfileStream -> DEBU 1afd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-11-19 05:22:59.488 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afe Remaining bytes=[27692], Going to peek [8] bytes" +"2019-11-19 05:22:59.488 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aff Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-11-19 05:22:59.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b00 blockbytes [27689] read from file [0]" +"2019-11-19 05:22:59.489 UTC [common.deliver] deliverBlocks -> DEBU 1b01 [channel: testchainid] Delivering block for (0xc00095f380) for 172.18.0.5:51684" +"2019-11-19 05:22:59.490 UTC [common.deliver] deliverBlocks -> DEBU 1b02 [channel: testchainid] Done delivering to 172.18.0.5:51684 for (0xc00095f380)" +"2019-11-19 05:22:59.490 UTC [common.deliver] Handle -> DEBU 1b03 Waiting for new SeekInfo from 172.18.0.5:51684" +"2019-11-19 05:22:59.490 UTC [common.deliver] Handle -> DEBU 1b04 Attempting to read seek info message from 172.18.0.5:51684" +"2019-11-19 05:22:59.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b05 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:59.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b06 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-11-19 05:22:59.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " +"2019-11-19 05:22:59.508 UTC [grpc] infof -> DEBU 1b08 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:59.508 UTC [common.deliver] Handle -> WARN 1b09 Error reading from 172.18.0.5:51684: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:59.515 UTC [orderer.common.server] func1 -> DEBU 1b0a Closing Deliver stream" +"2019-11-19 05:22:59.515 UTC [comm.grpc.server] 1 -> INFO 1b0b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51684 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.4186ms +"2019-11-19 05:22:59.724 UTC [orderer.common.server] Deliver -> DEBU 1b0c Starting new Deliver handler" +"2019-11-19 05:22:59.724 UTC [common.deliver] Handle -> DEBU 1b0d Starting new deliver loop for 172.18.0.5:51686" +"2019-11-19 05:22:59.725 UTC [common.deliver] Handle -> DEBU 1b0e Attempting to read seek info message from 172.18.0.5:51686" +"2019-11-19 05:22:59.725 UTC [policies] Evaluate -> DEBU 1b0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:59.725 UTC [policies] Evaluate -> DEBU 1b10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.725 UTC [policies] Evaluate -> DEBU 1b11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:59.725 UTC [policies] Evaluate -> DEBU 1b12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.726 UTC [policies] Evaluate -> DEBU 1b13 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:59.727 UTC [cauthdsl] func1 -> DEBU 1b14 0xc000d4cbe0 gate 1574140979727205200 evaluation starts" +"2019-11-19 05:22:59.727 UTC [cauthdsl] func2 -> DEBU 1b15 0xc000d4cbe0 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.727 UTC [cauthdsl] func2 -> DEBU 1b16 0xc000d4cbe0 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.728 UTC [cauthdsl] func2 -> DEBU 1b17 0xc000d4cbe0 principal matched by identity 0" +"2019-11-19 05:22:59.728 UTC [msp.identity] Verify -> DEBU 1b18 Verify: digest = 00000000 c5 ec 96 de a7 ef e1 a3 44 d8 39 da 31 70 4e a9 |........D.9.1pN.| +00000010 bd 03 1f 81 e1 ae 5e 14 5b e7 46 61 30 f6 fb 54 |......^.[.Fa0..T|" +"2019-11-19 05:22:59.728 UTC [msp.identity] Verify -> DEBU 1b19 Verify: sig = 00000000 30 44 02 20 67 fd 09 cd 8b 5c f2 e5 44 51 3e f4 |0D. g....\..DQ>.| +00000010 7c 63 e0 83 06 b4 17 b7 04 80 57 98 65 5d 60 38 ||c........W.e]`8| +00000020 0e fc 76 9b 02 20 5a c5 52 b8 93 82 07 65 62 80 |..v.. Z.R....eb.| +00000030 92 33 71 b5 75 1d c8 9a 4d fe 07 8a 6c be 21 f6 |.3q.u...M...l.!.| +00000040 a8 d3 0f c1 da 4d |.....M|" +"2019-11-19 05:22:59.729 UTC [cauthdsl] func2 -> DEBU 1b1a 0xc000d4cbe0 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:59.729 UTC [cauthdsl] func1 -> DEBU 1b1b 0xc000d4cbe0 gate 1574140979727205200 evaluation succeeds" +"2019-11-19 05:22:59.729 UTC [policies] Evaluate -> DEBU 1b1c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.729 UTC [policies] Evaluate -> DEBU 1b1d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.729 UTC [policies] Evaluate -> DEBU 1b1e Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.730 UTC [policies] Evaluate -> DEBU 1b1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.730 UTC [policies] Evaluate -> DEBU 1b20 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:59.730 UTC [policies] Evaluate -> DEBU 1b21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:59.730 UTC [common.deliver] deliverBlocks -> DEBU 1b22 [channel: testchainid] Received seekInfo (0xc000bb4180) start: > stop: > from 172.18.0.5:51686" +"2019-11-19 05:22:59.730 UTC [fsblkstorage] Next -> DEBU 1b23 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:59.736 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b24 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-11-19 05:22:59.736 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b25 Remaining bytes=[27692], Going to peek [8] bytes" +"2019-11-19 05:22:59.739 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b26 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-11-19 05:22:59.740 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b27 blockbytes [27689] read from file [0]" +"2019-11-19 05:22:59.740 UTC [common.deliver] deliverBlocks -> DEBU 1b28 [channel: testchainid] Delivering block for (0xc000bb4180) for 172.18.0.5:51686" +"2019-11-19 05:22:59.741 UTC [common.deliver] deliverBlocks -> DEBU 1b29 [channel: testchainid] Done delivering to 172.18.0.5:51686 for (0xc000bb4180)" +"2019-11-19 05:22:59.741 UTC [common.deliver] Handle -> DEBU 1b2a Waiting for new SeekInfo from 172.18.0.5:51686" +"2019-11-19 05:22:59.742 UTC [common.deliver] Handle -> DEBU 1b2b Attempting to read seek info message from 172.18.0.5:51686" +"2019-11-19 05:22:59.760 UTC [policies] Evaluate -> DEBU 1b2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:59.760 UTC [policies] Evaluate -> DEBU 1b2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.761 UTC [policies] Evaluate -> DEBU 1b2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:59.761 UTC [policies] Evaluate -> DEBU 1b2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.761 UTC [policies] Evaluate -> DEBU 1b30 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:59.762 UTC [cauthdsl] func1 -> DEBU 1b31 0xc00122cc70 gate 1574140979762111300 evaluation starts" +"2019-11-19 05:22:59.762 UTC [cauthdsl] func2 -> DEBU 1b32 0xc00122cc70 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.762 UTC [cauthdsl] func2 -> DEBU 1b33 0xc00122cc70 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.762 UTC [cauthdsl] func2 -> DEBU 1b34 0xc00122cc70 principal matched by identity 0" +"2019-11-19 05:22:59.762 UTC [msp.identity] Verify -> DEBU 1b35 Verify: digest = 00000000 aa b9 cc 4a 24 6c 34 ae ab 8b 0a cc be 2e 96 63 |...J$l4........c| +00000010 14 42 68 44 f4 cf 43 ca 28 9d 6c 0a 60 77 af 1f |.BhD..C.(.l.`w..|" +"2019-11-19 05:22:59.763 UTC [msp.identity] Verify -> DEBU 1b36 Verify: sig = 00000000 30 45 02 21 00 b8 eb c1 8b 48 d8 f0 8d 84 da f3 |0E.!.....H......| +00000010 4d cd f4 b9 f7 45 8c 3d 39 ab 55 1c d8 15 65 7f |M....E.=9.U...e.| +00000020 a3 8f fb 11 c2 02 20 5f 58 5f 21 97 fd b3 0f e6 |...... _X_!.....| +00000030 1b c8 10 18 74 39 c5 84 5b 03 0f 9e de e6 c0 2a |....t9..[......*| +00000040 32 ba ff ad 60 39 57 |2...`9W|" +"2019-11-19 05:22:59.763 UTC [cauthdsl] func2 -> DEBU 1b37 0xc00122cc70 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:59.763 UTC [cauthdsl] func1 -> DEBU 1b38 0xc00122cc70 gate 1574140979762111300 evaluation succeeds" +"2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b39 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3b Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3d Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:59.764 UTC [policies] Evaluate -> DEBU 1b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:59.765 UTC [common.deliver] deliverBlocks -> DEBU 1b3f [channel: testchainid] Received seekInfo (0xc000bb4640) start: > stop: > from 172.18.0.5:51686" +"2019-11-19 05:22:59.765 UTC [fsblkstorage] Next -> DEBU 1b40 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:59.765 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b41 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:22:59.766 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b42 Remaining bytes=[47979], Going to peek [8] bytes" +"2019-11-19 05:22:59.766 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b43 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:22:59.766 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b44 blockbytes [20284] read from file [0]" +"2019-11-19 05:22:59.766 UTC [common.deliver] deliverBlocks -> DEBU 1b45 [channel: testchainid] Delivering block for (0xc000bb4640) for 172.18.0.5:51686" +"2019-11-19 05:22:59.767 UTC [common.deliver] deliverBlocks -> DEBU 1b46 [channel: testchainid] Done delivering to 172.18.0.5:51686 for (0xc000bb4640)" +"2019-11-19 05:22:59.767 UTC [common.deliver] Handle -> DEBU 1b47 Waiting for new SeekInfo from 172.18.0.5:51686" +"2019-11-19 05:22:59.768 UTC [common.deliver] Handle -> DEBU 1b48 Attempting to read seek info message from 172.18.0.5:51686" +"2019-11-19 05:22:59.778 UTC [grpc] infof -> DEBU 1b49 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:22:59.778 UTC [common.deliver] Handle -> WARN 1b4a Error reading from 172.18.0.5:51686: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:22:59.778 UTC [orderer.common.server] func1 -> DEBU 1b4b Closing Deliver stream" +"2019-11-19 05:22:59.778 UTC [comm.grpc.server] 1 -> INFO 1b4c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51686 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.5223ms +"2019-11-19 05:22:59.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4d Sending msg of 28 bytes to 3 on channel businesschannel took 23.8µs" +"2019-11-19 05:22:59.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4e Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +"2019-11-19 05:22:59.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171µs " +"2019-11-19 05:22:59.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.3µs " +"2019-11-19 05:22:59.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b51 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:59.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b52 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:22:59.987 UTC [orderer.common.server] Deliver -> DEBU 1b53 Starting new Deliver handler" +"2019-11-19 05:22:59.987 UTC [common.deliver] Handle -> DEBU 1b54 Starting new deliver loop for 172.18.0.5:51688" +"2019-11-19 05:22:59.987 UTC [common.deliver] Handle -> DEBU 1b55 Attempting to read seek info message from 172.18.0.5:51688" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b58 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b5a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:22:59.988 UTC [cauthdsl] func1 -> DEBU 1b5b 0xc000c75710 gate 1574140979988238800 evaluation starts" +"2019-11-19 05:22:59.988 UTC [cauthdsl] func2 -> DEBU 1b5c 0xc000c75710 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:22:59.988 UTC [cauthdsl] func2 -> DEBU 1b5d 0xc000c75710 processing identity 0 with bytes of fd6070" +"2019-11-19 05:22:59.988 UTC [cauthdsl] func2 -> DEBU 1b5e 0xc000c75710 principal matched by identity 0" +"2019-11-19 05:22:59.988 UTC [msp.identity] Verify -> DEBU 1b5f Verify: digest = 00000000 fb 47 b3 c6 de 2a 67 16 12 d5 ab 25 1d 20 4d 8e |.G...*g....%. M.| +00000010 5f 7b bb 30 af 88 0e 5c 6c e1 b9 98 03 bc 00 68 |_{.0...\l......h|" +"2019-11-19 05:22:59.988 UTC [msp.identity] Verify -> DEBU 1b60 Verify: sig = 00000000 30 45 02 21 00 b9 fd 46 9d 1a 26 2e 67 0f bb 17 |0E.!...F..&.g...| +00000010 a3 74 b6 56 f5 54 7d cd ff 68 68 f9 e5 c0 2c c0 |.t.V.T}..hh...,.| +00000020 6c ed 32 75 de 02 20 31 e0 a5 7b 7f 14 c3 a5 31 |l.2u.. 1..{....1| +00000030 50 e0 e9 a3 17 10 2d 43 e6 a8 eb b2 1b dd a6 74 |P.....-C.......t| +00000040 01 5a c2 0c 41 27 6d |.Z..A'm|" +"2019-11-19 05:22:59.988 UTC [cauthdsl] func2 -> DEBU 1b61 0xc000c75710 principal evaluation succeeds for identity 0" +"2019-11-19 05:22:59.988 UTC [cauthdsl] func1 -> DEBU 1b62 0xc000c75710 gate 1574140979988238800 evaluation succeeds" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b63 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b64 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b65 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b66 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b67 Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:22:59.988 UTC [policies] Evaluate -> DEBU 1b68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:22:59.988 UTC [common.deliver] deliverBlocks -> DEBU 1b69 [channel: testchainid] Received seekInfo (0xc000bb4e40) start: > stop: > from 172.18.0.5:51688" +"2019-11-19 05:22:59.990 UTC [fsblkstorage] Next -> DEBU 1b6a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:22:59.990 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b6b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-11-19 05:22:59.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6c Remaining bytes=[47979], Going to peek [8] bytes" +"2019-11-19 05:22:59.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6d Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-11-19 05:22:59.990 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6e blockbytes [20284] read from file [0]" +"2019-11-19 05:22:59.990 UTC [common.deliver] deliverBlocks -> DEBU 1b6f [channel: testchainid] Delivering block for (0xc000bb4e40) for 172.18.0.5:51688" +"2019-11-19 05:22:59.991 UTC [common.deliver] deliverBlocks -> DEBU 1b70 [channel: testchainid] Done delivering to 172.18.0.5:51688 for (0xc000bb4e40)" +"2019-11-19 05:22:59.991 UTC [common.deliver] Handle -> DEBU 1b71 Waiting for new SeekInfo from 172.18.0.5:51688" +"2019-11-19 05:22:59.991 UTC [common.deliver] Handle -> DEBU 1b72 Attempting to read seek info message from 172.18.0.5:51688" +"2019-11-19 05:22:59.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b73 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:22:59.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b74 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-11-19 05:22:59.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.5µs " +"2019-11-19 05:23:00.005 UTC [common.deliver] Handle -> WARN 1b76 Error reading from 172.18.0.5:51688: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:23:00.006 UTC [orderer.common.server] func1 -> DEBU 1b77 Closing Deliver stream" +"2019-11-19 05:23:00.005 UTC [grpc] infof -> DEBU 1b78 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:23:00.006 UTC [comm.grpc.server] 1 -> INFO 1b79 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51688 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8568ms +"2019-11-19 05:23:00.191 UTC [orderer.common.server] Deliver -> DEBU 1b7a Starting new Deliver handler" +"2019-11-19 05:23:00.191 UTC [common.deliver] Handle -> DEBU 1b7b Starting new deliver loop for 172.18.0.5:51690" +"2019-11-19 05:23:00.191 UTC [common.deliver] Handle -> DEBU 1b7c Attempting to read seek info message from 172.18.0.5:51690" +"2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b80 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-11-19 05:23:00.193 UTC [policies] Evaluate -> DEBU 1b81 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-11-19 05:23:00.194 UTC [cauthdsl] func1 -> DEBU 1b82 0xc000d71d00 gate 1574140980194093700 evaluation starts" +"2019-11-19 05:23:00.194 UTC [cauthdsl] func2 -> DEBU 1b83 0xc000d71d00 signed by 0 principal evaluation starts (used [false])" +"2019-11-19 05:23:00.194 UTC [cauthdsl] func2 -> DEBU 1b84 0xc000d71d00 processing identity 0 with bytes of fd6070" +"2019-11-19 05:23:00.194 UTC [cauthdsl] func2 -> DEBU 1b85 0xc000d71d00 principal matched by identity 0" +"2019-11-19 05:23:00.194 UTC [msp.identity] Verify -> DEBU 1b86 Verify: digest = 00000000 4d 12 64 46 d1 b9 f6 75 d7 14 4f 75 cb 3d ed d4 |M.dF...u..Ou.=..| +00000010 38 55 a1 1a 09 61 71 4d e4 3e 0a 7a 17 3a 34 e5 |8U...aqM.>.z.:4.|" +"2019-11-19 05:23:00.194 UTC [msp.identity] Verify -> DEBU 1b87 Verify: sig = 00000000 30 45 02 21 00 e6 ba f6 6d 34 3b 04 c6 57 cf 19 |0E.!....m4;..W..| +00000010 be 23 5f 5a a2 01 23 dd bf 6e 43 a7 8d d5 c8 5e |.#_Z..#..nC....^| +00000020 0f 3c 4e 0c e2 02 20 26 00 ab 86 99 0b 9b 68 c0 |. DEBU 1b88 0xc000d71d00 principal evaluation succeeds for identity 0" +"2019-11-19 05:23:00.195 UTC [cauthdsl] func1 -> DEBU 1b89 0xc000d71d00 gate 1574140980194093700 evaluation succeeds" +"2019-11-19 05:23:00.195 UTC [policies] Evaluate -> DEBU 1b8a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:23:00.195 UTC [policies] Evaluate -> DEBU 1b8b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-11-19 05:23:00.196 UTC [policies] Evaluate -> DEBU 1b8c Signature set satisfies policy /Channel/Orderer/Readers" +"2019-11-19 05:23:00.196 UTC [policies] Evaluate -> DEBU 1b8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-11-19 05:23:00.196 UTC [policies] Evaluate -> DEBU 1b8e Signature set satisfies policy /Channel/Readers" +"2019-11-19 05:23:00.196 UTC [policies] Evaluate -> DEBU 1b8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-11-19 05:23:00.196 UTC [common.deliver] deliverBlocks -> DEBU 1b90 [channel: testchainid] Received seekInfo (0xc000bb5440) start: > stop: > from 172.18.0.5:51690" +"2019-11-19 05:23:00.197 UTC [fsblkstorage] Next -> DEBU 1b91 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-11-19 05:23:00.197 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b92 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-11-19 05:23:00.197 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b93 Remaining bytes=[27692], Going to peek [8] bytes" +"2019-11-19 05:23:00.197 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b94 Returning blockbytes - length=[27689], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-11-19 05:23:00.197 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b95 blockbytes [27689] read from file [0]" +"2019-11-19 05:23:00.197 UTC [common.deliver] deliverBlocks -> DEBU 1b96 [channel: testchainid] Delivering block for (0xc000bb5440) for 172.18.0.5:51690" +"2019-11-19 05:23:00.198 UTC [common.deliver] deliverBlocks -> DEBU 1b97 [channel: testchainid] Done delivering to 172.18.0.5:51690 for (0xc000bb5440)" +"2019-11-19 05:23:00.198 UTC [common.deliver] Handle -> DEBU 1b98 Waiting for new SeekInfo from 172.18.0.5:51690" +"2019-11-19 05:23:00.199 UTC [common.deliver] Handle -> DEBU 1b99 Attempting to read seek info message from 172.18.0.5:51690" +"2019-11-19 05:23:00.209 UTC [grpc] infof -> DEBU 1b9a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-11-19 05:23:00.209 UTC [common.deliver] Handle -> WARN 1b9b Error reading from 172.18.0.5:51690: rpc error: code = Canceled desc = context canceled" +"2019-11-19 05:23:00.209 UTC [orderer.common.server] func1 -> DEBU 1b9c Closing Deliver stream" +"2019-11-19 05:23:00.210 UTC [comm.grpc.server] 1 -> INFO 1b9d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:51690 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.9311ms +"2019-11-19 05:23:00.370 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9e Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +"2019-11-19 05:23:00.370 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9f Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2019-11-19 05:23:00.370 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.2µs " +"2019-11-19 05:23:00.370 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.4µs " +"2019-11-19 05:23:00.372 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:00.372 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba3 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:00.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba4 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:00.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba5 Sending msg of 28 bytes to 3 on channel testchainid took 9.5µs" +"2019-11-19 05:23:00.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 225.8µs " +"2019-11-19 05:23:00.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba7 Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +"2019-11-19 05:23:00.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba8 Sending msg of 28 bytes to 2 on channel businesschannel took 9.1µs" +"2019-11-19 05:23:00.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.3µs " +"2019-11-19 05:23:00.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.1µs " +"2019-11-19 05:23:00.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bab Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:00.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bac Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:00.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bad Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:00.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bae Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-11-19 05:23:00.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.7µs " +"2019-11-19 05:23:01.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb0 Sending msg of 28 bytes to 2 on channel businesschannel took 36.5µs" +"2019-11-19 05:23:01.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.3µs " +"2019-11-19 05:23:01.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb2 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:01.367 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb3 Sending msg of 28 bytes to 3 on channel businesschannel took 124.6µs" +"2019-11-19 05:23:01.368 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +"2019-11-19 05:23:01.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb5 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:01.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb6 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:01.495 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb7 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-11-19 05:23:01.496 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.5µs " +"2019-11-19 05:23:01.863 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb9 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2019-11-19 05:23:01.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bba Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +"2019-11-19 05:23:01.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.9µs " +"2019-11-19 05:23:01.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.6µs " +"2019-11-19 05:23:01.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbd Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:01.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbe Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:01.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbf Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:01.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc0 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-11-19 05:23:01.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.9µs " +"2019-11-19 05:23:02.366 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc2 Sending msg of 28 bytes to 2 on channel businesschannel took 53.1µs" +"2019-11-19 05:23:02.367 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc4 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2019-11-19 05:23:02.368 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 489.6µs " +"2019-11-19 05:23:02.367 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 319.9µs " +"2019-11-19 05:23:02.370 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc6 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:02.371 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc7 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:02.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc8 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:02.494 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc9 Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +"2019-11-19 05:23:02.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +"2019-11-19 05:23:02.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bcb Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +"2019-11-19 05:23:02.871 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bce Sending msg of 28 bytes to 3 on channel businesschannel took 52.6µs" +"2019-11-19 05:23:02.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 518.8µs " +"2019-11-19 05:23:02.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcd Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:02.871 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115µs " +"2019-11-19 05:23:02.872 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd0 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:02.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd1 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:02.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd2 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2019-11-19 05:23:02.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " +"2019-11-19 05:23:03.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd4 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-11-19 05:23:03.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd5 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +"2019-11-19 05:23:03.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +"2019-11-19 05:23:03.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.3µs " +"2019-11-19 05:23:03.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd8 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:03.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:03.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bda Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:03.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bdb Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-11-19 05:23:03.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69µs " +"2019-11-19 05:23:03.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bdd Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +"2019-11-19 05:23:03.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bde Sending msg of 28 bytes to 3 on channel businesschannel took 31.8µs" +"2019-11-19 05:23:03.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.2µs " +"2019-11-19 05:23:03.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57µs " +"2019-11-19 05:23:03.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:03.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:04.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be3 Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" +"2019-11-19 05:23:04.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be4 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2019-11-19 05:23:04.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115.5µs " +"2019-11-19 05:23:04.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +"2019-11-19 05:23:04.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be7 Sending msg of 28 bytes to 2 on channel businesschannel took 39.8µs" +"2019-11-19 05:23:04.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be8 Sending msg of 28 bytes to 3 on channel businesschannel took 37µs" +"2019-11-19 05:23:04.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121µs " +"2019-11-19 05:23:04.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.3µs " +"2019-11-19 05:23:04.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1beb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:04.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bec Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +"2019-11-19 05:23:04.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +"2019-11-19 05:23:04.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bee Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:04.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bef Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:04.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf0 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:04.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf1 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:04.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf2 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:04.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf3 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +"2019-11-19 05:23:04.995 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.2µs " +"2019-11-19 05:23:05.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf5 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2019-11-19 05:23:05.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bf6 Sending msg of 28 bytes to 3 on channel businesschannel took 256.8µs" +"2019-11-19 05:23:05.366 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 330.6µs " +"2019-11-19 05:23:05.366 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.5µs " +"2019-11-19 05:23:05.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bf9 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:05.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bfa Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:05.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bfb Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:05.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bfc Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-11-19 05:23:05.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bfd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +"2019-11-19 05:23:05.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bfe Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +"2019-11-19 05:23:05.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bff Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +"2019-11-19 05:23:05.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.8µs " +"2019-11-19 05:23:05.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45µs " +"2019-11-19 05:23:05.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c02 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:05.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c03 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:05.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c04 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:05.992 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c05 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-11-19 05:23:05.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.4µs " +"2019-11-19 05:23:06.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c07 Sending msg of 28 bytes to 2 on channel businesschannel took 22.9µs" +"2019-11-19 05:23:06.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c08 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2019-11-19 05:23:06.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.6µs " +"2019-11-19 05:23:06.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.4µs " +"2019-11-19 05:23:06.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c0b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:06.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c0c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:06.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c0d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:06.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c0e Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-11-19 05:23:06.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61µs " +"2019-11-19 05:23:06.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c10 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +"2019-11-19 05:23:06.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c11 Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +"2019-11-19 05:23:06.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.8µs " +"2019-11-19 05:23:06.864 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.9µs " +"2019-11-19 05:23:06.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c14 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:06.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c15 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:06.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c16 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:06.992 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c17 Sending msg of 28 bytes to 3 on channel testchainid took 8.1µs" +"2019-11-19 05:23:06.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.1µs " +"2019-11-19 05:23:07.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c19 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +"2019-11-19 05:23:07.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c1a Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +"2019-11-19 05:23:07.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +"2019-11-19 05:23:07.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.1µs " +"2019-11-19 05:23:07.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c1d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:07.367 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c1e Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:07.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c1f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:07.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c20 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2019-11-19 05:23:07.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs " +"2019-11-19 05:23:07.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c22 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2019-11-19 05:23:07.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c23 Sending msg of 28 bytes to 3 on channel businesschannel took 6.5µs" +"2019-11-19 05:23:07.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.9µs " +"2019-11-19 05:23:07.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " +"2019-11-19 05:23:07.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c26 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:07.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c27 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:07.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c28 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:07.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c29 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-11-19 05:23:07.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.4µs " +"2019-11-19 05:23:08.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c2b Sending msg of 28 bytes to 2 on channel businesschannel took 17.2µs" +"2019-11-19 05:23:08.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c2c Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2019-11-19 05:23:08.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.1µs " +"2019-11-19 05:23:08.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.7µs " +"2019-11-19 05:23:08.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c2f Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:08.365 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c30 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:08.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c31 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:08.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c32 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +"2019-11-19 05:23:08.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c33 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.8µs " +"2019-11-19 05:23:08.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c34 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +"2019-11-19 05:23:08.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c35 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +"2019-11-19 05:23:08.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.8µs " +"2019-11-19 05:23:08.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.7µs " +"2019-11-19 05:23:08.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c38 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:08.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c39 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:08.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3a Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:08.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3b Sending msg of 28 bytes to 3 on channel testchainid took 49.9µs" +"2019-11-19 05:23:08.993 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +"2019-11-19 05:23:09.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3d Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +"2019-11-19 05:23:09.365 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3e Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" +"2019-11-19 05:23:09.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207µs " +"2019-11-19 05:23:09.366 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.6µs " +"2019-11-19 05:23:09.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c41 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:09.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c42 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:09.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c43 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:09.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c44 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-11-19 05:23:09.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.6µs " +"2019-11-19 05:23:09.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c46 Sending msg of 28 bytes to 2 on channel businesschannel took 38.3µs" +"2019-11-19 05:23:09.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c47 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2019-11-19 05:23:09.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " +"2019-11-19 05:23:09.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.6µs " +"2019-11-19 05:23:09.869 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c4a Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:09.870 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c4b Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:09.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c4c Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:09.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4d Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2019-11-19 05:23:09.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +"2019-11-19 05:23:10.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4f Sending msg of 28 bytes to 2 on channel businesschannel took 115.6µs" +"2019-11-19 05:23:10.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c50 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2019-11-19 05:23:10.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327.8µs " +"2019-11-19 05:23:10.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 449.8µs " +"2019-11-19 05:23:10.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c53 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:10.368 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c54 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:10.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c55 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:10.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c56 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-11-19 05:23:10.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c57 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.5µs " +"2019-11-19 05:23:10.866 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.3µs " +"2019-11-19 05:23:10.865 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c59 Sending msg of 28 bytes to 2 on channel businesschannel took 616.8µs" +"2019-11-19 05:23:10.867 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5a Sending msg of 28 bytes to 3 on channel businesschannel took 433.5µs" +"2019-11-19 05:23:10.868 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " +"2019-11-19 05:23:10.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5c Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:10.871 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5d Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:10.994 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5e Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:10.995 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5f Sending msg of 28 bytes to 3 on channel testchainid took 26.8µs" +"2019-11-19 05:23:10.996 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.2µs " +"2019-11-19 05:23:11.364 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c61 Sending msg of 28 bytes to 2 on channel businesschannel took 124.6µs" +"2019-11-19 05:23:11.365 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.1µs " +"2019-11-19 05:23:11.366 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c63 Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:11.368 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.9µs " +"2019-11-19 05:23:11.369 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c66 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:11.366 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c64 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2019-11-19 05:23:11.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c67 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:11.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c68 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-11-19 05:23:11.493 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.5µs " +"2019-11-19 05:23:11.864 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c6a Sending msg of 28 bytes to 2 on channel businesschannel took 587.2µs" +"2019-11-19 05:23:11.866 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c6b Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2019-11-19 05:23:11.865 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 468µs " +"2019-11-19 05:23:11.868 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6d Received message from orderer1.example.com(172.18.0.2:42290): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:11.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 8.4713ms " +"2019-11-19 05:23:11.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6f Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-11-19 05:23:11.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c70 Received message from orderer2.example.com(172.18.0.4:44088): ConsensusRequest for channel testchainid with payload of size 28" +"2019-11-19 05:23:11.995 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c71 Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +"2019-11-19 05:23:11.997 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7533ms " diff --git a/hyperledger_fabric/v1.4.4/raft/logs/dev_peer0.log b/hyperledger_fabric/v1.4.4/raft/logs/dev_peer0.log new file mode 100644 index 00000000..84a5757d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/raft/logs/dev_peer0.log @@ -0,0 +1,22023 @@ +[001 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +[002 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +[003 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +[004 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +[005 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +[006 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +[007 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +[008 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +[009 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +[00a 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +[00b 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +[00c 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +[00d 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[00e 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +[00f 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[010 11-19 05:21:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +[011 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[012 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +[013 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +[014 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[015 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +[016 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[017 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +[018 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[019 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +[01a 11-19 05:21:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +[01b 11-19 05:21:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done +[01c 11-19 05:21:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +[01d 11-19 05:21:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +[01e 11-19 05:21:34.51 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem +[01f 11-19 05:21:34.51 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +[020 11-19 05:21:34.51 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +[021 11-19 05:21:34.52 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +[022 11-19 05:21:34.52 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +[023 11-19 05:21:34.52 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +[024 11-19 05:21:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +[025 11-19 05:21:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +[026 11-19 05:21:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +[027 11-19 05:21:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +[028 11-19 05:21:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +[029 11-19 05:21:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +[02a 11-19 05:21:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +[02b 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[02c 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[02d 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +[02e 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[02f 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- +[030 11-19 05:21:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE----- +[031 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1] at [/etc/hyperledger/fabric/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk]... +[032 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE----- +[033 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2029-09-21 00:59:00 +0000 UTC +[034 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: + Version: 1.4.4 + Commit SHA: development build + Go version: go1.12.13 + OS/Arch: linux/amd64 + Chaincode: + Base Image Version: 0.4.18 + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger +[035 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[036 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +[037 11-19 05:21:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +[038 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +[039 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +[03a 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +[03b 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +[03c 11-19 05:21:34.58 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +[03d 11-19 05:21:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +[03e 11-19 05:21:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +[03f 11-19 05:21:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +[040 11-19 05:21:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +[041 11-19 05:21:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +[042 11-19 05:21:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +[043 11-19 05:21:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +[044 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +[045 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +[046 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +[047 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +[048 11-19 05:21:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +[049 11-19 05:21:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +[04a 11-19 05:21:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +[04b 11-19 05:21:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +[04c 11-19 05:21:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +[04d 11-19 05:21:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +[04e 11-19 05:21:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +[04f 11-19 05:21:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +[050 11-19 05:21:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +[051 11-19 05:21:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +[052 11-19 05:21:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +[053 11-19 05:21:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +[054 11-19 05:21:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +[055 11-19 05:21:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +[056 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +[057 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +[058 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +[059 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +[05a 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[05b 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +[05c 11-19 05:21:34.68 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[05d 11-19 05:21:34.70 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +[05e 11-19 05:21:34.71 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +[05f 11-19 05:21:34.71 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +[060 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.4 +[061 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +[062 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.4 +[063 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +[064 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.4 +[065 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +[066 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +[067 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +[068 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[069 11-19 05:21:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +[06a 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +[06b 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +[06c 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +[06d 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +[06e 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +[06f 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +[070 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +[071 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +[072 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[073 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +[074 11-19 05:21:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +[075 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +[076 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[077 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +[078 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +[079 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +[07a 11-19 05:21:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +[07b 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +[07c 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[07d 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE----- +[07e 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[07f 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[080 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: +[081 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[082 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[083 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[084 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01D7060A20D925A8D65F6B3C84...455254494649434154452D2D2D2D2D0A +[085 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F0FB10D3C1457F727357F6D557E9312864F3FC1AE0BF8DD0E150BF246E3CC1E9 +[086 11-19 05:21:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Added �%��_k<���\<���8 [:5AT�!�]�, total items: 1 +[087 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +[088 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +[089 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[08a 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[08b 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C7E7A64DD026611F1444C6BA3439835D73645C8E6A5EA8C67BA7DF090CF1FC0E +[08c 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[08d 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[08e 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[08f 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +[090 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[091 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.4 +[092 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[093 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=lscc:1.4.4 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[094 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +[095 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +[096 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.4 +[097 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +[098 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.4) lock +[099 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.4) lock +[09a 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.4) +[09b 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.4 +[09c 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.4 +[09d 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[09e 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[09f 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.4 +[0a0 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.4" , sending back REGISTERED +[0a1 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.4" +[0a2 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.4" +[0a3 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.4" +[0a4 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0a5 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0a6 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [95db7c9f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0a7 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [95db7c9f] notifying Txid:95db7c9f-8c6b-44f6-b5e3-e4fd2d26949e, channelID: +[0a8 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0a9 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +[0aa 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[0ab 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.4 +[0ac 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0ad 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=cscc:1.4.4 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[0ae 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +[0af 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +[0b0 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.4 +[0b1 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +[0b2 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.4) lock +[0b3 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.4) lock +[0b4 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.4) +[0b5 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.4 +[0b6 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.4 +[0b7 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[0b8 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[0b9 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.4 +[0ba 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.4" , sending back REGISTERED +[0bb 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.4" +[0bc 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.4" +[0bd 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.4" +[0be 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0bf 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0c0 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[0c1 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [65811df4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0c2 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU [65811df4] notifying Txid:65811df4-07cd-42ad-940a-ade42efd2278, channelID: +[0c3 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0c4 11-19 05:21:34.79 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +[0c5 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.4,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[0c6 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.4 +[0c7 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0c8 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=qscc:1.4.4 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[0c9 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +[0ca 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +[0cb 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.4 +[0cc 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +[0cd 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.4) lock +[0ce 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.4 +[0cf 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.4) lock +[0d0 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.4) +[0d1 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.4 +[0d2 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[0d3 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[0d4 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.4 +[0d5 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.4" , sending back REGISTERED +[0d6 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.4" +[0d7 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.4" +[0d8 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.4" +[0d9 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0da 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0db 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[0dc 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU [ae618441] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0dd 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU [ae618441] notifying Txid:ae618441-3256-4ed9-8672-6b8511e8963e, channelID: +[0de 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0df 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +[0e0 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +[0e1 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +[0e2 11-19 05:21:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +[0e3 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +[0e4 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +[0e5 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[0e6 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[0e7 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +[0e8 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +[0e9 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +[0ea 11-19 05:21:34.81 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +[0eb 11-19 05:21:35.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:37.846Z grpc.peer_address=172.18.0.8:41262 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=109.6µs +[0ec 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[0ed 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[0ee 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[0ef 11-19 05:21:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:41262 +[0f0 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41262 +[0f1 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[0f2 11-19 05:21:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE----- +[0f3 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[0f4 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[0f5 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[0f6 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 68 6a e3 c2 57 42 e0 dd f8 ea |0E.!..hj..WB....| +00000010 d7 75 58 77 0f e8 24 04 d2 17 f1 e1 34 8c 2b a7 |.uXw..$.....4.+.| +00000020 f8 4b 7d 60 a7 02 20 31 fa 64 57 ff 9a 94 83 e4 |.K}`.. 1.dW.....| +00000030 5e 82 97 86 20 ac ef 59 68 70 39 54 ff da 48 40 |^... ..Yhp9T..H@| +00000040 88 7c 89 6e 00 96 a2 |.|.n...| +[0f7 11-19 05:21:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41262 +[0f8 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41262 +[0f9 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[0fa 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[0fb 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41262 disconnected +[0fc 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:21:45.849Z grpc.peer_address=172.18.0.8:41262 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.6351ms +[0fd 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[0fe 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:37.894Z grpc.peer_address=172.18.0.8:41264 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=130.4µs +[0ff 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[100 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[101 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[102 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:41264 +[103 11-19 05:21:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41264 +[104 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[105 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b6 26 d4 d7 13 58 25 6e ef 93 |0E.!...&...X%n..| +00000010 fb 77 41 c7 60 36 f8 d5 29 77 71 78 bb f3 55 9e |.wA.`6..)wqx..U.| +00000020 cb ef d5 a8 47 02 20 02 5e 6a 26 05 8c 5c 88 ac |....G. .^j&..\..| +00000030 7c 41 e4 0d be 40 d6 41 06 6a 11 4d 8a 12 a2 2f ||A...@.A.j.M.../| +00000040 dc e0 79 bc 74 88 04 |..y.t..| +[106 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41264 +[107 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41264 +[108 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:12006965676759780174 tag:EMPTY mem_req: > > , Envelope: 1108 bytes, Signature: 0 bytes +[109 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12006965676759780174 tag:EMPTY mem_req: > > , Envelope: 1108 bytes, Signature: 0 bytes +[10b 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 13 1f 7b 5f d0 28 af 41 8b 4c 0e 3a 27 c7 d8 |...{_.(.A.L.:'..| +00000010 c2 e1 67 17 2d 97 cf 4f 82 b5 ed 09 65 c7 b5 69 |..g.-..O....e..i| +[10c 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f e9 b9 e0 01 be 95 01 7a eb 38 55 |0D. /.......z.8U| +00000010 1b 60 cb 8c da ef bc bb aa d8 1d 7c a6 34 65 0e |.`.........|.4e.| +00000020 61 be 96 d9 02 20 72 7e 73 49 2d 1e 07 ad a8 a6 |a.... r~sI-.....| +00000030 b8 ca 59 17 36 f9 d0 16 f8 85 82 e2 5f 10 23 04 |..Y.6......._.#.| +00000040 c6 30 bc 83 c2 db |.0....| +[10d 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[10e 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 73 57 fc 66 1b b2 28 17 33 ee c2 |0D. !sW.f..(.3..| +00000010 0b 41 f9 05 5c e7 31 6f 87 03 d3 99 21 9d d0 55 |.A..\.1o....!..U| +00000020 b0 1f dd f9 02 20 27 a7 8f 5d 10 32 f8 dc bf af |..... '..].2....| +00000030 cb 38 c4 76 f9 2b 5e af d9 29 21 90 16 6e 32 32 |.8.v.+^..)!..n22| +00000040 bb bc 6f 2d 7f e0 |..o-..| +[10f 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[110 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]} +[111 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[112 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[113 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[114 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[115 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[116 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[117 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[118 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7E1BB2E3BE998A09D543009B35AF51D6477036AAC5DCDDD822FB18DCCC04C8E7 +[119 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[11a 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[11b 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[11c 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12006965676759780174, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2196 bytes, Signature: 0 bytes to 1 peers +[11d 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +[11e 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12006965676759780174, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2196 bytes, Signature: 0 bytes +[11f 11-19 05:21:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[120 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[121 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[122 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[124 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[123 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[125 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[126 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6265CB072B40698B7DDF852C699EDEC234BE4DEA9DCC434EDEAAB32D59C9CBF5 +[128 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[129 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[12a 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[127 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[12b 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[12c 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[12d 11-19 05:21:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers +[12e 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes +[12f 11-19 05:21:38.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[130 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +[131 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[132 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +[133 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 65 cb 07 2b 40 69 8b 7d df 85 2c 69 9e de c2 |be..+@i.}..,i...| +00000010 34 be 4d ea 9d cc 43 4e de aa b3 2d 59 c9 cb f5 |4.M...CN...-Y...| +[134 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 4a 52 25 4d 81 28 a4 d5 9d 00 |0E.!..JR%M.(....| +00000010 70 22 de 70 2c 1f a7 58 62 a2 00 85 39 84 9d da |p".p,..Xb...9...| +00000020 63 be 05 11 b0 02 20 17 bf a1 83 d3 02 1d b5 c9 |c..... .........| +00000030 ca c1 98 16 fb 10 29 da c5 cd 60 36 b2 e3 fb fc |......)...`6....| +00000040 26 56 d0 9c fb b7 8d |&V.....| +[135 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[136 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 38 64 bc d3 0b cf b0 db 9d 28 |0E.!..8d.......(| +00000010 cb 70 de 54 c6 3c 2c 17 a4 6c 94 b1 d7 39 55 02 |.p.T.<,..l...9U.| +00000020 1d be 50 70 01 02 20 44 36 fa a7 26 29 03 a8 1c |..Pp.. D6..&)...| +00000030 ec 82 cb dc 06 57 1f 2a 26 50 ec e0 de 1c ab f7 |.....W.*&P......| +00000040 72 d8 82 0f 13 e4 57 |r.....W| +[137 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[138 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[139 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13a 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 4f 46 e6 38 a5 25 d6 2a e2 8c 84 7c 2c 2e 92 |.OF.8.%.*...|,..| +00000010 6e c9 ff 6d 7a 75 11 c1 6e b2 50 a3 cc b8 7e b3 |n..mzu..n.P...~.| +[13b 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c a2 d7 5c f1 d9 a7 0d e6 09 81 4d |0D. L..\.......M| +00000010 1b f4 84 24 0e b7 52 6b 65 c5 c0 16 f4 6b a2 83 |...$..Rke....k..| +00000020 1c b2 ce 9f 02 20 08 66 6b 5d 30 c2 42 22 07 7d |..... .fk]0.B".}| +00000030 2d b6 ce 89 83 6a 5b 06 6a a2 23 2d d9 2d 16 83 |-....j[.j.#-.-..| +00000040 02 44 d1 80 14 59 |.D...Y| +[13c 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[13d 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 1a 5d 2b 82 e6 4c 9a 25 8b 4f |0E.!...]+..L.%.O| +00000010 76 ca 8e 6b 96 54 5d b0 50 5d 8a 7c 6d 4b 7b fa |v..k.T].P].|mK{.| +00000020 f7 3a 29 cd 39 02 20 33 6a 8e f1 03 f2 29 cb 65 |.:).9. 3j....).e| +00000030 74 89 8c 60 03 e9 c1 63 f3 fd 9c 14 0a 2d eb c6 |t..`...c.....-..| +00000040 47 e9 9d 92 66 ca 93 |G...f..| +[13e 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[13f 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[140 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +[141 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +[142 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[143 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[144 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[145 11-19 05:21:38.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[146 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[147 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[148 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 105AA20CD95A0A633547397D42081D8C941AF0B23B282E1242D27C8B7E0E84AC +[149 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[14a 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[14b 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[14c 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[14d 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to peer1.org1.example.com:7051 +[14e 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[14f 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +[150 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[151 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[152 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[153 11-19 05:21:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[154 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8701889258896347820, Envelope: 961 bytes, Signature: 0 bytes +[155 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 4a 3d 37 1d 50 54 7a 09 18 4c ca 94 e8 c2 63 |.J=7.PTz..L....c| +00000010 fe ce 97 59 47 0e 19 d5 32 6c e4 1d 62 3f a6 d3 |...YG...2l..b?..| +[156 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 42 0b 6e 3e 75 b8 b3 6b b2 f7 |0E.!..B.n>u..k..| +00000010 0f 22 ca 07 ef dd b1 ad fe fc 5a 34 e7 7f cf 3c |."........Z4...<| +00000020 e9 18 b5 53 8d 02 20 50 02 00 da e9 ef b0 c3 48 |...S.. P.......H| +00000030 f7 5d af ea 61 02 c9 4d 29 72 fe e2 6f 42 6f 71 |.]..a..M)r..oBoq| +00000040 83 80 a6 3e ea cc 77 |...>..w| +[157 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8701889258896347820, Envelope: 961 bytes, Signature: 0 bytes +[158 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 69 116 74 120 69 56 69 56 48 101 56 103 51 104 103 47 118 49 73 88 99 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 80 102 111 117 43 101 66 81 80 122 113 10 51 78 70 87 83 68 43 101 119 75 121 102 77 100 75 79 75 75 112 102 99 104 52 47 104 76 68 47 48 113 52 48 87 53 49 98 82 108 68 84 75 111 76 119 52 73 67 104 121 111 76 79 51 69 90 117 118 90 57 55 100 98 112 119 10 105 113 99 97 66 101 90 68 55 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 76 53 52 122 43 102 79 74 76 54 51 75 110 105 69 120 72 109 98 77 115 48 100 115 107 69 53 102 43 77 106 111 66 79 52 90 78 122 106 89 57 65 50 65 105 65 109 103 70 81 50 10 81 112 81 85 69 114 48 104 49 108 43 75 117 76 55 73 118 84 85 107 98 73 118 79 122 116 113 113 48 99 76 111 54 105 112 114 53 81 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[159 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Added �o��X +8T)�YR�^",�:��uO�.��� to the in memory item map, total items: 2 +[15a 11-19 05:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15c 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15d 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[15e 11-19 05:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\\:\003\320Z\000\260\346\373c\317\251*\023\374\016\270_^\235\367\002 m\332bOW\010\305\270g\016x\017\252vQS\372\346\216\007\354\330H\272\354#\246\255Q\230\310\033" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +[160 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[161 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\\:\003\320Z\000\260\346\373c\317\251*\023\374\016\270_^\235\367\002 m\332bOW\010\305\270g\016x\017\252vQS\372\346\216\007\354\330H\272\354#\246\255Q\230\310\033" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +[162 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c df 81 44 98 25 65 56 6c be 79 2e 07 ec 3c 02 |...D.%eVl.y...<.| +00000010 d6 23 af 9a 2b 44 45 d7 01 87 c3 28 95 64 10 3e |.#..+DE....(.d.>| +[163 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be f9 f9 cb 43 0c b9 67 81 8f 3e |0E.!.....C..g..>| +00000010 5c 3a 03 d0 5a 00 b0 e6 fb 63 cf a9 2a 13 fc 0e |\:..Z....c..*...| +00000020 b8 5f 5e 9d f7 02 20 6d da 62 4f 57 08 c5 b8 67 |._^... m.bOW...g| +00000030 0e 78 0f aa 76 51 53 fa e6 8e 07 ec d8 48 ba ec |.x..vQS......H..| +00000040 23 a6 ad 51 98 c8 1b |#..Q...| +[164 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[165 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 45 cb f7 31 47 cd f1 3d 53 f0 |0E.!..E..1G..=S.| +00000010 5b c6 a7 2a 76 7a f9 99 71 84 f2 d2 98 57 9f 1f |[..*vz..q....W..| +00000020 4a ee 4a 1b 90 02 20 66 bd cd a4 6a ee bb 18 18 |J.J... f...j....| +00000030 b3 29 66 be bf b6 67 02 d2 d8 98 7d 4a 31 88 c1 |.)f...g....}J1..| +00000040 2c 97 36 9f cf 60 55 |,.6..`U| +[166 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[167 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[168 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +[169 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +[16a 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[16b 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16c 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16d 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16e 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[16f 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes to 1 peers +[170 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\\:\003\320Z\000\260\346\373c\317\251*\023\374\016\270_^\235\367\002 m\332bOW\010\305\270g\016x\017\252vQS\372\346\216\007\354\330H\272\354#\246\255Q\230\310\033" secret_envelope: > alive: > +[171 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +[172 11-19 05:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[173 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[174 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[175 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[176 11-19 05:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[177 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[178 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[179 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[17a 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e9 d0 db f4 22 7f 72 d1 bd 61 22 94 a5 06 bf |.....".r..a"....| +00000010 23 cd d2 39 7c d9 a5 49 13 8b ab e0 60 f3 5c e2 |#..9|..I....`.\.| +[17b 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 20 34 a5 da 8b 2c 83 98 20 b8 |0E.!.. 4...,.. .| +00000010 a0 aa 0a 57 9a 71 93 ab 78 22 f4 3e 13 76 1a 91 |...W.q..x".>.v..| +00000020 86 71 bf 1d 09 02 20 2b e8 e3 3e 17 d1 a4 ea 5d |.q.... +..>....]| +00000030 f3 d9 8d 3d 48 e5 51 6a 39 63 0d 7e ae f8 62 29 |...=H.Qj9c.~..b)| +00000040 a9 70 0e 6f e1 b7 62 |.p.o..b| +[17c 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[17d 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 90 73 ff 3a 9d 34 52 50 b3 72 |0E.!...s.:.4RP.r| +00000010 a4 1f 67 47 fb c6 7d d8 24 a0 07 00 f8 28 bf 37 |..gG..}.$....(.7| +00000020 43 97 44 bf 55 02 20 12 b7 9d 69 1f c4 5a 96 35 |C.D.U. ...i..Z.5| +00000030 b3 28 2f 94 00 70 5e 0f 18 50 c5 16 ad a3 70 43 |.(/..p^..P....pC| +00000040 77 3d 57 bf 4a 44 16 |w=W.JD.| +[17e 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[17f 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[180 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +[181 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +[182 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[183 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[184 11-19 05:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[185 11-19 05:21:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[186 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[187 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[188 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[189 11-19 05:21:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18a 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[18b 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[18c 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18d 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[18e 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[18f 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 90F0135A7B04F96E8F9A8A398155140581224961659F6B7A377BF9647A84E2D9 +[190 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[191 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[192 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[193 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers +[194 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes +[195 11-19 05:21:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[196 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +[197 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[198 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes +[199 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 f0 13 5a 7b 04 f9 6e 8f 9a 8a 39 81 55 14 05 |...Z{..n...9.U..| +00000010 81 22 49 61 65 9f 6b 7a 37 7b f9 64 7a 84 e2 d9 |."Iae.kz7{.dz...| +[19a 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 e3 3a 5a ab 86 b1 fd c8 d0 39 |0E.!...:Z......9| +00000010 2e 48 38 ad 8c 5d 55 70 7d 01 4e cc 4c c9 7a bc |.H8..]Up}.N.L.z.| +00000020 66 31 79 f1 46 02 20 75 6f 92 53 fd d2 ff 40 a1 |f1y.F. uo.S...@.| +00000030 22 a5 f3 22 b5 5c fa 34 08 b0 b6 e0 f9 67 6b cc |"..".\.4.....gk.| +00000040 fd 17 9c 6b 01 b2 1d |...k...| +[19b 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[19c 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c1 21 f5 7b 0d 1e 97 ec c0 a1 37 |0D. =.!.{......7| +00000010 48 f3 94 38 32 14 24 d1 20 d4 74 2e bc 9c f2 53 |H..82.$. .t....S| +00000020 e9 e5 b4 39 02 20 02 83 4d 8b 42 9f d4 62 71 b2 |...9. ..M.B..bq.| +00000030 88 f9 09 eb 81 20 ee ee 18 ce 75 84 22 e4 fd 16 |..... ....u."...| +00000040 5f bf ca 87 01 f2 |_.....| +[19d 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[19e 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[19f 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a0 11-19 05:21:42.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a1 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45510 +[1a2 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003d7d60 +[1a3 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[1a4 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[1a5 11-19 05:21:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a6 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE----- +[1a7 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[1a8 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[1a9 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1aa 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[1ab 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 cb 23 14 5e d3 36 37 12 a3 53 49 2a 0a ad 69 |d.#.^.67..SI*..i| +00000010 cc ba 45 05 e6 90 b8 05 5c f0 df 00 80 52 72 ee |..E.....\....Rr.| +[1ac 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 30 6d 48 ec 10 25 72 3c d1 ab 46 |0D. z0mH..%r<..F| +00000010 9e 9d 51 a7 aa 52 2e 54 1a 8d 6d 37 5f 23 52 da |..Q..R.T..m7_#R.| +00000020 54 c7 5a ec 02 20 43 b6 40 7a 75 88 74 24 0c da |T.Z.. C.@zu.t$..| +00000030 f4 6d 85 74 03 74 6c b4 4c 3d d8 7a 40 a3 b5 e8 |.m.t.tl.L=.z@...| +00000040 80 40 c0 b6 4a 0a |.@..J.| +[1ad 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[1ae 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002d4bd0, header 0xc0004e66e0 +[1af 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[1b0 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU [][be1244ac] processing txid: be1244acf911906f8b806b6291a8f298e20c46e9b60e3fcd32a10299e7379308 +[1b1 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU [][be1244ac] Entry chaincode: name:"cscc" +[1b2 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> INFO [][be1244ac] Entry chaincode: name:"cscc" +[1b3 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[1b4 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +[1b5 11-19 05:21:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[1b6 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[1b7 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[1b8 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1b9 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[1ba 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1bb 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 cb 23 14 5e d3 36 37 12 a3 53 49 2a 0a ad 69 |d.#.^.67..SI*..i| +00000010 cc ba 45 05 e6 90 b8 05 5c f0 df 00 80 52 72 ee |..E.....\....Rr.| +[1bc 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 30 6d 48 ec 10 25 72 3c d1 ab 46 |0D. z0mH..%r<..F| +00000010 9e 9d 51 a7 aa 52 2e 54 1a 8d 6d 37 5f 23 52 da |..Q..R.T..m7_#R.| +00000020 54 c7 5a ec 02 20 43 b6 40 7a 75 88 74 24 0c da |T.Z.. C.@zu.t$..| +00000030 f4 6d 85 74 03 74 6c b4 4c 3d d8 7a 40 a3 b5 e8 |.m.t.tl.L=.z@...| +00000040 80 40 c0 b6 4a 0a |.@..J.| +[1bd 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +[1be 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +[1bf 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +[1c0 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +[1c1 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +[1c2 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +[1c3 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +[1c4 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +[1c5 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +[1c6 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +[1c7 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +[1c8 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000505aa0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +[1c9 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +[1ca 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +[1cc 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +[1cd 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +[1ce 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +[1cb 11-19 05:21:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +[1d0 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +[1d1 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +[1d2 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +[1cf 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +[1d3 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +[1d4 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +[1d5 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +[1d6 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +[1d7 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[1d8 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +[1d9 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +[1da 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +[1db 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +[1dc 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[1dd 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[1de 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[1df 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +[1e0 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[1e1 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[1e2 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[1e3 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[1e4 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[1e5 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[1e6 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[1e7 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[1e8 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[1e9 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[1ea 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +[1eb 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0026f0600)} +[1ec 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[1ed 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[1ee 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[1ef 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +[1f0 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +[1f1 11-19 05:21:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +[1f2 11-19 05:21:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +[1f3 11-19 05:21:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xeb, 0xcd, 0x1f, 0x7, 0xa0, 0x44, 0x7e, 0xdb, 0xb0, 0xc3, 0xd8, 0x38, 0xb2, 0x31, 0xa, 0x6d, 0xa6, 0x14, 0x14, 0x86, 0xef, 0x53, 0x16, 0x8b, 0x27, 0xf5, 0x83, 0xcc, 0x3e, 0xcb, 0xfd, 0x8c} txOffsets= +txId=92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426 locPointer=offset=39, bytesLength=25761 +] +[1f4 11-19 05:21:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to txid-index +[1f5 11-19 05:21:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25761] for tx number:[0] ID: [92364ec8c424877dd68974bffda1ec7682b8d589b9a0c6d0006cbea0823e6426] to blockNumTranNum index +[1f6 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25807], isChainEmpty=[false], lastBlockNumber=[0] +[1f7 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +[1f8 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +[1fa 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +[1fb 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +[1fc 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +[1fd 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +[1f9 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +[1fe 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[1ff 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[200 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +[201 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +[202 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +[203 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[204 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[205 11-19 05:21:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[206 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[207 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +[208 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[20a 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +[20b 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +[20c 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[209 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +[20d 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +[20e 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +[20f 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 28ms (state_validation=4ms block_and_pvtdata_commit=14ms state_commit=7ms) commitHash=[] +[210 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +[211 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [cbe0e0a1-d6f1-41ea-b9ad-c1c9bcb013b9] +[212 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +[213 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cbe0e0a1-d6f1-41ea-b9ad-c1c9bcb013b9] +[214 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[215 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[216 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[217 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[218 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[219 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[21a 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[21b 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[21c 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[21d 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[21e 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[21f 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[220 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[221 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +[222 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[223 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[224 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[225 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[226 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- +[227 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[228 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[229 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[22a 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[22b 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +[22c 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[22d 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[22e 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[22f 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[230 11-19 05:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- +[231 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[232 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[233 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[234 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[235 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[236 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[237 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[238 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[239 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[23a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[23b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[23c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[23d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[23e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[23f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[240 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- +[241 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- +[242 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[243 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[244 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[245 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[246 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[247 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +[248 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[249 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +[24a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[24b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[24c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[24d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[24e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[24f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[250 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[251 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[252 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[253 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[254 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[255 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[256 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[257 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[258 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[259 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[25a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[25b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[25c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[25d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[25e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[25f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[260 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[261 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[262 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +[263 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[264 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[265 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[266 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +[267 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[268 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[269 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[26a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[26b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[26c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[26d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[26e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[26f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[270 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[271 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[272 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[273 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[274 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[275 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[276 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[277 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[278 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[279 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[27a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[27b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[27c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[27d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[27e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[27f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[280 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[281 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[282 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[283 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[284 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[285 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[286 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[287 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[288 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[289 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[28a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[28b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[28c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[28d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[28e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[28f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[290 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[291 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[292 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[293 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[294 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[295 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[296 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[297 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[298 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[299 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[29a 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[29b 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[29c 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[29d 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[29e 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[29f 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[2a0 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +[2a1 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +[2a2 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[2a3 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[2a4 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[2a5 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +[2a6 11-19 05:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[2a7 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[2a8 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[2a9 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[2aa 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[2ab 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +[2ac 11-19 05:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +[2ad 11-19 05:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +[2ae 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[2af 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2b0 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +[2b1 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +[2b2 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +[2b3 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +[2b4 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +[2b5 11-19 05:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2b6 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408BCAFBBCFFB999EEC15...EA55014EA68C22F9710D59632A020801 +[2b7 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82708237BF8448EF3E3DDAB1FF4414DAFEDCD91FEB432DEE135B48440624C268 +[2b8 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +[2b9 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +[2bc 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +[2ba 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[2bb 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[2bd 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2be 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [d1a8f283-4881-4c70-b01e-6ca93ad6a8f4] +[2bf 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2c0 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU [d1a8f283] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2c1 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU [d1a8f283] notifying Txid:d1a8f283-4881-4c70-b01e-6ca93ad6a8f4, channelID:businesschannel +[2c2 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2c3 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +[2c4 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d1a8f283-4881-4c70-b01e-6ca93ad6a8f4] +[2c5 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2c6 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b0e96708-4831-49b4-bc2e-e7ca39c1969d] +[2c7 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2c8 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[2c9 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU [b0e96708] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2ca 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU [b0e96708] notifying Txid:b0e96708-4831-49b4-bc2e-e7ca39c1969d, channelID:businesschannel +[2cb 11-19 05:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2cc 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +[2cd 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b0e96708-4831-49b4-bc2e-e7ca39c1969d] +[2ce 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2cf 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [a089a368-2ea0-414c-b349-19df1337986c] +[2d0 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2d1 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[2d2 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [a089a368] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2d3 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [a089a368] notifying Txid:a089a368-2ea0-414c-b349-19df1337986c, channelID:businesschannel +[2d4 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2d5 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +[2d6 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a089a368-2ea0-414c-b349-19df1337986c] +[2d7 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +[2d8 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4170a1a6-82d3-41f0-bbd2-cc5080a7ba56] +[2d9 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +[2da 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4170a1a6-82d3-41f0-bbd2-cc5080a7ba56] +[2db 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2dc 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408BCAFBBCFFB999EEC15...EA55014EA68C22F9710D59632A020801 +[2dd 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 26C5B22C3EAFB8F78F8C2A44EF9E8A87C40130AA3D34F0BF16814FA04419DFE5 +[2de 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +[2df 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [be1244ac] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2e0 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [be1244ac] notifying Txid:be1244acf911906f8b806b6291a8f298e20c46e9b60e3fcd32a10299e7379308, channelID: +[2e1 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2e2 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO [][be1244ac] Exit chaincode: name:"cscc" (121ms) +[2e3 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][be1244ac] Exit +[2e4 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45510 +[2e5 11-19 05:21:43.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45510 grpc.code=OK grpc.call_duration=130.9195ms +[2e6 11-19 05:21:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e7 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2e8 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2e9 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[2ea 11-19 05:21:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2eb 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\213\020\275\265\314\325\002 UP\220]+9P\004-\244>ZC\305\025G\252V\013E\222\273\351r\346BS\242\315\357\266\237" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +[2ec 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ed 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\213\020\275\265\314\325\002 UP\220]+9P\004-\244>ZC\305\025G\252V\013E\222\273\351r\346BS\242\315\357\266\237" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +[2ee 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 ad 46 b8 41 80 d6 e6 e0 69 71 ff 6c aa 2f dd |..F.A....iq.l./.| +00000010 ed db 55 1e 26 f3 e1 f1 f7 01 9a 79 c5 8d 48 23 |..U.&......y..H#| +[2ef 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 0d 96 89 28 66 db d0 62 81 99 |0E.!.....(f..b..| +00000010 09 ef ad 58 ea d9 d0 2f d8 b1 c6 d6 4d 1b 3e 8b |...X.../....M.>.| +00000020 10 bd b5 cc d5 02 20 55 50 90 5d 2b 39 50 04 2d |...... UP.]+9P.-| +00000030 a4 3e 5a 43 c5 15 47 aa 56 0b 45 92 bb e9 72 e6 |.>ZC..G.V.E...r.| +00000040 42 53 a2 cd ef b6 9f |BS.....| +[2f0 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2f1 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 b5 8b 89 02 aa fc 76 1a 62 ba |0E.!........v.b.| +00000010 ba 77 37 8e b9 37 d7 9f 6d 40 6d 92 d4 e2 76 f6 |.w7..7..m@m...v.| +00000020 c9 12 43 59 7c 02 20 38 c9 99 af aa 45 cf 81 26 |..CY|. 8....E..&| +00000030 d8 9f 5b 5e 50 44 a8 84 b9 f5 6c e2 9e 62 a1 70 |..[^PD....l..b.p| +00000040 5c 36 e6 cb 5a 88 c7 |\6..Z..| +[2f2 11-19 05:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2f3 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2f4 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +[2f5 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" +[2f6 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[2f7 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f8 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f9 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fa 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[2fb 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes to 1 peers +[2fc 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\213\020\275\265\314\325\002 UP\220]+9P\004-\244>ZC\305\025G\252V\013E\222\273\351r\346BS\242\315\357\266\237" secret_envelope: > alive: > +[2fd 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2189 bytes, Signature: 0 bytes +[2fe 11-19 05:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ff 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting, peers found 1 +[300 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[301 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[302 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[303 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[304 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...E31F120C08F893EEE3FB999EEC151001 +[305 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E635AFD3D909C4C14BC6B2614E7B1E06009281BF354F3B2FB0DCBB58079A1CDA +[306 11-19 05:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[307 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45518 +[308 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002e59130 +[309 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[30a 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[30b 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[30c 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[30d 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e b9 ba 20 b4 5f 1f 77 94 29 89 ca 65 cb f4 a3 |~.. ._.w.)..e...| +00000010 4f 17 15 a2 ff d3 80 f1 d5 44 07 ac 5f 24 6e f0 |O........D.._$n.| +[30e 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 4f 42 bc 9a 7a 18 f1 e7 37 00 |0E.!..OB..z...7.| +00000010 c8 00 9b 45 17 63 01 79 db 56 39 4a d0 95 df 5e |...E.c.y.V9J...^| +00000020 60 ac 7a d7 80 02 20 53 7b 0e 97 0d b9 64 58 df |`.z... S{....dX.| +00000030 84 01 cf 06 0a 68 95 21 27 4a 94 e9 50 c1 b7 83 |.....h.!'J..P...| +00000040 de b3 f4 61 6e 81 26 |...an.&| +[30f 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[310 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00282ebd0, header 0xc002e59540 +[311 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[312 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [][1f85d19e] processing txid: 1f85d19e1ceaea8c78165fee77755078b045d7a316a5728359de8f923d73e487 +[313 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [][1f85d19e] Entry chaincode: name:"cscc" +[314 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> INFO [][1f85d19e] Entry chaincode: name:"cscc" +[315 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[316 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[317 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[318 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[319 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[31a 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e b9 ba 20 b4 5f 1f 77 94 29 89 ca 65 cb f4 a3 |~.. ._.w.)..e...| +00000010 4f 17 15 a2 ff d3 80 f1 d5 44 07 ac 5f 24 6e f0 |O........D.._$n.| +[31b 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 4f 42 bc 9a 7a 18 f1 e7 37 00 |0E.!..OB..z...7.| +00000010 c8 00 9b 45 17 63 01 79 db 56 39 4a d0 95 df 5e |...E.c.y.V9J...^| +00000020 60 ac 7a d7 80 02 20 53 7b 0e 97 0d b9 64 58 df |`.z... S{....dX.| +00000030 84 01 cf 06 0a 68 95 21 27 4a 94 e9 50 c1 b7 83 |.....h.!'J..P...| +00000040 de b3 f4 61 6e 81 26 |...an.&| +[31c 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [1f85d19e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[31d 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [1f85d19e] notifying Txid:1f85d19e1ceaea8c78165fee77755078b045d7a316a5728359de8f923d73e487, channelID: +[31e 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[31f 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> INFO [][1f85d19e] Exit chaincode: name:"cscc" (1ms) +[320 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU [][1f85d19e] Exit +[321 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45518 +[322 11-19 05:21:44.70 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45518 grpc.code=OK grpc.call_duration=1.7867ms +[323 11-19 05:21:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[324 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[325 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151007 +[326 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7505D113D28F73A91BCD13E27B9867C1F5B1E28DF8A59D1EF4B6FF253E4C084B +[327 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[328 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[329 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[32a 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[32b 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[32c 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[32d 11-19 05:21:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32e 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45526 +[32f 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002ee2370 +[330 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[331 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[332 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[333 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[334 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 09 cd 27 85 0b 76 c1 9d 46 c2 17 30 fd 10 da |S..'..v..F..0...| +00000010 13 39 7c 50 ea 57 5f e6 64 d9 b5 bc b4 d2 88 31 |.9|P.W_.d......1| +[335 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 6a bd 80 60 14 7d e1 1d 32 d1 |0E.!..j..`.}..2.| +00000010 dd 1c e5 2b 38 78 59 c6 f1 41 e0 f2 c7 13 55 a5 |...+8xY..A....U.| +00000020 91 30 54 a6 d5 02 20 41 e9 53 1a 85 11 ae 7b 14 |.0T... A.S....{.| +00000030 ff 68 43 73 fe 3f 47 8e 6e 53 c3 ec ca 0f cc 2f |.hCs.?G.nS...../| +00000040 43 49 97 50 53 00 1f |CI.PS..| +[336 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[337 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00282f490, header 0xc002ee2780 +[338 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[339 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU [][1429e68e] processing txid: 1429e68ed61c214ae866b33a0ef06ca91e8d7b9b565342c06f06aa4547272963 +[33a 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU [][1429e68e] Entry chaincode: name:"qscc" +[33b 11-19 05:21:45.64 UTC] [%{longpkg}] %{callpath} -> INFO [][1429e68e] Entry chaincode: name:"qscc" +[33c 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[33d 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[33e 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[33f 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[340 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[341 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[342 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[343 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[344 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE----- +[345 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 gate 1574140905654515500 evaluation starts +[346 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 signed by 0 principal evaluation starts (used [false]) +[347 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 processing identity 0 with bytes of 1151ae0 +[348 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[349 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[34a 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[34b 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 principal matched by identity 0 +[34c 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 09 cd 27 85 0b 76 c1 9d 46 c2 17 30 fd 10 da |S..'..v..F..0...| +00000010 13 39 7c 50 ea 57 5f e6 64 d9 b5 bc b4 d2 88 31 |.9|P.W_.d......1| +[34d 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 6a bd 80 60 14 7d e1 1d 32 d1 |0E.!..j..`.}..2.| +00000010 dd 1c e5 2b 38 78 59 c6 f1 41 e0 f2 c7 13 55 a5 |...+8xY..A....U.| +00000020 91 30 54 a6 d5 02 20 41 e9 53 1a 85 11 ae 7b 14 |.0T... A.S....{.| +00000030 ff 68 43 73 fe 3f 47 8e 6e 53 c3 ec ca 0f cc 2f |.hCs.?G.nS...../| +00000040 43 49 97 50 53 00 1f |CI.PS..| +[34e 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 principal evaluation succeeds for identity 0 +[34f 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c100 gate 1574140905654515500 evaluation succeeds +[350 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[351 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[352 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[353 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[354 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU [1429e68e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[355 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU [1429e68e] notifying Txid:1429e68ed61c214ae866b33a0ef06ca91e8d7b9b565342c06f06aa4547272963, channelID: +[356 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[357 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> INFO [][1429e68e] Exit chaincode: name:"qscc" (9ms) +[358 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU [][1429e68e] Exit +[359 11-19 05:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45526 +[35a 11-19 05:21:45.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45526 grpc.code=OK grpc.call_duration=15.7042ms +[35b 11-19 05:21:45.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[35c 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[35d 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35e 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[35f 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[360 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 c1 74 4e a9 40 05 54 55 88 f9 dc 12 b2 8b 6f |D.tN.@.TU......o| +00000010 a8 32 62 e2 aa 70 d7 8e 2f e4 23 02 47 84 83 4e |.2b..p../.#.G..N| +[361 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 04 6d ec 34 56 e4 7a df 21 8b 04 |0D. a.m.4V.z.!..| +00000010 d2 b1 b5 1f 71 de 65 46 1e 67 79 fd 83 20 b6 8e |....q.eF.gy.. ..| +00000020 0e 96 6d 60 02 20 1d d3 dd d5 fe 9a aa c2 57 0f |..m`. ........W.| +00000030 c1 09 8f 26 64 ab 98 ae cc c8 6b 62 f7 52 05 82 |...&d.....kb.R..| +00000040 5f 32 11 27 78 14 |_2.'x.| +[362 11-19 05:21:45.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[363 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 af 5b 1c 88 3f 1d 8c d9 0a f2 b2 |0D. ..[..?......| +00000010 97 24 bf 78 e6 6a 95 e9 0e 1d 9a 37 f9 f4 bd 59 |.$.x.j.....7...Y| +00000020 c7 63 2f 41 02 20 15 92 ab d2 56 e8 09 f1 44 78 |.c/A. ....V...Dx| +00000030 07 46 df c1 5b a8 c9 ca 03 8e c3 56 1d d4 1a 7e |.F..[......V...~| +00000040 15 c3 fd a9 ff 4a |.....J| +[364 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[365 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[366 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[367 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[368 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[369 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36a 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b 11-19 05:21:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36c 11-19 05:21:46.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[36d 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[36e 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[36f 11-19 05:21:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[370 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[371 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151008 +[372 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A024F55AABDD9626ED1146E8723A4D5A32BDA84B9FFEAAF1A708BA3F29CD5166 +[373 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[374 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[375 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[376 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\340\352\334\255r<\002 Dfb\3649|VuL\364\276H9\267\316\265R\2167\243\177\320\303D\004v\021Mu\\h\256" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[377 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\340\352\334\255r<\002 Dfb\3649|VuL\364\276H9\267\316\265R\2167\243\177\320\303D\004v\021Mu\\h\256" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[378 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[379 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[37a 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[37b 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37c 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +[37d 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37e 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +[37f 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[380 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 24 f5 5a ab dd 96 26 ed 11 46 e8 72 3a 4d 5a |.$.Z...&..F.r:MZ| +00000010 32 bd a8 4b 9f fe aa f1 a7 08 ba 3f 29 cd 51 66 |2..K.......?).Qf| +[381 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed f3 5e d2 54 92 99 c5 17 0b 2a |0D. #..^.T.....*| +00000010 c3 b8 c3 c6 f4 a5 2c 59 5b c7 fa be 3e 0a e0 ea |......,Y[...>...| +00000020 dc ad 72 3c 02 20 44 66 62 f4 39 7c 56 75 4c f4 |..r<. Dfb.9|VuL.| +00000030 be 48 39 b7 ce b5 52 8e 37 a3 7f d0 c3 44 04 76 |.H9...R.7....D.v| +00000040 11 4d 75 5c 68 ae |.Mu\h.| +[382 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[383 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 03 06 c0 d5 22 08 d1 6c 89 2a b5 |0D. t...."..l.*.| +00000010 22 2c 25 73 56 e5 79 09 b1 48 f5 51 73 be 8b 65 |",%sV.y..H.Qs..e| +00000020 ff e7 a3 3b 02 20 5c da 29 43 7b e8 60 f8 1a 1b |...;. \.)C{.`...| +00000030 a1 26 2e 78 1c fa ea c4 7f 6a 22 e3 cf 47 d7 09 |.&.x.....j"..G..| +00000040 d5 c7 90 52 62 2d |...Rb-| +[384 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[385 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[386 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[387 11-19 05:21:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[388 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +[389 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[38a 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38b 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[38c 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +[38d 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +00000040 30 b2 7f b8 62 2d 65 |0...b-e| +[38e 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[38f 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[390 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[391 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[392 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[393 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[394 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE----- +[395 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 gate 1574140907346562700 evaluation starts +[396 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 signed by 0 principal evaluation starts (used [false]) +[397 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 processing identity 0 with bytes of 1151ae0 +[398 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[399 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[39a 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[39b 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 principal matched by identity 0 +[39c 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +[39d 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +00000040 30 b2 7f b8 62 2d 65 |0...b-e| +[39e 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 principal evaluation succeeds for identity 0 +[39f 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f617b0 gate 1574140907346562700 evaluation succeeds +[3a0 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3a1 11-19 05:21:47.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a2 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a3 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a4 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a5 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +[3a6 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[3a7 11-19 05:21:47.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a8 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3a9 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3aa 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[3ab 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +[3ac 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +00000040 30 b2 7f b8 62 2d 65 |0...b-e| +[3ad 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ae 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3af 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3b0 11-19 05:21:47.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b1 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3b2 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3b3 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[3b4 11-19 05:21:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b5 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41264 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[3b6 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b7 11-19 05:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[3b8 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3b9 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 7e fb 38 90 4f 41 80 2d 00 3f 4f a4 59 8d 1c |.~.8.OA.-.?O.Y..| +00000010 8d e2 b1 c2 ff f6 0c ff 0c 6a 0d 49 73 98 00 b2 |.........j.Is...| +[3ba 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 c3 cd 1f 4e 53 34 2e d4 92 99 92 |0D. d...NS4.....| +00000010 99 90 c0 2f 7f 09 d3 39 27 d0 7f fe 0f 31 66 dd |.../...9'....1f.| +00000020 68 d0 db 10 02 20 1a 26 ba ba bc e1 4f c4 91 59 |h.... .&....O..Y| +00000030 24 25 9d 0c 36 26 5f 29 ad 46 14 d8 5c af 77 13 |$%..6&_).F..\.w.| +00000040 42 d3 bb 53 7b 50 |B..S{P| +[3bb 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3bc 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 66 f4 d4 f8 b8 84 b6 79 4c 4d 6c |0D. .f......yLMl| +00000010 a6 57 89 f6 d9 b9 e3 79 ca 9f 3c 84 13 a4 04 8d |.W.....y..<.....| +00000020 3f 0d f6 24 02 20 12 21 85 97 db 3f a8 b1 0d d4 |?..$. .!...?....| +00000030 d6 47 1f 40 13 6c 05 0d 6e 6d 68 78 b5 16 34 43 |.G.@.l..nmhx..4C| +00000040 28 85 8c f0 b9 ac |(.....| +[3bd 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3be 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3bf 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3c0 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3c1 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3c2 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c3 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c4 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c5 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[3c6 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +[3c7 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\273\014\220ktO\306" secret_envelope: > +[3c8 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +[3c9 11-19 05:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ca 11-19 05:21:48.34 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] +[3cb 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[3cc 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> INFO d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Becoming a leader +[3cd 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +[3ce 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +[3cf 11-19 05:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[3d1 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[3d2 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3d3 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510021801 +[3d0 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +[3d4 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BC9E08E17D1CFD4597A9696E5B568A5D269363A63E643072C4758DE1EF8D5CDE +[3d5 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3d6 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3d7 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }] +[3d8 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3d9 11-19 05:21:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002f43dd0, CONNECTING +[3da 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[3db 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002f43dd0, READY +[3dc 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer1.example.com:7050 [OrdererMSP]} +[3dd 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer1.example.com:7050 +[3de 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer1.example.com:7050 ... +[3df 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +[3e0 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +[3e1 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e2 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e3 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A91070A3D08051A0608EDF7CDEE0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +[3e4 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C9262BF29C4FD45CFA3031949814B03315D661165B0EC83AF623546D4DDC3E15 +[3e5 11-19 05:21:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e6 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e7 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[3e8 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[3e9 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ea 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[3eb 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ec 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 ++Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +rkc= +-----END CERTIFICATE----- +[3ed 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[3ee 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 gate 1574140909413768100 evaluation starts +[3ef 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 signed by 0 principal evaluation starts (used [false]) +[3f0 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 processing identity 0 with bytes of 1151ae0 +[3f1 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +[3f2 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[3f3 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 principal matched by identity 0 +[3f4 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 0d 67 29 f2 dd c4 44 52 b4 64 a8 1f 10 48 f2 |..g)...DR.d...H.| +00000010 b8 ca 62 79 aa 7d b8 fd 4f c3 59 ec ca f2 d4 c0 |..by.}..O.Y.....| +[3f5 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5e 71 4d 29 b8 62 52 b5 8f 10 |0E.!..^qM).bR...| +00000010 08 d1 28 d7 4e 48 91 21 b9 2d 62 76 1a 21 f5 c7 |..(.NH.!.-bv.!..| +00000020 6a 6f db 01 da 02 20 69 62 fa a9 16 65 97 6f 50 |jo.... ib...e.oP| +00000030 e3 26 90 3c e8 a4 da 6c e5 32 60 77 95 cd 48 c9 |.&.<...l.2`w..H.| +00000040 d4 ee d2 5a 59 63 26 |...ZYc&| +[3f6 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 principal evaluation succeeds for identity 0 +[3f7 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef370 gate 1574140909413768100 evaluation succeeds +[3f8 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[3f9 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[3fa 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[3fb 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[3fc 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +[3fd 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +[3fe 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[3ff 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [1] +[400 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes to the block puller +[401 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +[402 11-19 05:21:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +[403 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +[404 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +[405 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +[406 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +[407 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[408 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002f8cf40 env 0xc00307c7d0 txn 0 +[409 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00307c7d0 +[40a 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +[40b 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[40c 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[40d 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[410 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[411 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[40e 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[40f 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[412 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[414 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[415 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 gate 1574140909425847500 evaluation starts +[416 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 signed by 0 principal evaluation starts (used [false]) +[417 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 processing identity 0 with bytes of 1151ae0 +[418 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 principal matched by identity 0 +[419 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 91 7f 7d a7 af 3c 87 a6 35 17 24 8d af 90 a3 |...}..<..5.$....| +00000010 9c 3f e8 16 83 d2 11 ae 07 62 88 c0 41 a0 bc 76 |.?.......b..A..v| +[41a 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 89 59 37 ed 6c ef 46 99 77 07 88 |0D. B.Y7.l.F.w..| +00000010 25 71 00 7a ca 4f fc d5 07 4b 3c 91 59 93 9c 26 |%q.z.O...K<.Y..&| +00000020 9d a1 c1 78 02 20 1a ad 4d ed 38 4f f6 87 77 4e |...x. ..M.8O..wN| +00000030 06 62 fc 50 54 7c b9 e6 b1 6e 8c 80 a3 be be 72 |.b.PT|...n.....r| +00000040 96 dc 8b 79 6a f8 |...yj.| +[41b 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 principal evaluation succeeds for identity 0 +[41c 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308f250 gate 1574140909425847500 evaluation succeeds +[41d 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[41e 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[41f 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[420 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[421 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +[422 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +[423 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[424 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [1] +[425 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes to the block puller +[426 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +[413 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[427 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE----- +[428 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +[429 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[42a 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[42b 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 24 ac 10 46 16 fe ce bb 6e 57 f7 c2 1e a1 d7 |.$..F....nW.....| +00000010 ca f6 e7 e8 44 8c cd d1 bf f4 d7 40 94 11 a4 79 |....D......@...y| +[42c 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 c4 5b a3 d3 2b 64 c0 35 61 d6 |0E.!...[..+d.5a.| +00000010 95 cb 42 f3 53 ed ef ed 72 82 6d 75 eb c7 a6 cf |..B.S...r.mu....| +00000020 f1 06 36 11 63 02 20 1c 0c c7 c4 d6 6e e7 f0 43 |..6.c. .....n..C| +00000030 67 71 a7 fd 4f 11 0f ce c9 86 9f 83 ad a4 58 be |gq..O.........X.| +00000040 b3 5c 64 f4 e2 dd 4d |.\d...M| +[42d 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[42e 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0030a6000, header channel_header:"\010\001\032\006\010\352\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\206\304\203H\037=p\333g\350\002=_\210\3709\"s\301\0334\363k\302" +[42f 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[430 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[431 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[432 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[433 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[434 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[435 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[436 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[437 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[438 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[439 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[43a 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[43b 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[43c 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[43d 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[43e 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[43f 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +[440 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +[441 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[442 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[443 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[444 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[445 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[446 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[447 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +[448 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[449 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[44a 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +[44b 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +[44c 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 gate 1574140909430596600 evaluation starts +[44d 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 signed by 0 principal evaluation starts (used [false]) +[44e 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 processing identity 0 with bytes of 1151ae0 +[44f 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[450 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[451 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[452 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[453 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[454 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[455 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 principal matched by identity 0 +[456 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d c1 dc 82 04 5c d4 a6 8e 81 4b 93 eb 9d f0 8e |]....\....K.....| +00000010 48 24 5f cd 4f 0a c7 a0 86 03 21 7a ad d2 65 12 |H$_.O.....!z..e.| +[457 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 18 8e 51 4c 05 9a 36 d0 b5 dc |0E.!....QL..6...| +00000010 f6 98 d4 50 55 ce 33 72 5c 99 6d 9c d5 2b f8 df |...PU.3r\.m..+..| +00000020 9d 53 74 88 4b 02 20 0b f6 9b f4 5d 00 74 ee 9d |.St.K. ....].t..| +00000030 67 d6 d5 d8 76 ea 99 9c 93 5c 79 f2 a4 11 64 34 |g...v....\y...d4| +00000040 4d ed a9 9c dd 40 ef |M....@.| +[458 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 principal evaluation succeeds for identity 0 +[459 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003136260 gate 1574140909430596600 evaluation succeeds +[45a 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +[45b 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +[45c 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +[45d 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[45e 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[45f 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[460 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[461 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[462 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[463 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[464 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[465 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[466 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[467 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[468 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +[469 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[46a 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[46b 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[46c 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[46d 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[46e 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[46f 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[470 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[471 11-19 05:21:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[472 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes to 1 peers +[473 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes to 1 peers +[474 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25495 bytes, seq: 2}, Envelope: 25528 bytes, Signature: 0 bytes +[475 11-19 05:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[476 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25492 bytes, seq: 1}, Envelope: 25525 bytes, Signature: 0 bytes +[477 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[478 11-19 05:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[479 11-19 05:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[47a 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[47b 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[47c 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[47d 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[47e 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[47f 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[480 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[481 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[482 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[483 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[484 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[485 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[486 11-19 05:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[487 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[488 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[489 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[48a 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[48b 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[48c 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[48d 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[48e 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[48f 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- +[490 11-19 05:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- +[491 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[492 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[493 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[494 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[495 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[496 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[497 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[498 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[499 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[49a 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[49b 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[49c 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[49d 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[49e 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- +[49f 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4a0 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4a1 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4a2 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4a3 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +[4a4 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[4a5 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4a6 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4a7 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[4a8 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- +[4a9 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[4aa 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[4ab 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[4ac 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[4ad 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[4ae 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[4af 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[4b0 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[4b1 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[4b2 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[4b3 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[4b4 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[4b5 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +[4b6 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[4b7 11-19 05:21:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[4b8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[4b9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[4ba 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[4bb 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[4bc 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[4bd 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[4be 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[4bf 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[4c0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[4c1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[4c2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[4c3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[4c4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[4c5 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[4c6 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[4c7 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[4c8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[4c9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[4ca 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[4cb 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[4cc 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[4cd 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[4ce 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[4cf 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[4d0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[4d1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[4d2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[4d3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[4d4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[4d5 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[4d6 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[4d7 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[4d8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[4d9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[4da 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[4db 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[4dc 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[4dd 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[4de 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +[4df 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[4e0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[4e1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[4e2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[4e3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[4e4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[4e5 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[4e6 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[4e7 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[4e8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[4e9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[4ea 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[4eb 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[4ec 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[4ed 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[4ee 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[4ef 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[4f0 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[4f1 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[4f2 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[4f3 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[4f4 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[4f5 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[4f6 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[4f7 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[4f8 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[4f9 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[4fa 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[4fb 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[4fc 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[4fd 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[4fe 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[4ff 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[500 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[501 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[502 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[503 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[504 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[505 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[506 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[507 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[508 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +[509 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[50a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[50b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[50c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[50d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[50e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[50f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 gate 1574140909495882800 evaluation starts +[510 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 signed by 0 principal evaluation starts (used [false]) +[511 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 processing identity 0 with bytes of 1151ae0 +[512 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 principal matched by identity 0 +[513 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +[514 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +00000040 30 b2 7f b8 62 2d 65 |0...b-e| +[515 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 principal evaluation succeeds for identity 0 +[516 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322b7e0 gate 1574140909495882800 evaluation succeeds +[517 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[518 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[519 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[51a 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[51b 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[51c 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[51d 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[51e 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[51f 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[520 11-19 05:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[521 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[522 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[523 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[524 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[525 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[526 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002f8cf40 env 0xc00307c7d0 txn 0 +[527 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[528 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 96ms +[529 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[52a 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[52b 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[52c 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +[52d 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[52e 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[52f 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[530 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +[531 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[532 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[533 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[534 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[535 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[536 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[537 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[538 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[539 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[53a 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[53b 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +[53c 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003211480)} +[53d 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[53e 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[53f 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[540 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +[541 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +[542 11-19 05:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +[543 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +[544 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x60, 0x1e, 0xe1, 0xb7, 0xa1, 0x19, 0x69, 0xc3, 0xf3, 0xb5, 0x51, 0x11, 0x52, 0x94, 0x60, 0xd, 0x7b, 0xd0, 0x3f, 0x9f, 0xa0, 0x2a, 0x24, 0xa6, 0x25, 0xf8, 0xdd, 0x54, 0x3d, 0xb9, 0xca, 0x84} txOffsets= +txId=994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727 locPointer=offset=71, bytesLength=24470 +] +[545 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to txid-index +[546 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=25878, bytesLength=24470] for tx number:[0] ID: [994e20dfd34910ecedd8328ac278f07a91acc9acfd40d3fa20eb0b0ba01a1727] to blockNumTranNum index +[547 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51321], isChainEmpty=[false], lastBlockNumber=[1] +[548 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +[549 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +[54a 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +[54b 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[54c 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[54d 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[54e 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[54f 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[550 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[551 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +[552 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[553 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +[554 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +[555 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[556 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +[557 11-19 05:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +[558 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +[559 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 12ms (state_validation=1ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +[55a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[55b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408BCAFBBCFFB999EEC15...EA55014EA68C22F9710D59632A020802 +[55c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E46508EC6B042CE78C4B4079FB9E00CC9DFA8EB95BC6CEFA4CA91C395F829B12 +[55d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +[55e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +[55f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +[560 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +[561 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +[562 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[563 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0028eff40 env 0xc002f41810 txn 0 +[564 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002f41810 +[565 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +[566 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[567 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[568 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[569 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[56a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE----- +[56b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +[56c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[56d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[56e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5c 3f 1b d8 4a da c3 4b 67 20 49 d8 48 ce 53 | \?..J..Kg I.H.S| +00000010 e1 89 fc 50 b4 b1 5e c3 a1 04 2d 2b 2a a2 53 c9 |...P..^...-+*.S.| +[56f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c da 5b 7f f8 0b 78 dd 56 60 07 6f |0D. <.[...x.V`.o| +00000010 55 50 96 78 11 13 49 28 89 52 93 b7 b2 9d bb 4d |UP.x..I(.R.....M| +00000020 1c 1a 01 32 02 20 63 c4 7c ca a7 d6 48 c5 10 9b |...2. c.|...H...| +00000030 00 2d 4d 59 a6 7a c2 62 62 b5 9b 3a ce f0 9e e7 |.-MY.z.bb..:....| +00000040 61 25 fa 66 d3 6c |a%.f.l| +[570 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[571 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00334a000, header channel_header:"\010\001\032\006\010\354\367\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\353,,\250#\201\200\261\241\375\354jvX\027|:ys\\\007t;\300" +[572 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[573 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[574 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[575 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[576 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[577 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[578 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[579 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[57a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[57b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[57c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[57d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[57e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[57f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[580 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[581 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[582 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +[583 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +[584 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[585 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[586 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[587 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[588 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[589 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[58a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +[58b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[58c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[58d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +[58e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +[58f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[590 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE----- +[591 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 gate 1574140909537274700 evaluation starts +[592 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 signed by 0 principal evaluation starts (used [false]) +[593 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 processing identity 0 with bytes of 1151ae0 +[594 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +[595 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +[596 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[597 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[598 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +[599 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[59a 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 principal matched by identity 0 +[59b 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 e2 d9 fd 77 a4 60 cd 10 60 88 2f 04 bf ea 42 |#...w.`..`./...B| +00000010 8e b5 d5 69 1d be 1d 2c fe dc 9a 5f 04 0f 32 f0 |...i...,..._..2.| +[59c 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 6a 3e 85 9a 11 16 55 d9 79 |0E.!...j>....U.y| +00000010 54 07 0c 2c 9c a6 85 a8 e2 e9 36 01 8c de 2b 0c |T..,......6...+.| +00000020 04 54 84 ff 89 02 20 72 4b 58 9a fd aa a5 d4 c5 |.T.... rKX......| +00000030 3f 36 f2 96 a0 b2 82 77 bf 5e aa ae 23 ed 59 4a |?6.....w.^..#.YJ| +00000040 56 71 ab 2e 37 58 4a |Vq..7XJ| +[59d 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 principal evaluation succeeds for identity 0 +[59e 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370ac0 gate 1574140909537274700 evaluation succeeds +[59f 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +[5a0 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +[5a1 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +[5a2 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[5a3 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[5a4 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[5a5 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[5a6 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[5a7 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[5a8 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[5a9 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[5aa 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[5ab 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[5ac 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[5ad 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[5ae 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[5af 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +[5b0 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[5b1 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[5b2 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[5b3 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[5b4 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[5b5 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[5b6 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[5b7 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[5b8 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[5b9 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[5ba 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[5bb 11-19 05:21:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[5bc 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[5bd 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[5be 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[5bf 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[5c0 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[5c1 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[5c2 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[5c3 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[5c4 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[5c5 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[5c6 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[5c7 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[5c8 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[5c9 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[5ca 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[5cb 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.544Z grpc.peer_address=172.18.0.8:41314 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=281.2µs +[5cc 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[5cd 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- +[5ce 11-19 05:21:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[5cf 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[5d0 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[5d1 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:41314 +[5d2 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41314 +[5d3 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[5d4 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 e4 ad 25 13 4b ec 70 c8 5a 29 |0E.!....%.K.p.Z)| +00000010 23 f7 64 65 9b 9a 0c de a7 0f 4a d1 72 bb 20 e6 |#.de......J.r. .| +00000020 40 ee cc 34 db 02 20 0d 15 1f 3e 94 75 79 46 37 |@..4.. ...>.uyF7| +00000030 65 25 83 99 88 e4 54 92 15 25 76 1d 8f 57 6e ff |e%....T..%v..Wn.| +00000040 2c 3b 64 d1 cd 1a 61 |,;d...a| +[5d5 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41314 +[5d6 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41314 +[5d7 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[5d8 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41264 disconnected +[5d9 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:41264 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=13.6921774s +[5da 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[5db 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[5dc 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41314 disconnected +[5dd 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:21:59.549Z grpc.peer_address=172.18.0.8:41314 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.9523ms +[5de 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing +[5df 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[5e0 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[5e1 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- +[5e2 11-19 05:21:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[5e3 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[5e4 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[5e5 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[5e6 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[5e7 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[5e8 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[5e9 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[5ea 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +[5eb 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[5ec 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[5ed 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[5ee 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[5ef 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- +[5f0 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[5f1 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[5f2 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[5f3 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[5f4 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[5f5 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[5f6 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[5f7 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[5f8 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[5f9 11-19 05:21:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- +[5fa 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[5fb 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[5fc 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[5fd 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[5fe 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[5ff 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[600 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[601 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[602 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[603 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[604 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[605 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[606 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[607 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[608 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[609 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[60a 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[60b 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[60c 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[60d 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[60e 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[60f 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[610 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[611 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[612 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[613 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[614 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[615 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[616 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[617 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[618 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[619 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[61a 11-19 05:21:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[61b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[61c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[61d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[61e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[61f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[620 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[621 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[622 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[623 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[624 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[625 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[626 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[627 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[628 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[629 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[62a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[62b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[62c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[62d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[62e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[62f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[630 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[631 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[632 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[633 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[634 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[635 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[636 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[637 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[638 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[639 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[63a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[63b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[63c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[63d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[63e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[63f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[640 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[641 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[642 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[643 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[644 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[645 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[646 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[647 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[648 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[649 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[64a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[64b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[64c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[64d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[64e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[64f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[650 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[651 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[652 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[653 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[654 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[655 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[656 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[657 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[658 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[659 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +[65a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[65b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[65c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[65d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[65e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[65f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[660 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[661 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[662 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE----- +[663 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 gate 1574140909582218900 evaluation starts +[664 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 signed by 0 principal evaluation starts (used [false]) +[665 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 processing identity 0 with bytes of 1151ae0 +[666 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[667 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[668 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[669 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 principal matched by identity 0 +[66a 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 b2 63 50 82 35 14 d6 ee 77 8f 1a 93 42 3a 17 |..cP.5...w...B:.| +00000010 ed a7 94 03 6e 08 6a 70 d8 1a 09 0e 28 3e 10 7e |....n.jp....(>.~| +[66b 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 91 bb f8 62 26 ff af bc ae 0d |0E.!.....b&.....| +00000010 64 e6 fd bd 51 e5 a4 a8 6b 07 34 98 d8 86 d9 e8 |d...Q...k.4.....| +00000020 c5 c6 c5 f4 64 02 20 5d 1b c9 3e 0e b7 de 0e 50 |....d. ]..>....P| +00000030 8e 34 70 22 d2 7a 8a 80 e8 26 45 f2 9a f8 a9 30 |.4p".z...&E....0| +00000040 30 b2 7f b8 62 2d 65 |0...b-e| +[66c 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 principal evaluation succeeds for identity 0 +[66d 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494940 gate 1574140909582218900 evaluation succeeds +[66e 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[66f 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[670 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[671 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[672 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[673 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +[674 11-19 05:21:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +[675 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[676 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[677 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[678 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[679 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0034cb430, CONNECTING +[67a 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[67b 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[67c 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[67d 11-19 05:21:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[67e 11-19 05:21:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0034cb430, READY +[67f 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[680 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[681 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[682 11-19 05:21:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051 +[683 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +[684 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[685 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[686 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE----- +[687 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[688 11-19 05:21:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[689 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[68a 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[68b 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[68c 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:51.643Z grpc.peer_address=172.18.0.8:41320 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=131.7µs +[68d 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[68e 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[68f 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[690 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[691 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[692 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[693 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[694 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[695 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 gate 1574140909644418100 evaluation starts +[696 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 signed by 0 principal evaluation starts (used [false]) +[697 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 processing identity 0 with bytes of 1151ae0 +[698 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[699 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[69a 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 principal evaluation fails +[69b 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355ce00 gate 1574140909644418100 evaluation fails +[69c 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[69d 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[69e 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[69f 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[6a0 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[6a1 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 gate 1574140909644685400 evaluation starts +[6a2 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 signed by 0 principal evaluation starts (used [false]) +[6a3 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 processing identity 0 with bytes of 1151ae0 +[6a4 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[6a5 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[6a6 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[6a7 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 principal matched by identity 0 +[6a8 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 45 02 21 00 dd 2a 2a 92 18 d2 f8 fa 21 d4 c5 |0E.!..**.....!..| +00000010 1a fb 9b 71 ff 29 5a 54 6a 26 d0 94 bc be 74 30 |...q.)ZTj&....t0| +00000020 48 46 a0 6c 5e 02 20 0c 20 ae c3 f7 93 38 a0 76 |HF.l^. . ....8.v| +00000030 87 3a 26 2f 5e e9 a0 ce d2 e6 1a 1d 8a 23 56 86 |.:&/^........#V.| +00000040 99 cc 5d c6 04 bb 72 |..]...r| +[6aa 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 principal evaluation succeeds for identity 0 +[6ab 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d390 gate 1574140909644685400 evaluation succeeds +[6ac 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[6ad 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[6ae 11-19 05:21:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[6af 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[6b0 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[6b1 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[6b2 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[6b3 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[6b4 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0028eff40 env 0xc002f41810 txn 0 +[6b5 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[6b6 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 119ms +[6b7 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[6b8 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[6b9 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[6ba 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[6bb 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[6bc 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[6bd 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:41320 +[6be 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41320 +[6bf 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[6c0 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 dd 81 79 16 e4 72 97 89 1b 7f |0E.!....y..r....| +00000010 c4 74 f0 52 37 00 5c c0 d0 84 60 33 1d 18 10 ca |.t.R7.\...`3....| +00000020 f5 e4 2d 3f 3d 02 20 7f 30 ab ee 95 40 7c 03 24 |..-?=. .0...@|.$| +00000030 79 09 dd ce e5 13 92 b8 39 78 3f c3 8b ae e0 3d |y.......9x?....=| +00000040 c4 9e 65 0e 2a 84 5e |..e.*.^| +[6c1 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41320 +[6c2 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41320 +[6c3 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[6c4 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +[6c5 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6c6 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6c7 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE----- +[6c8 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[6c9 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15100E +[6ca 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DD08DBE6E6601D9A298B5B6568C742526EAD9031F726F4B2AFAD08A3C5FA0F54 +[6cb 11-19 05:21:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[6cc 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[6cd 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[6ce 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6cf 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:14982435750489679862 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +[6d0 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:14982435750489679862 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[6d1 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[6d2 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[6d3 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[6d4 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[6d5 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[6d6 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003625a90, CONNECTING +[6d7 11-19 05:21:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[6d8 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[6d9 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[6da 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41320 disconnected +[6db 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:21:59.654Z grpc.peer_address=172.18.0.8:41320 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.5442ms +[6dc 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[6dd 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[6de 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +[6df 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[6e0 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[6e1 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[6e2 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +[6e3 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[6e4 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[6e5 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[6e6 11-19 05:21:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[6e7 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[6e8 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[6e9 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[6ea 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[6eb 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003625a90, READY +[6ec 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[6ed 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[6ee 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +[6ef 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003672400)} +[6f0 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[6f1 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[6f2 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[6f3 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +[6f4 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +[6f5 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +[6f6 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +[6f7 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x39, 0x34, 0x96, 0xee, 0x50, 0x5e, 0xad, 0x78, 0xfc, 0x3, 0xa3, 0xac, 0x21, 0xe9, 0xfb, 0x52, 0x19, 0x4e, 0xd1, 0x91, 0xc2, 0x3c, 0xb8, 0xb, 0x70, 0x9b, 0xb2, 0x3d, 0xdd, 0xb4, 0xc8, 0xd8} txOffsets= +txId=02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732 locPointer=offset=71, bytesLength=24474 +] +[6f8 11-19 05:21:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to txid-index +[6f9 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx number:[0] ID: [02f9e3678b6c15deae6dfb6d3a70f3234977a63e6b0ed23e6648ffee4f13f732] to blockNumTranNum index +[6fa 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76838], isChainEmpty=[false], lastBlockNumber=[2] +[6fb 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +[6fc 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +[6fd 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +[6fe 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[6ff 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[700 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[701 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[702 11-19 05:21:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[703 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[704 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[705 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[706 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051 +[707 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[708 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +[709 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +[70a 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +[70b 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[70c 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +[70d 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +[70e 11-19 05:21:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[70f 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +[710 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 38ms (state_validation=11ms block_and_pvtdata_commit=8ms state_commit=15ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +[711 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[712 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408BCAFBBCFFB999EEC15...EA55014EA68C22F9710D59632A020803 +[713 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C3812AF4027289ED8E56A976CD94048BE7C809E1E102EECA9140415EE22D2ED +[714 11-19 05:21:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +[715 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +[716 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[717 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[718 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[719 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[71a 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[71b 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[71c 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[71d 11-19 05:21:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[71e 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[71f 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[720 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[721 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[722 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[723 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 gate 1574140909731137900 evaluation starts +[724 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 signed by 0 principal evaluation starts (used [false]) +[725 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 processing identity 0 with bytes of 1151ae0 +[726 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[727 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[728 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[729 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 principal matched by identity 0 +[72a 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 44 02 20 08 83 d7 9a e8 05 8a 09 5f 95 09 4d |0D. ........_..M| +00000010 96 e1 65 fa b1 4f ea de 4d 40 a5 e0 bf ea ce c9 |..e..O..M@......| +00000020 cc 51 ec 02 02 20 49 15 6f 7e 35 45 a0 80 a3 5b |.Q... I.o~5E...[| +00000030 c8 55 83 21 5b be 1a 93 c2 1b 25 a4 45 5c b4 79 |.U.![.....%.E\.y| +00000040 ea dc 76 3e 62 5a |..v>bZ| +[72c 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 principal evaluation succeeds for identity 0 +[72d 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037556b0 gate 1574140909731137900 evaluation succeeds +[72e 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[72f 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[730 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[731 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[732 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +[733 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[734 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[735 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[736 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 14982435750489679862, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +[737 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 14982435750489679862, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +[738 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[739 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 14982435750489679862, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +[73a 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[73b 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 8e 4a 56 ff 77 9e 34 e9 6c 45 32 ff 9b 4a 59 |..JV.w.4.lE2..JY| +00000010 d6 72 0c a4 5e df 2c 67 0e 0d b0 48 93 65 6b 88 |.r..^.,g...H.ek.| +[73c 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 8d 1f 03 fe 0e 3b 31 28 87 48 c5 |0D. U.....;1(.H.| +00000010 9e d8 00 d5 fb 8d a9 59 b1 82 d3 bc 1b e9 dc 92 |.......Y........| +00000020 08 76 7a c9 02 20 5b f2 53 c2 83 2e c7 ed 42 b9 |.vz.. [.S.....B.| +00000030 94 c9 61 1b f1 fd f7 ff 0d b1 88 4b b6 bd 33 3d |..a........K..3=| +00000040 88 0c 75 f3 98 8f |..u...| +[73d 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[73e 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[73f 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[740 11-19 05:21:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[741 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[742 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[743 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[744 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[745 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 08 db e6 e6 60 1d 9a 29 8b 5b 65 68 c7 42 52 |.....`..).[eh.BR| +00000010 6e ad 90 31 f7 26 f4 b2 af ad 08 a3 c5 fa 0f 54 |n..1.&.........T| +[746 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 97 ca 8f 47 3c c1 df 9a ca 18 44 |0D. k...G<.....D| +00000010 12 a0 45 c1 58 f4 5e 41 58 97 6d 4e f3 29 4d e0 |..E.X.^AX.mN.)M.| +00000020 ae 26 b0 39 02 20 69 31 4f c6 c0 c5 52 c9 8d 3c |.&.9. i1O...R..<| +00000030 15 f0 e9 ce 7d a9 ad 6b 17 f2 6b cc dd b1 c0 08 |....}..k..k.....| +00000040 55 b0 84 1f 05 72 |U....r| +[747 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[748 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[749 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[74a 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[74b 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[74c 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[74d 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[74e 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[74f 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[750 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[751 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[752 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 gate 1574140909742587500 evaluation starts +[753 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 signed by 0 principal evaluation starts (used [false]) +[754 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 processing identity 0 with bytes of 1151ae0 +[755 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 principal matched by identity 0 +[756 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 a8 5e e1 4d bf 89 97 fb cf d0 29 0e 67 fd 42 |..^.M......).g.B| +00000010 f5 e2 f5 fa 4a e9 35 2d 0f fd 6a 97 5c 05 db 08 |....J.5-..j.\...| +[757 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 29 d4 2b 63 e9 58 3e 8b 8b dd |0E.!..).+c.X>...| +00000010 0f 44 dc 11 ad 76 7d 8a 6f 0f 18 af 5c 84 4b 09 |.D...v}.o...\.K.| +00000020 e1 67 f5 8a 95 02 20 25 fa 49 5b c6 12 47 c1 e6 |.g.... %.I[..G..| +00000030 01 c9 f6 f5 39 e8 74 d8 ed 87 32 f2 9c 90 ea 59 |....9.t...2....Y| +00000040 ae 2c 27 01 eb 65 dc |.,'..e.| +[758 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 principal evaluation succeeds for identity 0 +[759 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a580 gate 1574140909742587500 evaluation succeeds +[75a 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[75b 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[75c 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[75d 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[75e 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[75f 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +[760 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[761 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[762 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[763 11-19 05:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[764 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[765 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15100F +[766 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA55CBB33439D6E8A73AC955D8EF501712631D7B040E3643EBB0E97742EF9A1C +[767 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[768 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[769 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[76a 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[76b 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[76c 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[76d 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[76e 11-19 05:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[76f 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[770 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[771 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[772 11-19 05:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[773 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[774 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[775 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +[776 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[777 11-19 05:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037c3690, CONNECTING +[778 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037c3690, READY +[779 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[77a 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[77b 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[77c 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051 +[77d 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:7051 +[77e 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[77f 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d a5 10 3f 18 39 01 2c 39 02 ca |0E.!....?.9.,9..| +00000010 e1 92 55 76 12 a2 4b 00 e7 f1 ee 9b 08 fc 23 b1 |..Uv..K.......#.| +00000020 57 19 05 98 95 02 20 38 ab 7d f6 f8 6c 22 ab 4f |W..... 8.}..l".O| +00000030 94 c2 c0 85 ad a6 1e 9c 1d 5f 75 aa ca 6c d1 69 |........._u..l.i| +00000040 f0 c8 4b 5a 50 22 c3 |..KZP".| +[780 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +[781 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[782 11-19 05:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[783 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[784 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[785 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[786 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[787 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[788 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[789 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 55 cb b3 34 39 d6 e8 a7 3a c9 55 d8 ef 50 17 |.U..49...:.U..P.| +00000010 12 63 1d 7b 04 0e 36 43 eb b0 e9 77 42 ef 9a 1c |.c.{..6C...wB...| +[78a 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d c8 c3 99 a2 69 02 ac 4d af 7c |0E.!......i..M.|| +00000010 8f e4 a0 cd d2 a3 05 47 c2 ca 7f 82 e4 03 7c c0 |.......G......|.| +00000020 f9 a5 d7 9a 0b 02 20 4a 78 c4 c5 fc 6a 4a b4 6d |...... Jx...jJ.m| +00000030 5e c0 89 63 9a 2b 02 27 67 fd 16 c0 8b fa b4 b7 |^..c.+.'g.......| +00000040 52 91 6c 4a f1 e5 40 |R.lJ..@| +[78b 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[78c 11-19 05:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[78d 11-19 05:21:50.11 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.118Z grpc.peer_address=172.18.0.9:44656 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=138.5µs +[78e 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[78f 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[790 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[791 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:44656 +[792 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44656 +[793 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[794 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[795 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[796 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[797 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[798 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[799 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[79a 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[79b 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[79c 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[79d 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[79e 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 gate 1574140910126923900 evaluation starts +[79f 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 signed by 0 principal evaluation starts (used [false]) +[7a0 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 processing identity 0 with bytes of 1151ae0 +[7a1 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 principal matched by identity 0 +[7a2 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 45 02 21 00 a5 04 25 89 01 b0 a5 43 2a 66 1b |0E.!...%....C*f.| +00000010 22 5c ab 2b a4 d5 f0 3c 54 fe d3 e2 d4 b6 9d c2 |"\.+... DEBU 0xc003845b30 principal evaluation succeeds for identity 0 +[7a5 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845b30 gate 1574140910126923900 evaluation succeeds +[7a6 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[7a7 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7a8 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7a9 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7aa 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44656 +[7ab 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44656 +[7ac 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7ad 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing +[7ae 11-19 05:21:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[7af 11-19 05:21:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7b0 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7b1 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[7b2 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44656 disconnected +[7b3 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.121Z grpc.peer_address=172.18.0.9:44656 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.468ms +[7b4 11-19 05:21:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7b5 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.166Z grpc.peer_address=172.18.0.9:44658 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=316.6µs +[7b6 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7b7 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[7b8 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[7b9 11-19 05:21:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:44658 +[7ba 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44658 +[7bb 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7bc 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7bd 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7be 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7bf 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7c0 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7c1 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7c2 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7c3 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7c4 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7c5 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7c6 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 gate 1574140910173960500 evaluation starts +[7c7 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 signed by 0 principal evaluation starts (used [false]) +[7c8 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 processing identity 0 with bytes of 1151ae0 +[7c9 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 principal matched by identity 0 +[7ca 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 44 02 20 45 e8 fc 29 ab c5 ad 14 e9 18 8c 67 |0D. E..).......g| +00000010 47 0c 0d dd 29 32 6f c9 ee db 45 5e d1 16 c2 27 |G...)2o...E^...'| +00000020 51 ef 21 6c 02 20 55 65 28 75 50 2d 9e 66 ac 0a |Q.!l. Ue(uP-.f..| +00000030 0f 47 6a 36 ae 24 7d 72 fb 59 59 bd e8 5e 8c bd |.Gj6.$}r.YY..^..| +00000040 7c ba 3c 9e 1f a2 ||.<...| +[7cc 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 principal evaluation succeeds for identity 0 +[7cd 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c23f0 gate 1574140910173960500 evaluation succeeds +[7ce 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[7cf 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7d0 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7d1 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7d2 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44658 +[7d3 11-19 05:21:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44658 +[7d4 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:44658 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:11007432676051748334 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[7d5 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7d6 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:11007432676051748334 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[7d7 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[7d8 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7d9 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7da 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7db 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7dc 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7dd 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7de 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7df 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 gate 1574140910186069600 evaluation starts +[7e0 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 signed by 0 principal evaluation starts (used [false]) +[7e1 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 processing identity 0 with bytes of 1151ae0 +[7e2 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 principal matched by identity 0 +[7e3 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 34 fd 7e 77 cc df 4c 77 fa e0 0a 4c 85 5b 8d |i4.~w..Lw...L.[.| +00000010 fa 6c f4 80 7d 02 b9 1a 55 85 ef d1 0b fd 5e e2 |.l..}...U.....^.| +[7e4 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 bb 49 d4 84 01 2e 7f f6 fb ce |0E.!...I........| +00000010 e3 b6 08 d2 d4 be 80 0f 2d d7 82 70 a6 41 2b 0e |........-..p.A+.| +00000020 d7 75 fc e9 bb 02 20 05 34 8a 8b f0 dd a2 52 20 |.u.... .4.....R | +00000030 ba d5 74 b2 60 68 7e 3a bb 7b 89 56 ee 27 e2 c9 |..t.`h~:.{.V.'..| +00000040 94 16 6e 2b de c0 02 |..n+...| +[7e5 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 principal evaluation succeeds for identity 0 +[7e6 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3900 gate 1574140910186069600 evaluation succeeds +[7e7 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[7e8 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7e9 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7ea 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7eb 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[7ec 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[7ed 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[7ee 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[7ef 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[7f0 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7f1 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7f2 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7f3 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[7f4 11-19 05:21:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7f5 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7f6 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11007432676051748334, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes to 1 peers +[7f7 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +[7f8 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11007432676051748334, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 498 bytes, Signature: 0 bytes +[7f9 11-19 05:21:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7fa 11-19 05:21:50.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.238Z grpc.peer_address=172.18.0.9:44660 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127.7µs +[7fb 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7fc 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[7fd 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[7fe 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:44660 +[7ff 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44660 +[800 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[801 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[804 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[802 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[803 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:44658 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:1329517227700458756 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[806 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[805 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[807 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[809 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[80a 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[80b 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[808 11-19 05:21:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1329517227700458756 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[80c 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[80e 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[80f 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[80d 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[810 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[811 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 gate 1574140910250991200 evaluation starts +[812 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 signed by 0 principal evaluation starts (used [false]) +[813 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 processing identity 0 with bytes of 1151ae0 +[814 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[815 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[816 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 principal matched by identity 0 +[817 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[819 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[81a 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[81b 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[81c 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 gate 1574140910252016900 evaluation starts +[818 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 0xc00393b3e0 signed by 0 principal evaluation starts (used [false]) +[81e 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 processing identity 0 with bytes of 1151ae0 +[81f 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4c 1d 86 b1 40 40 ab 44 d9 e6 3f |0D. .L...@@.D..?| +00000010 3d 71 be 97 bc ea 29 f7 e4 57 4a 90 a2 b0 33 1c |=q....)..WJ...3.| +00000020 59 46 f9 77 02 20 4d 72 67 c1 51 d5 f8 d2 79 9e |YF.w. Mrg.Q...y.| +00000030 7a 5a 3b f9 3b c9 bf f5 35 ee 51 23 e5 bc 3f 2e |zZ;.;...5.Q#..?.| +00000040 14 d2 9e 70 02 6d |...p.m| +[820 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 principal matched by identity 0 +[821 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 e6 12 f6 45 3c ce 5e 23 8d 1c 58 73 1b db c3 |9...E<.^#..Xs...| +00000010 bd 34 a1 3e 51 8c 10 b4 77 d3 6f 72 3c d7 dd 30 |.4.>Q...w.or<..0| +[822 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 96 c4 15 75 5e 34 01 6b f1 00 d0 |0D. &...u^4.k...| +00000010 52 34 d2 39 a3 8c 63 3b 5f 98 d3 84 6a 63 26 18 |R4.9..c;_...jc&.| +00000020 84 8a c4 b2 02 20 10 02 c4 91 62 a2 e4 0e 62 cb |..... ....b...b.| +00000030 53 db f0 6e f5 99 df 30 2a 17 c6 8d 8a 4a de 49 |S..n...0*....J.I| +00000040 7b a1 88 e2 a6 54 |{....T| +[823 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 principal evaluation succeeds for identity 0 +[824 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b530 gate 1574140910250991200 evaluation succeeds +[825 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[826 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 principal evaluation succeeds for identity 0 +[827 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[828 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b3e0 gate 1574140910252016900 evaluation succeeds +[829 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[82a 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[82b 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[82c 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[82d 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44660 +[82e 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[82f 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[830 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44660 +[831 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[832 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[833 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[834 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44658 disconnected +[835 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[836 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[837 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:44658 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=83.5611ms +[838 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[839 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[83a 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[83b 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[83c 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[83d 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[83e 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44660 disconnected +[83f 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[840 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.241Z grpc.peer_address=172.18.0.9:44660 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=10.9007ms +[841 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[842 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[843 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing +[844 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[845 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1329517227700458756, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes to 1 peers +[846 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1329517227700458756, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes +[847 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[848 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[849 11-19 05:21:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[84a 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[84b 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[84c 11-19 05:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00397db10, CONNECTING +[84d 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +[84e 11-19 05:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00397db10, READY +[84f 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[850 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[851 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[852 11-19 05:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051 +[853 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +[854 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[855 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[856 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[857 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[858 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[859 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[85a 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[85b 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[85c 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[85d 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[85e 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[85f 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 gate 1574140910304034400 evaluation starts +[860 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 signed by 0 principal evaluation starts (used [false]) +[861 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 processing identity 0 with bytes of 1151ae0 +[862 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 principal matched by identity 0 +[863 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[864 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 45 02 21 00 b4 82 9d b8 11 ad 53 43 84 57 3f |0E.!.......SC.W?| +00000010 69 b5 51 27 5b 58 d8 56 1d 31 fb 6b b6 8a 9c 2a |i.Q'[X.V.1.k...*| +00000020 80 42 92 b5 0e 02 20 0b 7f be 18 0d 3f b2 13 b0 |.B.... .....?...| +00000030 ff e7 73 c4 f5 cb 4b c0 4e a0 e3 91 f0 e1 70 f2 |..s...K.N.....p.| +00000040 3a de b4 f2 ac ea de |:......| +[866 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 principal evaluation succeeds for identity 0 +[867 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dbf0 gate 1574140910304034400 evaluation succeeds +[868 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[869 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[86a 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[86b 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[86c 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +[86d 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[86e 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[86f 11-19 05:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[870 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.355Z grpc.peer_address=172.18.0.7:39090 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=391.9µs +[871 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[872 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[873 11-19 05:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[874 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:39090 +[875 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:39090 +[876 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[877 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[878 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +-----END CERTIFICATE----- +[879 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[87a 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[87b 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[87c 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[87d 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[87e 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[87f 11-19 05:21:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[880 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[881 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[882 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[883 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[884 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[885 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[886 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[887 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 gate 1574140910374249400 evaluation starts +[888 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 signed by 0 principal evaluation starts (used [false]) +[889 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 processing identity 0 with bytes of 1151ae0 +[88a 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[88b 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[88c 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[88d 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 principal matched by identity 0 +[88e 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +[88f 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 35 af 18 99 ae ab cd ff 72 e0 |0E.!..5.......r.| +00000010 3e 9d 94 95 2a 07 b3 0a 7d 5d d7 6f a5 37 8a 45 |>...*...}].o.7.E| +00000020 49 21 dd dc 23 02 20 71 8e ce 63 0d 12 87 de dc |I!..#. q..c.....| +00000030 3d b0 ba b9 24 30 d7 72 f6 e2 32 ee 83 08 fc 58 |=...$0.r..2....X| +00000040 49 0c 83 5c 75 2a 20 |I..\u* | +[890 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 principal evaluation succeeds for identity 0 +[891 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1fa10 gate 1574140910374249400 evaluation succeeds +[892 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[893 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[894 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[895 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[896 11-19 05:21:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:39090 +[897 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:39090 +[898 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[899 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:39090 disconnected +[89a 11-19 05:21:50.38 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.359Z grpc.peer_address=172.18.0.7:39090 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.5774ms +[89b 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.404Z grpc.peer_address=172.18.0.7:39092 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=121.3µs +[89c 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[89d 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[89e 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[89f 11-19 05:21:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:39092 +[8a0 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:39092 +[8a1 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8a2 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8a3 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8a4 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8a5 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8a6 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8a7 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[8a8 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[8a9 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[8aa 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[8ab 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[8ac 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 gate 1574140910418265000 evaluation starts +[8ad 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 signed by 0 principal evaluation starts (used [false]) +[8ae 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 processing identity 0 with bytes of 1151ae0 +[8af 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 principal matched by identity 0 +[8b0 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +[8b1 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 d8 76 8c a4 e5 a9 39 93 68 d4 |0E.!...v....9.h.| +00000010 a1 fc d8 be 17 25 9f 19 eb 05 ab 55 0e c5 ae 25 |.....%.....U...%| +00000020 47 6e 71 85 73 02 20 1e 0c 07 5e ef 10 99 c3 d4 |Gnq.s. ...^.....| +00000030 46 5a dc c9 72 6a 11 5f 9f f0 8a f5 81 05 a1 9e |FZ..rj._........| +00000040 93 fd 5b 45 93 0f 1a |..[E...| +[8b2 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 principal evaluation succeeds for identity 0 +[8b3 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ffd0 gate 1574140910418265000 evaluation succeeds +[8b4 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8b5 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8b6 11-19 05:21:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8b7 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8b8 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:39092 +[8b9 11-19 05:21:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:39092 +[8ba 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:39092 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:7233013353250887132 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[8bb 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8bc 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7233013353250887132 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[8bd 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[8be 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8bf 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8c0 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[8c1 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[8c2 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[8c3 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[8c4 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[8c5 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 gate 1574140910435203200 evaluation starts +[8c6 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 signed by 0 principal evaluation starts (used [false]) +[8c7 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 processing identity 0 with bytes of 1151ae0 +[8c8 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 principal matched by identity 0 +[8c9 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 41 22 91 e2 af 31 74 47 bb 7f 06 cd e6 62 a6 |'A"...1tG.....b.| +00000010 c0 7d 7b 1f 8d 86 2b 44 3f 75 dc d9 93 d1 5c ae |.}{...+D?u....\.| +[8ca 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 0d 60 5e 40 c4 6b d1 59 2f 0e |0E.!...`^@.k.Y/.| +00000010 f4 df c9 60 92 25 b4 6b ab 82 1d 0f ec da 94 0f |...`.%.k........| +00000020 34 99 57 91 0c 02 20 6c 3a 8a ab 42 14 9e 38 fe |4.W... l:..B..8.| +00000030 a0 ea f5 e2 1f 08 2e 2d 40 bb 40 98 dd 47 3c 01 |.......-@.@..G<.| +00000040 d1 e0 4a 03 0b c0 63 |..J...c| +[8cb 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 principal evaluation succeeds for identity 0 +[8cc 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a914e0 gate 1574140910435203200 evaluation succeeds +[8cd 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8ce 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8cf 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8d0 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8d1 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[8d2 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +[8d3 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[8d4 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8d5 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8d6 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8d7 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[8d8 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8d9 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8da 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8db 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 7233013353250887132, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +[8dc 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[8dd 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7233013353250887132, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[8de 11-19 05:21:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8df 11-19 05:21:50.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:21:52.516Z grpc.peer_address=172.18.0.7:39096 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=252.8µs +[8e0 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[8e1 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[8e2 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[8e3 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:39096 +[8e4 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:39096 +[8e5 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8e6 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8e7 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8e8 11-19 05:21:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8e9 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8ea 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8eb 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[8ec 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[8ed 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[8ee 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[8ef 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[8f0 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 gate 1574140910533788800 evaluation starts +[8f1 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 signed by 0 principal evaluation starts (used [false]) +[8f2 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 processing identity 0 with bytes of 1151ae0 +[8f3 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 principal matched by identity 0 +[8f4 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +[8f5 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 81 53 47 96 3e c7 78 96 2c 73 41 |0D. D.SG.>.x.,sA| +00000010 ad 6d 19 cc cd 5c 0c 00 7d 1d 51 53 92 71 03 71 |.m...\..}.QS.q.q| +00000020 b0 b2 7b 68 02 20 56 f9 bd 29 86 6e 20 4b a5 be |..{h. V..).n K..| +00000030 e6 3e f3 0a ca 2e 1e 3b f5 b6 c2 59 5e d4 c5 9d |.>.....;...Y^...| +00000040 89 78 b8 01 7a 61 |.x..za| +[8f6 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 principal evaluation succeeds for identity 0 +[8f7 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b00e70 gate 1574140910533788800 evaluation succeeds +[8f8 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8f9 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8fa 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8fb 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8fc 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:39096 +[8fd 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:39096 +[8fe 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[8ff 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:39092 disconnected +[901 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[900 11-19 05:21:50.53 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:39092 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=132.0249ms +[902 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[903 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:39096 disconnected +[906 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:22:00.522Z grpc.peer_address=172.18.0.7:39096 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=19.1908ms +[904 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[905 11-19 05:21:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing +[907 11-19 05:21:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[908 11-19 05:21:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[909 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[90a 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[90b 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[90c 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[90d 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[90f 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[910 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[911 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[90e 11-19 05:21:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[912 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[913 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[914 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[915 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[916 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[917 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[918 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[919 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[91a 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[91b 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[91c 11-19 05:21:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[91d 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[91e 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[91f 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +[920 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[921 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b398b0, CONNECTING +[922 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b398b0, READY +[923 11-19 05:21:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[924 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[925 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[926 11-19 05:21:50.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +[927 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[928 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[929 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[92a 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[92b 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[92c 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 17 05 84 38 0c 79 48 ed 68 77 4f e4 a8 dc 2e |....8.yH.hwO....| +00000010 08 19 d6 73 63 62 de 37 a8 ca 4a 4a 88 c1 68 37 |...scb.7..JJ..h7| +[92d 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:7051 +[92f 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[930 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[931 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[932 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[933 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151010 +[92e 11-19 05:21:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 32 ed 6c 52 d9 72 ea 04 95 98 |0E.!..2.lR.r....| +00000010 bd 70 08 2d cd 2b ea 6a 75 53 2d 2d fc 68 56 6e |.p.-.+.juS--.hVn| +00000020 33 f8 b9 79 94 02 20 25 23 44 ad 84 83 51 ae 20 |3..y.. %#D...Q. | +00000030 6c c6 98 10 44 b0 f7 d1 37 85 02 6c be 79 43 12 |l...D...7..l.yC.| +00000040 9b 03 26 35 30 6e cf |..&50n.| +[934 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E816214EC528CF7AC3A412B16FB6ED92131F0A98A7F5D12AD7160156F9D32D0E +[935 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[939 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[93a 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[93b 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[936 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[937 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[938 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[93c 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[940 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[941 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[942 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[945 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +[946 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[943 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +[947 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[93e 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[948 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[949 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[94a 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[94b 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[94c 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[94d 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[94e 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 gate 1574140910836146900 evaluation starts +[94f 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 signed by 0 principal evaluation starts (used [false]) +[950 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 processing identity 0 with bytes of 1151ae0 +[93f 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[93d 11-19 05:21:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[944 11-19 05:21:50.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[951 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 principal matched by identity 0 +[956 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +[952 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[957 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[958 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[959 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[95a 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[95b 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[95c 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[95d 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[95e 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[95f 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[960 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[961 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[962 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[963 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[964 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[966 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[965 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 1f cf db 53 ac 11 6f b3 47 75 |0E.!.....S..o.Gu| +00000010 e8 4d c4 66 99 85 0b 3d 75 6a 95 38 77 fa e7 f0 |.M.f...=uj.8w...| +00000020 fb 81 58 b4 45 02 20 69 4d e5 2e e3 c8 d0 98 06 |..X.E. iM.......| +00000030 3d 57 51 31 80 bf 06 66 24 ea 32 30 ab 9d c1 57 |=WQ1...f$.20...W| +00000040 72 af 65 01 36 13 59 |r.e.6.Y| +[967 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[969 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[954 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[968 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 principal evaluation succeeds for identity 0 +[96b 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbe5d0 gate 1574140910836146900 evaluation succeeds +[953 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[955 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[96e 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[96a 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[96f 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[970 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 gate 1574140910860327800 evaluation starts +[971 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 signed by 0 principal evaluation starts (used [false]) +[96d 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[972 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[974 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[96c 11-19 05:21:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[973 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 processing identity 0 with bytes of 1151ae0 +[975 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[978 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[976 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[979 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[97a 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[97b 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +[97c 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[97d 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[97e 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[977 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 principal matched by identity 0 +[97f 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 4d 5f 51 e3 32 7f 75 f0 d9 fb d4 7a 6b a5 c9 |lM_Q.2.u....zk..| +00000010 61 23 20 41 20 8b f2 83 d0 a6 18 a0 35 ca 76 56 |a# A .......5.vV| +[980 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 1a 97 6b aa 3e 8e e8 c9 d9 19 80 |0D. ;..k.>......| +00000010 f9 25 b7 a2 69 14 d6 d1 94 81 aa 7f 74 a6 d0 02 |.%..i.......t...| +00000020 5a 76 7b e6 02 20 7b ef 62 7e 53 83 79 e2 81 f0 |Zv{.. {.b~S.y...| +00000030 06 d7 36 2e e2 05 24 fc 84 65 29 23 de 75 9f 0d |..6...$..e)#.u..| +00000040 25 87 85 0b f4 a0 |%.....| +[981 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 principal evaluation succeeds for identity 0 +[982 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbfc40 gate 1574140910860327800 evaluation succeeds +[983 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[984 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[985 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[986 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[987 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[988 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[989 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[98a 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[98b 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[98c 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[98d 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[98e 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[98f 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[990 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[991 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[992 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[993 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[994 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[995 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[996 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[997 11-19 05:21:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[998 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[999 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[99a 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[99b 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[99c 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +[99d 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +00000040 c0 54 b2 99 1b 95 3e |.T....>| +[99e 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[99f 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9a0 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9a1 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[9a2 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9a3 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[9a4 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9a5 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9a6 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9a7 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9a8 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9a9 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 gate 1574140910875060000 evaluation starts +[9aa 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 signed by 0 principal evaluation starts (used [false]) +[9ac 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9ad 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9ab 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[9ae 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[9af 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 processing identity 0 with bytes of 1151ae0 +[9b0 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 principal matched by identity 0 +[9b1 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e f8 80 a5 e3 28 6d 18 1c 9d ba fe c3 41 e3 b2 |.....(m......A..| +00000010 11 84 90 75 ba 4f 5d 14 73 29 84 2b e8 9d fc ef |...u.O].s).+....| +[9b2 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 05 7b 17 02 f3 b8 53 af 34 8c fb |0D. 8.{....S.4..| +00000010 a2 0a 60 9d 35 e8 73 f4 17 f8 2f 9c db e2 ca 91 |..`.5.s.../.....| +00000020 57 ce f5 3e 02 20 1f be 98 b3 5c 17 59 a9 9c 7e |W..>. ....\.Y..~| +00000030 c3 f5 05 9a b4 ca b7 27 a7 1c 3c 50 fa 40 3a d4 |.......'.. DEBU 0xc003be1c20 principal evaluation succeeds for identity 0 +[9b4 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1c20 gate 1574140910875060000 evaluation succeeds +[9b5 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9b6 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9b7 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9b8 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9b9 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[9ba 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9bb 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9bc 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9bd 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9be 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9bf 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9c0 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[9c1 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9c2 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9c3 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[9c4 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[9c5 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9c6 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[9c7 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9c8 11-19 05:21:50.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[9c9 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[9ca 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[9cb 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[9cc 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9cd 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9ce 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9cf 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9d0 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[9d1 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[9d2 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9d3 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[9d4 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[9d5 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[9d6 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +[9d7 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +00000040 c0 54 b2 99 1b 95 3e |.T....>| +[9d8 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[9d9 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 0f 8f ca 5c 5d 65 ca b6 56 33 ff |0D. 2...\]e..V3.| +00000010 d6 ed 5d ec 86 ae 66 21 88 75 e9 5b 71 87 e2 e8 |..]...f!.u.[q...| +00000020 6f ba d6 f5 02 20 3f 98 92 91 85 01 23 47 06 7d |o.... ?.....#G.}| +00000030 44 82 4c 5d df ae 49 25 ff 5d 98 35 6b 96 aa 68 |D.L]..I%.].5k..h| +00000040 34 94 1e 7b f7 f4 |4..{..| +[9da 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[9db 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[9dc 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9dd 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9de 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[9df 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9e0 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[9e1 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 16 21 4e c5 28 cf 7a c3 a4 12 b1 6f b6 ed 92 |..!N.(.z....o...| +00000010 13 1f 0a 98 a7 f5 d1 2a d7 16 01 56 f9 d3 2d 0e |.......*...V..-.| +[9e2 11-19 05:21:50.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 af 04 78 64 b7 70 7b 22 36 ad |0E.!....xd.p{"6.| +00000010 33 3b 4c ef 75 1f 7c e7 9b 0b 4a 20 0d 57 88 18 |3;L.u.|...J .W..| +00000020 72 b6 ad 27 07 02 20 79 b7 32 bc 51 fb 3a 92 3a |r..'.. y.2.Q.:.:| +00000030 5a 09 50 bb dd de 1c 67 18 f0 8a 1e 40 5b e9 e1 |Z.P....g....@[..| +00000040 c0 54 b2 99 1b 95 3e |.T....>| +[9e3 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9e4 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9e5 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9e6 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[9e7 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9e8 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[9e9 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9ea 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9eb 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9ec 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9ed 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9ee 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 gate 1574140910891609200 evaluation starts +[9ef 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 signed by 0 principal evaluation starts (used [false]) +[9f0 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 processing identity 0 with bytes of 1151ae0 +[9f1 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 principal matched by identity 0 +[9f2 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 19 8b 85 59 7d 69 4c 24 0d eb f9 6e 6e 19 5d |....Y}iL$...nn.]| +00000010 56 3f 42 5a 39 65 7f 10 b4 3d ef a3 b9 1a 23 14 |V?BZ9e...=....#.| +[9f3 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 35 11 38 3f dc 0c 83 3a fb ea |0E.!..5.8?...:..| +00000010 0e 51 7c f2 0a 23 7d 71 7f 6b 28 0d 48 51 81 3b |.Q|..#}q.k(.HQ.;| +00000020 22 09 b5 af e3 02 20 10 d9 9c e7 51 65 4a b5 f7 |"..... ....QeJ..| +00000030 df 51 dc 08 7c e5 e1 24 66 f5 87 2d 6f 68 cb 44 |.Q..|..$f..-oh.D| +00000040 b6 0c ba 96 ca 37 f6 |.....7.| +[9f4 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 principal evaluation succeeds for identity 0 +[9f5 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ee00 gate 1574140910891609200 evaluation succeeds +[9f6 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9f7 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9f8 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9f9 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9fa 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9fb 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 18 but got ts: inc_num:1574140895405208300 seq_num:12 +[9fc 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9fd 11-19 05:21:50.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9fe 11-19 05:21:51.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9ff 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a00 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[a01 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[a02 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a03 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[a04 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a05 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[a06 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a07 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +[a08 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +[a09 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a0a 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a0b 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a0c 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[a0f 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a10 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a11 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a0d 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[a0e 11-19 05:21:51.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +[a12 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a13 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a14 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 gate 1574140911351351400 evaluation starts +[a15 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 signed by 0 principal evaluation starts (used [false]) +[a16 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 processing identity 0 with bytes of 1151ae0 +[a17 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 principal matched by identity 0 +[a18 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[a19 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[a1a 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 principal evaluation succeeds for identity 0 +[a1b 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3fa90 gate 1574140911351351400 evaluation succeeds +[a1c 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a1d 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a1e 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a1f 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a20 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a21 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a22 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a23 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a24 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a25 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a26 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 gate 1574140911353538600 evaluation starts +[a27 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 signed by 0 principal evaluation starts (used [false]) +[a28 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 processing identity 0 with bytes of 1151ae0 +[a29 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 principal matched by identity 0 +[a2a 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[a2b 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[a2c 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 principal evaluation succeeds for identity 0 +[a2d 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6e5d0 gate 1574140911353538600 evaluation succeeds +[a2e 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a2f 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a30 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 3 peers +[a31 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a32 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a33 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a34 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a35 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a36 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a37 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a38 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a39 11-19 05:21:51.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a3a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a3b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a3c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a3d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a3e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[a3f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a40 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a41 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a42 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[a43 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a44 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a45 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a46 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a47 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a48 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 gate 1574140911366604200 evaluation starts +[a49 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 signed by 0 principal evaluation starts (used [false]) +[a4a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 processing identity 0 with bytes of 1151ae0 +[a4b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 principal matched by identity 0 +[a4c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[a4d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[a4e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 principal evaluation succeeds for identity 0 +[a4f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6f9b0 gate 1574140911366604200 evaluation succeeds +[a50 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a51 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a52 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a53 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a54 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a55 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a56 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a57 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a58 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a59 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a5a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 gate 1574140911367505400 evaluation starts +[a5b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 signed by 0 principal evaluation starts (used [false]) +[a5c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 processing identity 0 with bytes of 1151ae0 +[a5d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 principal matched by identity 0 +[a5e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[a5f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[a60 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 principal evaluation succeeds for identity 0 +[a61 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c984f0 gate 1574140911367505400 evaluation succeeds +[a62 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a63 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a64 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a65 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a66 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a67 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +[a68 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 c5 b2 2c 3e af b8 f7 8f 8c 2a 44 ef 9e 8a 87 |&..,>.....*D....| +00000010 c4 01 30 aa 3d 34 f0 bf 16 81 4f a0 44 19 df e5 |..0.=4....O.D...| +[a69 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 92 fb 35 13 3f 29 99 4d 95 47 ff |0D. "..5.?).M.G.| +00000010 1b 92 6b 1a c2 34 2e 78 03 f0 8a 7c 07 fb 53 30 |..k..4.x...|..S0| +00000020 1c 7e 48 f2 02 20 10 7c 9f 70 52 85 f2 3c eb fb |.~H.. .|.pR..<..| +00000030 ef f4 a5 28 0d d1 46 54 f6 62 3d bf 6a d9 2d d4 |...(..FT.b=.j.-.| +00000040 18 8b 11 50 9a 69 |...P.i| +[a6a 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[a6b 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[a6c 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a6d 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a6e 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a6f 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a70 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a71 11-19 05:21:51.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a72 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE----- +[a73 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 gate 1574140911370706100 evaluation starts +[a74 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 signed by 0 principal evaluation starts (used [false]) +[a75 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 processing identity 0 with bytes of 1151ae0 +[a76 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[a77 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 principal evaluation fails +[a78 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99e20 gate 1574140911370706100 evaluation fails +[a79 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[a7a 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a7b 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[a7c 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 gate 1574140911372379600 evaluation starts +[a7d 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 signed by 0 principal evaluation starts (used [false]) +[a7e 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 processing identity 0 with bytes of 1151ae0 +[a7f 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[a80 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[a81 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[a82 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 principal matched by identity 0 +[a83 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[a84 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[a85 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 principal evaluation succeeds for identity 0 +[a86 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0c30 gate 1574140911372379600 evaluation succeeds +[a87 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[a88 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[a89 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a8a 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a8b 11-19 05:21:51.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a8c 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a8d 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a8e 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[a8f 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[a90 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a91 11-19 05:21:51.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a92 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a93 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a94 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[a95 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[a96 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a97 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a98 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a99 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[a9a 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a9b 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a9c 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[a9d 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[a9e 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a9f 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[aa0 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[aa1 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[aa2 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aa3 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[aa4 11-19 05:21:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[aa5 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[aa6 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa7 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa8 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[aa9 11-19 05:21:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aaa 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[aab 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[aac 11-19 05:21:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aad 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[aae 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[aaf 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ab0 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ab1 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ab2 11-19 05:21:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ab3 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ab4 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ab5 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ab6 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 gate 1574140911458545900 evaluation starts +[ab7 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 signed by 0 principal evaluation starts (used [false]) +[ab8 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 processing identity 0 with bytes of 1151ae0 +[ab9 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 principal matched by identity 0 +[aba 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 22 53 4e e7 78 ea dd 97 fa 4f af cc 9d 7b c8 |6"SN.x....O...{.| +00000010 28 bd 43 2e 47 4c 60 e2 9f 25 1d c0 74 6f a0 f0 |(.C.GL`..%..to..| +[abb 11-19 05:21:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 96 22 d0 d6 eb e9 2f 69 a7 3d 7f |0D. l."..../i.=.| +00000010 2a dd 7c ef 18 30 37 08 71 0d 78 e0 7a 7f de 91 |*.|..07.q.x.z...| +00000020 a5 77 4c 14 02 20 38 21 cb e3 6a 1d 42 85 16 9e |.wL.. 8!..j.B...| +00000030 bc da 5f 34 0e 3d 2d da 2d 73 92 6d 4d 46 99 22 |.._4.=-.-s.mMF."| +00000040 54 df bf 03 9e c9 |T.....| +[abc 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 principal evaluation succeeds for identity 0 +[abd 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe050 gate 1574140911458545900 evaluation succeeds +[abe 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[abf 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ac0 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ac1 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ac2 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ac3 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[ac4 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[ac5 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[ac6 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[ac7 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ac8 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ac9 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aca 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[acb 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[acc 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[acd 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ace 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[acf 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\216\350\311\331\031\200\371%\267\242i\024\326\321\224\201\252\177t\246\320\002Zv{\346\002 {\357b~S\203y\342\201\360\006\3276.\342\005$\374\204e)#\336u\237\r%\207\205\013\364\240" > alive: +[ad0 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ad1 11-19 05:21:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ad2 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ad3 11-19 05:21:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ad4 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ad5 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ad6 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ad7 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[ad8 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[ad9 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[ada 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[adb 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[adc 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[add 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[ade 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[adf 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[ae0 11-19 05:21:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ae1 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[ae2 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[ae3 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[ae4 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[ae5 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ae6 11-19 05:21:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ae7 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to peer1.org2.example.com:7051 +[ae8 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +[ae9 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to peer0.org2.example.com:7051 +[aea 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +[aeb 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[aec 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aed 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[aee 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6034116066613526804, Envelope: 960 bytes, Signature: 0 bytes +[aef 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6034116066613526804, Envelope: 960 bytes, Signature: 0 bytes +[af0 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[af1 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[af2 11-19 05:21:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[af3 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[af4 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7972021935824796748, Envelope: 960 bytes, Signature: 0 bytes +[af5 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[af6 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[af7 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[af8 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[af9 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 gate 1574140911783276900 evaluation starts +[afa 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 signed by 0 principal evaluation starts (used [false]) +[afb 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 processing identity 0 with bytes of 1151ae0 +[afc 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 principal matched by identity 0 +[afd 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a c7 07 b8 a6 e2 3f 6d 3f 52 f9 11 5e c4 ac a3 |......?m?R..^...| +00000010 86 a0 13 5c 24 43 f8 af dc db 79 58 90 84 d9 fe |...\$C....yX....| +[afe 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 72 1b f0 55 5e d1 c7 0a de af b2 |0D. .r..U^......| +00000010 ee 11 7e 45 6f a8 2e 1b ea a8 a2 c8 6e cf 01 d2 |..~Eo.......n...| +00000020 c2 b3 f1 d6 02 20 5f 8b ea 0e 41 fd ac ca 5e 0f |..... _...A...^.| +00000030 7a 8a 5b 43 5a a7 47 97 85 d7 30 8f 7d b4 c5 b9 |z.[CZ.G...0.}...| +00000040 15 1e 09 1d e2 c6 |......| +[aff 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 principal evaluation succeeds for identity 0 +[b00 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67240 gate 1574140911783276900 evaluation succeeds +[b01 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b02 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b03 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b04 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b05 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b06 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b07 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6034116066613526804, Envelope: 960 bytes, Signature: 0 bytes +[b08 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b09 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b0a 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b0b 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b0c 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 78 102 48 116 47 73 97 110 78 52 83 84 110 47 74 99 90 52 75 86 99 56 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 119 79 84 73 48 77 68 65 49 79 84 65 119 87 104 99 78 77 106 107 119 79 84 73 120 77 68 65 49 79 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 65 116 51 73 56 50 72 52 50 66 114 10 83 47 52 109 68 69 103 111 73 71 49 115 86 86 97 73 72 82 48 116 47 99 110 53 113 106 50 115 57 116 72 70 108 88 49 88 114 103 112 53 121 72 119 55 110 90 107 73 103 66 105 70 114 50 87 110 87 119 49 83 84 73 106 56 10 100 118 106 105 53 101 122 47 100 98 43 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 73 53 114 108 100 66 47 51 50 78 78 121 108 43 73 98 56 53 53 52 85 71 86 67 68 99 72 88 101 78 78 73 110 83 66 110 88 88 67 122 76 84 85 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 70 50 121 56 69 87 104 49 79 118 69 99 101 121 84 68 71 71 70 114 100 78 119 47 118 106 49 65 86 51 52 105 82 76 57 102 66 57 78 80 72 57 55 65 105 65 52 70 89 114 81 10 115 122 57 106 106 56 74 50 69 111 118 79 121 111 49 113 118 84 73 107 97 113 82 109 89 116 67 120 86 114 101 105 52 73 87 43 105 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[b0d 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Added A^���g�� +����U���ʒ�:+��aSpq� to the in memory item map, total items: 3 +[b0e 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b0f 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7972021935824796748, Envelope: 960 bytes, Signature: 0 bytes +[b10 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b11 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b12 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b13 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b14 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b15 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b16 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b17 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 gate 1574140911789393100 evaluation starts +[b18 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 signed by 0 principal evaluation starts (used [false]) +[b19 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 processing identity 0 with bytes of 1151ae0 +[b1a 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 principal matched by identity 0 +[b1b 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 10 04 b5 a3 2a 10 1a 4d 56 66 c4 f3 70 0f 31 |.....*..MVf..p.1| +00000010 c8 d0 a3 ab a5 ba 00 36 67 eb 56 a7 61 c6 4b ea |.......6g.V.a.K.| +[b1c 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 7a 55 44 ca 72 63 38 96 2d 0a bf |0D. .zUD.rc8.-..| +00000010 9b c0 0d 1e 70 36 ec f4 c3 f9 05 45 ab 5c 21 06 |....p6.....E.\!.| +00000020 dd c4 a8 ac 02 20 18 9c f8 41 1c c6 81 f6 be ec |..... ...A......| +00000030 b0 4d a9 b8 0b 79 82 f5 6d 52 aa 1b bf 24 ee d2 |.M...y..mR...$..| +00000040 cd 2b be b4 dc 4c |.+...L| +[b1d 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 principal evaluation succeeds for identity 0 +[b1e 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d919e0 gate 1574140911789393100 evaluation succeeds +[b1f 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b20 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b21 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b22 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b23 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b24 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b25 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7972021935824796748, Envelope: 960 bytes, Signature: 0 bytes +[b26 11-19 05:21:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b27 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b28 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b29 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b2a 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 102 105 102 67 76 119 72 51 110 66 114 75 72 80 115 121 82 75 78 70 68 122 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 114 77 122 71 105 79 121 106 104 83 43 10 86 87 101 43 84 47 56 79 89 105 102 75 110 75 84 118 102 73 102 51 105 119 75 89 106 75 104 108 49 103 67 101 87 86 90 110 72 89 75 79 80 98 85 117 73 80 116 55 97 77 54 120 76 57 51 121 117 118 120 111 77 100 51 105 10 65 74 107 80 83 55 111 100 50 54 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 106 109 117 86 48 72 47 102 89 48 51 75 88 52 104 118 122 110 110 104 81 90 85 73 78 119 100 100 52 48 48 105 100 73 71 100 100 99 76 77 116 78 81 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 99 113 85 43 110 112 50 85 104 57 119 109 103 79 55 54 88 69 50 107 121 71 49 110 56 111 112 114 102 82 106 68 51 66 119 53 49 103 87 74 118 116 65 105 66 114 85 71 57 103 10 70 114 97 73 49 57 49 78 114 113 122 53 108 98 99 65 98 112 107 84 43 74 83 116 84 80 113 55 54 79 120 69 111 43 81 56 110 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[b2b 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Added *g��kҚ�-���$6��[�@p�@�NP3�� to the in memory item map, total items: 4 +[b2c 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b2d 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[b2e 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[b2f 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[b30 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[b31 11-19 05:21:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b32 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[b33 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[b34 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b35 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[b36 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[b37 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +[b38 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +00000040 b0 a7 83 ce 50 7e |....P~| +[b39 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[b3a 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e d8 7c 41 ed 7e 17 52 22 d7 4e 6f |0D. N.|A.~.R".No| +00000010 30 2f 81 cc 6f cc 8c b2 7b a9 f3 e3 47 6a 6c aa |0/..o...{...Gjl.| +00000020 e4 13 d8 fe 02 20 6b 7e e6 a1 96 10 cd 1d 90 dc |..... k~........| +00000030 c1 5d da a9 ac 31 ab 33 71 95 cc 8b 13 db 20 be |.]...1.3q..... .| +00000040 fd 6f 4d c4 4e 27 |.oM.N'| +[b3b 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[b3c 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[b3d 11-19 05:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[b3e 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[b3f 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[b40 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[b41 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b42 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b43 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[b44 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[b45 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b46 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b47 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b48 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[b49 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b4a 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b4b 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[b4c 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[b4d 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[b4e 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b4f 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b50 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b51 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b52 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b53 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[b54 11-19 05:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b55 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[b56 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[b57 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b58 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[b59 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[b5a 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b5b 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b5c 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b5d 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b5e 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b5f 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b60 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b61 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 gate 1574140911855042500 evaluation starts +[b62 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 signed by 0 principal evaluation starts (used [false]) +[b63 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 processing identity 0 with bytes of 1151ae0 +[b64 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 principal matched by identity 0 +[b65 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +[b66 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +00000040 3c b7 fd fe 94 01 8e |<......| +[b67 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 principal evaluation succeeds for identity 0 +[b68 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de6c80 gate 1574140911855042500 evaluation succeeds +[b69 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b6a 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b6b 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b6c 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b6d 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[b6e 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[b6f 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[b70 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[b71 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[b72 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b73 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b74 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b75 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[b76 11-19 05:21:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b77 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b78 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b79 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[b7a 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[b7b 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[b7c 11-19 05:21:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b7d 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[b7e 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[b7f 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b80 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b81 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b82 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b83 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +[b84 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +[b85 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b86 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b87 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b88 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b89 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b8a 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b8b 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b8c 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 gate 1574140911999459400 evaluation starts +[b8d 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 signed by 0 principal evaluation starts (used [false]) +[b8e 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 processing identity 0 with bytes of 1151ae0 +[b8f 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 principal matched by identity 0 +[b90 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[b91 11-19 05:21:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[b92 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +[b93 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 principal evaluation succeeds for identity 0 +[b94 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e12a70 gate 1574140911999459400 evaluation succeeds +[b95 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b96 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b97 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b98 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b99 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b9a 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b9b 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > , Envelope: 98 bytes, Signature: 71 bytes +[b9c 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b9d 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b9e 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b9f 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ba0 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ba1 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ba2 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ba3 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 gate 1574140912013165500 evaluation starts +[ba4 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 signed by 0 principal evaluation starts (used [false]) +[ba5 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 processing identity 0 with bytes of 1151ae0 +[ba6 11-19 05:21:52.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 principal matched by identity 0 +[ba7 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[ba8 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[ba9 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 principal evaluation succeeds for identity 0 +[baa 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13d50 gate 1574140912013165500 evaluation succeeds +[bab 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[bac 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[bad 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[bae 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[baf 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb0 11-19 05:21:52.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bb1 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[bb2 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[bb3 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb4 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb5 11-19 05:21:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb6 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bb7 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[bb8 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[bb9 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bba 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bbb 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[bbc 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[bbd 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[bbe 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[bbf 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[bc0 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 gate 1574140912239032500 evaluation starts +[bc1 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 signed by 0 principal evaluation starts (used [false]) +[bc2 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 processing identity 0 with bytes of 1151ae0 +[bc3 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 principal matched by identity 0 +[bc4 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[bc5 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[bc6 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 principal evaluation succeeds for identity 0 +[bc7 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e08e60 gate 1574140912239032500 evaluation succeeds +[bc8 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[bc9 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[bca 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[bcb 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[bcc 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bcd 11-19 05:21:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bce 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +[bcf 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +[bd0 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +[bd1 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bd2 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bd3 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bd4 11-19 05:21:52.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[bd5 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +[bd6 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +[bd7 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes +[bd8 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bd9 11-19 05:21:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[bda 11-19 05:21:52.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[bdb 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[bdc 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[bdd 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bde 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bdf 11-19 05:21:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[be0 11-19 05:21:53.33 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] +[be1 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45582 +[be2 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e1af00 +[be3 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[be4 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[be5 11-19 05:21:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[be6 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[be7 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 2a 4c e8 1c 79 64 9e e4 66 d8 a7 07 3e c3 ef |.*L..yd..f...>..| +00000010 3f 2a 92 11 04 40 c3 40 d9 17 97 08 bd 1a 65 06 |?*...@.@......e.| +[be8 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 52 4d c4 04 3f d4 0d 82 5e 90 |0E.!..RM..?...^.| +00000010 cc 8e 84 be c0 ca 1d 68 c8 ad 14 85 95 37 8d 17 |.......h.....7..| +00000020 b1 1d 6f 45 44 02 20 17 4e 69 0b a9 10 b8 4a 36 |..oED. .Ni....J6| +00000030 ae 18 dd 4f 49 1b 42 db f0 92 ad c5 53 e6 07 7a |...OI.B.....S..z| +00000040 50 d6 dc b3 28 6b 98 |P...(k.| +[be9 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[bea 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003cd9180, header 0xc003e1b310 +[beb 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[bec 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][b2ea0184] processing txid: b2ea01846d32b3947dbc344288157c6e745939690a3d7ac66712eb78ccafabb2 +[bed 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][b2ea0184] Entry chaincode: name:"lscc" +[bee 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> INFO [][b2ea0184] Entry chaincode: name:"lscc" +[bef 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[bf0 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 2a 4c e8 1c 79 64 9e e4 66 d8 a7 07 3e c3 ef |.*L..yd..f...>..| +00000010 3f 2a 92 11 04 40 c3 40 d9 17 97 08 bd 1a 65 06 |?*...@.@......e.| +[bf1 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 52 4d c4 04 3f d4 0d 82 5e 90 |0E.!..RM..?...^.| +00000010 cc 8e 84 be c0 ca 1d 68 c8 ad 14 85 95 37 8d 17 |.......h.....7..| +00000020 b1 1d 6f 45 44 02 20 17 4e 69 0b a9 10 b8 4a 36 |..oED. .Ni....J6| +00000030 ae 18 dd 4f 49 1b 42 db f0 92 ad c5 53 e6 07 7a |...OI.B.....S..z| +00000040 50 d6 dc b3 28 6b 98 |P...(k.| +[bf2 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +[bf3 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +[bf4 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +[bf5 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [891f24b3-1e22-41ed-a7eb-87b8a481a3f4] +[bf6 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[bf7 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [891f24b3-1e22-41ed-a7eb-87b8a481a3f4] +[bf8 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +[bf9 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +[bfa 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [b2ea0184] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[bfb 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [b2ea0184] notifying Txid:b2ea01846d32b3947dbc344288157c6e745939690a3d7ac66712eb78ccafabb2, channelID: +[bfc 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[bfd 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> INFO [][b2ea0184] Exit chaincode: name:"lscc" (3ms) +[bfe 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][b2ea0184] Exit +[bff 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45582 +[c00 11-19 05:21:53.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45582 grpc.code=OK grpc.call_duration=7.1976ms +[c01 11-19 05:21:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[c02 11-19 05:21:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45582: read: connection reset by peer +[c03 11-19 05:21:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[c04 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[c05 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[c06 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[c07 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510031801 +[c08 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8697883B7554CF299F2B9A861419AE77A79A530FB8047C1A9F8BD132BB1501F0 +[c09 11-19 05:21:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[c0a 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c0b 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c0c 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c0d 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c0e 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[c0f 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c11 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c10 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[c12 11-19 05:21:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c13 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[c14 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151011 +[c15 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 24CFBF83D079DA793DF65F4064205CFC3ED289B1D5F7921FDE709A005BCC64F7 +[c16 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[c17 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[c18 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[c19 11-19 05:21:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[c1a 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[c1b 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[c1c 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[c1d 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[c1f 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[c20 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[c22 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[c23 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c1e 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c24 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c21 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[c25 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c26 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[c27 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[c28 11-19 05:21:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +[c29 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[c2a 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[c2b 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c2c 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[c2d 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[c2e 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c2f 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +[c30 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +[c31 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c32 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c33 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c34 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c35 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[c36 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c37 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[c38 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c3a 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c39 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[c3b 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c3c 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c3d 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c3e 11-19 05:21:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c3f 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[c40 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151012 +[c41 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 036894E692692D780D4264AF17725599D1B81DD61B859875E5BC42643391722C +[c42 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[c43 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[c44 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[c45 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c46 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[c47 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[c48 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c49 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes +[c4a 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c4b 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[c4c 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[c4d 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c4e 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\360W\233\332{hhSZ\374\335\364\370\367\352\010\244\321]K\006Z" > > , Envelope: 165 bytes, Signature: 0 bytes +[c4f 11-19 05:21:54.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c50 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[c51 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[c52 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c53 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[c54 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[c55 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c56 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[c57 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[c58 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[c59 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[c5a 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[c5b 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[c5c 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 gate 1574140914849620300 evaluation starts +[c5d 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 signed by 0 principal evaluation starts (used [false]) +[c5e 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 processing identity 0 with bytes of 1151ae0 +[c5f 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 principal matched by identity 0 +[c60 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 22 53 4e e7 78 ea dd 97 fa 4f af cc 9d 7b c8 |6"SN.x....O...{.| +00000010 28 bd 43 2e 47 4c 60 e2 9f 25 1d c0 74 6f a0 f0 |(.C.GL`..%..to..| +[c61 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 96 22 d0 d6 eb e9 2f 69 a7 3d 7f |0D. l."..../i.=.| +00000010 2a dd 7c ef 18 30 37 08 71 0d 78 e0 7a 7f de 91 |*.|..07.q.x.z...| +00000020 a5 77 4c 14 02 20 38 21 cb e3 6a 1d 42 85 16 9e |.wL.. 8!..j.B...| +00000030 bc da 5f 34 0e 3d 2d da 2d 73 92 6d 4d 46 99 22 |.._4.=-.-s.mMF."| +00000040 54 df bf 03 9e c9 |T.....| +[c62 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 principal evaluation succeeds for identity 0 +[c63 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed3360 gate 1574140914849620300 evaluation succeeds +[c64 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[c65 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[c66 11-19 05:21:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[c67 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[c68 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c69 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c6a 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[c6b 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 35 3d c0 f9 e4 76 f4 2e aa e8 47 b9 47 97 a1 |p5=...v....G.G..| +00000010 95 f8 a5 11 ec 58 6e 81 c0 48 34 d5 a7 2c e2 d0 |.....Xn..H4..,..| +[c6c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4b fd e0 5d 01 4a 2c 4f 67 7a 9f |0D. 'K..].J,Ogz.| +00000010 7f 06 f3 f5 71 74 fc a6 14 19 84 53 a5 76 b5 1d |....qt.....S.v..| +00000020 a4 c7 2f 41 02 20 78 78 fd 2a dd 9c 43 d5 18 7a |../A. xx.*..C..z| +00000030 75 4b 28 39 bf 66 81 58 e8 89 79 25 b6 e6 1d 61 |uK(9.f.X..y%...a| +00000040 b0 a7 83 ce 50 7e |....P~| +[c6d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c6e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c6f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[c70 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +[c71 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +00000040 a4 d1 5d 4b 06 5a |..]K.Z| +[c72 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c73 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c74 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c75 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c76 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[c78 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[c79 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c7a 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[c7b 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[c7c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +[c7d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +00000040 a4 d1 5d 4b 06 5a |..]K.Z| +[c7e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[c7f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 1d 5b 7c f0 c6 8f 69 f8 d2 d1 |0E.!...[|...i...| +00000010 7e e1 40 82 4c 42 0d 63 62 92 d3 1a d8 56 d3 d1 |~.@.LB.cb....V..| +00000020 8f 31 02 28 15 02 20 39 6e 48 02 2f a5 bf 1d c6 |.1.(.. 9nH./....| +00000030 86 5f 52 10 80 1a f7 cb 97 3d 76 0d e9 79 b2 42 |._R......=v..y.B| +00000040 f4 9d 45 9e e1 ae 83 |..E....| +[c80 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[c81 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[c82 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c83 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c77 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[c84 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[c85 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c86 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[c87 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[c88 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 68 94 e6 92 69 2d 78 0d 42 64 af 17 72 55 99 |.h...i-x.Bd..rU.| +00000010 d1 b8 1d d6 1b 85 98 75 e5 bc 42 64 33 91 72 2c |.......u..Bd3.r,| +[c89 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a9 ba 80 6b a4 9b 07 74 a6 2d c6 |0D. /...k...t.-.| +00000010 ca be 0c 23 80 cc a0 87 12 f9 73 d4 77 54 20 bc |...#......s.wT .| +00000020 ac 6b e2 d3 02 20 37 6a 99 94 02 8a 72 8b e2 3e |.k... 7j....r..>| +00000030 f0 57 9b da 7b 68 68 53 5a fc dd f4 f8 f7 ea 08 |.W..{hhSZ.......| +00000040 a4 d1 5d 4b 06 5a |..]K.Z| +[c8a 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c8b 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[c8c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c8d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[c8e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c8f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[c90 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[c91 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[c92 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[c93 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[c94 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[c95 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 gate 1574140914858108700 evaluation starts +[c96 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 signed by 0 principal evaluation starts (used [false]) +[c97 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 processing identity 0 with bytes of 1151ae0 +[c98 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 principal matched by identity 0 +[c99 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f0 17 f4 cf 98 70 f1 3d b3 34 5a 0a 83 ac e3 |m.....p.=.4Z....| +00000010 51 3c 80 35 d5 43 21 93 05 17 5a 62 b6 52 d9 e0 |Q<.5.C!...Zb.R..| +[c9a 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be e0 fc 6a af 51 0b 0b 22 73 88 |0E.!....j.Q.."s.| +00000010 8b a1 f2 06 13 5a 9b 9b 42 72 aa b8 0a 12 e6 db |.....Z..Br......| +00000020 41 43 99 6b 82 02 20 17 2e 1d 46 95 11 c2 8b 10 |AC.k.. ...F.....| +00000030 fc 55 1d f1 f9 96 8c c2 b7 b2 ab 09 f9 0f 5c a8 |.U............\.| +00000040 3c b7 fd fe 94 01 8e |<......| +[c9b 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 principal evaluation succeeds for identity 0 +[c9c 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f23600 gate 1574140914858108700 evaluation succeeds +[c9d 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[c9e 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[c9f 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ca0 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ca1 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ca2 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ca3 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[ca4 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ca5 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ca6 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ca7 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ca8 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ca9 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[caa 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[cab 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 gate 1574140914859160500 evaluation starts +[cac 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 signed by 0 principal evaluation starts (used [false]) +[cad 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 processing identity 0 with bytes of 1151ae0 +[cae 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 principal matched by identity 0 +[caf 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 19 8b 85 59 7d 69 4c 24 0d eb f9 6e 6e 19 5d |....Y}iL$...nn.]| +00000010 56 3f 42 5a 39 65 7f 10 b4 3d ef a3 b9 1a 23 14 |V?BZ9e...=....#.| +[cb0 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 35 11 38 3f dc 0c 83 3a fb ea |0E.!..5.8?...:..| +00000010 0e 51 7c f2 0a 23 7d 71 7f 6b 28 0d 48 51 81 3b |.Q|..#}q.k(.HQ.;| +00000020 22 09 b5 af e3 02 20 10 d9 9c e7 51 65 4a b5 f7 |"..... ....QeJ..| +00000030 df 51 dc 08 7c e5 e1 24 66 f5 87 2d 6f 68 cb 44 |.Q..|..$f..-oh.D| +00000040 b6 0c ba 96 ca 37 f6 |.....7.| +[cb1 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 principal evaluation succeeds for identity 0 +[cb2 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f348c0 gate 1574140914859160500 evaluation succeeds +[cb3 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[cb4 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[cb5 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[cb6 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[cb7 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[cb8 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 20 but got ts: inc_num:1574140895405208300 seq_num:12 +[cb9 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cba 11-19 05:21:54.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cbb 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cbc 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cbd 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[cbe 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[cbf 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cc0 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[cc1 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cc2 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[cc3 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cc4 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[cc5 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[cc6 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[cc7 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cc8 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cc9 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cca 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ccb 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ccc 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ccd 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[cce 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ccf 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[cd0 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 gate 1574140915346492200 evaluation starts +[cd1 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 signed by 0 principal evaluation starts (used [false]) +[cd2 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 processing identity 0 with bytes of 1151ae0 +[cd3 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 principal matched by identity 0 +[cd4 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[cd5 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[cd6 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 principal evaluation succeeds for identity 0 +[cd7 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5c3f0 gate 1574140915346492200 evaluation succeeds +[cd8 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[cd9 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[cda 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[cdb 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[cdc 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[cdd 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[cde 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[cdf 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[ce0 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ce1 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ce2 11-19 05:21:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ce3 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ce4 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ce5 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ce6 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ce7 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ce8 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 gate 1574140915351158000 evaluation starts +[ce9 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 signed by 0 principal evaluation starts (used [false]) +[cea 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 processing identity 0 with bytes of 1151ae0 +[ceb 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 principal matched by identity 0 +[cec 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[ced 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[cee 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 principal evaluation succeeds for identity 0 +[cef 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f84280 gate 1574140915351158000 evaluation succeeds +[cf0 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[cf1 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[cf2 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[cf3 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[cf4 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cf5 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[cf6 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf7 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf8 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf9 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[cfa 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[cfb 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[cfc 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[cfd 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[cfe 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[cff 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 gate 1574140915356399700 evaluation starts +[d00 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 signed by 0 principal evaluation starts (used [false]) +[d01 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 processing identity 0 with bytes of 1151ae0 +[d02 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 principal matched by identity 0 +[d03 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[d04 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[d05 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 principal evaluation succeeds for identity 0 +[d06 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85660 gate 1574140915356399700 evaluation succeeds +[d07 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d08 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d09 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d0a 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d0b 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[d0c 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[d0d 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d0e 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d0f 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d10 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d11 11-19 05:21:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d12 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d13 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d14 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d15 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 gate 1574140915360685800 evaluation starts +[d16 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 signed by 0 principal evaluation starts (used [false]) +[d17 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 processing identity 0 with bytes of 1151ae0 +[d18 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 principal matched by identity 0 +[d19 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[d1a 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[d1b 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 principal evaluation succeeds for identity 0 +[d1c 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f98e70 gate 1574140915360685800 evaluation succeeds +[d1d 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d1e 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d1f 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d20 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d21 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d22 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[d23 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[d24 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[d25 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[d26 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[d27 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[d28 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d29 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d2a 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d2b 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d2c 11-19 05:21:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d2d 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d2e 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d2f 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d30 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 gate 1574140915370621600 evaluation starts +[d31 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 signed by 0 principal evaluation starts (used [false]) +[d32 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 processing identity 0 with bytes of 1151ae0 +[d33 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 principal matched by identity 0 +[d34 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[d35 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[d36 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 principal evaluation succeeds for identity 0 +[d37 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbafb0 gate 1574140915370621600 evaluation succeeds +[d38 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d39 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d3a 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d3b 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d3c 11-19 05:21:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d3d 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d3e 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d3f 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[d40 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d41 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d42 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[d43 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[d44 11-19 05:21:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d45 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[d46 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[d47 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d48 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[d49 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d4a 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d4b 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d4c 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d4d 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[d4e 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d4f 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d50 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d52 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d51 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d53 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d54 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d55 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d56 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d57 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d58 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[d59 11-19 05:21:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d5a 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d5b 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d5c 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d5d 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d5e 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d5f 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d60 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 gate 1574140915412290300 evaluation starts +[d61 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 signed by 0 principal evaluation starts (used [false]) +[d62 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 processing identity 0 with bytes of 1151ae0 +[d63 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 principal matched by identity 0 +[d64 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 08 16 77 fb fb 6d 78 00 54 32 2f bf f4 15 c9 |...w..mx.T2/....| +00000010 ae b3 12 79 db 6f c0 44 d7 7e 72 c1 d3 2e 74 d9 |...y.o.D.~r...t.| +[d65 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d c7 65 f0 b9 59 a4 06 7d f3 3b 49 |0D. m.e..Y..}.;I| +00000010 5f 28 4d 19 5e 25 7a 95 a3 6a 1c 4a 43 bf c1 ab |_(M.^%z..j.JC...| +00000020 94 5a 1f 08 02 20 1e f6 dc ce d6 94 f8 b1 b0 36 |.Z... .........6| +00000030 c1 56 e7 a9 e5 ec 2c e1 d9 71 6a 45 e9 dc 92 17 |.V....,..qjE....| +00000040 59 dd b8 17 1e 9c |Y.....| +[d66 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 principal evaluation succeeds for identity 0 +[d67 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee53b0 gate 1574140915412290300 evaluation succeeds +[d68 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d69 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d6a 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d6b 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d6c 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d6d 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[d6e 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[d6f 11-19 05:21:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[d70 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[d71 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d72 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d73 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d74 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d75 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d76 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d77 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d78 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d79 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d7a 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d7b 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d7c 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d7d 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d7e 11-19 05:21:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d7f 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d80 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d82 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d83 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d84 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[d81 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d85 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d86 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d88 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d87 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d89 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[d8a 11-19 05:21:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d8b 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d8c 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > > , Envelope: 166 bytes, Signature: 0 bytes +[d8d 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > > , Envelope: 166 bytes, Signature: 0 bytes +[d8e 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d8f 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > > , Envelope: 166 bytes, Signature: 0 bytes +[d90 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[d91 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d92 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d93 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d94 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d95 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d96 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d97 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d98 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 gate 1574140915445375600 evaluation starts +[d99 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 signed by 0 principal evaluation starts (used [false]) +[d9a 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 processing identity 0 with bytes of 1151ae0 +[d9b 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 principal matched by identity 0 +[d9c 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +[d9d 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +[d9e 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 principal evaluation succeeds for identity 0 +[d9f 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401c0c0 gate 1574140915445375600 evaluation succeeds +[da0 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[da1 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[da2 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[da3 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[da4 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[da5 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[da6 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[da7 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[da8 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[da9 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[daa 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dab 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dac 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[dad 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dae 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[daf 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[db0 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[db1 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > alive:\204\324aB\001@|\233~\326M\240\321-\026\010`\000]\000?u\273\260\n?\034xI" > +[db2 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[db3 11-19 05:21:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[db4 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[db5 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[db6 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[db7 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[db8 11-19 05:21:55.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[db9 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[dba 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[dbb 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[dbc 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[dbd 11-19 05:21:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dbe 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[dbf 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[dc0 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[dc1 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[dc2 11-19 05:21:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dc3 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc4 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc5 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dc6 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc7 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[dc8 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 f6 4a 00 cc 7b 1f 2c 43 72 2a df c4 3c 90 65 |U.J..{.,Cr*..<.e| +00000010 e0 e1 fe ae d3 d8 92 56 78 20 b9 26 64 be a5 71 |.......Vx .&d..q| +[dc9 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ad 45 3d 3a e8 d9 2d fb ab 71 |0E.!...E=:..-..q| +00000010 72 7a 60 32 e3 24 aa e2 81 51 47 b6 c8 9f 5a 6d |rz`2.$...QG...Zm| +00000020 d7 03 68 c4 4f 02 20 49 db c7 d7 8f cf 48 d1 16 |..h.O. I.....H..| +00000030 ea 63 c9 6e db 26 e5 12 5e 11 c6 5f 94 3a 03 c6 |.c.n.&..^.._.:..| +00000040 db b2 14 8a 0f ae 3c |......<| +[dca 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dcb 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[dcc 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[dcd 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[dce 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[dcf 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dd0 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dd1 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dd2 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd3 11-19 05:21:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd4 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd5 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[dd6 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd7 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[dd8 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dd9 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dda 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ddb 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ddc 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ddd 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dde 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ddf 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[de0 11-19 05:21:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[de1 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[de2 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[de3 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[de4 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[de5 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[de6 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[de7 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[de8 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[de9 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dea 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[deb 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[dec 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ded 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[dee 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[def 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[df0 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[df1 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[df2 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[df3 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[df4 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[df5 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[df6 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[df7 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[df8 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 gate 1574140915832962900 evaluation starts +[df9 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 signed by 0 principal evaluation starts (used [false]) +[dfa 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 processing identity 0 with bytes of 1151ae0 +[dfb 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 principal matched by identity 0 +[dfc 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3f 7c f1 9a ee 25 79 35 df 74 e5 d3 53 0a 15 |.?|...%y5.t..S..| +00000010 07 6d 27 19 e6 08 67 9a 5b 31 ab df dc c4 ef 6b |.m'...g.[1.....k| +[dfd 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 d1 da 29 17 ed a1 99 9d b1 88 d0 |0D. P..)........| +00000010 6a 4c 2e ef 3e 47 b6 d9 a5 68 66 ba 56 74 3d 35 |jL..>G...hf.Vt=5| +00000020 76 d7 6d 4f 02 20 31 85 7d 8b 65 eb a7 46 7b 12 |v.mO. 1.}.e..F{.| +00000030 18 8d 7a 85 67 1a 7a d3 39 ae 55 91 77 2b 62 7e |..z.g.z.9.U.w+b~| +00000040 24 04 f3 d7 c4 7b |$....{| +[dfe 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 principal evaluation succeeds for identity 0 +[dff 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040655f0 gate 1574140915832962900 evaluation succeeds +[e00 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e01 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e02 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e03 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e04 11-19 05:21:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e05 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[e06 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[e07 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e08 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e09 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[e0a 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[e0b 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e0c 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e0d 11-19 05:21:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e0e 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e0f 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[e10 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[e11 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e12 11-19 05:21:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[e13 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e14 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e15 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e16 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e17 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e18 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e19 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e1a 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e1b 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e1c 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e1d 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e1e 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e1f 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e20 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e21 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e22 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e23 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[e24 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[e25 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[e26 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[e27 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[e28 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 gate 1574140915867869600 evaluation starts +[e29 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 signed by 0 principal evaluation starts (used [false]) +[e2a 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 processing identity 0 with bytes of 1151ae0 +[e2b 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 principal matched by identity 0 +[e2c 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +[e2d 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +[e2e 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 principal evaluation succeeds for identity 0 +[e2f 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004094d40 gate 1574140915867869600 evaluation succeeds +[e30 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e31 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e32 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e33 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e34 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e35 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[e36 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e37 11-19 05:21:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e38 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[e39 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e3a 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e3b 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e3c 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[e3d 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3e 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3f 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e40 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[e41 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:y\003eu3\001\\!.\366\240\\u/&\322\306}\255z\275e\240\027\\\311\3223\"\002 )\010\223\201K\352FI\374g/\244&\257\243y\215\177\322\001\003\226;6\025g\2070\375=]\003" > alive: alive: alive:\204\324aB\001@|\233~\326M\240\321-\026\010`\000]\000?u\273\260\n?\034xI" > +[e42 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[e43 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e44 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e45 11-19 05:21:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e46 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e47 11-19 05:21:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e48 11-19 05:21:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e49 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e4a 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e4b 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e4c 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[e4d 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e4e 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[e4f 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e50 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e51 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[e52 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[e53 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +[e54 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +00000040 4e 82 17 b1 de 42 |N....B| +[e55 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[e56 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 b6 2e bc 7f 23 c8 f5 29 6b 70 |0E.!......#..)kp| +00000010 d6 19 e0 0a 36 cf 0a 69 88 08 f0 3c 4d d8 a6 e7 |....6..i... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[e58 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[e59 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e5a 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e5b 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[e5c 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e5d 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e5e 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e5f 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e60 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e61 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e62 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[e63 11-19 05:21:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e64 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e65 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[e66 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\204\324aB\001@|\233~\326M\240\321-\026\010`\000]\000?u\273\260\n?\034xI" > +[e67 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[e68 11-19 05:21:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e69 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e6a 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e6b 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e6c 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e6d 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e6e 11-19 05:21:55.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e6f 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e70 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e71 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e72 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e73 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e74 11-19 05:21:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e75 11-19 05:21:56.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45600 +[e76 11-19 05:21:56.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040aad20 +[e77 11-19 05:21:56.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[e78 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[e79 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[e7a 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e7b 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE----- +[e7c 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[e7d 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[e7e 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[e7f 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[e80 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 6e da ad 35 f8 e1 66 00 12 1c 37 31 69 a2 b0 |%n..5..f...71i..| +00000010 dc 6e bc b6 b6 40 45 85 96 44 ac 8e cd 58 1c ab |.n...@E..D...X..| +[e81 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 56 40 5b a2 d6 11 6d e3 48 d5 f5 |0D. QV@[...m.H..| +00000010 7b a3 22 af b9 3d 9f 29 15 21 fe 24 2e 82 e2 f2 |{."..=.).!.$....| +00000020 6f f6 76 05 02 20 27 e9 0e 27 43 59 16 45 7f a7 |o.v.. '..'CY.E..| +00000030 9a e3 68 90 34 ee 4e f6 21 3a 59 9c 64 59 f1 4a |..h.4.N.!:Y.dY.J| +00000040 74 93 50 a8 c1 07 |t.P...| +[e82 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[e83 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004134000, header 0xc0040ab130 +[e84 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[e85 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] processing txid: afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b +[e86 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +[e87 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[e88 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +[e89 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] Entry chaincode: name:"lscc" +[e8a 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][afc2f7b1] Entry chaincode: name:"lscc" +[e8b 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[e8c 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[e8d 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] handling GET_STATE from chaincode +[e8e 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] getting state for chaincode lscc, key exp02, channel businesschannel +[e8f 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[e90 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] No state associated with key: exp02. Sending RESPONSE with an empty payload +[e91 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Completed GET_STATE. Sending RESPONSE +[e92 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[e93 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 gate 1574140916344331900 evaluation starts +[e94 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 signed by 0 principal evaluation starts (used [false]) +[e95 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 processing identity 0 with bytes of 1151ae0 +[e96 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[e97 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[e98 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[e99 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[e9a 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[e9b 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[e9c 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 principal matched by identity 0 +[e9d 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 6e da ad 35 f8 e1 66 00 12 1c 37 31 69 a2 b0 |%n..5..f...71i..| +00000010 dc 6e bc b6 b6 40 45 85 96 44 ac 8e cd 58 1c ab |.n...@E..D...X..| +[e9e 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 56 40 5b a2 d6 11 6d e3 48 d5 f5 |0D. QV@[...m.H..| +00000010 7b a3 22 af b9 3d 9f 29 15 21 fe 24 2e 82 e2 f2 |{."..=.).!.$....| +00000020 6f f6 76 05 02 20 27 e9 0e 27 43 59 16 45 7f a7 |o.v.. '..'CY.E..| +00000030 9a e3 68 90 34 ee 4e f6 21 3a 59 9c 64 59 f1 4a |..h.4.N.!:Y.dY.J| +00000040 74 93 50 a8 c1 07 |t.P...| +[e9f 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 principal evaluation succeeds for identity 0 +[ea0 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 signed by 1 principal evaluation starts (used [true]) +[ea1 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 skipping identity 0 because it has already been used +[ea2 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 principal evaluation fails +[ea3 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00413db60 gate 1574140916344331900 evaluation succeeds +[ea4 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[ea5 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] handling PUT_STATE from chaincode +[ea6 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Completed PUT_STATE. Sending RESPONSE +[ea7 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU No collection configuration specified +[ea8 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[ea9 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] notifying Txid:afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, channelID:businesschannel +[eaa 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[eab 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[eac 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:1.0 +[ead 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[eae 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=exp02:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[eaf 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +[eb0 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +[eb1 11-19 05:21:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-1.0 +[eb2 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[eb3 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-1.0 +[eb4 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[eb5 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-1.0 +[eb6 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[eb7 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[eb8 11-19 05:21:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[eb9 11-19 05:21:56.36 UTC] [%{longpkg}] %{callpath} -> DEBU +FROM hyperledger/fabric-baseos:amd64-0.4.18 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.4.4" \ + org.hyperledger.fabric.base.version="0.4.18" +ENV CORE_CHAINCODE_BUILDLEVEL=1.4.4 +[eba 11-19 05:21:56.36 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[ebb 11-19 05:21:56.37 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +[ebc 11-19 05:21:56.37 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:latest +[ebd 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[ebe 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[ebf 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[ec0 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[ec1 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ec2 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[ec3 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[ec4 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[ec5 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[ec6 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[ec7 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[ec8 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[eca 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ec9 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ecb 11-19 05:21:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[ecc 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ecd 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[ece 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[ecf 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[ed1 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ed0 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[ed2 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[ed3 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[ed4 11-19 05:21:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ed5 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[ed6 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151013 +[ed7 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4957A1C0A579B77D97CBB5A1ED1957782CB41331D7FD79CAE2599CACD6140AAE +[ed8 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[ed9 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[eda 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[edb 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[edc 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[edd 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ede 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[edf 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[ee0 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[ee1 11-19 05:21:58.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee2 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[ee3 11-19 05:21:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee4 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[ee5 11-19 05:21:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee6 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ee7 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ee8 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee9 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[eea 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[eeb 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +[eec 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +[eed 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[eee 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[eef 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ef0 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ef1 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ef2 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[ef3 11-19 05:21:58.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ef4 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ef5 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ef6 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ef7 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ef8 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ef9 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[efa 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[efb 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 gate 1574140918872701400 evaluation starts +[efc 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 signed by 0 principal evaluation starts (used [false]) +[efd 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 processing identity 0 with bytes of 1151ae0 +[efe 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 principal matched by identity 0 +[eff 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 ad a7 34 57 bb 91 3c c0 97 a1 f5 f1 f3 c3 ab |...4W..<........| +00000010 9c 0e af cd 76 14 f6 4e de 10 ef d9 61 bc 86 6c |....v..N....a..l| +[f00 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 ae 78 e6 a6 f6 76 67 23 e9 |0E.!..D.x...vg#.| +00000010 10 8c c2 b7 60 df ec 87 33 c2 33 b1 90 27 1c d7 |....`...3.3..'..| +00000020 0d 46 67 f0 19 02 20 59 8f be 20 2a ee 80 2d 8d |.Fg... Y.. *..-.| +00000030 9e b7 90 25 2c 5b be 9c 00 a1 93 cf f9 b1 ec 85 |...%,[..........| +00000040 23 6d a3 bc 6e e9 4b |#m..n.K| +[f01 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 principal evaluation succeeds for identity 0 +[f02 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c650 gate 1574140918872701400 evaluation succeeds +[f03 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f04 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f05 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f06 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f07 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[f08 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f09 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[f0a 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +[f0b 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +00000040 4e 82 17 b1 de 42 |N....B| +[f0c 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f0d 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f0e 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f0f 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f10 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[f11 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[f12 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[f13 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +[f14 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +[f15 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[f16 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c cb 92 9e 31 1f e2 ca fb cb 78 8d |0D. \...1.....x.| +00000010 14 97 fe 0b 13 7c b5 3c c1 46 27 95 0d 6c aa e8 |.....|.<.F'..l..| +00000020 e7 30 d9 52 02 20 75 a3 57 64 7f fe 59 dc 91 4d |.0.R. u.Wd..Y..M| +00000030 ba 98 4d 3d 13 45 bc 6d 31 c4 5a 29 44 67 c2 0c |..M=.E.m1.Z)Dg..| +00000040 40 2e 43 8b 41 43 |@.C.AC| +[f17 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[f18 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[f19 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f1a 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f1c 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f1b 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[f1d 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[f1e 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 28 d7 7e 0a 2e 5f e1 6a 82 38 0b 21 d2 09 e4 |#(.~.._.j.8.!...| +00000010 ba 6d 1f 37 aa 77 05 48 d3 4d 9e 64 c8 d8 25 31 |.m.7.w.H.M.d..%1| +[f1f 11-19 05:21:58.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 7a e9 0c a8 dd cb a5 dc ed 4d 59 |0D. .z........MY| +00000010 6b ed a5 8f 96 2f dc bd 3a fe 8b 6a 34 df 9f 79 |k..../..:..j4..y| +00000020 f1 11 bd 36 02 20 6a 07 a7 13 dd bb b8 30 87 94 |...6. j......0..| +00000030 7a 8a f1 b9 d0 f2 e0 c7 2c 77 cd 6c 36 72 10 6b |z.......,w.l6r.k| +00000040 4e 82 17 b1 de 42 |N....B| +[f20 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f21 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f22 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[f23 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 57 a1 c0 a5 79 b7 7d 97 cb b5 a1 ed 19 57 78 |IW...y.}......Wx| +00000010 2c b4 13 31 d7 fd 79 ca e2 59 9c ac d6 14 0a ae |,..1..y..Y......| +[f24 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 14 a9 35 0d 47 c8 ca 3a d3 35 |0E.!....5.G..:.5| +00000010 5a ba 79 2d 46 5d 8a 65 9c 81 90 31 47 78 a4 91 |Z.y-F].e...1Gx..| +00000020 ca c7 43 14 64 02 20 02 b6 c8 da 51 cd d8 40 f9 |..C.d. ....Q..@.| +00000030 49 90 92 8c 5d d1 22 04 1a d7 4e 2a 22 79 e9 bc |I...]."...N*"y..| +00000040 b6 f0 7c 59 44 8c e6 |..|YD..| +[f25 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[f26 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[f27 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f28 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[f29 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f2a 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f2b 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f2c 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f2d 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f2e 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f2f 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f30 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 gate 1574140918884616500 evaluation starts +[f31 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 signed by 0 principal evaluation starts (used [false]) +[f32 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 processing identity 0 with bytes of 1151ae0 +[f33 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 principal matched by identity 0 +[f34 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 c8 15 bf 0b a6 ea 0b 95 3b 3b 8f cd 40 65 91 |7........;;..@e.| +00000010 c8 a1 d2 2b 63 e6 1f a6 2a fa 69 fe 78 49 22 86 |...+c...*.i.xI".| +[f35 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 59 3e 79 03 65 75 33 01 5c 21 |0E.!..Y>y.eu3.\!| +00000010 2e f6 a0 5c 75 2f 26 d2 c6 7d ad 7a bd 65 a0 17 |...\u/&..}.z.e..| +00000020 5c c9 d2 33 22 02 20 29 08 93 81 4b ea 46 49 fc |\..3". )...K.FI.| +00000030 67 2f a4 26 af a3 79 8d 7f d2 01 03 96 3b 36 15 |g/.&..y......;6.| +00000040 67 87 30 fd 3d 5d 03 |g.0.=].| +[f36 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 principal evaluation succeeds for identity 0 +[f37 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670820 gate 1574140918884616500 evaluation succeeds +[f38 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f39 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f3a 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f3b 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f3c 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[f3d 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f3e 11-19 05:21:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f3f 11-19 05:21:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f40 11-19 05:21:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f41 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[f42 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[f43 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f44 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[f45 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f46 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[f47 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f48 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[f49 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[f4a 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4b 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4c 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4d 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f4e 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f4f 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f50 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f51 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f52 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f53 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 gate 1574140919349499300 evaluation starts +[f54 11-19 05:21:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 signed by 0 principal evaluation starts (used [false]) +[f55 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 processing identity 0 with bytes of 1151ae0 +[f56 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 principal matched by identity 0 +[f57 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[f58 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[f59 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 principal evaluation succeeds for identity 0 +[f5a 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026188b0 gate 1574140919349499300 evaluation succeeds +[f5b 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f5c 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f5d 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f5e 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f5f 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[f60 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[f61 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f62 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f63 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f64 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f65 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f66 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f67 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f68 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f69 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 gate 1574140919354135100 evaluation starts +[f6a 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 signed by 0 principal evaluation starts (used [false]) +[f6b 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 processing identity 0 with bytes of 1151ae0 +[f6c 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 principal matched by identity 0 +[f6d 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[f6e 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[f6f 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 principal evaluation succeeds for identity 0 +[f70 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da130 gate 1574140919354135100 evaluation succeeds +[f71 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f72 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f73 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f74 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f75 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[f76 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[f77 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f78 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[f79 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[f7a 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[f7b 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7c 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7d 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7e 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f7f 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f80 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f81 11-19 05:21:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f82 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f83 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f84 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 gate 1574140919360641000 evaluation starts +[f85 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 signed by 0 principal evaluation starts (used [false]) +[f86 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 processing identity 0 with bytes of 1151ae0 +[f87 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 principal matched by identity 0 +[f88 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[f89 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[f8a 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 principal evaluation succeeds for identity 0 +[f8b 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671ee0 gate 1574140919360641000 evaluation succeeds +[f8c 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f8d 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f8e 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f8f 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f90 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[f91 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[f92 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[f93 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[f94 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f95 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f96 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f97 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f98 11-19 05:21:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f99 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f9a 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f9b 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f9c 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 gate 1574140919370802900 evaluation starts +[f9d 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 signed by 0 principal evaluation starts (used [false]) +[f9e 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 processing identity 0 with bytes of 1151ae0 +[f9f 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 principal matched by identity 0 +[fa0 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[fa1 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[fa2 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 principal evaluation succeeds for identity 0 +[fa3 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a00e0 gate 1574140919370802900 evaluation succeeds +[fa4 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[fa5 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[fa6 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[fa7 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[fa8 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa9 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[faa 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[fab 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[fac 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[fad 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[fae 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[faf 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fb0 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[fb1 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[fb2 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[fb3 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[fb4 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[fb5 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[fb6 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 gate 1574140919378217000 evaluation starts +[fb7 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 signed by 0 principal evaluation starts (used [false]) +[fb8 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 processing identity 0 with bytes of 1151ae0 +[fb9 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 principal matched by identity 0 +[fba 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[fbb 11-19 05:21:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[fbc 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 principal evaluation succeeds for identity 0 +[fbd 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258a580 gate 1574140919378217000 evaluation succeeds +[fbe 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[fbf 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[fc0 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[fc1 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[fc2 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fc3 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fc4 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[fc5 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[fc6 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[fc7 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[fc8 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[fc9 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[fca 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 gate 1574140919383074100 evaluation starts +[fcb 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 signed by 0 principal evaluation starts (used [false]) +[fcc 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 processing identity 0 with bytes of 1151ae0 +[fcd 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 principal matched by identity 0 +[fce 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[fcf 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[fd0 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 principal evaluation succeeds for identity 0 +[fd1 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b710 gate 1574140919383074100 evaluation succeeds +[fd2 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[fd3 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[fd4 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[fd5 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[fd6 11-19 05:21:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fd7 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fd8 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fd9 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[fda 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fdb 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fdc 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[fdd 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[fde 11-19 05:21:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fdf 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[fe0 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[fe1 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[fe2 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe3 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[fe4 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[fe5 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[fe6 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510041801 +[fe7 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9261850069933056C1E196CA66C5FEEC58A168B988F207A431D972E44F3263AE +[fe8 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[fe9 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[fea 11-19 05:21:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[feb 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[fec 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fed 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fee 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fef 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff0 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff1 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff2 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff3 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff4 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff5 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[ff6 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff7 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff8 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[ff9 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ffa 11-19 05:21:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ffb 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[ffc 11-19 05:21:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ffd 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[ffe 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[fff 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1000 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1001 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1002 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1003 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1004 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1005 11-19 05:21:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1006 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1007 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1008 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1009 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 gate 1574140919450412300 evaluation starts +[100a 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 signed by 0 principal evaluation starts (used [false]) +[100b 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 processing identity 0 with bytes of 1151ae0 +[100c 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 principal matched by identity 0 +[100d 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 95 61 6f 3d d8 c2 ec f6 90 04 c5 f5 0e 71 ad |..ao=.........q.| +00000010 4b 3b 13 f7 6d e7 da b8 4f 77 42 75 58 c3 c9 a9 |K;..m...OwBuX...| +[100e 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 44 a5 06 99 7e 54 17 38 99 48 60 |0D. ,D...~T.8.H`| +00000010 5f da 54 56 cb 8b fa cb 0d 8a 7d 45 f8 da 60 69 |_.TV......}E..`i| +00000020 59 da f7 2e 02 20 2c 9e 1e 71 7b fe 4e 7e a9 a3 |Y.... ,..q{.N~..| +00000030 a3 9e 07 8c 39 8a c3 27 33 34 0e 27 52 6c 69 d6 |....9..'34.'Rli.| +00000040 6e 72 3d 80 4d da |nr=.M.| +[100f 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 principal evaluation succeeds for identity 0 +[1010 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed3b0 gate 1574140919450412300 evaluation succeeds +[1011 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1012 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1013 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1014 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1015 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1016 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1017 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1018 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1019 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[101a 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[101b 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[101c 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[101d 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[101e 11-19 05:21:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[101f 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1020 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1021 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1022 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\204\324aB\001@|\233~\326M\240\321-\026\010`\000]\000?u\273\260\n?\034xI" > +[1023 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1024 11-19 05:21:59.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1025 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1026 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1027 11-19 05:21:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1028 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1029 11-19 05:21:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[102a 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[102b 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[102c 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[102d 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[102e 11-19 05:21:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[102f 11-19 05:21:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[1030 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1031 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151014 +[1032 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B659A72413C3C0E41650A13FCC7B69DB7DB03E3E53C4D7D5DC9565C7C309C38 +[1033 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1034 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1035 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1036 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1037 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1038 11-19 05:21:59.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1039 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[103a 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[103b 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[103c 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[103d 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[103e 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[103f 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1040 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1041 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1042 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1043 11-19 05:21:59.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1044 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1045 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1046 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1047 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[1048 11-19 05:21:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1049 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[104a 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[104b 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[104c 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[104d 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[104e 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[104f 11-19 05:21:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1050 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1051 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1052 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[1053 11-19 05:21:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1054 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1055 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1056 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1058 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1059 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[105a 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[105b 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[105c 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[105d 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[105e 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[105f 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1060 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 gate 1574140919856036000 evaluation starts +[1061 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 signed by 0 principal evaluation starts (used [false]) +[1062 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 processing identity 0 with bytes of 1151ae0 +[1063 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 principal matched by identity 0 +[1064 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c bf 11 70 8a 16 7a 01 c9 65 e5 6c 7e e5 b2 84 |,..p..z..e.l~...| +00000010 85 ea 6c 43 0c 62 25 5d 94 9d 2c 97 10 6e 87 0b |..lC.b%]..,..n..| +[1065 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7e 3c 34 08 c3 85 e5 98 45 15 |0E.!..~<4.....E.| +00000010 26 9c 6b 76 29 0e 08 ac 9c a1 f1 f7 c9 4d 77 91 |&.kv)........Mw.| +00000020 c0 72 e4 8f bc 02 20 3b e5 61 fa 2e 3f db 7a 82 |.r.... ;.a..?.z.| +00000030 51 98 4d 9b 47 7b 5e b6 da 14 89 2f 63 06 ac 9f |Q.M.G{^..../c...| +00000040 7a f5 f3 de 42 43 07 |z...BC.| +[1066 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 principal evaluation succeeds for identity 0 +[1067 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7e40 gate 1574140919856036000 evaluation succeeds +[1068 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1069 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[106a 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1057 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[106b 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[106c 11-19 05:21:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[106d 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[106e 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[106f 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1070 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1071 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1072 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1073 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1074 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[1075 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1076 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1077 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1078 11-19 05:21:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1079 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[107a 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[107b 11-19 05:21:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[107c 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > > , Envelope: 272 bytes, Signature: 0 bytes +[107d 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > > , Envelope: 272 bytes, Signature: 0 bytes +[107e 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[107f 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > > , Envelope: 272 bytes, Signature: 0 bytes +[1080 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1081 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 11 8b 08 45 f7 ca ad 60 ac 50 0d 92 c3 85 9f |....E...`.P.....| +00000010 6d fe 9c a9 48 42 9c 73 0d 80 28 67 b3 b5 8a 94 |m...HB.s..(g....| +[1082 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 cf ee a7 76 61 c8 3a e3 1f ad |0E.!.....va.:...| +00000010 21 a4 83 72 5e d9 37 cb 84 01 6b a6 fb 3e a4 35 |!..r^.7...k..>.5| +00000020 64 50 3a 36 58 02 20 70 81 9c a5 e5 28 32 ea 65 |dP:6X. p....(2.e| +00000030 3a 7c c5 a2 52 c7 51 6c 86 0c 72 d6 5a 7b a2 9c |:|..R.Ql..r.Z{..| +00000040 ae 6b 3c 57 cc 18 19 |.k DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1084 11-19 05:21:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb db 6b 2b 02 ef 3e 0f e4 95 fa |0E.!...k+..>....| +00000010 5b 0a af 72 2d a9 dd 68 9e 1a b2 a6 e3 58 af e9 |[..r-..h.....X..| +00000020 8c 28 b9 22 28 02 20 20 96 61 3a e8 31 ab 5b d8 |.(."(. .a:.1.[.| +00000030 13 58 80 0b f3 a9 90 fd 4f 35 23 16 6c da 33 00 |.X......O5#.l.3.| +00000040 df 21 ff 15 0c 15 8f |.!.....| +[1085 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1086 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1087 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1088 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1089 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[108a 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[108b 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[108c 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[108d 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[108e 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[108f 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1090 11-19 05:21:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[1091 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1092 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1093 11-19 05:21:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\2445dP:6X\002 p\201\234\245\345(2\352e:|\305\242R\307Ql\206\014r\326Z{\242\234\256k\017\344\225\372[\n\257r-\251\335h\236\032\262\246\343X\257\351\214(\271\"(\002 \226a:\3501\253[\330\023X\200\013\363\251\220\375O5#\026l\3323\000\337!\377\025\014\025\217" > > alive: +[1094 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1095 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1096 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1097 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1098 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1099 11-19 05:21:59.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[109a 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[109b 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[109c 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109d 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109e 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109f 11-19 05:22:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a0 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10a1 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10a2 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a3 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10a4 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[10a5 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10a6 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[10a7 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[10a8 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[10a9 11-19 05:22:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[10aa 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[10ab 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[10ac 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 gate 1574140920411024800 evaluation starts +[10ad 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 signed by 0 principal evaluation starts (used [false]) +[10ae 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 processing identity 0 with bytes of 1151ae0 +[10af 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 principal matched by identity 0 +[10b0 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5d dc cd a9 f5 28 47 a3 a2 f2 d2 7d 60 a3 f2 |.]....(G....}`..| +00000010 8f 5d cb 61 c8 90 58 1f f4 f5 ea 94 8b c7 05 3e |.].a..X........>| +[10b1 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 7f 98 81 e5 b9 23 a7 ac 42 a8 b4 |0D. ......#..B..| +00000010 e9 73 a8 35 bc 11 d7 e1 a4 14 d0 0c 89 00 ec 27 |.s.5...........'| +00000020 42 cb 23 f0 02 20 52 a4 cf 86 56 5d b4 f3 da 16 |B.#.. R...V]....| +00000030 7c 6b eb d8 65 3f b5 08 40 5d 00 9a 09 db fc 6e ||k..e?..@].....n| +00000040 db f6 cd ca 2c 3d |....,=| +[10b2 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 principal evaluation succeeds for identity 0 +[10b3 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004738a0 gate 1574140920411024800 evaluation succeeds +[10b4 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[10b5 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[10b6 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[10b7 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[10b8 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10b9 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[10ba 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[10bb 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[10bc 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[10bd 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10be 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10bf 11-19 05:22:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10c0 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c1 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c2 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c3 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c4 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c5 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c6 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c7 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[10c8 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c9 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[10ca 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10cb 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10cc 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10cd 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ce 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10cf 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10d0 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d1 11-19 05:22:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10d2 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d3 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10d4 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10d5 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d6 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10d7 11-19 05:22:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d8 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10d9 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10da 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10db 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10dc 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[10dd 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 ae 8d b1 be 1c e0 96 8b ee db e6 bc b1 9c bc |................| +00000010 85 84 a8 30 1f 3e c4 23 e8 6c a1 b8 11 83 f9 45 |...0.>.#.l.....E| +[10de 11-19 05:22:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 86 36 6f 0f e4 4c 65 bc dc 89 |0E.!...6o..Le...| +00000010 9e ec 88 dc 5b 3b f3 da 71 a5 0c c4 65 ba 2d 42 |....[;..q...e.-B| +00000020 06 23 8d 8a 4f 02 20 30 8c 04 ce 94 08 61 05 28 |.#..O. 0.....a.(| +00000030 bd 27 d6 5b 78 74 94 20 93 53 d1 d2 60 63 91 bb |.'.[xt. .S..`c..| +00000040 c3 89 5a 8a bb be 3f |..Z...?| +[10df 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10e0 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[10e1 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[10e2 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[10e3 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[10e4 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e5 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e6 11-19 05:22:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e7 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10e8 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10e9 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ea 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10eb 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ec 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10ed 11-19 05:22:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10ee 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10ef 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10f0 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10f1 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10f2 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10f3 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10f4 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10f5 11-19 05:22:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10f6 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10f7 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10f8 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10f9 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10fa 11-19 05:22:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10fb 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10fc 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10fd 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10fe 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[10ff 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1100 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1101 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1102 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1103 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1104 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1105 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1106 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1107 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 gate 1574140920853114500 evaluation starts +[1108 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 signed by 0 principal evaluation starts (used [false]) +[1109 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 processing identity 0 with bytes of 1151ae0 +[110a 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 principal matched by identity 0 +[110b 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 79 57 a8 8d 6c 20 cc 56 64 3f c0 d2 1d 97 b7 |.yW..l .Vd?.....| +00000010 1a 51 37 63 a4 98 d6 b9 27 2d a9 ed 50 b7 57 24 |.Q7c....'-..P.W$| +[110c 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 fc 10 eb 1f 45 49 75 a3 39 70 05 |0D. G....EIu.9p.| +00000010 9f 1a d2 51 51 be 64 bd f3 e5 04 6f f0 ba 1d 42 |...QQ.d....o...B| +00000020 0a 0d 51 4a 02 20 0a c0 ea 8c 86 e9 af 8a 43 90 |..QJ. ........C.| +00000030 c6 15 d3 3d 15 d0 b0 71 a2 b1 6f af 57 7f 40 a6 |...=...q..o.W.@.| +00000040 7f 77 2a 8a 18 08 |.w*...| +[110d 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 principal evaluation succeeds for identity 0 +[110e 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6070 gate 1574140920853114500 evaluation succeeds +[110f 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1110 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1111 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1112 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1113 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1114 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1115 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1116 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1117 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1118 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1119 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[111a 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[111b 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[111c 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[111d 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[111f 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[111e 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1120 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1121 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1122 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1123 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1124 11-19 05:22:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1125 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1126 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1127 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1128 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1129 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112a 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112b 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112c 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[112d 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112e 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[112f 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1130 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1131 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1132 11-19 05:22:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1133 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1134 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1135 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1136 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1137 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1138 11-19 05:22:02.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1139 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[113a 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[113b 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[113c 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[113e 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[113f 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1140 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1141 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[113d 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1142 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1143 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1144 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1145 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1146 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1147 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1148 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1149 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[114a 11-19 05:22:02.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[114b 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[114c 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151015 +[114d 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 80B4BA26E5FE762BED894C9B8F2C459974EE13CB278025A02F014CF2DE4B9709 +[114e 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[114f 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1150 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1151 11-19 05:22:02.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" secret_envelope:\353\206z3\037\014$u\036\321\002 Q\177\017\232q\370\367\241\023\024\217\376\356^R\217\253O\264Qv\306\023\247\376\261;\276\234\203^\350" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1152 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1153 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" secret_envelope:\353\206z3\037\014$u\036\321\002 Q\177\017\232q\370\367\241\023\024\217\376\356^R\217\253O\264Qv\306\023\247\376\261;\276\234\203^\350" > > > , Envelope: 272 bytes, Signature: 0 bytes +[1154 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1155 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1156 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1157 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1158 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes +[115a 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1159 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:p\030{\220\265[\206$\021\367\251\002 Q\206\213\n(\022d\362\264\036\203:\315f\272\324C\263\264:\323\232\t9\256\370\261\255$\372;\362" > > , Envelope: 166 bytes, Signature: 0 bytes +[115b 11-19 05:22:02.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[115c 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[115d 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[115e 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[115f 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1160 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1161 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1162 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +[1163 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +[1164 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1165 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1166 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1167 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1168 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1169 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[116a 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[116b 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +[116c 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +[116d 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[116e 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[116f 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1170 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1171 11-19 05:22:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1172 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1173 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1174 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1175 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1176 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1177 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b4 ba 26 e5 fe 76 2b ed 89 4c 9b 8f 2c 45 99 |...&..v+..L..,E.| +00000010 74 ee 13 cb 27 80 25 a0 2f 01 4c f2 de 4b 97 09 |t...'.%./.L..K..| +[1178 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 15 a0 ce 71 cd 14 55 e9 46 ba |0E.!.....q..U.F.| +00000010 24 aa 49 9c 6d 52 e7 c6 6a 3e 70 18 7b 90 b5 5b |$.I.mR..j>p.{..[| +00000020 86 24 11 f7 a9 02 20 51 86 8b 0a 28 12 64 f2 b4 |.$.... Q...(.d..| +00000030 1e 83 3a cd 66 ba d4 43 b3 b4 3a d3 9a 09 39 ae |..:.f..C..:...9.| +00000040 f8 b1 ad 24 fa 3b f2 |...$.;.| +[1179 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[117a 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 fb 20 98 a1 28 4d b7 21 cd b2 |0E.!... ..(M.!..| +00000010 7a 1b a4 61 a8 e8 d0 f1 5a 53 3e eb 86 7a 33 1f |z..a....ZS>..z3.| +00000020 0c 24 75 1e d1 02 20 51 7f 0f 9a 71 f8 f7 a1 13 |.$u... Q...q....| +00000030 14 8f fe ee 5e 52 8f ab 4f b4 51 76 c6 13 a7 fe |....^R..O.Qv....| +00000040 b1 3b be 9c 83 5e e8 |.;...^.| +[117b 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[117c 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[117d 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[117e 11-19 05:22:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[117f 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1180 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1181 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1182 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1183 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1184 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1185 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1186 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1187 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1188 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1189 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[118a 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[118b 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[118c 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[118d 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[118e 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[118f 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1190 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1191 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1192 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1193 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1194 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1195 11-19 05:22:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 gate 1574140923349934600 evaluation starts +[1196 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 signed by 0 principal evaluation starts (used [false]) +[1197 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 processing identity 0 with bytes of 1151ae0 +[1198 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 principal matched by identity 0 +[1199 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[119a 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[119b 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 principal evaluation succeeds for identity 0 +[119c 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a3180 gate 1574140923349934600 evaluation succeeds +[119d 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[119e 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[119f 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11a0 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11a1 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[11a2 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[11a3 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11a4 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11a5 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11a6 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11a7 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11a8 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11a9 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11aa 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11ab 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 gate 1574140923355916600 evaluation starts +[11ac 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 signed by 0 principal evaluation starts (used [false]) +[11ad 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 processing identity 0 with bytes of 1151ae0 +[11ae 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 principal matched by identity 0 +[11af 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[11b0 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[11b1 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 principal evaluation succeeds for identity 0 +[11b2 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002df0f0 gate 1574140923355916600 evaluation succeeds +[11b3 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11b4 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11b5 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11b6 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11b7 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[11b8 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[11b9 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11ba 11-19 05:22:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[11bb 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[11bc 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[11bd 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[11be 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[11bf 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11c0 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11c1 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11c2 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11c3 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11c4 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11c5 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11c6 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11c7 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 gate 1574140923365007800 evaluation starts +[11c8 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 signed by 0 principal evaluation starts (used [false]) +[11c9 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 processing identity 0 with bytes of 1151ae0 +[11ca 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 principal matched by identity 0 +[11cb 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[11cc 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[11cd 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 principal evaluation succeeds for identity 0 +[11ce 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c80c0 gate 1574140923365007800 evaluation succeeds +[11cf 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11d0 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11d1 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11d2 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11d3 11-19 05:22:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11d4 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11d5 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11d6 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11d7 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11d8 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11d9 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11da 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11db 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 gate 1574140923373616800 evaluation starts +[11dc 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 signed by 0 principal evaluation starts (used [false]) +[11dd 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 processing identity 0 with bytes of 1151ae0 +[11de 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 principal matched by identity 0 +[11df 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[11e0 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[11e1 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 principal evaluation succeeds for identity 0 +[11e2 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001c9340 gate 1574140923373616800 evaluation succeeds +[11e3 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11e4 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11e5 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11e6 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11e7 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11e8 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[11e9 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11ea 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11eb 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11ec 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11ed 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11ee 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11ef 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11f0 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11f1 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11f2 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 gate 1574140923378256400 evaluation starts +[11f3 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 signed by 0 principal evaluation starts (used [false]) +[11f4 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 processing identity 0 with bytes of 1151ae0 +[11f5 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 principal matched by identity 0 +[11f6 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[11f7 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[11f8 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 principal evaluation succeeds for identity 0 +[11f9 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037eff0 gate 1574140923378256400 evaluation succeeds +[11fa 11-19 05:22:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11fb 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11fc 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11fd 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11fe 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[11ff 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1200 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1201 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1202 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1203 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1204 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1205 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1206 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1207 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1208 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1209 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[120a 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 gate 1574140923383794800 evaluation starts +[120b 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 signed by 0 principal evaluation starts (used [false]) +[120c 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 processing identity 0 with bytes of 1151ae0 +[120d 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 principal matched by identity 0 +[120e 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[120f 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1210 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 principal evaluation succeeds for identity 0 +[1211 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345310 gate 1574140923383794800 evaluation succeeds +[1212 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1213 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1214 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1215 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1216 11-19 05:22:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1217 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1218 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1219 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[121a 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[121b 11-19 05:22:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[121c 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[121d 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[121e 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[121f 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1220 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1221 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1222 11-19 05:22:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1223 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1224 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1225 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1226 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1227 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1228 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1229 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[122a 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[122b 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[122c 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[122d 11-19 05:22:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[122e 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[122f 11-19 05:22:03.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1230 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1231 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1232 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1233 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1234 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1235 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1236 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1237 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1238 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1239 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[123a 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 gate 1574140923453764100 evaluation starts +[123b 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 signed by 0 principal evaluation starts (used [false]) +[123c 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 processing identity 0 with bytes of 1151ae0 +[123d 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 principal matched by identity 0 +[123e 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d eb 64 e5 1d ad b1 f1 0f e0 53 2e eb c0 eb a8 |..d.......S.....| +00000010 74 ec c3 46 f1 2d 0f 1e 49 3b 0b e3 b2 d7 1b 33 |t..F.-..I;.....3| +[123f 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 63 8d db 42 fc d2 fe 4a 69 29 |0E.!..c..B...Ji)| +00000010 02 10 07 10 28 75 7e 61 6e 06 b8 1f d2 80 c9 81 |....(u~an.......| +00000020 d0 b9 e9 a4 83 02 20 21 eb 4e 2e cb d7 3b 0d 71 |...... !.N...;.q| +00000030 20 d5 a9 63 90 15 a1 e8 fd 96 5f 5f 0e af d9 f0 | ..c......__....| +00000040 6a 9d 86 9e 6e e0 d0 |j...n..| +[1240 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 principal evaluation succeeds for identity 0 +[1241 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15140 gate 1574140923453764100 evaluation succeeds +[1242 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1243 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1244 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1245 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1246 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1247 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1248 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1249 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[124a 11-19 05:22:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[124b 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[124c 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[124d 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[124e 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[124f 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1250 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1251 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1252 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1253 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1254 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1255 11-19 05:22:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1256 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1257 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1258 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1259 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[125a 11-19 05:22:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[125b 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[125c 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[125d 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[125e 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[125f 11-19 05:22:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1260 11-19 05:22:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1261 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1262 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1263 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[1264 11-19 05:22:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1265 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1266 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1267 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1268 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1269 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[126a 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[126b 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[126c 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[126d 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[126e 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[126f 11-19 05:22:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1270 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1271 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1272 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1273 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1274 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1275 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1276 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1277 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1278 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1279 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[127a 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[127b 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[127c 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 gate 1574140923856837500 evaluation starts +[127d 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 signed by 0 principal evaluation starts (used [false]) +[127e 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 processing identity 0 with bytes of 1151ae0 +[127f 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 principal matched by identity 0 +[1280 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 89 53 a7 f7 86 02 31 6a 3a 25 aa c2 d3 2b ad |..S....1j:%...+.| +00000010 c7 c6 6f 04 ad 7c b5 0c ab 0c 0b 06 34 5d ee 21 |..o..|......4].!| +[1281 11-19 05:22:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 e0 d9 b9 62 8f 38 01 b6 39 3a |0E.!.....b.8..9:| +00000010 cd 39 1d 31 6a 62 0a 3c 22 c7 ce 11 c0 81 b0 29 |.9.1jb.<"......)| +00000020 dc cb d3 83 e1 02 20 50 21 f7 2b e2 d6 08 2d 65 |...... P!.+...-e| +00000030 12 a0 3b c6 3d a7 af 82 de 63 c8 47 51 a1 41 bf |..;.=....c.GQ.A.| +00000040 d6 c1 28 d9 f6 87 3c |..(...<| +[1282 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 principal evaluation succeeds for identity 0 +[1283 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3deb0 gate 1574140923856837500 evaluation succeeds +[1284 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1285 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1286 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1287 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1288 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1289 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[128a 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[128b 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[128c 11-19 05:22:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[128d 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[128e 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[128f 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1290 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[1291 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1292 11-19 05:22:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1293 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1294 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[1295 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1296 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1297 11-19 05:22:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1298 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1299 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[129a 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[129b 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[129c 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[129d 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 06 4a 57 60 88 12 b0 fc 87 2d 7a f3 e2 3e f2 |..JW`.....-z..>.| +00000010 b8 45 35 64 63 d0 4d d8 46 9f b9 1d c2 f6 b4 43 |.E5dc.M.F......C| +[129e 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 1a 44 53 5c 9f c5 25 c9 11 f8 f8 |0D. H.DS\..%....| +00000010 78 f9 ae c6 72 d4 91 5f b4 a5 0b 3b ee 77 bf e1 |x...r.._...;.w..| +00000020 2c 88 bb ae 02 20 45 02 53 3a 46 8a 70 43 0e 97 |,.... E.S:F.pC..| +00000030 f2 8c a4 fd 02 8e 32 5e 77 97 9c aa e5 5f b4 93 |......2^w...._..| +00000040 da 3f 91 8a 01 d9 |.?....| +[129f 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[12a0 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b cb f4 d7 14 87 e2 77 9f 5e 3c 37 |0D. k......w.^<7| +00000010 f8 35 39 2c 98 bc da 94 b2 4b d0 35 62 d8 b0 97 |.59,.....K.5b...| +00000020 97 c0 ce 7c 02 20 74 c6 b3 9d 6c 8e 18 32 3b c0 |...|. t...l..2;.| +00000030 b9 83 91 fe 4b 3d 72 2e e6 db e3 19 23 d3 cb ba |....K=r.....#...| +00000040 12 cc 53 35 16 97 |..S5..| +[12a1 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[12a2 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[12a3 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[12a4 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[12a5 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[12a6 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a7 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a8 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a9 11-19 05:22:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[12aa 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ab 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ac 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[12ad 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[12ae 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[12af 11-19 05:22:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12b0 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12b1 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12b2 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b3 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b4 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b5 11-19 05:22:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12b6 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12b7 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12b8 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b9 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ba 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12bb 11-19 05:22:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12bc 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[12bd 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[12be 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[12bf 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510051801 +[12c0 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 46A96912ECE4827459CD5B7DFBA8503602B6648BED50F8DC9F7651B1F5D7FE7A +[12c1 11-19 05:22:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[12c2 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c3 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c4 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c5 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c6 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[12c7 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c8 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c9 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[12ca 11-19 05:22:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12cb 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[12cc 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151016 +[12cd 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 88F03667B5A78F673A5C0228708E5A962B8FDBBDA787A0F7B9F9B9CC663816C2 +[12ce 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[12cf 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[12d0 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[12d1 11-19 05:22:04.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[12d2 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12d3 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12d4 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12d5 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[12d6 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12d7 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12d8 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12d9 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[12da 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[12db 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12dc 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12dd 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12de 11-19 05:22:04.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12df 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12e0 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12e1 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12e2 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12e3 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[12e4 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12e5 11-19 05:22:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[12e6 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[12e7 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[12e8 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[12e9 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[12ea 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[12eb 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 gate 1574140925402131900 evaluation starts +[12ec 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 signed by 0 principal evaluation starts (used [false]) +[12ed 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 processing identity 0 with bytes of 1151ae0 +[12ee 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 principal matched by identity 0 +[12ef 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c 60 4f 19 69 1e 59 13 b7 9c 6f 4c cb e4 6b ee |.`O.i.Y...oL..k.| +00000010 68 bd ad 42 e2 15 f1 15 b0 46 24 56 f1 b6 1b 92 |h..B.....F$V....| +[12f0 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 c3 58 2d c8 1d de 2b bc fd 62 |0E.!...X-...+..b| +00000010 66 d2 e1 58 3b 8d a9 fb 0d b6 c8 93 51 f3 78 49 |f..X;.......Q.xI| +00000020 06 b8 e2 99 f1 02 20 28 6c c5 ee 26 57 11 2d 03 |...... (l..&W.-.| +00000030 9f 6b 56 9e 4d a3 78 f3 8e 4f 42 c4 80 64 04 c6 |.kV.M.x..OB..d..| +00000040 85 b1 42 8c 3b 28 b7 |..B.;(.| +[12f1 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 principal evaluation succeeds for identity 0 +[12f2 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2d410 gate 1574140925402131900 evaluation succeeds +[12f3 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[12f4 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[12f5 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12f6 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12f7 11-19 05:22:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[12f8 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[12f9 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12fa 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[12fb 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[12fc 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[12fd 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[12fe 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ff 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1300 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1301 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1302 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1303 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1304 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1305 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1306 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1307 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1308 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1309 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[130a 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[130b 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[130c 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[130d 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[130e 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[130f 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1310 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1311 11-19 05:22:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1312 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1313 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1314 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1315 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1316 11-19 05:22:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1317 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1318 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1319 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[131a 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[131b 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[131c 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 ee 66 4f d5 e3 fa a9 25 93 b2 89 75 fa 35 6d |..fO....%...u.5m| +00000010 78 38 b0 71 b7 14 c3 6e aa f8 0d dc 62 0a 76 45 |x8.q...n....b.vE| +[131d 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 49 c7 ff 73 b1 2e 2c cf cd 58 74 |0D. 6I..s..,..Xt| +00000010 09 e1 b0 7e a2 f2 e9 1d dc b3 33 82 7b c3 0a 25 |...~......3.{..%| +00000020 2c 7a df a7 02 20 53 b7 9a 15 de 7a 8e 69 a1 ac |,z... S....z.i..| +00000030 31 cb 62 55 50 cd b5 1d d3 c4 ad 6e db 59 e5 e8 |1.bUP......n.Y..| +00000040 3a 4b 1a 97 be 08 |:K....| +[131e 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[131f 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1320 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1321 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1322 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[1323 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1324 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1325 11-19 05:22:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1326 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1327 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1328 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1329 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[132a 11-19 05:22:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[132b 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[132c 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[132d 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[132e 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[132f 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1330 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1331 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1332 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1333 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1334 11-19 05:22:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1335 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1336 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1338 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1337 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1339 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[133a 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[133b 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[133c 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[133d 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[133e 11-19 05:22:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[133f 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1340 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1341 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1342 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1343 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 gate 1574140925851789800 evaluation starts +[1344 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 signed by 0 principal evaluation starts (used [false]) +[1345 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 processing identity 0 with bytes of 1151ae0 +[1346 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 principal matched by identity 0 +[1347 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 98 11 19 da 40 a9 16 e9 f9 72 f9 b0 11 0d 2d |7....@....r....-| +00000010 ec f7 3e 4f 9c 86 01 65 d4 25 07 6c 9a 14 80 de |..>O...e.%.l....| +[1348 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 d9 e9 99 b7 22 41 0d 07 ef 4c |0E.!......"A...L| +00000010 37 ba 4f 64 ba d8 cd 10 f5 14 cf 72 75 d6 3a bc |7.Od.......ru.:.| +00000020 cc 74 14 3c 67 02 20 6e c0 d9 ce d6 4d 61 39 5f |.t. DEBU 0xc002f854c0 principal evaluation succeeds for identity 0 +[134a 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f854c0 gate 1574140925851789800 evaluation succeeds +[134b 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[134c 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[134d 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[134e 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[134f 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1350 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1351 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1352 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1353 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1354 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1355 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1356 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1357 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1358 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1359 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[135a 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[135b 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[135c 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[135d 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[135e 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[135f 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1360 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1361 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1362 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1363 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1364 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1365 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1367 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1368 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1369 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1366 11-19 05:22:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[136a 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[136b 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[136c 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[136d 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[136e 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[136f 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1370 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1371 11-19 05:22:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1372 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1373 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1374 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1375 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1376 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1377 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1378 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1379 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[137a 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[137b 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[137c 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[137d 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[137e 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[137f 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1380 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1381 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1382 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1383 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1384 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1385 11-19 05:22:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1386 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1387 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1388 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1389 11-19 05:22:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[138a 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[138b 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151017 +[138c 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E2AE507A345A67573613BB0C075227F7BF55CE300635A2A4219D33CA7008BCD +[138d 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[138e 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[138f 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1390 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1391 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1392 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1393 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1394 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1396 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1397 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1398 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1399 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1395 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[139a 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[139b 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[139c 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[139d 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[139e 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[139f 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +[13a0 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +[13a1 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[13a2 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[13a3 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13a4 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13a5 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[13a6 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[13a7 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13a8 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[13a9 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[13aa 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +[13ab 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +[13ac 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[13ad 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[13ae 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13af 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13b0 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[13b1 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[13b2 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13b3 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[13b4 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[13b5 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 2a e5 07 a3 45 a6 75 73 61 3b b0 c0 75 22 7f |.*...E.usa;..u".| +00000010 7b f5 5c e3 00 63 5a 2a 42 19 d3 3c a7 00 8b cd |{.\..cZ*B..<....| +[13b6 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 e0 8d 89 31 55 a6 09 6d b3 11 |0E.!.....1U..m..| +00000010 70 4d 19 dc bf c9 b0 7f e1 af 0f 67 15 90 d2 c6 |pM.........g....| +00000020 6e 43 ee 56 61 02 20 14 3b 6d af 92 e6 73 b4 09 |nC.Va. .;m...s..| +00000030 ed 74 4c bd 3f c5 ca 57 06 86 d8 c0 d3 61 10 c5 |.tL.?..W.....a..| +00000040 d6 a0 4b 0b 9e 5e a9 |..K..^.| +[13b7 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[13b8 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd d3 b1 20 7c af f4 51 61 4b c7 |0E.!.... |..QaK.| +00000010 24 39 3b ca e3 29 d3 b7 30 9e f1 a7 e9 70 7e 9b |$9;..)..0....p~.| +00000020 c8 45 3b 88 18 02 20 51 75 8f 47 dc 4d 1a d8 3c |.E;... Qu.G.M..<| +00000030 ab 44 9c 2a 73 0e 1a a1 43 e3 27 8e a7 15 1c ac |.D.*s...C.'.....| +00000040 da ce 81 76 13 67 b9 |...v.g.| +[13b9 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[13ba 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[13bb 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13bc 11-19 05:22:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13bd 11-19 05:22:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13be 11-19 05:22:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13bf 11-19 05:22:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13c0 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[13c1 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[13c3 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c2 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[13c4 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c5 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[13c6 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c7 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[13c8 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[13c9 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[13ca 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[13cb 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[13cc 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[13cd 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[13ce 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[13cf 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13d0 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13d1 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13d2 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13d3 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13d4 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[13d5 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[13d6 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[13d7 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 gate 1574140927348551800 evaluation starts +[13d8 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 signed by 0 principal evaluation starts (used [false]) +[13d9 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 processing identity 0 with bytes of 1151ae0 +[13da 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 principal matched by identity 0 +[13db 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[13dc 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[13dd 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 principal evaluation succeeds for identity 0 +[13de 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268e10 gate 1574140927348551800 evaluation succeeds +[13df 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[13e0 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[13e1 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[13e2 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[13e3 11-19 05:22:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13e4 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13e5 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13e6 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13e7 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13e8 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[13e9 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[13ea 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[13eb 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 gate 1574140927350590600 evaluation starts +[13ec 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 signed by 0 principal evaluation starts (used [false]) +[13ed 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 processing identity 0 with bytes of 1151ae0 +[13ee 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 principal matched by identity 0 +[13ef 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[13f0 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[13f1 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 principal evaluation succeeds for identity 0 +[13f2 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003269fa0 gate 1574140927350590600 evaluation succeeds +[13f3 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[13f4 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[13f5 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[13f6 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[13f7 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f8 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[13f9 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13fa 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13fb 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13fc 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13fd 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13fe 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13ff 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1400 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1401 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1402 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 gate 1574140927353114600 evaluation starts +[1403 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 signed by 0 principal evaluation starts (used [false]) +[1404 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 processing identity 0 with bytes of 1151ae0 +[1405 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 principal matched by identity 0 +[1406 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1407 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1408 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 principal evaluation succeeds for identity 0 +[1409 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c53b0 gate 1574140927353114600 evaluation succeeds +[140a 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[140b 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[140c 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[140d 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[140e 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[140f 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1410 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1411 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1412 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1413 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1414 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1415 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1416 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1417 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1418 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 gate 1574140927356895200 evaluation starts +[1419 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 signed by 0 principal evaluation starts (used [false]) +[141a 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 processing identity 0 with bytes of 1151ae0 +[141b 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 principal matched by identity 0 +[141c 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[141d 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[141e 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 principal evaluation succeeds for identity 0 +[141f 11-19 05:22:07.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003390bc0 gate 1574140927356895200 evaluation succeeds +[1420 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1421 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1422 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1423 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1424 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1425 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1426 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1427 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1428 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1429 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[142a 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[142b 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[142c 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[142d 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[142e 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[142f 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1430 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1431 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 gate 1574140927364715600 evaluation starts +[1432 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 signed by 0 principal evaluation starts (used [false]) +[1433 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 processing identity 0 with bytes of 1151ae0 +[1434 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 principal matched by identity 0 +[1435 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1436 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1437 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 principal evaluation succeeds for identity 0 +[1438 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033be670 gate 1574140927364715600 evaluation succeeds +[1439 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[143a 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[143b 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[143c 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[143d 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[143e 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[143f 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1440 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1441 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1442 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1443 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1444 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1445 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1446 11-19 05:22:07.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1447 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1448 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1449 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 gate 1574140927370296200 evaluation starts +[144a 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 signed by 0 principal evaluation starts (used [false]) +[144b 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 processing identity 0 with bytes of 1151ae0 +[144c 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 principal matched by identity 0 +[144d 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[144e 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[144f 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 principal evaluation succeeds for identity 0 +[1450 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e4740 gate 1574140927370296200 evaluation succeeds +[1451 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1452 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1453 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1454 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1455 11-19 05:22:07.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1456 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1457 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1458 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1459 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[145a 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[145b 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[145c 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[145d 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[145e 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[145f 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1460 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1461 11-19 05:22:07.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1462 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1463 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1464 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1465 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1466 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1467 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1468 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1469 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146a 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146b 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[146c 11-19 05:22:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[146d 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[146e 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[146f 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1470 11-19 05:22:07.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1471 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1472 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1473 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1474 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1475 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1476 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1477 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1478 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1479 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 gate 1574140927456824200 evaluation starts +[147a 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 signed by 0 principal evaluation starts (used [false]) +[147b 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 processing identity 0 with bytes of 1151ae0 +[147c 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 principal matched by identity 0 +[147d 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 b3 11 f1 fd aa 37 51 a4 17 e3 8b 01 51 b3 ee |R.....7Q.....Q..| +00000010 2e 6c 19 35 57 07 6d bd 58 d8 35 bf 28 75 13 cb |.l.5W.m.X.5.(u..| +[147e 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 2d 63 18 ed 0e 27 81 e4 24 44 |0E.!..-c...'..$D| +00000010 c6 78 cc 65 90 37 7f 45 e3 01 ea da 03 f1 18 9e |.x.e.7.E........| +00000020 c4 45 a9 e3 21 02 20 24 a0 f8 79 37 17 b2 fa 07 |.E..!. $..y7....| +00000030 35 49 58 7d a3 01 62 4a b5 b5 7a b0 58 3b 14 a2 |5IX}..bJ..z.X;..| +00000040 a7 58 41 a9 25 f4 94 |.XA.%..| +[147f 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 principal evaluation succeeds for identity 0 +[1480 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341c530 gate 1574140927456824200 evaluation succeeds +[1481 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1482 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1483 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1484 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1485 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1486 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1487 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1488 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1489 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[148a 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148b 11-19 05:22:07.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148c 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148d 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[148e 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[148f 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1490 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1491 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1492 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1493 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1494 11-19 05:22:07.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1495 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1496 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1497 11-19 05:22:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1498 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1499 11-19 05:22:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[149a 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[149b 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[149c 11-19 05:22:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[149d 11-19 05:22:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[149e 11-19 05:22:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[149f 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14a0 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14a1 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14a2 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[14a3 11-19 05:22:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14a4 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14a5 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14a6 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14a7 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14a8 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14a9 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14aa 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ab 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ac 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ad 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[14ae 11-19 05:22:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14af 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[14b0 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[14b1 11-19 05:22:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[14b2 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[14b3 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14b4 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[14b5 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[14b6 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[14b7 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[14b8 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[14b9 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[14ba 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 gate 1574140927864389900 evaluation starts +[14bb 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 signed by 0 principal evaluation starts (used [false]) +[14bc 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 processing identity 0 with bytes of 1151ae0 +[14bd 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 principal matched by identity 0 +[14be 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 6a 7d 56 6d 5f fc 25 72 1b 99 d9 a8 44 d4 44 |tj}Vm_.%r....D.D| +00000010 5d c4 92 fb 3a b5 13 80 a3 d2 61 9b 4f 79 aa 45 |]...:.....a.Oy.E| +[14bf 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 85 39 6f b5 de 76 75 fc 97 99 |0E.!...9o..vu...| +00000010 15 7b e0 90 65 38 a5 e4 60 ac db 2a 07 c6 19 25 |.{..e8..`..*...%| +00000020 8d a3 a7 74 f7 02 20 0b 88 0a 99 85 41 a5 5d 2b |...t.. .....A.]+| +00000030 b0 91 2d 11 d0 13 bb b5 5e 0c 94 5b 87 b2 bb cd |..-.....^..[....| +00000040 f4 59 5a 82 0b 92 e8 |.YZ....| +[14c0 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 principal evaluation succeeds for identity 0 +[14c1 11-19 05:22:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003434a40 gate 1574140927864389900 evaluation succeeds +[14c2 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[14c3 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[14c4 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[14c5 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[14c6 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14c7 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[14c8 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[14c9 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[14ca 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[14cb 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14cc 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14cd 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14ce 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[14cf 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14d0 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14d1 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14d2 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[14d3 11-19 05:22:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14d4 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[14d5 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14d6 11-19 05:22:07.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[14d7 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[14d8 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[14d9 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14da 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[14db 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[14dc 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 94 a5 97 d0 fd 59 99 e5 57 ca 0c 06 a2 c6 a7 |S.....Y..W......| +00000010 f9 2c 3a 87 c5 72 d1 50 d9 51 96 15 35 6f 9b c3 |.,:..r.P.Q..5o..| +[14dd 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc ad 80 5b 80 12 1b 17 4e f6 85 |0E.!....[....N..| +00000010 1e 06 1f f1 67 f9 54 1f ab 07 6b 18 0e 65 4a e5 |....g.T...k..eJ.| +00000020 0f 78 5e 27 70 02 20 4d 5d e7 56 e4 16 10 a8 96 |.x^'p. M].V.....| +00000030 29 ec b5 f7 29 87 31 5b d9 65 b2 0a 77 54 1a fb |)...).1[.e..wT..| +00000040 40 58 2d fc 41 d7 2d |@X-.A.-| +[14de 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[14df 11-19 05:22:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a8 4d ab eb f4 91 c0 72 e3 63 |0E.!...M.....r.c| +00000010 11 34 55 69 36 55 09 06 32 16 29 44 c0 bc 3d 0e |.4Ui6U..2.)D..=.| +00000020 2e e0 0b 9f 1b 02 20 3a 4c 39 dc d6 45 ad 51 92 |...... :L9..E.Q.| +00000030 6f 42 d4 6a f0 5c c0 ee 07 f6 6c c6 ef 64 41 72 |oB.j.\....l..dAr| +00000040 c0 27 6f ca a7 13 db |.'o....| +[14e0 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[14e1 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[14e2 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[14e3 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[14e4 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[14e5 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e6 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e7 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e8 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[14e9 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ea 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14eb 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[14ec 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[14ed 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[14ee 11-19 05:22:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14ef 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14f0 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14f1 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f2 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f3 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f4 11-19 05:22:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14f5 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14f6 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14f7 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f8 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f9 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14fa 11-19 05:22:08.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14fb 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[14fc 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[14fd 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[14fe 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510061801 +[14ff 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B5861AC8D4993A4B4C5BBCBFFEFDCEEF36E2256692FDF5E7DDAB37E73E3F224C +[1500 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[1501 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1502 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1503 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1504 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1505 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[1506 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1507 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[1508 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1509 11-19 05:22:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[150a 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[150b 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151018 +[150c 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C72DA73F9EBA4AEDFDEC25608DB914B56673CE2A58B0A4B40E917FDA2CC6FF2 +[150d 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[150e 11-19 05:22:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[150f 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1510 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1511 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1512 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1513 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[1514 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1515 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1516 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1517 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1518 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1519 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[151a 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[151b 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[151c 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[151d 11-19 05:22:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[151e 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[151f 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1520 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1521 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1522 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1523 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1524 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1525 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1526 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1527 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1528 11-19 05:22:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1529 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[152a 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 gate 1574140930411891900 evaluation starts +[152b 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 signed by 0 principal evaluation starts (used [false]) +[152c 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 processing identity 0 with bytes of 1151ae0 +[152d 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 principal matched by identity 0 +[152e 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 c9 8e 0f 98 f6 14 a2 16 ae c0 98 fe 60 51 18 |.............`Q.| +00000010 49 cc 88 bc d0 d0 03 7d 39 45 b2 3a 34 7b 77 a5 |I......}9E.:4{w.| +[152f 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 0a ce 03 9b 30 45 f1 9f 40 76 2c |0D. }....0E..@v,| +00000010 b2 bd 9d 0b a6 9a 58 d8 b3 a5 aa 28 2c cb 48 d3 |......X....(,.H.| +00000020 03 d9 90 f3 02 20 03 7b c4 65 83 9c c1 b6 20 e8 |..... .{.e.... .| +00000030 64 6a e3 3e 33 db 5b 6f b8 66 b9 4c 81 35 b0 1c |dj.>3.[o.f.L.5..| +00000040 23 d0 22 c9 d1 d2 |#."...| +[1530 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 principal evaluation succeeds for identity 0 +[1531 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec510 gate 1574140930411891900 evaluation succeeds +[1532 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1533 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1534 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1535 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1536 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1537 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1538 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1539 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[153a 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[153b 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[153c 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[153d 11-19 05:22:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[153e 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[153f 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1540 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1541 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1542 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1543 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1544 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1545 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1546 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1547 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1548 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1549 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[154a 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[154b 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[154d 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[154e 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[154c 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[154f 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1550 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1551 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1552 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1553 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1554 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1555 11-19 05:22:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1556 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1557 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1558 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1559 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[155a 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[155b 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[155c 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[155e 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[155d 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[155f 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1560 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1561 11-19 05:22:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1562 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1563 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1565 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1566 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1567 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1564 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1568 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1569 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[156a 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[156b 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[156c 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[156d 11-19 05:22:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[156e 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[156f 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1570 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1571 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1572 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 6b 81 25 70 d6 89 94 08 a1 b7 66 df 9e e2 ee |.k.%p......f....| +00000010 06 17 e5 c1 b2 2c 2f 01 b1 e7 57 c7 40 22 c4 46 |.....,/...W.@".F| +[1573 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a ce 86 02 c4 ab 30 56 82 a4 50 a4 |0D. :.....0V..P.| +00000010 65 13 c1 61 99 46 e1 61 ca c2 99 47 6b 9f a3 3e |e..a.F.a...Gk..>| +00000020 34 12 af 0d 02 20 59 be fd 77 59 28 0c f2 31 3c |4.... Y..wY(..1<| +00000030 12 7f e7 ad a3 e5 87 b4 73 e1 52 10 f5 98 68 4a |........s.R...hJ| +00000040 54 d0 ad 6e 5c 61 |T..n\a| +[1574 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1575 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1576 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1577 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1578 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1579 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[157a 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[157b 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[157c 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[157d 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[157e 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[157f 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1580 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1581 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1582 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1583 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1584 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1585 11-19 05:22:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1586 11-19 05:22:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1587 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1588 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1589 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[158a 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[158b 11-19 05:22:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[158c 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[158d 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[158e 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[158f 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1590 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1591 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1592 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1593 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1594 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1595 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1596 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1597 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1598 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 gate 1574140930838002500 evaluation starts +[1599 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 signed by 0 principal evaluation starts (used [false]) +[159a 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 processing identity 0 with bytes of 1151ae0 +[159b 11-19 05:22:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 principal matched by identity 0 +[159c 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 6f 8d 4a 96 49 d1 06 03 a4 de d5 ec af 66 0f |\o.J.I........f.| +00000010 6f ff 5c dc 9b 2d 5a 10 f4 14 4f 9b 44 dd b2 77 |o.\..-Z...O.D..w| +[159d 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 0c f8 10 43 b3 a9 50 81 42 21 |0E.!.....C..P.B!| +00000010 30 0b 1a 69 52 7e e0 0d ea 10 73 82 25 5f 42 2b |0..iR~....s.%_B+| +00000020 1f 81 89 1d 1e 02 20 0d 07 4b c6 b4 5c 2f 65 17 |...... ..K..\/e.| +00000030 5c 61 0a ac d4 3f e3 fa 63 e2 40 58 af 81 97 db |\a...?..c.@X....| +00000040 84 c0 4f ad f4 f0 ab |..O....| +[159e 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[15a0 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 principal evaluation succeeds for identity 0 +[15a1 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b2800 gate 1574140930838002500 evaluation succeeds +[159f 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151019 +[15a2 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 95ABEEBA30AACE539A01F77BE1E151477D4B18F92E642D724912C9F14C377F2F +[15a3 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[15a4 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[15a5 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[15a6 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[15a8 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[15a7 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[15a9 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15ab 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[15aa 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[15ac 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[15ad 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[15ae 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[15af 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b0 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b2 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[15b1 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b3 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b4 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[15b5 11-19 05:22:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b6 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[15b7 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b8 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[15ba 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[15bb 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b9 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[15bc 11-19 05:22:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15bd 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[15be 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[15bf 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15c0 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[15c1 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[15c2 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +[15c3 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +00000040 48 7c 41 ee bb a6 |H|A...| +[15c4 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15c5 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[15c7 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[15c9 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15c6 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15c8 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[15cb 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15cc 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15ca 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15cd 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15cf 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15d0 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ce 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d1 11-19 05:22:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15d2 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[15d4 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15d5 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[15d6 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[15d7 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d8 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +[15d9 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +00000040 48 7c 41 ee bb a6 |H|A...| +[15d3 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[15da 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[15de 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[15db 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15dc 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15dd 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[15df 11-19 05:22:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[15e0 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e1 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e2 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[15e3 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e4 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e5 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15e6 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e7 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[15e8 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15e9 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ea 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[15ec 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[15ed 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab ee ba 30 aa ce 53 9a 01 f7 7b e1 e1 51 47 |....0..S...{..QG| +00000010 7d 4b 18 f9 2e 64 2d 72 49 12 c9 f1 4c 37 7f 2f |}K...d-rI...L7./| +[15ee 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 00 31 98 f7 36 75 c9 3a 89 37 ec |0D. 0.1..6u.:.7.| +00000010 00 00 14 00 f1 7c 74 e8 67 ae ea 27 50 1c dd ff |.....|t.g..'P...| +00000020 95 4b 64 ad 02 20 76 f6 09 01 2c 0e 7d 16 86 a9 |.Kd.. v...,.}...| +00000030 4d a4 3c 10 2a 40 09 72 d3 05 78 e3 83 47 75 d2 |M.<.*@.r..x..Gu.| +00000040 48 7c 41 ee bb a6 |H|A...| +[15ef 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15f0 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[15f2 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 75 14 2d 24 76 92 cd ee 51 0e |0E.!..u.-$v...Q.| +00000010 1b 83 5b b1 f3 d1 9e 54 89 6f c7 b8 8e fc a7 98 |..[....T.o......| +00000020 64 1d f7 7e 98 02 20 2f 92 8d 59 8e f3 44 4b 9d |d..~.. /..Y..DK.| +00000030 04 45 2d 70 94 62 35 f5 83 c7 15 20 66 0d f4 81 |.E-p.b5.... f...| +00000040 0f e5 eb 43 3f e5 01 |...C?..| +[15f3 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[15f4 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[15f5 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f1 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[15f6 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f7 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15f8 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15f9 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15eb 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15fa 11-19 05:22:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[15fb 11-19 05:22:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15fc 11-19 05:22:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15fd 11-19 05:22:11.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15fe 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15ff 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1600 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1601 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1602 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1603 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1605 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1606 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1607 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1608 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1604 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1609 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[160a 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[160b 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[160c 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[160d 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[160e 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[160f 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1610 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1611 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 gate 1574140931345645500 evaluation starts +[1612 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 signed by 0 principal evaluation starts (used [false]) +[1613 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 processing identity 0 with bytes of 1151ae0 +[1614 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 principal matched by identity 0 +[1615 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1616 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1617 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 principal evaluation succeeds for identity 0 +[1618 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364d4d0 gate 1574140931345645500 evaluation succeeds +[1619 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[161a 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[161b 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[161c 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[161d 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[161e 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[161f 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1620 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1621 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1622 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1623 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1624 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1625 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1626 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1627 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1628 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1629 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 gate 1574140931348869600 evaluation starts +[162a 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 signed by 0 principal evaluation starts (used [false]) +[162b 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 processing identity 0 with bytes of 1151ae0 +[162c 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 principal matched by identity 0 +[162d 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[162e 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[162f 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1630 11-19 05:22:11.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 principal evaluation succeeds for identity 0 +[1631 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 gate 1574140931348869600 evaluation succeeds +[1632 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1633 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1634 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1635 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1636 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1637 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1639 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1638 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[163a 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[163b 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[163c 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[163d 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[163e 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[163f 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1640 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1641 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1642 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1643 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1644 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1645 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 gate 1574140931357785600 evaluation starts +[1646 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 signed by 0 principal evaluation starts (used [false]) +[1647 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 processing identity 0 with bytes of 1151ae0 +[1648 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 principal matched by identity 0 +[1649 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[164a 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[164b 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 principal evaluation succeeds for identity 0 +[164c 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3c50 gate 1574140931357785600 evaluation succeeds +[164d 11-19 05:22:11.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[164e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[164f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1650 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1651 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1652 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1653 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1654 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1655 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1656 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1657 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1658 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1659 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 gate 1574140931362000200 evaluation starts +[165a 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 signed by 0 principal evaluation starts (used [false]) +[165b 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 processing identity 0 with bytes of 1151ae0 +[165c 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 principal matched by identity 0 +[165d 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[165e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[165f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 principal evaluation succeeds for identity 0 +[1660 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387a410 gate 1574140931362000200 evaluation succeeds +[1661 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1662 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1663 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1664 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1665 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1666 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1667 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1668 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1669 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[166a 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[166b 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[166c 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[166d 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[166e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[166f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1670 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 gate 1574140931364439500 evaluation starts +[1671 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 signed by 0 principal evaluation starts (used [false]) +[1672 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 processing identity 0 with bytes of 1151ae0 +[1673 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 principal matched by identity 0 +[1674 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1675 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1676 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 principal evaluation succeeds for identity 0 +[1677 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387b820 gate 1574140931364439500 evaluation succeeds +[1678 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1679 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[167a 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[167b 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[167c 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[167d 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[167e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[167f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1680 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1681 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1682 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1683 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1684 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1685 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1686 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 gate 1574140931367480100 evaluation starts +[1687 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 signed by 0 principal evaluation starts (used [false]) +[1688 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 processing identity 0 with bytes of 1151ae0 +[1689 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 principal matched by identity 0 +[168a 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[168b 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[168c 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 principal evaluation succeeds for identity 0 +[168d 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d090 gate 1574140931367480100 evaluation succeeds +[168e 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[168f 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1690 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1691 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1692 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1693 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1694 11-19 05:22:11.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1695 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1696 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1697 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1698 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1699 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[169a 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[169b 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[169c 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[169d 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[169e 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[169f 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[16a0 11-19 05:22:11.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a1 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[16a2 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[16a3 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[16a4 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16a5 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16a6 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16a7 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16a8 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16a9 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16aa 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[16ab 11-19 05:22:11.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16ac 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[16ad 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[16ae 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16af 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[16b0 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[16b1 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16b2 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[16b3 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[16b4 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[16b5 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[16b6 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[16b7 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[16b8 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 gate 1574140931457592700 evaluation starts +[16b9 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 signed by 0 principal evaluation starts (used [false]) +[16ba 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 processing identity 0 with bytes of 1151ae0 +[16bb 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 principal matched by identity 0 +[16bc 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +[16bd 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +00000040 e2 8a 16 3a 1d 12 |...:..| +[16be 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 principal evaluation succeeds for identity 0 +[16bf 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ddb0 gate 1574140931457592700 evaluation succeeds +[16c0 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[16c1 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[16c2 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[16c3 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[16c4 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16c5 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[16c6 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[16c7 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[16c8 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[16c9 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16ca 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16cb 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16cc 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[16cd 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ce 11-19 05:22:11.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16cf 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d0 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[16d1 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > alive: alive: +[16d2 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[16d3 11-19 05:22:11.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16d4 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[16d5 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[16d6 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d7 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d8 11-19 05:22:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16d9 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[16da 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[16db 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[16dc 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[16dd 11-19 05:22:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16de 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16df 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16e0 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16e1 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[16e2 11-19 05:22:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16e3 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16e4 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16e5 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16e6 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16e7 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16e8 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16e9 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ea 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16eb 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ec 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[16ed 11-19 05:22:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16ee 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +[16ef 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +[16f0 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16f1 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > > , Envelope: 166 bytes, Signature: 0 bytes +[16f2 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[16f3 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16f4 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[16f5 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[16f6 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[16f7 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[16f8 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[16f9 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[16fa 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 gate 1574140931863602400 evaluation starts +[16fb 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 signed by 0 principal evaluation starts (used [false]) +[16fc 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 processing identity 0 with bytes of 1151ae0 +[16fd 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 principal matched by identity 0 +[16fe 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +[16ff 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +00000040 e0 f0 e8 f4 47 16 43 |....G.C| +[1700 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 principal evaluation succeeds for identity 0 +[1701 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039dc390 gate 1574140931863602400 evaluation succeeds +[1702 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1703 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1704 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1705 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1706 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1707 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1708 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1709 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[170a 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[170b 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[170c 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[170d 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[170e 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[170f 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1710 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1711 11-19 05:22:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1712 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1713 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1714 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1715 11-19 05:22:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:4\022\257\r\002 Y\276\375wY(\014\3621<\022\177\347\255\243\345\207\264s\341R\020\365\230hJT\320\255n\\a" > alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > alive: alive: +[1716 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1717 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1718 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1719 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[171a 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[171b 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +[171c 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +00000040 eb 91 0c 98 35 67 ce |....5g.| +[171d 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[171e 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c bf d0 52 58 e0 49 f9 0d 24 de 11 |0D. ...RX.I..$..| +00000010 61 a6 2a db d9 10 5a 8e 41 6c ac d5 1b 5a 06 db |a.*...Z.Al...Z..| +00000020 d0 bc f0 7f 02 20 19 3a 61 90 b8 36 16 08 07 a8 |..... .:a..6....| +00000030 95 00 b0 88 56 d1 31 df d1 45 71 7b 50 1b c2 b0 |....V.1..Eq{P...| +00000040 82 5e 5c bb 02 ab |.^\...| +[171f 11-19 05:22:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1720 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1721 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1722 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1723 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1724 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1725 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1726 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1727 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[1728 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1729 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[172a 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[172b 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[172c 11-19 05:22:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[172d 11-19 05:22:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[172e 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[172f 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1730 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1731 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1732 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1733 11-19 05:22:11.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1734 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1735 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1736 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1737 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1738 11-19 05:22:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1739 11-19 05:22:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[173a 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[173b 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[173c 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[173d 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510071801 +[173e 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0DB0C69785D7C3D8698F4A23785AC0D77F98DBDD298F095E6A6A6EDC7D3F56E0 +[173f 11-19 05:22:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[1740 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1741 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1742 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1743 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1744 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[1745 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1746 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1747 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[1748 11-19 05:22:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1749 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[174a 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101A +[174b 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C1B5BD86FBEEC143CF9973EDFA581F274ADACD1A1D02B5F604F722E250CE7A76 +[174c 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[174d 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[174e 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[174f 11-19 05:22:14.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1750 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1751 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1752 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1753 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1754 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1755 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1756 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1758 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1759 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[175a 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[175b 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1757 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[175c 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[175d 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[175e 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[175f 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1760 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1761 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1762 11-19 05:22:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1763 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1764 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1765 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1767 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1766 11-19 05:22:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1768 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1769 11-19 05:22:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[176a 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[176b 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[176c 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[176d 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[176e 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[176f 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1770 11-19 05:22:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1771 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1772 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1773 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1774 11-19 05:22:14.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1775 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1776 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101B +[1777 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E1496B11434695B92FF829A6582CB6E9A904F809DFD6F97AD9B063DE9C8FC88E +[1778 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1779 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[177a 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[177b 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[177c 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[177d 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[177e 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[177f 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[1780 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1782 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1784 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1781 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1785 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1783 11-19 05:22:14.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1786 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1787 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1788 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1789 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[178a 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[178b 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +[178c 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[178e 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[178f 11-19 05:22:14.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1790 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 46 f3 09 00 b8 17 14 8f 71 ea |0E.!..F.......q.| +00000010 38 84 8c 81 a8 58 9d d6 7d 24 f0 55 51 c7 4c bf |8....X..}$.UQ.L.| +00000020 7d 3a 2a ba 95 02 20 34 c5 11 6e 57 97 9e 74 3a |}:*... 4..nW..t:| +00000030 74 42 7c 38 12 d0 a6 c9 54 62 0d 77 ba 72 78 3a |tB|8....Tb.w.rx:| +00000040 52 c4 62 b5 71 25 f2 |R.b.q%.| +[1791 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1792 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1793 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1794 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1795 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1796 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1797 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1798 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +[1799 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[179b 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[179c 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[179d 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[179e 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[179f 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17a0 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17a1 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17a2 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17a3 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17a4 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17a5 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 gate 1574140934844708200 evaluation starts +[17a6 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 signed by 0 principal evaluation starts (used [false]) +[17a7 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 processing identity 0 with bytes of 1151ae0 +[17a8 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 principal matched by identity 0 +[17a9 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 36 72 e5 d3 87 33 3a 98 12 cb 3c 5c 80 89 a8 |.6r...3:...<\...| +00000010 5f 5b 3d ba 1b f0 52 e1 3a a3 77 92 30 35 41 81 |_[=...R.:.w.05A.| +[17aa 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 a0 4c ac ec 8a 4f 02 d4 c5 6d |0E.!...L...O...m| +00000010 d7 b1 7c bd 3e f3 4a c1 d4 f6 c6 50 a8 31 d3 a1 |..|.>.J....P.1..| +00000020 1e eb 28 2c 9d 02 20 17 6e bd 55 8a fb 9a e6 00 |..(,.. .n.U.....| +00000030 4b 79 96 40 48 71 9b ed 77 b9 00 e2 1a 95 18 9b |Ky.@Hq..w.......| +00000040 e0 f0 e8 f4 47 16 43 |....G.C| +[17ab 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 principal evaluation succeeds for identity 0 +[17ac 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e8c0 gate 1574140934844708200 evaluation succeeds +[17ad 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17ae 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17af 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17b0 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17b1 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[17b2 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17b3 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[17b4 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +[17b5 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +00000040 eb 91 0c 98 35 67 ce |....5g.| +[17b6 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[17b7 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17b8 11-19 05:22:14.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17b9 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[17ba 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[17bb 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17bc 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[17bd 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[17be 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17bf 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17c0 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17c1 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17c2 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17c3 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17c4 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17c5 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 gate 1574140934853827500 evaluation starts +[17c6 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 signed by 0 principal evaluation starts (used [false]) +[17c7 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 processing identity 0 with bytes of 1151ae0 +[17c8 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 principal matched by identity 0 +[17c9 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 52 be 76 5f 2d 42 07 13 a6 e0 c5 85 9c 43 44 |?R.v_-B.......CD| +00000010 57 0f bc e1 19 fb 2a 81 ec d1 4f 75 11 8c d3 66 |W.....*...Ou...f| +[17ca 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 63 bc 23 2d f1 2d cb 5d 61 43 f5 |0D. .c.#-.-.]aC.| +00000010 96 a6 3d 51 1c f9 23 b2 56 b3 cf 18 b2 e2 45 5e |..=Q..#.V.....E^| +00000020 05 37 df 3d 02 20 61 c5 dd 65 60 c9 46 a8 2a 27 |.7.=. a..e`.F.*'| +00000030 b5 a9 26 07 ed 03 96 4a e5 91 96 4a 3c 23 78 b5 |..&....J...J<#x.| +00000040 e2 8a 16 3a 1d 12 |...:..| +[17cb 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 principal evaluation succeeds for identity 0 +[17cc 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee810 gate 1574140934853827500 evaluation succeeds +[17cd 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17ce 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17cf 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17d0 11-19 05:22:14.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17d1 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[17d2 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17d3 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[17d4 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 00 50 96 3b 6d b9 54 4d b9 e3 1e 23 cb b7 |...P.;m.TM...#..| +00000010 1f 86 40 cf d5 b8 7d d8 d2 df 16 89 36 e6 33 7a |..@...}.....6.3z| +[17d5 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 1a 75 00 a4 0f fa 11 63 02 e9 |0E.!...u.....c..| +00000010 67 32 82 2a 44 37 c9 e2 ab 0e 1c dc 4f 94 25 e7 |g2.*D7......O.%.| +00000020 58 56 c1 e1 fa 02 20 52 dc 80 3b fd 75 be 29 ba |XV.... R..;.u.).| +00000030 34 46 c5 5d 00 e9 81 38 d6 b8 d6 5e 39 dd da 24 |4F.]...8...^9..$| +00000040 eb 91 0c 98 35 67 ce |....5g.| +[17d6 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[17d7 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17d8 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[17d9 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 6b 11 43 46 95 b9 2f f8 29 a6 58 2c b6 e9 |.Ik.CF../.).X,..| +00000010 a9 04 f8 09 df d6 f9 7a d9 b0 63 de 9c 8f c8 8e |.......z..c.....| +[17da 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 14 01 c0 32 05 fb a8 61 ba d5 a9 |0D. \...2...a...| +00000010 61 a1 d3 6d 4c 30 57 4d 2e 86 77 ea 64 9a 8e 21 |a..mL0WM..w.d..!| +00000020 4d 05 a7 ba 02 20 03 9a 13 00 31 85 36 4d 53 54 |M.... ....1.6MST| +00000030 de fe c0 f1 28 fb 10 f1 d4 c9 ac 96 95 3c 69 b1 |....(........ DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[17dc 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[17dd 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17de 11-19 05:22:14.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17df 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17e0 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17e1 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[17e2 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[17e3 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17e4 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[17e5 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17e6 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[17e7 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17e8 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[17e9 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[17ea 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[17eb 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[17ec 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[17ed 11-19 05:22:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[17ee 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[17ef 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[17f0 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17f1 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17f2 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17f3 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17f4 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17f5 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17f6 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17f7 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17f8 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 gate 1574140935312881700 evaluation starts +[17f9 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 signed by 0 principal evaluation starts (used [false]) +[17fa 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 processing identity 0 with bytes of 1151ae0 +[17fb 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 principal matched by identity 0 +[17fc 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[17fd 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[17fe 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 principal evaluation succeeds for identity 0 +[17ff 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c98ad0 gate 1574140935312881700 evaluation succeeds +[1800 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1801 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1802 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1803 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1804 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1805 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1806 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1807 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1808 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1809 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[180a 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[180b 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[180c 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 gate 1574140935315124400 evaluation starts +[180d 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 signed by 0 principal evaluation starts (used [false]) +[180e 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 processing identity 0 with bytes of 1151ae0 +[180f 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 principal matched by identity 0 +[1810 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1811 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1812 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 principal evaluation succeeds for identity 0 +[1813 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99c70 gate 1574140935315124400 evaluation succeeds +[1814 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1815 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1816 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1817 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1818 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1819 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[181a 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[181b 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[181c 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[181d 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[181e 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[181f 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1820 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1821 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1822 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1823 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 gate 1574140935317526000 evaluation starts +[1824 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 signed by 0 principal evaluation starts (used [false]) +[1825 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 processing identity 0 with bytes of 1151ae0 +[1826 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 principal matched by identity 0 +[1827 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1828 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1829 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 principal evaluation succeeds for identity 0 +[182a 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb1170 gate 1574140935317526000 evaluation succeeds +[182b 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[182c 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[182d 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[182e 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[182f 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1830 11-19 05:22:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1831 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1832 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1833 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1834 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1835 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1836 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1837 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1838 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1839 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[183a 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[183b 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 gate 1574140935324263300 evaluation starts +[183c 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 signed by 0 principal evaluation starts (used [false]) +[183d 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 processing identity 0 with bytes of 1151ae0 +[183e 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 principal matched by identity 0 +[183f 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1840 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1841 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 principal evaluation succeeds for identity 0 +[1842 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91020 gate 1574140935324263300 evaluation succeeds +[1843 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1844 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1845 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1846 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1847 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1848 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1849 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[184a 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[184b 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[184c 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[184d 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[184e 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[184f 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1850 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1851 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1852 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 gate 1574140935329024100 evaluation starts +[1853 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 signed by 0 principal evaluation starts (used [false]) +[1854 11-19 05:22:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 processing identity 0 with bytes of 1151ae0 +[1855 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 principal matched by identity 0 +[1856 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1857 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1858 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 principal evaluation succeeds for identity 0 +[1859 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac400 gate 1574140935329024100 evaluation succeeds +[185a 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[185b 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[185c 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[185d 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[185e 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[185f 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1860 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1861 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1862 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1863 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1864 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1865 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1866 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1867 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1868 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 gate 1574140935335829400 evaluation starts +[1869 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 signed by 0 principal evaluation starts (used [false]) +[186a 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 processing identity 0 with bytes of 1151ae0 +[186b 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 principal matched by identity 0 +[186c 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[186d 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[186e 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 principal evaluation succeeds for identity 0 +[186f 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dadc30 gate 1574140935335829400 evaluation succeeds +[1870 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1871 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1872 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1873 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1874 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1875 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1876 11-19 05:22:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1877 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1878 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1879 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[187a 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[187b 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[187c 11-19 05:22:15.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[187d 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[187e 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[187f 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1880 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1881 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1882 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1883 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 gate 1574140935372734400 evaluation starts +[1884 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 signed by 0 principal evaluation starts (used [false]) +[1885 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 processing identity 0 with bytes of 1151ae0 +[1886 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 principal matched by identity 0 +[1887 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b f5 f2 30 49 0c f6 fe 80 00 b9 aa 7c 14 f0 a4 |k..0I.......|...| +00000010 a5 dd df 75 b5 03 96 21 af 1e c8 44 bd fe 56 df |...u...!...D..V.| +[1888 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc e4 d5 b9 64 8c 50 80 9a 6b 39 |0E.!.....d.P..k9| +00000010 c5 69 4a c7 1c 2f 39 96 5b 01 6e 9f c8 78 49 6e |.iJ../9.[.n..xIn| +00000020 c5 56 0a 1c 8d 02 20 2a 92 06 ea cb 76 39 fc db |.V.... *....v9..| +00000030 66 58 8f b4 0c 80 8c ee 0f a1 4c b9 d0 37 d6 eb |fX........L..7..| +00000040 f8 39 8f 78 81 8e e2 |.9.x...| +[1889 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 principal evaluation succeeds for identity 0 +[188a 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f860 gate 1574140935372734400 evaluation succeeds +[188b 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[188c 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[188d 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[188e 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[188f 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1890 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1891 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1892 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1893 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1894 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1895 11-19 05:22:15.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1896 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1897 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1898 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1899 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[189a 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[189b 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[189c 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[189d 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[189e 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[189f 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a3 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a0 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18a1 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a2 11-19 05:22:15.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a5 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a7 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a8 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a6 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a4 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a9 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18aa 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[18ac 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ad 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18af 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ae 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[18ab 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[18b1 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18b2 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[18b3 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18b4 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18b0 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18b5 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18b6 11-19 05:22:15.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18b7 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18b8 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18b9 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18ba 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18bb 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18bd 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18bc 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18be 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18bf 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[18c0 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[18c1 11-19 05:22:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18c2 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[18c3 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[18c4 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[18c5 11-19 05:22:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18c6 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[18c7 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[18c8 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18c9 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[18ca 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[18cb 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18cc 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[18cd 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[18ce 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[18cf 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[18d0 11-19 05:22:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[18d1 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[18d2 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 gate 1574140935430232300 evaluation starts +[18d3 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 signed by 0 principal evaluation starts (used [false]) +[18d4 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 processing identity 0 with bytes of 1151ae0 +[18d5 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 principal matched by identity 0 +[18d6 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +[18d7 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +00000040 29 8b ad a5 19 09 |).....| +[18d8 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 principal evaluation succeeds for identity 0 +[18d9 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba5c0 gate 1574140935430232300 evaluation succeeds +[18da 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[18db 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[18dc 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[18dd 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[18de 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18df 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[18e0 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[18e1 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[18e2 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[18e3 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18e4 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18e5 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18e6 11-19 05:22:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[18e7 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18e8 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18e9 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18ea 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[18eb 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\363J\301\324\366\306P\2501\323\241\036\353(,\235\002 \027n\275U\212\373\232\346\000Ky\226@Hq\233\355w\271\000\342\032\225\030\233\340\360\350\364G\026C" > alive: alive: +[18ec 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[18ed 11-19 05:22:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ee 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[18ef 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[18f0 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18f1 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18f2 11-19 05:22:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18f3 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[18f4 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[18f5 11-19 05:22:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[18f6 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[18f7 11-19 05:22:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18f8 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18f9 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18fa 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18fb 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18fc 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18fd 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18fe 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[18ff 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1901 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1900 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1902 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 bc da 02 d2 92 5c c2 d8 0e 4e 85 00 4b c3 9a |......\...N..K..| +00000010 b5 31 27 89 fe 62 b5 de 15 e4 69 07 7b 81 42 d7 |.1'..b....i.{.B.| +[1903 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 73 33 59 a4 bd a2 78 2a df 54 |0E.!..s3Y...x*.T| +00000010 00 d3 7b 4e 19 43 e2 57 7e df 8f 28 a6 6e da 03 |..{N.C.W~..(.n..| +00000020 32 a9 cf ce a8 02 20 55 a7 9f 8e 13 5b 30 b7 91 |2..... U....[0..| +00000030 96 cd d7 e2 85 79 b2 01 c9 35 c2 f1 a9 38 c5 40 |.....y...5...8.@| +00000040 71 b7 09 f3 b1 7c 44 |q....|D| +[1904 11-19 05:22:15.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1905 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1906 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1907 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1908 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[1909 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190a 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190b 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190c 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[190d 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[190e 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[190f 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1910 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1911 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1912 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1913 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1914 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1915 11-19 05:22:15.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1916 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1917 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1918 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1919 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[191a 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[191b 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[191c 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[191d 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[191e 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[191f 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1920 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[1921 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1922 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1923 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1924 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1925 11-19 05:22:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1926 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1927 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1928 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1929 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[192a 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[192b 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[192c 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[192d 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[192e 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[192f 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1930 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1931 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1932 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1933 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1934 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1935 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1936 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1937 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 gate 1574140935816088900 evaluation starts +[1938 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 signed by 0 principal evaluation starts (used [false]) +[1939 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 processing identity 0 with bytes of 1151ae0 +[193a 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 principal matched by identity 0 +[193b 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b b1 8f 0a 39 ad 76 56 b8 3f 78 c4 d4 5b 44 c9 |....9.vV.?x..[D.| +00000010 46 ad f7 77 3f 31 fc 9d c8 05 73 5d 2f cf 75 0b |F..w?1....s]/.u.| +[193c 11-19 05:22:15.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 ee 7e 54 58 69 da e3 f1 09 7d |0E.!...~TXi....}| +00000010 d0 c6 cf f1 8c 3a 3e 09 72 51 49 bf f1 42 fe 50 |.....:>.rQI..B.P| +00000020 43 41 c4 13 f8 02 20 33 50 8a 7f 1b 73 db 30 6d |CA.... 3P...s.0m| +00000030 9b 66 64 db 65 ab 6b c9 3f 50 bb f9 75 34 4d b8 |.fd.e.k.?P..u4M.| +00000040 4f 6b fb 3a 94 9b d6 |Ok.:...| +[193d 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 principal evaluation succeeds for identity 0 +[193e 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff7ca0 gate 1574140935816088900 evaluation succeeds +[193f 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1940 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1941 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1942 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1943 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1944 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1945 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1946 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1947 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1948 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1949 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[194a 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[194b 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +[194c 11-19 05:22:15.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +[194d 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[194e 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > > , Envelope: 165 bytes, Signature: 0 bytes +[194f 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1950 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1951 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1952 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1953 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1954 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1955 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1956 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1957 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 gate 1574140935835973600 evaluation starts +[1958 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 signed by 0 principal evaluation starts (used [false]) +[1959 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 processing identity 0 with bytes of 1151ae0 +[195a 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 principal matched by identity 0 +[195b 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +[195c 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +00000040 03 19 f7 9c b7 51 |.....Q| +[195d 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 principal evaluation succeeds for identity 0 +[195e 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004095630 gate 1574140935835973600 evaluation succeeds +[195f 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1960 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1961 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1962 11-19 05:22:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1963 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1964 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1965 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1966 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1967 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1968 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1969 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[196a 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[196b 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[196c 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196d 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196e 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196f 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1970 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1971 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1972 11-19 05:22:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > alive: alive: alive: +[1973 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1974 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1975 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1976 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1977 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1978 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1979 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[197a 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[197b 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[197c 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[197d 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[197f 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[197e 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1980 11-19 05:22:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1981 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1982 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1983 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1984 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1985 11-19 05:22:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1986 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1987 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1988 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1989 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[198a 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[198b 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[198c 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[198d 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[198e 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[198f 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1990 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +[1991 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +00000040 97 98 2a f0 ef af ab |..*....| +[1992 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1993 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 b1 2b 82 fa a6 96 ac 93 97 20 bb |0D. B.+....... .| +00000010 22 40 ee 8a dc 91 9d 13 83 6b 5e 10 0a 38 41 c4 |"@.......k^..8A.| +00000020 9a 1f 36 a2 02 20 0c bf a6 eb 88 70 37 e6 72 fa |..6.. .....p7.r.| +00000030 07 51 4b b2 f1 06 5f 16 ac 3b 21 b6 2e 7d 8a 8a |.QK..._..;!..}..| +00000040 a9 e6 d5 f1 a0 31 |.....1| +[1994 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1995 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1996 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1997 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1998 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1999 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[199a 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[199b 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[199c 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[199d 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[199e 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[199f 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[19a0 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[19a1 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[19a2 11-19 05:22:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a3 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19a4 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19a5 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a6 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a7 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a8 11-19 05:22:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a9 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19aa 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19ab 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ac 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ad 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ae 11-19 05:22:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19af 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[19b0 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[19b1 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[19b2 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[19b3 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[19b4 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[19b5 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b6 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[19b7 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[19b8 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[19ba 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b9 11-19 05:22:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19bb 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[19bc 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[19bd 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[19be 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[19bf 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[19c0 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c1 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[19c2 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[19c3 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c4 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[19c5 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[19c6 11-19 05:22:18.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c7 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[19c8 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101C +[19c9 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3362263D579EAF29474F55E87B9462511C07F3F664956E4ED9C059ACE5CAA3D9 +[19ca 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[19cb 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[19cc 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[19cd 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ce 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[19cf 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\210p" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[19d0 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes +[19d1 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d2 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19d4 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[19d3 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\210p" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[19d5 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d6 11-19 05:22:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:1\210p" > > , Envelope: 165 bytes, Signature: 0 bytes +[19d7 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d8 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[19d9 11-19 05:22:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[19da 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19db 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[19dc 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[19dd 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +[19de 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +00000040 cf c7 3e 31 88 70 |..>1.p| +[19df 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19e0 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19e1 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19e2 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[19e3 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19e4 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[19e5 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[19e6 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[19e7 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[19e8 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[19e9 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[19ea 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 gate 1574140938841579200 evaluation starts +[19eb 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 signed by 0 principal evaluation starts (used [false]) +[19ec 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 processing identity 0 with bytes of 1151ae0 +[19ed 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 principal matched by identity 0 +[19ee 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 2f 2e 1e 98 f5 51 36 18 d8 42 c4 a5 ee 20 a5 |K/....Q6..B... .| +00000010 8b 4e a7 9d cb 18 aa 02 61 df 21 1c aa 62 67 d9 |.N......a.!..bg.| +[19ef 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e8 6e da 8b 8c ea 85 13 d6 bb d2 |0D. v.n.........| +00000010 32 36 26 df ac 05 c9 c6 ed ef 78 da be 24 bb 08 |26&.......x..$..| +00000020 a3 17 2e d6 02 20 03 c1 d8 d1 35 f1 bc 5a 18 3e |..... ....5..Z.>| +00000030 38 5f 04 0f e0 a2 ed 96 cc d5 30 03 78 c3 09 f6 |8_........0.x...| +00000040 03 19 f7 9c b7 51 |.....Q| +[19f0 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 principal evaluation succeeds for identity 0 +[19f1 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d150 gate 1574140938841579200 evaluation succeeds +[19f2 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[19f3 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[19f4 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[19f5 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[19f6 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19f7 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19f8 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[19f9 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +[19fa 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +00000040 97 98 2a f0 ef af ab |..*....| +[19fb 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[19fc 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19fd 11-19 05:22:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19ff 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1a00 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1a01 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a02 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[19fe 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a03 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a04 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1a05 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +[1a06 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +00000040 cf c7 3e 31 88 70 |..>1.p| +[1a07 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1a08 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 7d 35 b2 20 5a 67 0d 9c ea ef |0E.!..}5. Zg....| +00000010 3a 08 c2 99 13 03 81 35 62 82 4d 67 03 e4 a8 4b |:......5b.Mg...K| +00000020 a6 2e 37 65 bf 02 20 7d c7 b2 27 df b6 59 82 d2 |..7e.. }..'..Y..| +00000030 bb e4 82 79 17 a9 cb 02 38 59 41 65 2f c1 e4 9a |...y....8YAe/...| +00000040 d3 1b 70 24 38 cd 9f |..p$8..| +[1a09 11-19 05:22:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1a0a 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1a0b 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a0c 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a0d 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a0e 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a0f 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1a10 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 62 26 3d 57 9e af 29 47 4f 55 e8 7b 94 62 51 |3b&=W..)GOU.{.bQ| +00000010 1c 07 f3 f6 64 95 6e 4e d9 c0 59 ac e5 ca a3 d9 |....d.nN..Y.....| +[1a11 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 60 0d 01 53 b8 44 0b 54 7d 7c 3d |0D. =`..S.D.T}|=| +00000010 5f 0f 9f b8 5c 63 8a ab d7 91 63 f7 d6 bd d2 7f |_...\c....c.....| +00000020 9f c8 7b 49 02 20 07 a4 9c 23 26 6e 2a e5 50 66 |..{I. ...#&n*.Pf| +00000030 b2 f9 64 91 53 4a 16 45 57 7b 9a 67 31 ea c3 0b |..d.SJ.EW{.g1...| +00000040 cf c7 3e 31 88 70 |..>1.p| +[1a12 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1a13 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1a14 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a15 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1a16 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a17 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a18 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a19 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a1a 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a1b 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a1c 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a1d 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 gate 1574140938867201900 evaluation starts +[1a1e 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 signed by 0 principal evaluation starts (used [false]) +[1a1f 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 processing identity 0 with bytes of 1151ae0 +[1a20 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 principal matched by identity 0 +[1a21 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 10 18 36 36 04 33 fa 46 75 18 fc ab 42 96 bb |...66.3.Fu...B..| +00000010 2b 21 fc 28 c5 0d 32 8e 5e 83 4b 18 d1 11 ef 6f |+!.(..2.^.K....o| +[1a22 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 a8 01 1d ea dc e5 f5 11 3d 17 d3 |0D. F........=..| +00000010 d0 9a 1f 00 b2 03 ca 87 e3 03 e0 73 fe 85 a5 2c |...........s...,| +00000020 8c 61 d7 6b 02 20 68 df bf 58 e9 95 7d 00 70 d9 |.a.k. h..X..}.p.| +00000030 1f 36 6e 04 7c b5 20 4d 7c be 04 f9 c9 24 7c fc |.6n.|. M|....$|.| +00000040 29 8b ad a5 19 09 |).....| +[1a23 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 principal evaluation succeeds for identity 0 +[1a24 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ff760 gate 1574140938867201900 evaluation succeeds +[1a25 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a26 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a27 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a28 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a29 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1a2a 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a2b 11-19 05:22:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1a2c 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 3e d6 db 05 b9 db 18 a0 d8 1c 5e 87 c4 06 98 |.>.........^....| +00000010 26 d7 35 02 27 8f 9a 58 81 76 29 ff c3 56 79 e6 |&.5.'..X.v)..Vy.| +[1a2d 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 99 8b bf 73 40 ca f6 86 c4 |0E.!......s@....| +00000010 00 f6 83 1a f4 90 48 ee 38 99 13 88 fb d6 94 b7 |......H.8.......| +00000020 be 67 4b 69 4b 02 20 00 d2 67 37 0b ec ac 86 94 |.gKiK. ..g7.....| +00000030 2f 03 48 c9 8a 46 54 a1 d0 86 ae 57 dd f8 24 c4 |/.H..FT....W..$.| +00000040 97 98 2a f0 ef af ab |..*....| +[1a2e 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1a2f 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a30 11-19 05:22:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a31 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a32 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a33 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1a34 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a35 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a36 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a38 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a37 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a39 11-19 05:22:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a3a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1a3c 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1a3b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1a3d 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a3e 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a3f 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a40 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1a41 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a42 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a43 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a44 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a45 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a46 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a47 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 gate 1574140939312523800 evaluation starts +[1a48 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 signed by 0 principal evaluation starts (used [false]) +[1a49 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 processing identity 0 with bytes of 1151ae0 +[1a4a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 principal matched by identity 0 +[1a4b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1a4c 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1a4d 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 principal evaluation succeeds for identity 0 +[1a4e 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f4f0 gate 1574140939312523800 evaluation succeeds +[1a4f 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a50 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a51 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a52 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a53 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1a54 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1a55 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1a56 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1a57 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a58 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a59 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a5a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a5b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a5c 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a5d 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a5e 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a5f 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 gate 1574140939316267300 evaluation starts +[1a60 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 signed by 0 principal evaluation starts (used [false]) +[1a61 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 processing identity 0 with bytes of 1151ae0 +[1a62 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 principal matched by identity 0 +[1a63 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1a64 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1a65 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 principal evaluation succeeds for identity 0 +[1a66 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bb380 gate 1574140939316267300 evaluation succeeds +[1a67 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a68 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a69 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a6a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a6b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a6c 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1a6d 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a6e 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a6f 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a70 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a71 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a72 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a73 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a74 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a75 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a76 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 gate 1574140939319121200 evaluation starts +[1a77 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 signed by 0 principal evaluation starts (used [false]) +[1a78 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 processing identity 0 with bytes of 1151ae0 +[1a79 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 principal matched by identity 0 +[1a7a 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1a7b 11-19 05:22:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1a7c 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 principal evaluation succeeds for identity 0 +[1a7d 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e2760 gate 1574140939319121200 evaluation succeeds +[1a7e 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a7f 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a80 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a81 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a82 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1a83 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1a84 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a85 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a86 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a87 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a88 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a89 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a8a 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a8b 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a8c 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 gate 1574140939327322200 evaluation starts +[1a8d 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 signed by 0 principal evaluation starts (used [false]) +[1a8e 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 processing identity 0 with bytes of 1151ae0 +[1a8f 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 principal matched by identity 0 +[1a90 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1a91 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1a92 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 principal evaluation succeeds for identity 0 +[1a93 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e3f70 gate 1574140939327322200 evaluation succeeds +[1a94 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a95 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a96 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a97 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a98 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1a99 11-19 05:22:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1a9a 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a9b 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1a9c 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1a9d 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1a9e 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1a9f 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1aa0 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aa1 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aa2 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1aa3 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1aa4 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1aa5 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1aa6 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1aa7 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1aa8 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 gate 1574140939333651700 evaluation starts +[1aa9 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 signed by 0 principal evaluation starts (used [false]) +[1aaa 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 processing identity 0 with bytes of 1151ae0 +[1aab 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 principal matched by identity 0 +[1aac 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1aad 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1aae 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 principal evaluation succeeds for identity 0 +[1aaf 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266620 gate 1574140939333651700 evaluation succeeds +[1ab0 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ab1 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ab2 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ab3 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ab4 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ab5 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ab6 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ab7 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ab8 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ab9 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1aba 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1abb 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1abc 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 gate 1574140939338261600 evaluation starts +[1abd 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 signed by 0 principal evaluation starts (used [false]) +[1abe 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 processing identity 0 with bytes of 1151ae0 +[1abf 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 principal matched by identity 0 +[1ac0 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1ac1 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1ac2 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 principal evaluation succeeds for identity 0 +[1ac3 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032677b0 gate 1574140939338261600 evaluation succeeds +[1ac4 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ac5 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ac6 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ac7 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ac8 11-19 05:22:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ac9 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[1aca 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[1acb 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1acc 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510081801 +[1acd 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9F57D1024DB60A9FA6A848BC0A5839990C7F194D4F33226901DDC2541E6DD0F9 +[1ace 11-19 05:22:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[1acf 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ad0 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ad1 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ad2 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad3 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad4 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad5 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad6 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad7 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad8 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ada 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad9 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1adb 11-19 05:22:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1adc 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[1add 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[1ade 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1adf 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae1 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae0 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[1ae2 11-19 05:22:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ae3 11-19 05:22:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae4 11-19 05:22:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae5 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1ae6 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae7 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae8 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1ae9 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1aea 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1aeb 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1aec 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1aed 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1aee 11-19 05:22:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1aef 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1af0 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1af1 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1af2 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1af3 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1af4 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af5 11-19 05:22:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1af6 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1af7 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1af8 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1af9 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1afa 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1afb 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 gate 1574140939438122400 evaluation starts +[1afc 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 signed by 0 principal evaluation starts (used [false]) +[1afd 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 processing identity 0 with bytes of 1151ae0 +[1afe 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 principal matched by identity 0 +[1aff 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 d3 02 9e 3d 13 ec 1a 63 e6 ec 06 e3 c3 10 9a |....=...c.......| +00000010 6c 56 9b 55 d2 39 46 e4 fe 1f 89 0d af c7 81 a8 |lV.U.9F.........| +[1b00 11-19 05:22:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 93 df 8e 1f c6 96 e8 6e 60 88 |0E.!.........n`.| +00000010 3a 5d 5c 47 c4 21 9e 0a ae 98 89 57 5d 15 1b 81 |:]\G.!.....W]...| +00000020 2b 0c 82 39 d8 02 20 4c 17 f1 0d 94 ce 98 05 95 |+..9.. L........| +00000030 93 d7 ac 93 63 f8 49 47 66 ef e5 53 15 01 1c cd |....c.IGf..S....| +00000040 ec e9 4a 45 40 28 5a |..JE@(Z| +[1b01 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 principal evaluation succeeds for identity 0 +[1b02 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a80670 gate 1574140939438122400 evaluation succeeds +[1b03 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b04 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b05 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b06 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b07 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b08 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1b09 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1b0a 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1b0b 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1b0c 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b0d 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b0e 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b0f 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[1b10 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b11 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b12 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b13 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1b14 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1b15 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b16 11-19 05:22:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:8_\004\017\340\242\355\226\314\3250\003x\303\t\366\003\031\367\234\267Q" > alive: alive: +[1b17 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes +[1b18 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes +[1b19 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:551137968960121392 tag:EMPTY mem_req:@Qk\335\020q\266\025\340Z\264\013\252\217\255wC\361a?\214\"" > > > , Envelope: 280 bytes, Signature: 0 bytes +[1b1a 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1b1b 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 20 ff d9 79 4a b8 0a ce d3 a0 c3 89 e5 cd 03 |. ..yJ..........| +00000010 a6 f7 aa fb 18 50 0c 68 a4 29 63 4b 46 63 5c 3d |.....P.h.)cKFc\=| +[1b1c 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 6f 92 65 34 4b f4 db 03 33 31 9e |0D. .o.e4K...31.| +00000010 3d f1 08 a3 73 b8 96 70 10 b5 8d 76 f4 93 ac eb |=...s..p...v....| +00000020 cd 6e 3b 4a 02 20 5b 2a a4 87 2f 74 37 d0 ea 82 |.n;J. [*../t7...| +00000030 79 ad 3b df f3 63 8a 32 ba 53 55 73 dd b2 a6 be |y.;..c.2.SUs....| +00000040 30 83 28 b6 a5 b4 |0.(...| +[1b1d 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1b1e 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 17 76 fe 9c d5 86 fe b4 41 70 32 |0D. \.v......Ap2| +00000010 c9 34 11 7a 4a 1f b5 bb 80 e2 a6 37 e2 54 dd d8 |.4.zJ......7.T..| +00000020 e2 9f d5 b1 02 20 0c d8 a9 29 02 fa b0 5c 24 3e |..... ...)...\$>| +00000030 40 51 6b dd 10 71 b6 15 e0 5a b4 0b aa 8f ad 77 |@Qk..q...Z.....w| +00000040 43 f1 61 3f 8c 22 |C.a?."| +[1b1f 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b20 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[1b21 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b22 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b23 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 551137968960121392, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes to 1 peers +[1b24 11-19 05:22:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1b25 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 551137968960121392, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +[1b26 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b27 11-19 05:22:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b28 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b29 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b2a 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b2b 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b2c 11-19 05:22:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b2d 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b2e 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b2f 11-19 05:22:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b30 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1297292706604458090 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b31 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1b32 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c bc b3 61 f5 ed 65 48 3a 12 5b dd 40 40 28 11 |...a..eH:.[.@@(.| +00000010 a9 be 9a 04 f4 dd 36 f5 e2 b5 da 36 e8 53 73 bb |......6....6.Ss.| +[1b33 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 20 e1 d8 5e 7c 53 e6 3c 55 8a |0E.!.. ..^|S. DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1b35 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 70 82 a3 9b e5 ae 7c aa 5d c8 |0E.!..p.....|.].| +00000010 8e 3a c0 ff 42 5a 8f 80 e1 f8 d6 34 a0 52 d4 23 |.:..BZ.....4.R.#| +00000020 1e f9 a9 7c f3 02 20 5c 0f 18 f4 2e 45 60 dd dd |...|.. \....E`..| +00000030 81 fa a5 f1 a7 32 c0 ed ee 57 89 fe 79 1f 71 42 |.....2...W..y.qB| +00000040 b3 07 39 b3 0e cd c8 |..9....| +[1b36 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b37 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[1b38 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b39 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b3a 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1297292706604458090, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes to 1 peers +[1b3b 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1b3c 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1297292706604458090, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +[1b3d 11-19 05:22:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b3e 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1b3f 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1b40 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1b41 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[1b42 11-19 05:22:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b43 11-19 05:22:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1b44 11-19 05:22:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101D +[1b45 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 42161C592D2AC6FD60D771782F73A7A01D72DD1BD40F9D420C8ACC283A3EE490 +[1b46 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1b47 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1b48 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1b49 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1b4a 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b4b 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b4c 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[1b4d 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b4e 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1b4f 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b50 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b52 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1b53 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b54 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b55 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b51 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b56 11-19 05:22:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b57 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b58 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b59 11-19 05:22:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b5a 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[1b5b 11-19 05:22:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b5c 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b5d 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b5e 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b5f 11-19 05:22:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b60 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b61 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b62 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b63 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b64 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b65 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[1b66 11-19 05:22:19.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b67 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1b68 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1b69 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1b6a 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1b6b 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b6c 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1b6d 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1b6e 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1b6f 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1b70 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1b71 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1b72 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 gate 1574140939836631100 evaluation starts +[1b73 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 signed by 0 principal evaluation starts (used [false]) +[1b74 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 processing identity 0 with bytes of 1151ae0 +[1b75 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 principal matched by identity 0 +[1b76 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 d1 fe 6a a7 49 f3 07 8d 3f 73 53 8c 90 87 fb |s..j.I...?sS....| +00000010 8e 00 d1 b1 1f 4c 91 d5 cb 23 37 62 d3 38 68 5c |.....L...#7b.8h\| +[1b77 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 c4 fc cc 62 d1 5a fb e4 a7 05 |0E.!.....b.Z....| +00000010 d1 c9 64 94 38 e6 d5 91 26 83 80 85 58 9a 80 80 |..d.8...&...X...| +00000020 13 9d 72 49 9c 02 20 15 ca 22 4f 9c 81 d7 96 6d |..rI.. .."O....m| +00000030 62 0c 16 c1 4e 6d 6e 9c d1 e2 48 81 f0 5d 96 78 |b...Nmn...H..].x| +00000040 cd f9 67 25 28 fc 53 |..g%(.S| +[1b78 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 principal evaluation succeeds for identity 0 +[1b79 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071f40 gate 1574140939836631100 evaluation succeeds +[1b7a 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b7b 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b7c 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b7d 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b7e 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b7f 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1b80 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1b81 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1b82 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1b83 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b84 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b85 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b86 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[1b87 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b88 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b89 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b8a 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[1b8b 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1b8c 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1b8d 11-19 05:22:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b8e 11-19 05:22:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b8f 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1b90 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1b91 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b92 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1b93 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1b94 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 e1 a5 84 b8 e7 7c b7 b1 eb 3a fb cd f1 34 59 |......|...:...4Y| +00000010 23 4a 03 ab 14 d6 75 22 99 07 2f 04 cb ac 2b fb |#J....u"../...+.| +[1b95 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 90 f9 8e f6 d6 c2 69 17 9c 02 03 |0D. U......i....| +00000010 aa 5b cc bf 7f 28 59 33 01 e4 54 0a c7 23 5e 97 |.[...(Y3..T..#^.| +00000020 4a 04 c8 03 02 20 55 84 0f 30 af 13 80 2e 14 ba |J.... U..0......| +00000030 14 2a 06 0b 07 2c b4 fd 1b 5f 00 39 09 26 34 d9 |.*...,..._.9.&4.| +00000040 65 fb 17 39 76 b8 |e..9v.| +[1b96 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1b97 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 02 05 75 ae 8b 41 5f d6 9a a4 |0E.!....u..A_...| +00000010 c1 3d 6b a2 b3 16 d7 49 07 c9 06 b9 d3 5d d7 61 |.=k....I.....].a| +00000020 ac c1 b1 57 ed 02 20 64 73 6b f5 6b a6 14 25 21 |...W.. dsk.k..%!| +00000030 9f ff c0 8d c8 0a ea cc 44 e5 17 83 a5 09 2c 68 |........D.....,h| +00000040 55 b9 5c 0f 92 04 30 |U.\...0| +[1b98 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1b99 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1b9a 11-19 05:22:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1b9b 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1b9c 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[1b9d 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b9e 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b9f 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ba0 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[1ba1 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ba2 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ba3 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[1ba4 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1ba5 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1ba6 11-19 05:22:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ba7 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1ba8 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1ba9 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1baa 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bab 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bac 11-19 05:22:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bad 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1bae 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1baf 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bb0 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bb1 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bb2 11-19 05:22:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bb3 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bb4 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bb5 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bb6 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bb7 11-19 05:22:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1bb8 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bb9 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1bba 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1bbb 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1bbc 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1bbd 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1bbe 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1bbf 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 gate 1574140940382450200 evaluation starts +[1bc0 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 signed by 0 principal evaluation starts (used [false]) +[1bc1 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 processing identity 0 with bytes of 1151ae0 +[1bc2 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 principal matched by identity 0 +[1bc3 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 05 53 1b 4a 7c d7 b7 da 6b a0 89 cf 28 8b 66 | .S.J|...k...(.f| +00000010 1c 82 13 57 2b 06 e3 ab a3 ad a7 d2 b8 b4 cc e1 |...W+...........| +[1bc4 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 64 41 c8 3a 6d f5 c3 f7 b0 44 0f |0D. udA.:m....D.| +00000010 21 d7 fd fe ab 97 aa 2f 3d 87 67 05 6a 5f 89 fb |!....../=.g.j_..| +00000020 18 8c 13 82 02 20 32 03 24 3f fc 94 4b c9 a5 74 |..... 2.$?..K..t| +00000030 d3 48 06 c0 66 f0 05 8e 5a ed 36 9c f7 4f 05 2c |.H..f...Z.6..O.,| +00000040 5d 6a 1c 82 5c 1a |]j..\.| +[1bc5 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 principal evaluation succeeds for identity 0 +[1bc6 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0240 gate 1574140940382450200 evaluation succeeds +[1bc7 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1bc8 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1bc9 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1bca 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1bcb 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bcc 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1bcd 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1bce 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1bcf 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1bd0 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd1 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd2 11-19 05:22:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd3 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd4 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd5 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd6 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd7 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd8 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd9 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1bda 11-19 05:22:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bdb 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bdc 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1bdd 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bde 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bdf 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1be0 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be1 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1be2 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1be3 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be4 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1be5 11-19 05:22:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be6 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1be7 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1be8 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be9 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bea 11-19 05:22:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1beb 11-19 05:22:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1bec 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1bed 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bee 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:222188947551341445 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1bef 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1bf0 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bf1 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1bf2 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1bf3 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1bf4 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1bf5 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1bf6 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1bf7 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 gate 1574140940542530800 evaluation starts +[1bf8 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 signed by 0 principal evaluation starts (used [false]) +[1bf9 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 processing identity 0 with bytes of 1151ae0 +[1bfa 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 principal matched by identity 0 +[1bfb 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 39 ca 75 7f 5a f0 f2 73 50 50 34 ab da b7 40 |!9.u.Z..sPP4...@| +00000010 87 2d 4c 96 82 06 22 11 40 9f 7d 59 55 7a 67 ae |.-L...".@.}YUzg.| +[1bfc 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e e1 dc 67 a7 d6 6a 92 47 46 a4 a0 |0D. ...g..j.GF..| +00000010 1f 01 7e f7 52 dd 30 c1 14 4c 17 11 dc dc b8 03 |..~.R.0..L......| +00000020 2e 54 5b a5 02 20 34 95 f8 10 2c 50 85 41 5a af |.T[.. 4...,P.AZ.| +00000030 27 d4 97 0f 2f 65 9f bb 35 b9 a9 74 18 3a 1a c8 |'.../e..5..t.:..| +00000040 b5 99 5d 21 53 0a |..]!S.| +[1bfd 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 principal evaluation succeeds for identity 0 +[1bfe 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4570 gate 1574140940542530800 evaluation succeeds +[1bff 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c00 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c01 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c02 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1c03 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c04 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[1c05 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c06 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c07 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c08 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 222188947551341445, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +[1c09 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 222188947551341445, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[1c0a 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c0b 11-19 05:22:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1c0c 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c0d 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c0e 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c0f 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c10 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1c11 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 9f c8 8d c8 6e 76 f4 d7 7e 4e 83 3d 20 d0 d0 |.....nv..~N.= ..| +00000010 4c ba 7f 10 17 d6 88 fb 00 e3 4c b9 37 bc 6d 2f |L.........L.7.m/| +[1c12 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 8c 2a 05 1c a7 3b 35 02 98 ee c0 |0D. ..*...;5....| +00000010 9c 13 d3 ea 8c da be 2b b7 7c 97 c2 98 be a3 68 |.......+.|.....h| +00000020 de 29 38 c0 02 20 1d 22 46 25 fb e1 40 7d 4e c2 |.)8.. ."F%..@}N.| +00000030 71 b3 c1 9c 5e 69 2c 94 c5 2b 39 00 e3 59 31 d5 |q...^i,..+9..Y1.| +00000040 51 09 98 7a 2d f2 |Q..z-.| +[1c13 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c14 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1c15 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c16 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c17 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1c18 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c19 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c1a 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c1b 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c1c 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c1d 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c1e 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c1f 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c20 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c21 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c22 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c23 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c24 11-19 05:22:20.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c25 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c26 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c27 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c28 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c29 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1c2a 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c2b 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1c2c 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1c2d 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1c2e 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1c2f 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1c30 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1c31 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 gate 1574140940817469300 evaluation starts +[1c32 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 signed by 0 principal evaluation starts (used [false]) +[1c33 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 processing identity 0 with bytes of 1151ae0 +[1c34 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 principal matched by identity 0 +[1c35 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 cc 25 aa 71 10 1a d1 25 a7 62 88 c2 1c b8 51 |..%.q...%.b....Q| +00000010 c4 0f 4f 3d 2f 1d c1 a5 c7 59 b8 6f 92 c8 94 6e |..O=/....Y.o...n| +[1c36 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 57 25 7a 99 a9 4c 02 03 ba e1 3a |0D. .W%z..L....:| +00000010 33 26 cf 22 76 8d e6 01 86 e5 ca 38 39 3e db 84 |3&."v......89>..| +00000020 e9 f5 46 1c 02 20 61 4f ff 44 ec 0d 44 a2 0e db |..F.. aO.D..D...| +00000030 db f8 98 7b 7b d1 48 6e a8 02 04 aa fd a3 c4 86 |...{{.Hn........| +00000040 b1 8a 25 86 2b ef |..%.+.| +[1c37 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 principal evaluation succeeds for identity 0 +[1c38 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5bf0 gate 1574140940817469300 evaluation succeeds +[1c39 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c3a 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c3b 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c3c 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1c3d 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c3e 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1c3f 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c40 11-19 05:22:20.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c41 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c43 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c44 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c42 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1c45 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c46 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c47 11-19 05:22:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c48 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c49 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c4a 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c4b 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c4c 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c4d 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c4e 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c4f 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c50 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c51 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c52 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c53 11-19 05:22:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c54 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c55 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c56 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c57 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c58 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c59 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5a 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5b 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c5c 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5e 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c5d 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c5f 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c60 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c61 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c62 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c63 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c64 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c65 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c66 11-19 05:22:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c67 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1c68 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1c69 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1c6a 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1c6b 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1c6c 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1c6d 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1c6e 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c6f 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1c70 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c71 11-19 05:22:22.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1c72 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c73 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1c74 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1c75 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1c76 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c77 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1c78 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1c79 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1c7a 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c7b 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1c7c 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1c7d 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1c7e 11-19 05:22:22.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c7f 11-19 05:22:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1c80 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101E +[1c81 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 257ABBBDD507E271EA07C28A1C76CCDD64C310FE62ECA69CF8C6132AB57DA7DB +[1c82 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1c83 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1c84 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1c85 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1c86 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c88 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1c89 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c8b 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1c87 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1c8a 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1c8c 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c8d 11-19 05:22:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c8e 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1c91 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c8f 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1c92 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1c93 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1c90 11-19 05:22:22.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1c94 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c96 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1c95 11-19 05:22:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1c97 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1c98 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +[1c99 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +[1c9a 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c9b 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c9c 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c9d 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c9e 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1c9f 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ca0 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1ca1 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1ca2 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +[1ca3 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +[1ca4 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ca5 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ca6 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ca7 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ca8 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1ca9 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1caa 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1cab 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 7a bb bd d5 07 e2 71 ea 07 c2 8a 1c 76 cc dd |%z.....q.....v..| +00000010 64 c3 10 fe 62 ec a6 9c f8 c6 13 2a b5 7d a7 db |d...b......*.}..| +[1cac 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 6c 80 ac fa 30 1c 61 60 da 97 |0E.!..l...0.a`..| +00000010 88 f4 5d 30 7c ec f2 c9 4a 64 11 83 4e e0 69 19 |..]0|...Jd..N.i.| +00000020 e4 c0 7d 1b 64 02 20 50 0c df be 5a ba 90 76 b5 |..}.d. P...Z..v.| +00000030 2f 11 cc 70 3a 69 f9 54 85 fb 73 54 57 d4 91 0e |/..p:i.T..sTW...| +00000040 ba 54 29 c8 f4 a7 67 |.T)...g| +[1cad 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1cae 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 75 45 d8 99 09 11 04 4f 78 b0 |0E.!..uE.....Ox.| +00000010 65 dd 19 21 aa 77 4c 4b c0 d0 57 c9 71 70 dd 2b |e..!.wLK..W.qp.+| +00000020 b4 ec 76 f5 45 02 20 73 cc fd 98 44 ba b9 26 54 |..v.E. s...D..&T| +00000030 17 43 40 a7 2b 4b 3a 59 4c ac c2 ef 6b 60 9a 69 |.C@.+K:YL...k`.i| +00000040 ef 5c 01 52 3d db 57 |.\.R=.W| +[1caf 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1cb0 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1cb1 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cb2 11-19 05:22:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cb3 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cb4 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cb5 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1cb6 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1cb7 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cb8 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1cb9 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cba 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1cbb 11-19 05:22:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cbc 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1cbd 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1cbe 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cbf 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cc0 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cc1 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1cc2 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cc3 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cc4 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cc5 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cc6 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cc7 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 gate 1574140943316690400 evaluation starts +[1cc8 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 signed by 0 principal evaluation starts (used [false]) +[1cc9 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 processing identity 0 with bytes of 1151ae0 +[1cca 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 principal matched by identity 0 +[1ccb 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1ccc 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1ccd 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 principal evaluation succeeds for identity 0 +[1cce 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742370 gate 1574140943316690400 evaluation succeeds +[1ccf 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1cd0 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1cd1 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cd2 11-19 05:22:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1cd5 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1cd6 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1cd7 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cd3 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1cd4 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1cd8 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cd9 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1cda 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cdb 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cdc 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cdd 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cde 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cdf 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 gate 1574140943324429800 evaluation starts +[1ce0 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 signed by 0 principal evaluation starts (used [false]) +[1ce1 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 processing identity 0 with bytes of 1151ae0 +[1ce2 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 principal matched by identity 0 +[1ce3 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1ce4 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1ce5 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 principal evaluation succeeds for identity 0 +[1ce6 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003743ba0 gate 1574140943324429800 evaluation succeeds +[1ce7 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ce8 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ce9 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cea 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ceb 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1cec 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1ced 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cee 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1cef 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cf0 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cf1 11-19 05:22:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cf2 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1cf3 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cf4 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cf5 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cf6 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cf7 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cf8 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 gate 1574140943332950700 evaluation starts +[1cf9 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 signed by 0 principal evaluation starts (used [false]) +[1cfa 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 processing identity 0 with bytes of 1151ae0 +[1cfb 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 principal matched by identity 0 +[1cfc 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1cfd 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1cfe 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 principal evaluation succeeds for identity 0 +[1cff 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071600 gate 1574140943332950700 evaluation succeeds +[1d00 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d01 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d02 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d03 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d04 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1d05 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1d06 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1d07 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1d08 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d09 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d0a 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d0b 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d0c 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d0d 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d0e 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d0f 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d10 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 gate 1574140943336078200 evaluation starts +[1d11 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 signed by 0 principal evaluation starts (used [false]) +[1d12 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 processing identity 0 with bytes of 1151ae0 +[1d13 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 principal matched by identity 0 +[1d14 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1d15 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1d16 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 principal evaluation succeeds for identity 0 +[1d17 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315b490 gate 1574140943336078200 evaluation succeeds +[1d18 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d19 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d1a 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d1b 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d1c 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d1d 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1d1e 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1d1f 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1d20 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1d21 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1d22 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d23 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d24 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d25 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d26 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d27 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d28 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d29 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d2a 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 gate 1574140943337339300 evaluation starts +[1d2b 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 signed by 0 principal evaluation starts (used [false]) +[1d2c 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 processing identity 0 with bytes of 1151ae0 +[1d2d 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 principal matched by identity 0 +[1d2e 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1d2f 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1d30 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 principal evaluation succeeds for identity 0 +[1d31 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d74c0 gate 1574140943337339300 evaluation succeeds +[1d32 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d33 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d34 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d35 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d36 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d37 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d38 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d39 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d3a 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d3b 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d3c 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d3d 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d3e 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 gate 1574140943338058200 evaluation starts +[1d3f 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 signed by 0 principal evaluation starts (used [false]) +[1d40 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 processing identity 0 with bytes of 1151ae0 +[1d41 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 principal matched by identity 0 +[1d42 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1d43 11-19 05:22:23.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1d44 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 principal evaluation succeeds for identity 0 +[1d45 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003758650 gate 1574140943338058200 evaluation succeeds +[1d46 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d47 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d48 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d49 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d4a 11-19 05:22:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d4b 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d4c 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d4d 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d4e 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d4f 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d50 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d51 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d52 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d53 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d54 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[1d55 11-19 05:22:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d56 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d57 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d58 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1d59 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d5a 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d5b 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[1d5c 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1d5d 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d5e 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1d5f 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1d60 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1d61 11-19 05:22:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d62 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1d63 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1d64 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d65 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1d66 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1d67 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d68 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d69 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d6a 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d6b 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d6c 11-19 05:22:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d6d 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d6e 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 gate 1574140943450160700 evaluation starts +[1d6f 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 signed by 0 principal evaluation starts (used [false]) +[1d70 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 processing identity 0 with bytes of 1151ae0 +[1d71 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 principal matched by identity 0 +[1d72 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 4a 69 8b 40 21 15 b5 db c1 42 70 6b 4d e3 22 |.Ji.@!....BpkM."| +00000010 53 68 56 81 28 54 ed ed 87 c2 48 dd d4 30 4e a8 |ShV.(T....H..0N.| +[1d73 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 24 90 ef 98 a5 6d 5b f7 09 0d f1 |0D. \$....m[....| +00000010 b1 6f 84 20 95 21 3c 3c a7 3a fb 14 8a ab 8d fc |.o. .!<<.:......| +00000020 2f ed b5 74 02 20 62 03 f2 d7 b3 a8 8a a6 e9 21 |/..t. b........!| +00000030 55 cf d3 11 c0 67 49 77 16 26 37 9e 08 11 fb a8 |U....gIw.&7.....| +00000040 d4 ee 0e e0 32 5d |....2]| +[1d74 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 principal evaluation succeeds for identity 0 +[1d75 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161c40 gate 1574140943450160700 evaluation succeeds +[1d76 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d77 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d78 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d79 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d7a 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1d7b 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1d7c 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1d7d 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1d7e 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1d7f 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d80 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d81 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d82 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[1d83 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d84 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d85 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d86 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1d87 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\333\204\351\365F\034\002 aO\377D\354\rD\242\016\333\333\370\230{{\321Hn\250\002\004\252\375\243\304\206\261\212%\206+\357" > alive: alive: +[1d88 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1d89 11-19 05:22:23.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d8a 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d8b 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d8c 11-19 05:22:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d8d 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d8e 11-19 05:22:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d8f 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1d90 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1d91 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1d92 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[1d93 11-19 05:22:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d94 11-19 05:22:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d95 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d96 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d97 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[1d98 11-19 05:22:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d99 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d9a 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d9b 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d9c 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d9d 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d9e 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d9f 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1da0 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1da1 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1da2 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[1da3 11-19 05:22:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1da4 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1da5 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1da6 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1da7 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1da8 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1da9 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1daa 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1dab 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1dac 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1dad 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1dae 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1daf 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1db0 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 gate 1574140943845809700 evaluation starts +[1db1 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 signed by 0 principal evaluation starts (used [false]) +[1db2 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 processing identity 0 with bytes of 1151ae0 +[1db3 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 principal matched by identity 0 +[1db4 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 56 09 a6 c3 d9 9b 49 97 c4 98 5f 43 79 49 71 |.V.....I..._CyIq| +00000010 0c 1b 9a f3 ea fb d3 43 79 24 55 9e 3d 12 30 53 |.......Cy$U.=.0S| +[1db5 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 5d 6d be 18 15 50 10 0b 95 b1 |0E.!..]m...P....| +00000010 47 3c b3 21 72 95 6b 75 34 59 9c dd c1 a1 14 11 |G<.!r.ku4Y......| +00000020 89 8d f7 b8 d2 02 20 33 84 59 ef b6 bd ae c1 ee |...... 3.Y......| +00000030 f7 cc 0b 57 1f bc 2b 4c 5c 3a 3b 6e 38 b4 9b a6 |...W..+L\:;n8...| +00000040 bc 54 0a c5 ac b9 7d |.T....}| +[1db6 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 principal evaluation succeeds for identity 0 +[1db7 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26790 gate 1574140943845809700 evaluation succeeds +[1db8 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1db9 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1dba 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1dbb 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1dbc 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1dbd 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1dbe 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1dbf 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1dc0 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1dc1 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc2 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc3 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc4 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[1dc5 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dc6 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dc7 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dc8 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1dc9 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1dca 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1dcb 11-19 05:22:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dcc 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[1dcd 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[1dce 11-19 05:22:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dcf 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:%\200\014\020\261\263\277U" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[1dd0 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1dd1 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac fd d3 0a 61 64 0a 7b dd 3e 5f fc 13 26 9f a1 |....ad.{.>_..&..| +00000010 7a 6c 15 0d 69 0e 4a ed b9 2e c0 7a 79 c3 d3 f0 |zl..i.J....zy...| +[1dd2 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 96 29 b3 a4 b9 10 6c 1b e2 20 |0E.!...)....l.. | +00000010 fb b0 e1 87 f9 f7 32 0d 52 1e b2 4f 2e bf fb 68 |......2.R..O...h| +00000020 06 d2 e9 76 a8 02 20 5b 95 ce 18 de b2 37 a3 e5 |...v.. [.....7..| +00000030 fa 9f 2d da 92 1b d3 8a 72 17 61 cf 6a 05 3e 25 |..-.....r.a.j.>%| +00000040 80 0c 10 b1 b3 bf 55 |......U| +[1dd3 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1dd4 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 ae 43 40 5a b9 36 e2 1b d3 1c |0E.!...C@Z.6....| +00000010 16 27 f2 24 32 fa ed bd 99 1e 02 d7 a8 04 39 95 |.'.$2.........9.| +00000020 45 be 2e bb c4 02 20 77 b2 d2 08 1d 1a ff 2a fc |E..... w......*.| +00000030 c9 0f 0c 26 5e 75 95 9b 8c ab 6e a9 b3 37 43 6c |...&^u....n..7Cl| +00000040 ea 6a db a1 e8 08 94 |.j.....| +[1dd5 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1dd6 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1dd7 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1dd8 11-19 05:22:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1dd9 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1dda 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ddb 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ddc 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ddd 11-19 05:22:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[1dde 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ddf 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de0 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[1de1 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1de2 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1de3 11-19 05:22:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:%\200\014\020\261\263\277U" secret_envelope: > alive: +[1de4 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1de5 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1de6 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de7 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de8 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de9 11-19 05:22:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dea 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1deb 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1dec 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ded 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dee 11-19 05:22:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1def 11-19 05:22:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1df0 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[1df1 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[1df2 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1df3 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510091801 +[1df4 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EEEB2535D10AB7E1F350782B6F6105D6D1E09466FE0785DCDE181FD16423F1B0 +[1df5 11-19 05:22:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[1df6 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1df7 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1df8 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1df9 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dfa 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[1dfb 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dfc 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dfd 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[1dfe 11-19 05:22:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dff 11-19 05:22:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[1e00 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1e01 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15101F +[1e02 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37675CB1727A4FC33A1775B516BC91E473DB4294FB0AB944E1F289FF6557303B +[1e03 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1e04 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1e05 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1e06 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1e07 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e08 11-19 05:22:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e09 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0a 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e0b 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0c 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e0d 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e0e 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e0f 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e10 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e11 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e12 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e13 11-19 05:22:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e14 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e15 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e16 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e17 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e18 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1e19 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e1a 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e1b 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e1c 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e1d 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e1e 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e1f 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e20 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 gate 1574140945394734400 evaluation starts +[1e21 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 signed by 0 principal evaluation starts (used [false]) +[1e22 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 processing identity 0 with bytes of 1151ae0 +[1e23 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 principal matched by identity 0 +[1e24 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf fa 3d 6f c7 b3 bb fc 9b b1 8e 0c 17 73 86 f8 |..=o.........s..| +00000010 a6 b2 06 cc 50 fa 47 69 65 6d 71 31 86 31 44 94 |....P.Giemq1.1D.| +[1e25 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 0e b7 00 a9 c3 77 64 95 c1 68 |0E.!.......wd..h| +00000010 fa bb 2b 6b f5 ff 40 df 80 d8 85 d8 9c 3d 26 f7 |..+k..@......=&.| +00000020 d2 17 58 d2 30 02 20 59 01 bd f7 32 fb ff bf 1e |..X.0. Y...2....| +00000030 bd 42 88 ab b2 85 25 98 a3 b4 22 9a 9c 90 a4 e0 |.B....%...".....| +00000040 37 3a 31 b1 9c 17 e8 |7:1....| +[1e26 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 principal evaluation succeeds for identity 0 +[1e27 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7fe0 gate 1574140945394734400 evaluation succeeds +[1e28 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e29 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e2a 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e2b 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e2c 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e2d 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1e2e 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e2f 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e30 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1e31 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e32 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e33 11-19 05:22:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e34 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e35 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e36 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e37 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e38 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e39 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e3a 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e3b 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e3c 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e3d 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e3e 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e3f 11-19 05:22:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e40 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e41 11-19 05:22:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e42 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e43 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e44 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e45 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e46 11-19 05:22:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e47 11-19 05:22:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is # examples/chaincode/go/chaincode_example02 +/tmp/go-link-810691446/000001.o: In function `pluginOpen': +/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-810691446/000021.o: In function `mygetgrouplist': +/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-810691446/000020.o: In function `mygetgrgid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-810691446/000020.o: In function `mygetgrnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-810691446/000020.o: In function `mygetpwnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-810691446/000020.o: In function `mygetpwuid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-810691446/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +/tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +[1e48 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e49 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e4a 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e4b 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e4c 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[1e4d 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 7d d9 69 99 26 6d 9b f9 e2 cd e4 c1 43 12 8d |.}.i.&m......C..| +00000010 7a bc 34 1b e3 01 c1 e5 f3 dd 1a 2d 93 a5 cd 2d |z.4........-...-| +[1e4e 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cc 3e f1 56 1b ea 6a 4c f1 5f |0E.!...>.V..jL._| +00000010 3a ee a4 0a 56 75 00 9d 5c c5 89 1c eb e7 c3 2c |:...Vu..\......,| +00000020 e3 ca 46 84 ac 02 20 53 f3 a7 5b e3 78 dc 91 cf |..F... S..[.x...| +00000030 5c e2 40 72 f1 02 50 4e 50 ca f6 4e 9b 89 d4 28 |\.@r..PNP..N...(| +00000040 17 dd b8 ca aa 68 ca |.....h.| +[1e4f 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e50 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1e51 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e52 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e53 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1e54 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e55 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e56 11-19 05:22:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e57 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e58 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e59 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e5a 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e5b 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e5c 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e5d 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e5e 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e5f 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e60 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e61 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e62 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e63 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e64 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e65 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e66 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e67 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e68 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e69 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e6a 11-19 05:22:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e6b 11-19 05:22:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e6c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e6d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e6e 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e6f 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1e70 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e71 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e72 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e73 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e74 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e75 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e76 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e77 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 gate 1574140945820643800 evaluation starts +[1e78 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 signed by 0 principal evaluation starts (used [false]) +[1e79 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 processing identity 0 with bytes of 1151ae0 +[1e7a 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 principal matched by identity 0 +[1e7b 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 3d 1d 4c 32 af 15 52 ca a6 3e 45 4b 5e 92 57 |.=.L2..R..>EK^.W| +00000010 bc 4b cc fb 15 73 2b 2e 00 e5 10 67 ce a3 0c e3 |.K...s+....g....| +[1e7c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 1f 0d 29 0e 9b ff 6f b6 8f 0e |0E.!....)...o...| +00000010 60 0b 76 28 11 58 af 03 e1 bf b4 9f 9f 34 f6 52 |`.v(.X.......4.R| +00000020 e6 6d 13 60 0b 02 20 40 da 86 7a e7 8d b9 1c 61 |.m.`.. @..z....a| +00000030 ad d4 98 90 fc bc 86 d3 2d a7 ad 9f 6c d7 9c 77 |........-...l..w| +00000040 8b fe c1 b5 ad ba e0 |.......| +[1e7d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 principal evaluation succeeds for identity 0 +[1e7e 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f5a0 gate 1574140945820643800 evaluation succeeds +[1e7f 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e80 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e81 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e82 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e83 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e84 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1e85 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e86 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e87 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1e88 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e89 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e8a 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e8b 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e8c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e8d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e8e 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e8f 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e90 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e91 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e92 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e93 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e94 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e95 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e96 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e97 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e98 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e99 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9a 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9b 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9c 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e9d 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9e 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9f 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1ea0 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ea1 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ea2 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ea3 11-19 05:22:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ea4 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1ea5 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1ea6 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1ea7 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1ea8 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1ea9 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1eaa 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1eab 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eac 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ead 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eae 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1eaf 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eb0 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1eb1 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1eb2 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1eb3 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eb4 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1eb5 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1eb6 11-19 05:22:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1eb7 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eb8 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1eb9 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1eba 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1ebb 11-19 05:22:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ebc 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1ebd 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151020 +[1ebe 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FF398E060DB645EF9756A038D0C9FA3F8844B5AFEFBD61F602A1EB43E032304 +[1ebf 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1ec0 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1ec1 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1ec2 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\320>\254M\034\377\271\207\025\273#u" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[1ec3 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec4 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[1ec5 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec6 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[1ec7 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1ec8 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ec9 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\320>\254M\034\377\271\207\025\273#u" > > > , Envelope: 271 bytes, Signature: 0 bytes +[1eca 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ecb 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1ecc 11-19 05:22:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ecd 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1ece 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1ecf 11-19 05:22:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ed0 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1ed1 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1ed2 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +[1ed3 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +00000040 26 42 c3 02 0b 22 |&B..."| +[1ed4 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1ed5 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 6d 81 c9 9a e4 26 6d 7c 3f 04 |0E.!..m....&m|?.| +00000010 27 22 20 f4 09 f6 2c a7 1f 1f 8c 0a b5 66 ba 71 |'" ...,......f.q| +00000020 1f fd 1a 14 00 02 20 49 74 3d 54 4a 26 18 87 24 |...... It=TJ&..$| +00000030 38 5d e6 63 d8 67 f6 f3 72 89 3e d0 3e ac 4d 1c |8].c.g..r.>.>.M.| +00000040 ff b9 87 15 bb 23 75 |.....#u| +[1ed6 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1ed7 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1ed8 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ed9 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eda 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1edb 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1edc 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1edd 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1ede 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1edf 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +[1ee0 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +00000040 26 42 c3 02 0b 22 |&B..."| +[1ee1 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ee2 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ee3 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ee4 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ee5 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1ee6 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1ee7 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ee8 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1ee9 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[1eea 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f3 98 e0 60 db 64 5e f9 75 6a 03 8d 0c 9f a3 |/...`.d^.uj.....| +00000010 f8 84 4b 5a fe fb d6 1f 60 2a 1e b4 3e 03 23 04 |..KZ....`*..>.#.| +[1eeb 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 77 3a d2 31 97 33 01 c7 63 3f 11 |0D. Aw:.1.3..c?.| +00000010 61 a2 fc 66 a3 d1 3a 88 ce 83 25 e6 14 30 51 4e |a..f..:...%..0QN| +00000020 a7 b9 c0 5d 02 20 28 75 79 2a 82 0d bd 0e 32 5f |...]. (uy*....2_| +00000030 70 6a 62 7d b7 69 bd 35 18 aa 74 d3 25 44 8d 04 |pjb}.i.5..t.%D..| +00000040 26 42 c3 02 0b 22 |&B..."| +[1eec 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1eed 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1eee 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eef 11-19 05:22:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef0 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ef1 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ef2 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1ef3 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1ef4 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef5 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1ef6 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1ef7 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef8 11-19 05:22:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef9 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1efa 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1efb 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1efc 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1efd 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1efe 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1eff 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f00 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f01 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f02 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f03 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f04 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 gate 1574140947313249400 evaluation starts +[1f05 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 signed by 0 principal evaluation starts (used [false]) +[1f06 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 processing identity 0 with bytes of 1151ae0 +[1f07 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 principal matched by identity 0 +[1f08 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1f09 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1f0a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 principal evaluation succeeds for identity 0 +[1f0b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ed40 gate 1574140947313249400 evaluation succeeds +[1f0c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f0d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f0e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f0f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f10 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1f11 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1f12 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f13 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f14 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f15 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f16 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f17 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f18 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f19 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f1a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 gate 1574140947314467600 evaluation starts +[1f1b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 signed by 0 principal evaluation starts (used [false]) +[1f1c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 processing identity 0 with bytes of 1151ae0 +[1f1d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 principal matched by identity 0 +[1f1e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1f1f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1f20 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 principal evaluation succeeds for identity 0 +[1f21 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac550 gate 1574140947314467600 evaluation succeeds +[1f22 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f23 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f24 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f25 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f26 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1f27 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1f28 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f29 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1f2a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1f2b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f2c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f2d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f2e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f2f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f30 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f31 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f32 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f33 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f34 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 gate 1574140947315749200 evaluation starts +[1f35 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 signed by 0 principal evaluation starts (used [false]) +[1f36 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 processing identity 0 with bytes of 1151ae0 +[1f37 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 principal matched by identity 0 +[1f38 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1f39 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1f3a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 principal evaluation succeeds for identity 0 +[1f3b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d900f0 gate 1574140947315749200 evaluation succeeds +[1f3c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f3d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f3e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f3f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f40 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1f41 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1f42 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1f43 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1f44 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f45 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f46 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f47 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f48 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f49 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f4a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f4b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f4c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 gate 1574140947317056500 evaluation starts +[1f4d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 signed by 0 principal evaluation starts (used [false]) +[1f4e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 processing identity 0 with bytes of 1151ae0 +[1f4f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 principal matched by identity 0 +[1f50 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1f51 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1f52 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 principal evaluation succeeds for identity 0 +[1f53 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d91f90 gate 1574140947317056500 evaluation succeeds +[1f54 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f55 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f56 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f57 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f58 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f59 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1f5a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[1f5b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[1f5c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[1f5d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[1f5e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[1f5f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f60 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f61 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f62 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f63 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f64 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f65 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f66 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f67 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 gate 1574140947318550900 evaluation starts +[1f68 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 signed by 0 principal evaluation starts (used [false]) +[1f69 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 processing identity 0 with bytes of 1151ae0 +[1f6a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 principal matched by identity 0 +[1f6b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[1f6c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[1f6d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 principal evaluation succeeds for identity 0 +[1f6e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c981f0 gate 1574140947318550900 evaluation succeeds +[1f6f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f70 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f71 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f72 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f73 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f74 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f75 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f76 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f77 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f78 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f79 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f7a 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f7b 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 gate 1574140947319340900 evaluation starts +[1f7c 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 signed by 0 principal evaluation starts (used [false]) +[1f7d 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 processing identity 0 with bytes of 1151ae0 +[1f7e 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 principal matched by identity 0 +[1f7f 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[1f80 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[1f81 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 principal evaluation succeeds for identity 0 +[1f82 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99380 gate 1574140947319340900 evaluation succeeds +[1f83 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f84 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f85 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f86 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f87 11-19 05:22:27.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f88 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1f89 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1f8a 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1f8b 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f8c 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f8d 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f8e 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f8f 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f90 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f91 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[1f92 11-19 05:22:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f93 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f94 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f95 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1f96 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f97 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f98 11-19 05:22:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1f99 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1f9a 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f9b 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1f9c 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1f9d 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1f9e 11-19 05:22:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f9f 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +[1fa0 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +[1fa1 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fa2 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\226\200\371" > > , Envelope: 166 bytes, Signature: 0 bytes +[1fa3 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[1fa4 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fa5 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1fa6 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1fa7 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1fa8 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1fa9 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1faa 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1fab 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 gate 1574140947467234600 evaluation starts +[1fac 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 signed by 0 principal evaluation starts (used [false]) +[1fad 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 processing identity 0 with bytes of 1151ae0 +[1fae 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 principal matched by identity 0 +[1faf 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 3b 2d 53 79 7e 96 b4 3b a5 00 2f 34 4b f4 98 |.;-Sy~..;../4K..| +00000010 bc 4e 21 0f 91 85 ba c5 52 f6 b2 93 68 31 43 00 |.N!.....R...h1C.| +[1fb0 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 1d e5 4c 6a fa cd c7 d1 cb df |0E.!....Lj......| +00000010 b5 e4 da da fb 6a bb 7d 13 59 51 40 a4 e5 9b 0c |.....j.}.YQ@....| +00000020 5d 76 e8 e0 9c 02 20 03 9f df 16 58 1d 86 14 c7 |]v.... ....X....| +00000030 59 27 a7 09 3c dc 1d ef 14 42 8c 8d db 86 55 18 |Y'..<....B....U.| +00000040 48 86 43 3e 96 80 f9 |H.C>...| +[1fb1 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 principal evaluation succeeds for identity 0 +[1fb2 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bee2d0 gate 1574140947467234600 evaluation succeeds +[1fb3 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1fb4 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1fb5 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1fb6 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1fb7 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1fb8 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1fb9 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1fba 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1fbb 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1fbc 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fbd 11-19 05:22:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fbe 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[1fbf 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fc0 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fc1 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fc2 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[1fc3 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > alive: alive:\226\200\371" > alive:\352[\006G\\\345\323,\333]\342\311\307" > +[1fc4 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1fc5 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fc6 11-19 05:22:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fc7 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1fc8 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1fc9 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fca 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fcb 11-19 05:22:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fcc 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1fcd 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1fce 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1fcf 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[1fd0 11-19 05:22:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fd1 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fd2 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fd3 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fd4 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[1fd5 11-19 05:22:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fd6 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1fd7 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1fd8 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1fd9 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fda 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fdb 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fdc 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fdd 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fde 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fdf 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[1fe0 11-19 05:22:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fe1 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1fe2 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1fe3 11-19 05:22:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fe4 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1fe5 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[1fe6 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe7 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1fe8 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1fe9 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1fea 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1feb 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1fec 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1fed 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 gate 1574140947840673100 evaluation starts +[1fee 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 signed by 0 principal evaluation starts (used [false]) +[1fef 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 processing identity 0 with bytes of 1151ae0 +[1ff0 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 principal matched by identity 0 +[1ff1 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 16 88 c3 34 f0 2e b2 4f fb eb 2e 89 31 98 ab |....4...O....1..| +00000010 05 f1 a7 ba c4 1c f0 0f dd 77 00 0d 29 84 8a ec |.........w..)...| +[1ff2 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 00 8f 9f bc aa 50 5e 3b 0c d0 |0E.!.......P^;..| +00000010 68 de 2a 21 a1 37 3f d2 fa b3 82 91 7b c8 c0 8f |h.*!.7?.....{...| +00000020 2b 03 83 fe 66 02 20 71 da 64 15 61 94 c3 cf 1b |+...f. q.d.a....| +00000030 6b 0d be b6 d9 7d a2 04 cc 3a d7 c6 26 67 89 1e |k....}...:..&g..| +00000040 f4 77 3f 23 c9 6a ac |.w?#.j.| +[1ff3 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 principal evaluation succeeds for identity 0 +[1ff4 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e320 gate 1574140947840673100 evaluation succeeds +[1ff5 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ff6 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ff7 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ff8 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ff9 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ffa 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1ffb 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1ffc 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1ffd 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1ffe 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fff 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2000 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2001 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[2002 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2003 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2004 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2005 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[2006 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\361V\033\352jL\361_:\356\244\nVu\000\235\\\305\211\034\353\347\303,\343\312F\204\254\002 S\363\247[\343x\334\221\317\\\342@r\361\002PNP\312\366N\233\211\324(\027\335\270\312\252h\312" > alive: alive:\226\200\371" > alive:\352[\006G\\\345\323,\333]\342\311\307" > +[2007 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[2008 11-19 05:22:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2009 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[200a 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[200b 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[200c 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[200d 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[200e 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 16 8e 12 24 53 5d 8a 00 ed 9f dd d1 00 73 cb |....$S].......s.| +00000010 08 a2 1d 4d d5 e9 1a 3f a3 bb 47 c6 1e c2 b9 6a |...M...?..G....j| +[200f 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 8a ba c9 bc 71 19 d5 48 61 b7 |0E.!......q..Ha.| +00000010 b4 63 e0 cd d0 f4 a1 4e 6c 3e 92 48 4a a1 4f 4e |.c.....Nl>.HJ.ON| +00000020 ef 5e 40 12 e4 02 20 01 7e e5 df 6a 9c 52 b5 38 |.^@... .~..j.R.8| +00000030 9c 8f 8b cc db 00 38 15 8e 81 b2 b4 a9 d1 83 43 |......8........C| +00000040 14 12 ad a2 f2 d6 df |.......| +[2010 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2011 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 81 89 0d fb 58 c6 7b 29 36 bb |0E.!......X.{)6.| +00000010 bf 73 5d 53 0e 24 70 1b e5 44 93 7b 4e e9 53 fe |.s]S.$p..D.{N.S.| +00000020 7d ca e7 e4 86 02 20 06 bf 43 8a e4 af 69 3d 10 |}..... ..C...i=.| +00000030 68 f3 4f ae 22 05 d7 63 98 08 1f 95 e2 ed fe 37 |h.O."..c.......7| +00000040 53 cc c7 9b 4d 71 20 |S...Mq | +[2012 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2013 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2014 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2015 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2016 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2017 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2018 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2019 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[201a 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[201b 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[201c 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[201d 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[201e 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\222HJ\241ON\357^@\022\344\002 \001~\345\337j\234R\2658\234\217\213\314\333\0008\025\216\201\262\264\251\321\203C\024\022\255\242\362\326\337" secret_envelope: > alive:\352[\006G\\\345\323,\333]\342\311\307" > +[201f 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[2020 11-19 05:22:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2021 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2022 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2023 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2024 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2025 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2026 11-19 05:22:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2027 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2028 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2029 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[202a 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[202b 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[202c 11-19 05:22:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[202d 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[202e 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[202f 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2030 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100A1801 +[2031 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4C7347089662D1B0DC3AB7FDDD2C4EF0FC2B25A8811C1AA4E4F66AD37A11D2C9 +[2032 11-19 05:22:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[2033 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2034 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2035 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2036 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2037 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[2038 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2039 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[203a 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[203b 11-19 05:22:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[203c 11-19 05:22:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 +[203d 11-19 05:22:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[203e 11-19 05:22:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[203f 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2040 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151021 +[2041 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9641523C9005941ED1D3FF2A665AB4D2A1CA8B07F6B35127D53BBCAA21784E35 +[2042 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2043 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2044 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2045 11-19 05:22:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2046 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2047 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2048 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2049 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[204a 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[204b 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[204c 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[204d 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[204e 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[204f 11-19 05:22:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[2050 11-19 05:22:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2051 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2052 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2053 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2054 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2055 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2056 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2057 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2058 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2059 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 41 52 3c 90 05 94 1e d1 d3 ff 2a 66 5a b4 d2 |.AR<.......*fZ..| +00000010 a1 ca 8b 07 f6 b3 51 27 d5 3b bc aa 21 78 4e 35 |......Q'.;..!xN5| +[205a 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 9e 33 20 5b 6d 39 50 dd 4d 5d |0E.!...3 [m9P.M]| +00000010 99 78 13 92 00 78 2a 3a 3e 1d f3 5d 5d 7e 4a 51 |.x...x*:>..]]~JQ| +00000020 8e 35 e1 72 0a 02 20 36 7b 45 3f dc bc 56 cc 0b |.5.r.. 6{E?..V..| +00000030 72 c2 96 89 71 b6 82 db 37 19 91 a1 d5 80 cf da |r...q...7.......| +00000040 cd 18 83 a8 75 66 76 |....ufv| +[205b 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[205c 11-19 05:22:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[205d 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[205e 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[205f 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2060 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2061 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[2062 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2063 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2064 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2065 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2066 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2067 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2068 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2069 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 gate 1574140950388685500 evaluation starts +[206a 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 signed by 0 principal evaluation starts (used [false]) +[206b 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 processing identity 0 with bytes of 1151ae0 +[206c 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 principal matched by identity 0 +[206d 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 cc dc 57 81 e1 20 71 52 37 78 d1 0e e6 41 c3 |...W.. qR7x...A.| +00000010 9a 7b 35 89 ee fc bc a2 91 49 e0 f5 56 a3 25 cf |.{5......I..V.%.| +[206e 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 3c 30 6a b8 1e de 79 66 49 3e 54 |0D. 7<0j...yfI>T| +00000010 a4 63 47 ff 7c 55 66 d5 56 4e ce e4 26 9b 41 e7 |.cG.|Uf.VN..&.A.| +00000020 3a ee 77 8c 02 20 42 d4 d2 63 98 2a 38 19 57 30 |:.w.. B..c.*8.W0| +00000030 c2 1b da 8b 49 1a 95 62 dd 8f 3c ad 57 04 6d 70 |....I..b..<.W.mp| +00000040 32 53 32 7a 0b 45 |2S2z.E| +[206f 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 principal evaluation succeeds for identity 0 +[2070 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998430 gate 1574140950388685500 evaluation succeeds +[2071 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2072 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2073 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2074 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2075 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2076 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2077 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2078 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2079 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[207a 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[207b 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[207c 11-19 05:22:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[207d 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[207e 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[207f 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2080 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2081 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2082 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2083 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2084 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2085 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2086 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2087 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2088 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2089 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[208a 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[208b 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[208c 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[208d 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[208e 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[208f 11-19 05:22:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2090 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2091 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2092 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2093 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2094 11-19 05:22:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2095 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-1.0 +[2096 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +[2097 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +[2098 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +[2099 11-19 05:22:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +[209a 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:1.0 's authentication is authorized +[209b 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[209c 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[209d 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:1.0 +[209e 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED +[209f 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"exp02:1.0" +[20a0 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"exp02:1.0" +[20a1 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"exp02:1.0" +[20a2 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[20a3 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[20a4 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[20a5 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] handling PUT_STATE from chaincode +[20a6 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Completed PUT_STATE. Sending RESPONSE +[20a7 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[20a8 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] handling PUT_STATE from chaincode +[20a9 11-19 05:22:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Completed PUT_STATE. Sending RESPONSE +[20aa 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[20ab 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [afc2f7b1] notifying Txid:afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, channelID:businesschannel +[20ac 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[20ad 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][afc2f7b1] Exit chaincode: name:"lscc" (34332ms) +[20ae 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[20af 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +[20b0 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] Exit +[20b1 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] Entry chaincode: name:"lscc" +[20b2 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] escc for chaincode name:"lscc" is escc +[20b3 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, chaincode: lscc} +[20b4 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A202004FDA5AFFB449ECC63CD9FA045...455254494649434154452D2D2D2D2D0A +[20b5 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9A681CADB4BBC155D500B1317381E67713BB9B2685B6A12A9B2A9EAED67F8936 +[20b6 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, chaincode: lscc} +[20b7 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][afc2f7b1] Exit +[20b8 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +[20b9 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45600 +[20ba 11-19 05:22:30.64 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45600 grpc.code=OK grpc.call_duration=34.340689s +[20bb 11-19 05:22:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[20bc 11-19 05:22:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[20bd 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[20be 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[20bf 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[20c0 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[20c1 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[20c2 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[20c3 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[20c4 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20c5 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[20c6 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20c7 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[20c8 11-19 05:22:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20c9 11-19 05:22:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[20ca 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[20cb 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[20cc 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20cd 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[20ce 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20cf 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[20d0 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[20d1 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20d2 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20d3 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20d4 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20d5 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[20d6 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e4 30 87 86 5f d1 01 bc e0 9a 62 f0 c5 66 0f |..0.._.....b..f.| +00000010 24 87 6e 3d 09 99 e7 1d 24 7c 6e 74 48 bc f0 d7 |$.n=....$|ntH...| +[20d7 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 ed 6c cd e1 53 cb 09 94 a1 4a bd |0D. '.l..S....J.| +00000010 51 7c 17 78 79 07 bd 93 bd bd d1 ed 3c 2f fd 0a |Q|.xy....... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20d9 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[20da 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[20db 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[20dc 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[20dd 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20de 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20df 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20e0 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20e1 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20e2 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20e3 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20e4 11-19 05:22:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20e5 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[20e6 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20e7 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20e8 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[20e9 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20ea 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[20eb 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20ec 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20ed 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20ee 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20ef 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20f0 11-19 05:22:30.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[20f1 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[20f2 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20f3 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20f4 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20f5 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20f6 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20f7 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20f8 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20f9 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20fa 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20fb 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[20fc 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20fd 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[20fe 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[20ff 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2100 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2101 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2102 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2103 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 gate 1574140950833484200 evaluation starts +[2104 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 signed by 0 principal evaluation starts (used [false]) +[2105 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 processing identity 0 with bytes of 1151ae0 +[2106 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 principal matched by identity 0 +[2107 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 ac df e1 3e fa 6a 10 1c 43 e3 dd 09 00 d2 8f |G...>.j..C......| +00000010 1f 9a c7 2b ef cd 44 cc 44 cf f7 f3 8e fa 6a 4e |...+..D.D.....jN| +[2108 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 69 e4 bc 09 64 39 d0 2d 93 7f 64 |0D. ]i...d9.-..d| +00000010 45 dc 9c 77 21 09 bf 79 05 46 d3 99 9b 98 59 a6 |E..w!..y.F....Y.| +00000020 82 ad 78 26 02 20 38 20 f1 58 d2 be 62 84 23 fe |..x&. 8 .X..b.#.| +00000030 02 53 af 51 7c fc b0 b7 ec 6b 5c d2 ac 3d a0 5a |.S.Q|....k\..=.Z| +00000040 41 d6 08 6e d7 63 |A..n.c| +[2109 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 principal evaluation succeeds for identity 0 +[210a 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039596c0 gate 1574140950833484200 evaluation succeeds +[210b 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[210c 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[210d 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[210e 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[210f 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2110 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2111 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2112 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2113 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2114 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2115 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2116 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2117 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2118 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2119 11-19 05:22:30.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211a 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211b 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211c 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211d 11-19 05:22:30.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[211e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2120 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2121 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2122 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2123 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2124 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2125 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2126 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2127 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2128 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2129 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[212a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[212b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[212c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[212d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[212e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[212f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2130 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151022 +[2131 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C5EC319E2A891A25F1D4E3D17856065D8B9A249C989D3A5367D9B4ACA1E42DA +[2132 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2133 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2134 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2135 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[2136 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2137 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2138 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2139 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[213a 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[213b 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[213c 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[213d 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[213e 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[213f 11-19 05:22:30.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2140 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2141 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2142 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2143 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2144 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2145 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +[2146 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +[2147 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2148 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2149 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[214a 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[214b 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[214c 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[214d 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[214e 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[214f 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2150 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +[2151 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +[2152 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2153 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2154 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2155 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2156 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2157 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2158 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2159 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[215a 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[215b 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 5e c3 19 e2 a8 91 a2 5f 1d 4e 3d 17 85 60 65 |<^......_.N=..`e| +00000010 d8 b9 a2 49 c9 89 d3 a5 36 7d 9b 4a ca 1e 42 da |...I....6}.J..B.| +[215c 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 9c 4d ff 9a 42 83 35 5d 89 f5 |0E.!...M..B.5]..| +00000010 41 8a 7b 3c 89 02 78 9d a2 7f bc 27 4e c8 29 bf |A.{<..x....'N.).| +00000020 3a 8a 20 d8 f3 02 20 43 a7 15 05 82 aa d9 67 d0 |:. ... C......g.| +00000030 8e 11 99 d6 85 35 eb 9c 42 f4 69 91 b5 10 c5 86 |.....5..B.i.....| +00000040 a7 f1 7c 4b ad 2b e6 |..|K.+.| +[215d 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[215e 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 c3 c8 0e 4c ab 0d 76 8e 80 e3 e3 |0D. C...L..v....| +00000010 a7 f4 27 58 7f d7 b8 97 dd 27 ea f5 ae 7b 66 1f |..'X.....'...{f.| +00000020 5a 4d b0 31 02 20 42 d6 0c 5f d7 0e bf 0c a5 af |ZM.1. B.._......| +00000030 30 e7 08 1b d8 b0 b0 bc 13 d8 35 fb b6 a2 0b c6 |0.........5.....| +00000040 c5 6e b2 28 42 a9 |.n.(B.| +[215f 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2160 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2161 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2162 11-19 05:22:30.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2163 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45614 +[2164 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00396a820 +[2165 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2166 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2167 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2168 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2169 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[216a 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 61 20 24 f9 40 c3 0b 77 54 02 da 06 f1 ec d2 |Ca $.@..wT......| +00000010 9a e9 07 ae 2a a8 19 7d f4 0d 52 f4 e0 97 10 90 |....*..}..R.....| +[216b 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 31 89 0a f1 3f 6c 5d 4f b0 28 b8 |0D. z1...?l]O.(.| +00000010 0c c2 b6 d4 21 4d 7e 1d 5c 1d 59 e6 bf 68 79 f6 |....!M~.\.Y..hy.| +00000020 7d 4d 48 ed 02 20 21 49 c8 88 3e c0 da 45 6c 93 |}MH.. !I..>..El.| +00000030 ef 7b 57 56 65 fe cf b2 36 73 ba 5c 18 45 16 48 |.{WVe...6s.\.E.H| +00000040 76 93 d5 11 84 9e |v.....| +[216c 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[216d 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00282f1f0, header 0xc00396ac30 +[216e 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[216f 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fc0cfc47] processing txid: fc0cfc4777ad95d6a297506084d00c5bfcca2083c696b69474f17b6a0de8874d +[2170 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [fc0cfc4777ad95d6a297506084d00c5bfcca2083c696b69474f17b6a0de8874d] +[2171 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2172 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2173 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2174 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2175 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2176 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 gate 1574140951144108500 evaluation starts +[2177 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 signed by 0 principal evaluation starts (used [false]) +[2178 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 processing identity 0 with bytes of 1151ae0 +[2179 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[217a 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 principal evaluation fails +[217b 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e75e0 gate 1574140951144108500 evaluation fails +[217c 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[217d 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[217e 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[217f 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 gate 1574140951146335300 evaluation starts +[2180 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 signed by 0 principal evaluation starts (used [false]) +[2181 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 processing identity 0 with bytes of 1151ae0 +[2182 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[2183 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[2184 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[2185 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 principal matched by identity 0 +[2186 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 61 20 24 f9 40 c3 0b 77 54 02 da 06 f1 ec d2 |Ca $.@..wT......| +00000010 9a e9 07 ae 2a a8 19 7d f4 0d 52 f4 e0 97 10 90 |....*..}..R.....| +[2187 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 31 89 0a f1 3f 6c 5d 4f b0 28 b8 |0D. z1...?l]O.(.| +00000010 0c c2 b6 d4 21 4d 7e 1d 5c 1d 59 e6 bf 68 79 f6 |....!M~.\.Y..hy.| +00000020 7d 4d 48 ed 02 20 21 49 c8 88 3e c0 da 45 6c 93 |}MH.. !I..>..El.| +00000030 ef 7b 57 56 65 fe cf b2 36 73 ba 5c 18 45 16 48 |.{WVe...6s.\.E.H| +00000040 76 93 d5 11 84 9e |v.....| +[2188 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 principal evaluation succeeds for identity 0 +[2189 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e7b70 gate 1574140951146335300 evaluation succeeds +[218a 11-19 05:22:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[218b 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[218c 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[218d 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[218e 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[218f 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [fc0cfc4777ad95d6a297506084d00c5bfcca2083c696b69474f17b6a0de8874d] +[2190 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fc0cfc47] Entry chaincode: name:"exp02" +[2191 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2192 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fc0cfc47] Exit +[2193 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fc0cfc4777ad95d6a297506084d00c5bfcca2083c696b69474f17b6a0de8874d] +[2194 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45614 +[2195 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45614 grpc.code=OK grpc.call_duration=14.7412ms +[2196 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45614: read: connection reset by peer +[2197 11-19 05:22:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2198 11-19 05:22:31.16 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2199 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[219a 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[219b 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[219c 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[219d 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[219e 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[219f 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21a0 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[21a1 11-19 05:22:31.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21a2 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[21a3 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[21a4 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21a5 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21a6 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21a7 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[21a8 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[21a9 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[21aa 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[21ab 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[21ac 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[21ad 11-19 05:22:31.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 gate 1574140951319754900 evaluation starts +[21ae 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 signed by 0 principal evaluation starts (used [false]) +[21af 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 processing identity 0 with bytes of 1151ae0 +[21b0 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 principal matched by identity 0 +[21b1 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[21b2 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[21b3 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 principal evaluation succeeds for identity 0 +[21b4 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036247c0 gate 1574140951319754900 evaluation succeeds +[21b5 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[21b6 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[21b7 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[21b8 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[21b9 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[21ba 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[21bb 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21bc 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21bd 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[21be 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[21bf 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[21c0 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[21c1 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[21c2 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[21c3 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[21c4 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[21c5 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 gate 1574140951329045400 evaluation starts +[21c6 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 signed by 0 principal evaluation starts (used [false]) +[21c7 11-19 05:22:31.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 processing identity 0 with bytes of 1151ae0 +[21c8 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 principal matched by identity 0 +[21c9 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[21ca 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[21cb 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 principal evaluation succeeds for identity 0 +[21cc 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8000 gate 1574140951329045400 evaluation succeeds +[21cd 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[21ce 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[21cf 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[21d0 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[21d1 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[21d2 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[21d3 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21d4 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[21d5 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[21d6 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[21d7 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[21d8 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[21d9 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21da 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21db 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[21dc 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[21dd 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[21de 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[21df 11-19 05:22:31.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[21e0 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[21e1 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 gate 1574140951340558900 evaluation starts +[21e2 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 signed by 0 principal evaluation starts (used [false]) +[21e3 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 processing identity 0 with bytes of 1151ae0 +[21e4 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 principal matched by identity 0 +[21e5 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[21e6 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[21e7 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 principal evaluation succeeds for identity 0 +[21e8 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b28f0 gate 1574140951340558900 evaluation succeeds +[21e9 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[21ea 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[21eb 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[21ec 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[21ed 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21ee 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21ef 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[21f0 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[21f1 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[21f2 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[21f3 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[21f4 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[21f5 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 gate 1574140951345244400 evaluation starts +[21f6 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 signed by 0 principal evaluation starts (used [false]) +[21f7 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 processing identity 0 with bytes of 1151ae0 +[21f8 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 principal matched by identity 0 +[21f9 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[21fa 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[21fb 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 principal evaluation succeeds for identity 0 +[21fc 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b3a90 gate 1574140951345244400 evaluation succeeds +[21fd 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[21fe 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[21ff 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2200 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2201 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2202 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +[2203 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2204 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2205 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2206 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2207 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2208 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2209 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[220a 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[220b 11-19 05:22:31.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[220c 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 gate 1574140951350180500 evaluation starts +[220d 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 signed by 0 principal evaluation starts (used [false]) +[220e 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 processing identity 0 with bytes of 1151ae0 +[220f 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 principal matched by identity 0 +[2210 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[2211 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[2212 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 principal evaluation succeeds for identity 0 +[2213 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a6e70 gate 1574140951350180500 evaluation succeeds +[2214 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2215 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2216 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2217 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2218 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[2219 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[221a 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[221b 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[221c 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[221d 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[221e 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[221f 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2220 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2221 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2222 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2223 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2224 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 gate 1574140951357411400 evaluation starts +[2225 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 signed by 0 principal evaluation starts (used [false]) +[2226 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 processing identity 0 with bytes of 1151ae0 +[2227 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 principal matched by identity 0 +[2228 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[2229 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[222a 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 principal evaluation succeeds for identity 0 +[222b 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ece30 gate 1574140951357411400 evaluation succeeds +[222c 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[222d 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[222e 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[222f 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2230 11-19 05:22:31.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2231 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2232 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2233 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2234 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2235 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2236 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2237 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2238 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2239 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223a 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[223b 11-19 05:22:31.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[223c 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223d 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223e 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[223f 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2240 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2241 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2242 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2243 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2244 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2245 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2246 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2247 11-19 05:22:31.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2248 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2249 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[224a 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[224b 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[224c 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[224d 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[224e 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[224f 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2250 11-19 05:22:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2251 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2252 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2253 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2254 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 gate 1574140951481139000 evaluation starts +[2255 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 signed by 0 principal evaluation starts (used [false]) +[2256 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 processing identity 0 with bytes of 1151ae0 +[2257 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 principal matched by identity 0 +[2258 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +[2259 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +00000040 e5 5b e6 cd c1 ab |.[....| +[225a 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 principal evaluation succeeds for identity 0 +[225b 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494b60 gate 1574140951481139000 evaluation succeeds +[225c 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[225d 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[225e 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[225f 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2260 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2261 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2262 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2263 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2264 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2265 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2266 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2267 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2268 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[2269 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[226a 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[226b 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[226c 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[226d 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\035\363]]~JQ\2165\341r\n\002 6{E?\334\274V\314\013r\302\226\211q\266\202\3337\031\221\241\325\200\317\332\315\030\203\250ufv" > +[226e 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[226f 11-19 05:22:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2270 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2271 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2272 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2273 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2274 11-19 05:22:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2275 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2276 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2277 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2278 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[2279 11-19 05:22:31.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[227a 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[227b 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[227c 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[227d 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[227e 11-19 05:22:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[227f 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2280 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2281 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2282 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2283 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2284 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2285 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2286 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2287 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2288 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[2289 11-19 05:22:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[228a 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +[228b 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +[228c 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[228d 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > > , Envelope: 165 bytes, Signature: 0 bytes +[228e 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[228f 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2290 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2291 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2292 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2293 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2294 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2295 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2296 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 gate 1574140951847762300 evaluation starts +[2297 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 signed by 0 principal evaluation starts (used [false]) +[2298 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 processing identity 0 with bytes of 1151ae0 +[2299 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 principal matched by identity 0 +[229a 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +[229b 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +00000040 40 28 a8 8d b6 bd |@(....| +[229c 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 principal evaluation succeeds for identity 0 +[229d 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034670f0 gate 1574140951847762300 evaluation succeeds +[229e 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[229f 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[22a0 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[22a1 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[22a2 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[22a3 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[22a4 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[22a5 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[22a6 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[22a7 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22a8 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22a9 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22aa 11-19 05:22:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[22ab 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ac 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ad 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ae 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[22af 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[22b0 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22b1 11-19 05:22:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > alive: alive:\035\363]]~JQ\2165\341r\n\002 6{E?\334\274V\314\013r\302\226\211q\266\202\3337\031\221\241\325\200\317\332\315\030\203\250ufv" > +[22b2 11-19 05:22:31.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[22b3 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[22b4 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22b5 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[22b6 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[22b7 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +[22b8 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +00000040 ee 6f fc 7d f3 ae |.o.}..| +[22b9 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[22ba 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 60 ac ca e2 93 21 13 13 c3 c4 e1 |0D. 5`....!.....| +00000010 00 c1 68 80 12 21 ac ea ae c6 bd 30 54 08 7a 16 |..h..!.....0T.z.| +00000020 4b c1 f0 59 02 20 01 b9 15 2b 01 ff 43 58 45 b6 |K..Y. ...+..CXE.| +00000030 28 1a b2 fb ac 9b 7a bf e4 23 2f d5 55 6c 39 77 |(.....z..#/.Ul9w| +00000040 6e 68 b9 a1 66 8f |nh..f.| +[22bb 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[22bc 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[22bd 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[22be 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[22bf 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[22c0 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c1 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c2 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c3 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[22c4 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c5 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c6 11-19 05:22:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[22c7 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\035\363]]~JQ\2165\341r\n\002 6{E?\334\274V\314\013r\302\226\211q\266\202\3337\031\221\241\325\200\317\332\315\030\203\250ufv" > +[22c8 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[22c9 11-19 05:22:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22ca 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22cb 11-19 05:22:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22cc 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22cd 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ce 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22cf 11-19 05:22:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22d0 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22d1 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22d2 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22d3 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22d4 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22d5 11-19 05:22:32.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22d6 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[22d7 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[22d8 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[22d9 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[22da 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[22db 11-19 05:22:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22dc 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 ++Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +rkc= +-----END CERTIFICATE----- +[22dd 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 gate 1574140952702965000 evaluation starts +[22de 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 signed by 0 principal evaluation starts (used [false]) +[22df 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 processing identity 0 with bytes of 1151ae0 +[22e0 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +[22e1 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[22e2 11-19 05:22:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 principal matched by identity 0 +[22e3 11-19 05:22:32.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d b0 62 ef 1e 31 f9 96 b2 bb 11 77 0d 77 07 1b |m.b..1.....w.w..| +00000010 df f7 7d cb 1d bf 8d 2c 66 5f f8 1e b3 54 9f 11 |..}....,f_...T..| +[22e4 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 f0 74 c5 a5 31 5c 21 0c dc e3 79 |0D. @.t..1\!...y| +00000010 17 f7 68 fd 8c eb 2a 10 c6 ac 70 4b f3 71 34 c2 |..h...*...pK.q4.| +00000020 63 f8 74 a1 02 20 10 32 ae 4b 4d e8 92 aa 09 77 |c.t.. .2.KM....w| +00000030 c3 32 c2 a2 c5 ba 9d 0a 40 1d 58 71 96 ae 7d 05 |.2......@.Xq..}.| +00000040 6e 67 ab b1 5b 69 |ng..[i| +[22e5 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 principal evaluation succeeds for identity 0 +[22e6 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034349a0 gate 1574140952702965000 evaluation succeeds +[22e7 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[22e8 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[22e9 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[22ea 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[22eb 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +[22ec 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +[22ed 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +[22ee 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[22ef 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +[22f0 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +[22f1 11-19 05:22:32.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +[22f2 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +[22f3 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[22f4 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002950d40 env 0xc0037a1ae0 txn 0 +[22f5 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0037a1ae0 +[22f6 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +[22f7 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[22f8 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[22f9 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[22fa 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[22fb 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[22fc 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +[22fd 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +00000040 28 97 fa fc 24 78 52 |(...$xR| +[22fe 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[22ff 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003b86a80, header channel_header:"\010\003\032\014\010\364\367\315\356\005\020\370\300\230\241\001\"\017businesschannel*@afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\023\364o\217\224\t\027F\372\340\371\226\210\203\t\211\025\032\257\002\003]\210&" +[2300 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[2301 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[2302 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[2303 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[2304 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] +[2305 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[2306 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0004b2000 +[2307 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +[2308 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [93a66447-9e34-4f4e-a076-e36aae14df10] +[2309 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [93a66447-9e34-4f4e-a076-e36aae14df10] +[230a 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[230b 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE----- +[230c 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 gate 1574140952737570300 evaluation starts +[230d 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 signed by 0 principal evaluation starts (used [false]) +[230e 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 processing identity 0 with bytes of 1151ae0 +[230f 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[2310 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[2311 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[2312 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 principal matched by identity 0 +[2313 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 68 1c ad b4 bb c1 55 d5 00 b1 31 73 81 e6 77 |.h.....U...1s..w| +00000010 13 bb 9b 26 85 b6 a1 2a 9b 2a 9e ae d6 7f 89 36 |...&...*.*.....6| +[2314 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a9 11 75 e6 b6 d8 fc 3f dc e6 f1 |0D. $..u....?...| +00000010 05 18 53 bd 79 20 d0 5e 12 b1 96 67 4f 41 cc 77 |..S.y .^...gOA.w| +00000020 d2 c8 ab 9d 02 20 0f d1 40 05 e3 ff 8b ab b4 77 |..... ..@......w| +00000030 0b 32 e1 20 48 7e 06 ea 74 97 31 23 a3 14 40 56 |.2. H~..t.1#..@V| +00000040 b8 2d a4 d4 aa 2c |.-...,| +[2315 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 principal evaluation succeeds for identity 0 +[2316 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 signed by 1 principal evaluation starts (used [true]) +[2317 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 skipping identity 0 because it has already been used +[2318 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 principal evaluation fails +[2319 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341dc70 gate 1574140952737570300 evaluation succeeds +[231a 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +[231b 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[231c 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[231d 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +[231e 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +[231f 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ff7faade-d8af-4bf0-b21c-f4b33db00d0a] +[2320 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2321 11-19 05:22:32.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ff7faade-d8af-4bf0-b21c-f4b33db00d0a] +[2323 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +[2324 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [214eb03f-df7c-48c9-946c-54b179bea080] +[2325 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[2326 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [214eb03f-df7c-48c9-946c-54b179bea080] +[2327 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 gate 1574140952749194900 evaluation starts +[2328 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 signed by 0 principal evaluation starts (used [false]) +[2329 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 processing identity 0 with bytes of 1151ae0 +[232a 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 principal matched by identity 0 +[232b 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 f6 5f be 9b b5 81 49 93 90 f7 8f dc 32 3f c9 |.._....I.....2?.| +00000010 e6 ad d3 3b 17 a5 1c 47 7c 29 27 44 e0 4c f4 3f |...;...G|)'D.L.?| +[232c 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 3d 27 97 63 36 d5 14 8d 58 |0E.!..,='.c6...X| +00000010 26 64 34 e6 56 c5 0b bc 13 e7 bf ac fd 66 35 48 |&d4.V........f5H| +00000020 68 a5 ee e3 9b 02 20 79 71 42 03 a8 a1 be 07 68 |h..... yqB.....h| +00000030 da 8b ae 5f ad 9b c5 b5 df 00 7d be ec d1 22 cd |..._......}...".| +00000040 28 97 fa fc 24 78 52 |(...$xR| +[232d 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 principal evaluation succeeds for identity 0 +[232e 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 signed by 1 principal evaluation starts (used [true]) +[232f 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 skipping identity 0 because it has already been used +[2330 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 principal evaluation fails +[2331 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56d0 gate 1574140952749194900 evaluation succeeds +[2332 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +[2333 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b appears to be valid +[2334 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0004b2000 +[2335 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002950d40 env 0xc0037a1ae0 txn 0 +[2336 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[2337 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 20ms +[2338 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[2339 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[233a 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +[233b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[233c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[233d 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[233e 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +[233f 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[2340 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[2341 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2342 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +[2343 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] marked as valid by state validator +[2344 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0028b22c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0028b2300), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc0028b2340)} +[2345 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[2346 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[2347 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[2348 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0035131d0)}} +[2349 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +[234a 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[234b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +[234c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +[234d 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +[234e 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +[234f 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +[2350 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2351 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 74 53 85 89 111 88 108 49 90 120 79 106 50 69 54 54 74 87 67 107 49 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 80 49 117 51 118 74 69 71 113 89 89 50 10 54 103 47 56 112 84 98 57 48 122 77 71 56 56 83 47 67 85 121 71 106 74 102 43 80 65 68 82 48 112 111 111 107 51 74 79 85 119 98 118 111 113 82 115 87 67 85 107 79 103 69 113 112 101 78 116 113 67 120 80 110 72 77 81 10 80 98 118 73 71 112 55 90 65 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 98 112 65 97 110 108 101 122 111 51 121 119 49 113 113 76 48 50 122 102 105 114 107 87 108 47 89 101 84 100 81 120 101 114 56 77 52 121 105 98 72 98 107 67 73 66 57 73 71 85 85 79 10 100 111 71 54 121 81 110 66 88 102 121 97 67 116 102 78 89 100 112 101 105 51 69 76 43 116 50 97 78 113 43 106 68 104 110 79 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 61 108 250 203 94 232 89 127 6 108 198 114 165 148 190 58 43 216 54 96 61 77 103 22 10 9 219 159 217 18 207 205 2 32 54 136 234 228 71 153 30 119 84 154 25 200 146 161 37 82 251 34 104 43 90 180 96 243 135 128 12 17 34 227 177 142]} 0x152c9b0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00043bb30 0xc0002c0660 {{0 0} 0 0 0 0} {false}})]} +[2352 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[2353 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00000ffa0})} +[2354 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +[2355 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +[2356 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +[2322 11-19 05:22:32.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +[2357 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4536 bytes, seq: 3}, Envelope: 4566 bytes, Signature: 0 bytes to the block puller +[2358 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +[2359 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +[235a 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[235b 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[235c 11-19 05:22:32.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[235d 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[235e 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4536 bytes, seq: 3}, Envelope: 4566 bytes, Signature: 0 bytes to 1 peers +[235f 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2360 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2361 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4536 bytes, seq: 3}, Envelope: 4566 bytes, Signature: 0 bytes +[2362 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2363 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xaf, 0xe8, 0x73, 0x33, 0x36, 0xd, 0xf9, 0x12, 0x19, 0x79, 0xd, 0x24, 0x42, 0x5b, 0x7d, 0xa9, 0x98, 0xab, 0xce, 0xdc, 0x98, 0x36, 0x45, 0x6e, 0x26, 0x2b, 0x86, 0x76, 0x6a, 0x37, 0x47, 0x75} txOffsets= +txId=afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b locPointer=offset=70, bytesLength=3516 +] +[2364 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to txid-index +[2365 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76908, bytesLength=3516] for tx number:[0] ID: [afc2f7b1a234488bdb40f418bb68134c8e715c013d23ce54a2bec26a31ffa65b] to blockNumTranNum index +[2366 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81396], isChainEmpty=[false], lastBlockNumber=[3] +[2367 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +[2368 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +[2369 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +[236a 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[236b 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[236c 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[236d 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[236e 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[236f 11-19 05:22:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[2370 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +[2371 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[2372 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +[2373 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +[2374 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +[2375 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[2376 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4ac2512f-6564-412e-9ff2-64d2c4add1d0] +[2377 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +[2378 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2379 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +[237a 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4ac2512f-6564-412e-9ff2-64d2c4add1d0] +[237b 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +[237c 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[237d 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08031A0C0A0565787030321203312E30 +[237e 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 05A9254508971A2A7A4210353C12DA46266E8725689AAE2402E27115EB1F84C4 +[237f 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +[2380 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +[2381 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +[2382 11-19 05:22:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +[2383 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 30ms (state_validation=1ms block_and_pvtdata_commit=16ms state_commit=6ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +[2384 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2385 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08041A0C0A0565787030321203312E30 +[2386 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7BFABFB704311033C2236C34CB57C970500115274BCE2C992BB9717AAD08B09E +[2387 11-19 05:22:32.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +[2388 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45618 +[2389 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00346e1e0 +[238a 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[238b 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[238c 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[238d 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[238e 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[238f 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 94 90 09 62 ad c8 15 96 13 9a 06 76 82 03 62 |....b.......v..b| +00000010 50 3c 6b d3 9f 6c cf ad 22 6a 3f ae b8 37 2e 9b |P DEBU Verify: sig = 00000000 30 45 02 21 00 89 7a a7 04 8c fe b5 76 1e 3d b4 |0E.!..z.....v.=.| +00000010 cc 76 3b 14 9f e3 60 4d 92 c3 65 98 12 da b2 0a |.v;...`M..e.....| +00000020 bb 0b 8e 9a 44 02 20 26 b3 f3 ba 82 19 c9 a2 62 |....D. &.......b| +00000030 bd 59 65 61 dc 45 95 1c 01 80 e2 80 ed d9 03 e7 |.Yea.E..........| +00000040 98 07 20 92 39 64 1f |.. .9d.| +[2391 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2392 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002527730, header 0xc00346e5f0 +[2393 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2394 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] processing txid: e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc +[2395 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc] +[2396 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2397 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2398 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2399 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[239a 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[239b 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 gate 1574140953348480200 evaluation starts +[239c 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 signed by 0 principal evaluation starts (used [false]) +[239d 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 processing identity 0 with bytes of 1151ae0 +[239e 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[239f 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 principal evaluation fails +[23a0 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032686c0 gate 1574140953348480200 evaluation fails +[23a1 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[23a2 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[23a3 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[23a4 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 gate 1574140953349755300 evaluation starts +[23a5 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 signed by 0 principal evaluation starts (used [false]) +[23a6 11-19 05:22:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 processing identity 0 with bytes of 1151ae0 +[23a7 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 principal matched by identity 0 +[23a8 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 94 90 09 62 ad c8 15 96 13 9a 06 76 82 03 62 |....b.......v..b| +00000010 50 3c 6b d3 9f 6c cf ad 22 6a 3f ae b8 37 2e 9b |P DEBU Verify: sig = 00000000 30 45 02 21 00 89 7a a7 04 8c fe b5 76 1e 3d b4 |0E.!..z.....v.=.| +00000010 cc 76 3b 14 9f e3 60 4d 92 c3 65 98 12 da b2 0a |.v;...`M..e.....| +00000020 bb 0b 8e 9a 44 02 20 26 b3 f3 ba 82 19 c9 a2 62 |....D. &.......b| +00000030 bd 59 65 61 dc 45 95 1c 01 80 e2 80 ed d9 03 e7 |.Yea.E..........| +00000040 98 07 20 92 39 64 1f |.. .9d.| +[23aa 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 principal evaluation succeeds for identity 0 +[23ab 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003268c60 gate 1574140953349755300 evaluation succeeds +[23ac 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[23ad 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[23ae 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[23af 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[23b0 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[23b1 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc] +[23b2 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] Entry chaincode: name:"exp02" +[23b3 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[23b4 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[23b5 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e0b5b90b] Entry chaincode: name:"exp02" +[23b6 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[23b7 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[23b8 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] handling GET_STATE from chaincode +[23b9 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] getting state for chaincode exp02, key a, channel businesschannel +[23ba 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[23bb 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] Completed GET_STATE. Sending RESPONSE +[23bc 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[23bd 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [e0b5b90b] notifying Txid:e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc, channelID:businesschannel +[23be 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[23bf 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e0b5b90b] Exit chaincode: name:"exp02" (3ms) +[23c0 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[23c1 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc] +[23c2 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] Exit +[23c3 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] Entry chaincode: name:"exp02" +[23c4 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] escc for chaincode name:"exp02" is escc +[23c5 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc, chaincode: exp02} +[23c6 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20FDE79C2AF97DCB662E4D420AC0AC...455254494649434154452D2D2D2D2D0A +[23c7 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AEF743445051F1C7C5EF5471F23C547EC70AAACD2CD55B96AFFC0FC94241D963 +[23c8 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc, chaincode: exp02} +[23c9 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e0b5b90b] Exit +[23ca 11-19 05:22:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e0b5b90bbc0675c1e85e591bef68181f7ffedbb961ee3ed5c87c53a694b9f7cc] +[23cb 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45618 +[23cc 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45618 grpc.code=OK grpc.call_duration=14.4405ms +[23cd 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45618: read: connection reset by peer +[23ce 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[23cf 11-19 05:22:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[23d0 11-19 05:22:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45622 +[23d1 11-19 05:22:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00346f810 +[23d2 11-19 05:22:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[23d3 11-19 05:22:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[23d4 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[23d5 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[23d6 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[23d7 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 84 3b 87 dd 12 e7 47 8d 69 32 72 c9 d7 7f dd |%.;....G.i2r....| +00000010 8d d5 66 93 18 61 1d f7 f9 6c d6 fa 7b 69 f4 a3 |..f..a...l..{i..| +[23d8 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 d5 3a 86 fe 8a e9 6e 46 05 7d |0E.!...:....nF.}| +00000010 4d 6a a2 3f 0d 9a 0b 19 4a f0 7b 7c 0f 4a d1 e4 |Mj.?....J.{|.J..| +00000020 f0 b6 07 b1 58 02 20 49 35 36 66 ec 52 75 e8 62 |....X. I56f.Ru.b| +00000030 c0 ca 58 cc b9 a1 7a ef fb ba a4 93 72 74 3c 59 |..X...z.....rt DEBU exits successfully +[23da 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00015c310, header 0xc00346fc20 +[23db 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[23dc 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] processing txid: e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff +[23dd 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +[23de 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[23df 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[23e0 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[23e1 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[23e2 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[23e3 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 gate 1574140953583015600 evaluation starts +[23e4 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 signed by 0 principal evaluation starts (used [false]) +[23e5 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 processing identity 0 with bytes of 1151ae0 +[23e6 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[23e7 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 principal evaluation fails +[23e8 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308fed0 gate 1574140953583015600 evaluation fails +[23e9 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[23ea 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[23eb 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[23ec 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 gate 1574140953585362600 evaluation starts +[23ed 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 signed by 0 principal evaluation starts (used [false]) +[23ee 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 processing identity 0 with bytes of 1151ae0 +[23ef 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 principal matched by identity 0 +[23f0 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 84 3b 87 dd 12 e7 47 8d 69 32 72 c9 d7 7f dd |%.;....G.i2r....| +00000010 8d d5 66 93 18 61 1d f7 f9 6c d6 fa 7b 69 f4 a3 |..f..a...l..{i..| +[23f1 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 d5 3a 86 fe 8a e9 6e 46 05 7d |0E.!...:....nF.}| +00000010 4d 6a a2 3f 0d 9a 0b 19 4a f0 7b 7c 0f 4a d1 e4 |Mj.?....J.{|.J..| +00000020 f0 b6 07 b1 58 02 20 49 35 36 66 ec 52 75 e8 62 |....X. I56f.Ru.b| +00000030 c0 ca 58 cc b9 a1 7a ef fb ba a4 93 72 74 3c 59 |..X...z.....rt DEBU 0xc003008550 principal evaluation succeeds for identity 0 +[23f3 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008550 gate 1574140953585362600 evaluation succeeds +[23f4 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[23f5 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[23f6 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[23f7 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[23f8 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[23f9 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +[23fa 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] Entry chaincode: name:"exp02" +[23fb 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[23fc 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[23fd 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e3312465] Entry chaincode: name:"exp02" +[23fe 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[23ff 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2400 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] handling GET_STATE from chaincode +[2401 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] getting state for chaincode exp02, key a, channel businesschannel +[2402 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2403 11-19 05:22:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Completed GET_STATE. Sending RESPONSE +[2404 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2405 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] handling GET_STATE from chaincode +[2406 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] getting state for chaincode exp02, key b, channel businesschannel +[2407 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[2408 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Completed GET_STATE. Sending RESPONSE +[2409 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[240a 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] handling PUT_STATE from chaincode +[240b 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Completed PUT_STATE. Sending RESPONSE +[240c 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[240d 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] handling PUT_STATE from chaincode +[240e 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Completed PUT_STATE. Sending RESPONSE +[240f 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2410 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [e3312465] notifying Txid:e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, channelID:businesschannel +[2411 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2412 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e3312465] Exit chaincode: name:"exp02" (8ms) +[2413 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2414 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +[2415 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] Exit +[2416 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] Entry chaincode: name:"exp02" +[2417 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] escc for chaincode name:"exp02" is escc +[2418 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, chaincode: exp02} +[2419 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20CA1CAD5967D43FA79DE0C281BD3E...455254494649434154452D2D2D2D2D0A +[241a 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FA3744604EC0745220E52A669F1D8E96967643DBD515F4EEAA4D42459AB96C7 +[241b 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, chaincode: exp02} +[241c 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e3312465] Exit +[241d 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +[241e 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45622 +[241f 11-19 05:22:33.59 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45622 grpc.code=OK grpc.call_duration=20.3083ms +[2420 11-19 05:22:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45622: read: connection reset by peer +[2421 11-19 05:22:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2422 11-19 05:22:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2423 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45628 +[2424 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00339a410 +[2425 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2426 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2427 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2428 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2429 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE----- +[242a 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +[242b 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[242c 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[242d 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[242e 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e ec 4b 18 e9 04 c6 e7 a9 dc f3 c2 32 96 1e 0e |>.K.........2...| +00000010 83 15 9e 19 a3 46 64 7b ed 16 6f 92 bc 0d ad f2 |.....Fd{..o.....| +[242f 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 06 61 bd ab eb 5b 98 94 fb 6a c8 |0D. ..a...[...j.| +00000010 b4 e1 2b e9 cd 44 64 62 d0 b4 3e 79 1b 86 1d ad |..+..Ddb..>y....| +00000020 f8 3d 3a 30 02 20 0f 95 1b 01 8f 19 62 bb ff 18 |.=:0. ......b...| +00000030 7a 90 5d 8e 8b ac 50 3d 06 a6 16 f4 28 f1 4f 59 |z.]...P=....(.OY| +00000040 f6 91 94 28 2f be |...(/.| +[2430 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2431 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001ac1c0, header 0xc00339a820 +[2432 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2433 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] processing txid: 0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427 +[2434 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427] +[2435 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2436 11-19 05:22:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2437 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2438 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2439 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[243a 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 gate 1574140953780305400 evaluation starts +[243b 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 signed by 0 principal evaluation starts (used [false]) +[243c 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 processing identity 0 with bytes of 1151ae0 +[243d 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[243e 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[243f 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[2440 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 principal matched by identity 0 +[2441 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e ec 4b 18 e9 04 c6 e7 a9 dc f3 c2 32 96 1e 0e |>.K.........2...| +00000010 83 15 9e 19 a3 46 64 7b ed 16 6f 92 bc 0d ad f2 |.....Fd{..o.....| +[2442 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 06 61 bd ab eb 5b 98 94 fb 6a c8 |0D. ..a...[...j.| +00000010 b4 e1 2b e9 cd 44 64 62 d0 b4 3e 79 1b 86 1d ad |..+..Ddb..>y....| +00000020 f8 3d 3a 30 02 20 0f 95 1b 01 8f 19 62 bb ff 18 |.=:0. ......b...| +00000030 7a 90 5d 8e 8b ac 50 3d 06 a6 16 f4 28 f1 4f 59 |z.]...P=....(.OY| +00000040 f6 91 94 28 2f be |...(/.| +[2443 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 principal evaluation succeeds for identity 0 +[2444 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe6840 gate 1574140953780305400 evaluation succeeds +[2445 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[2446 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2447 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2448 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2449 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[244a 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427] +[244b 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] Entry chaincode: name:"exp02" +[244c 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[244d 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[244e 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0726a01d] Entry chaincode: name:"exp02" +[244f 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2450 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2451 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] handling GET_STATE from chaincode +[2452 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] getting state for chaincode exp02, key a, channel businesschannel +[2453 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2454 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] Completed GET_STATE. Sending RESPONSE +[2455 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2456 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [0726a01d] notifying Txid:0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427, channelID:businesschannel +[2457 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2458 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0726a01d] Exit chaincode: name:"exp02" (3ms) +[2459 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[245a 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427] +[245b 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] Exit +[245c 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] Entry chaincode: name:"exp02" +[245d 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] escc for chaincode name:"exp02" is escc +[245e 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427, chaincode: exp02} +[245f 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A1FB8DB453C15DA913223B22B20C...455254494649434154452D2D2D2D2D0A +[2460 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CD4303E1B4487465E0026DF179A9D4CBB83FB5AABF73C49BEBAF1DAC81FE7A10 +[2461 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427, chaincode: exp02} +[2462 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0726a01d] Exit +[2463 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0726a01d0983cf29d962101223edb1b7fcffde7e504d5f97b3cf514acf7ae427] +[2464 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45628 +[2465 11-19 05:22:33.78 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45628 grpc.code=OK grpc.call_duration=10.0232ms +[2467 11-19 05:22:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2466 11-19 05:22:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2468 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[2469 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[246a 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[246b 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100B1801 +[246c 11-19 05:22:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E51D29A451EBBC3912A566C5B5ECACCF1F74C0B4CBCC12145F92D10B1440578 +[246d 11-19 05:22:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[246e 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[246f 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2470 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2471 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2472 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[2473 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2474 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[2475 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2476 11-19 05:22:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2477 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2478 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151023 +[2479 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 88F0C47C3E8817F1A38E02C3B436AF7CDDA4E4B8DDD8F7596BF294752B473E33 +[247a 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[247b 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[247c 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[247d 11-19 05:22:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[247e 11-19 05:22:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[247f 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2480 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2481 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2482 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2483 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2484 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2485 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2486 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2487 11-19 05:22:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2488 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2489 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[248a 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[248b 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[248c 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[248d 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[248e 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[248f 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2490 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2491 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2492 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2493 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2494 11-19 05:22:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2495 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2496 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2497 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2498 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2499 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[249a 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 f0 c4 7c 3e 88 17 f1 a3 8e 02 c3 b4 36 af 7c |...|>........6.|| +00000010 dd a4 e4 b8 dd d8 f7 59 6b f2 94 75 2b 47 3e 33 |.......Yk..u+G>3| +[249b 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 74 6d 61 d7 92 d0 37 5c d1 7f 37 |0D. .tma...7\..7| +00000010 80 ea ae 9e 58 af 59 33 01 05 07 28 d5 45 ec 8e |....X.Y3...(.E..| +00000020 43 bb 26 11 02 20 55 94 b5 d2 83 b2 30 e8 0c 9d |C.&.. U.....0...| +00000030 e8 26 0a ef 92 8f 74 4a bd 3b 42 ab 65 15 26 aa |.&....tJ.;B.e.&.| +00000040 4e 3a cb a4 63 be |N:..c.| +[249c 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[249d 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[249e 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[249f 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[24a0 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[24a1 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24a2 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[24a3 11-19 05:22:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[24a4 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[24a5 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24a6 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[24a7 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24a8 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[24a9 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[24aa 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[24ab 11-19 05:22:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ac 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[24ad 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151024 +[24ae 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7534DDCF4DE7142C5E0B4BD3227F205D65B4AF75B7B92342291D82B1BA4B609B +[24af 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[24b0 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[24b1 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[24b2 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[24b3 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b4 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[24b5 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b6 11-19 05:22:34.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[24b7 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[24b8 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24b9 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[24ba 11-19 05:22:34.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24bb 11-19 05:22:34.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[24bc 11-19 05:22:34.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24bd 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[24be 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[24c0 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24bf 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[24c1 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[24c2 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[24c3 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +[24c4 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +00000040 e2 b3 a6 20 70 d3 80 |... p..| +[24c5 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[24c6 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[24c7 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 db 9e 6e 26 0c b2 72 69 24 c8 2e |0D. &..n&..ri$..| +00000010 6c 99 97 b0 50 e5 19 62 5d df 77 11 30 9a ac c5 |l...P..b].w.0...| +00000020 23 b8 6d 93 02 20 5b 6e d4 1e 04 f2 cb 61 de 97 |#.m.. [n.....a..| +00000030 36 05 80 48 c4 11 b2 82 b9 f1 f6 c9 2e 84 67 14 |6..H..........g.| +00000040 60 c9 fa b3 d6 41 |`....A| +[24c8 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[24c9 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[24ca 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24cb 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24cc 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[24cd 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[24ce 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +[24d0 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +00000040 e2 b3 a6 20 70 d3 80 |... p..| +[24d1 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24d2 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24d3 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24d4 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[24d5 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24d6 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[24d7 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[24d8 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[24d9 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[24da 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[24cf 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24db 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[24dc 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 gate 1574140954897933400 evaluation starts +[24dd 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 signed by 0 principal evaluation starts (used [false]) +[24de 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 processing identity 0 with bytes of 1151ae0 +[24df 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 principal matched by identity 0 +[24e0 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 58 5f 9e 84 58 23 c0 0d 55 27 ae cc 54 1d 9e |.X_..X#..U'..T..| +00000010 78 e5 50 db 12 38 07 10 28 ae d4 13 16 14 39 e5 |x.P..8..(.....9.| +[24e1 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 0f 04 38 98 e2 13 de 7a 5f f8 f5 |0D. ...8....z_..| +00000010 4d ef 7d 3b 3d ad 78 47 bb d4 20 10 bf e2 90 0c |M.};=.xG.. .....| +00000020 6b a6 4f 7d 02 20 1e a6 98 7b 4d f5 e0 ef 90 88 |k.O}. ...{M.....| +00000030 2c 9f a2 3e 04 5e f1 c1 9f 2a 88 fb 94 ed 57 6d |,..>.^...*....Wm| +00000040 40 28 a8 8d b6 bd |@(....| +[24e2 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 principal evaluation succeeds for identity 0 +[24e3 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2dee0 gate 1574140954897933400 evaluation succeeds +[24e4 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[24e5 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[24e6 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[24e7 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[24e8 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24e9 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ea 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[24eb 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +[24ec 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +00000040 ee 6f fc 7d f3 ae |.o.}..| +[24ed 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24ee 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ef 11-19 05:22:34.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f0 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[24f1 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[24f2 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f3 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[24f4 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[24f5 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 5b 55 80 72 a5 2c d4 75 60 f0 79 6a 40 4e ab |.[U.r.,.u`.yj@N.| +00000010 4e 03 31 71 2b d9 64 de 3d fc ae f5 02 7d af a2 |N.1q+.d.=....}..| +[24f6 11-19 05:22:34.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 31 7d 3f db 7d 7d 84 16 74 7c 1c |0D. i1}?.}}..t|.| +00000010 fc e6 0a 27 52 14 a5 a7 23 06 a6 a9 07 7a fa ff |...'R...#....z..| +00000020 5e 93 bb 48 02 20 7f ca 28 94 4d e9 65 31 21 86 |^..H. ..(.M.e1!.| +00000030 7e 2b f4 9b c5 3b 0c a7 5a 29 31 67 4a 56 3f 62 |~+...;..Z)1gJV?b| +00000040 ee 6f fc 7d f3 ae |.o.}..| +[24f7 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24f8 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f9 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[24fa 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 34 dd cf 4d e7 14 2c 5e 0b 4b d3 22 7f 20 5d |u4..M..,^.K.". ]| +00000010 65 b4 af 75 b7 b9 23 42 29 1d 82 b1 ba 4b 60 9b |e..u..#B)....K`.| +[24fb 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 2f 15 29 c1 83 ce 55 a2 c5 be |0E.!../.)...U...| +00000010 b0 dc 12 88 14 0c 62 71 c3 f7 1d ca f1 80 2e 94 |......bq........| +00000020 88 4d 28 09 ac 02 20 01 0b 7b 76 49 e0 e6 71 64 |.M(... ..{vI..qd| +00000030 41 33 33 f1 78 e5 1c 82 4d 80 da 4d 9d 21 ad b9 |A33.x...M..M.!..| +00000040 e2 b3 a6 20 70 d3 80 |... p..| +[24fc 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24fd 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24fe 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ff 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[2500 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2501 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2502 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2503 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2504 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2505 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2506 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2507 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 gate 1574140954914363500 evaluation starts +[2508 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 signed by 0 principal evaluation starts (used [false]) +[2509 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 processing identity 0 with bytes of 1151ae0 +[250a 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 principal matched by identity 0 +[250b 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 27 4c 10 12 8c 30 fd 84 e9 af 08 af b1 48 0c |:'L...0.......H.| +00000010 98 53 ed 1e fa fc d2 fe 8e 8e a3 c3 23 8b fd bb |.S..........#...| +[250c 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e bb 90 f5 51 4e 33 8b 46 78 1c 0d |0D. ~...QN3.Fx..| +00000010 7d b6 f7 41 47 5e ad fe 20 3d 99 5b 05 62 21 eb |}..AG^.. =.[.b!.| +00000020 2f c5 62 4a 02 20 7e ae 9a e6 5d 52 08 73 f6 33 |/.bJ. ~...]R.s.3| +00000030 a9 b7 80 d2 d5 5d 54 85 37 7a ee 40 5e 8c c2 5a |.....]T.7z.@^..Z| +00000040 e5 5b e6 cd c1 ab |.[....| +[250d 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 principal evaluation succeeds for identity 0 +[250e 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e66de0 gate 1574140954914363500 evaluation succeeds +[250f 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2510 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2511 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2512 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2513 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2514 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2515 11-19 05:22:34.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2516 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2517 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2518 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2519 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[251c 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[251a 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[251e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[251b 11-19 05:22:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[251f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[251d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 738 bytes, Signature: 0 bytes +[2520 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 738 bytes, Signature: 0 bytes +[2521 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2522 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[2523 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[2524 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[2525 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[2526 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2527 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2528 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2529 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[252a 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[252b 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[252c 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[252d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[252e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 gate 1574140955315424200 evaluation starts +[252f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 signed by 0 principal evaluation starts (used [false]) +[2530 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 processing identity 0 with bytes of 1151ae0 +[2531 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 principal matched by identity 0 +[2532 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[2533 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[2534 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 principal evaluation succeeds for identity 0 +[2535 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd00 gate 1574140955315424200 evaluation succeeds +[2536 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2537 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2538 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2539 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[253a 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[253b 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[253c 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[253d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[253e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[253f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2540 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2541 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2542 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 gate 1574140955317103400 evaluation starts +[2543 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 signed by 0 principal evaluation starts (used [false]) +[2544 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 processing identity 0 with bytes of 1151ae0 +[2545 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 principal matched by identity 0 +[2546 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 07 1a 4d 44 90 90 66 f9 58 46 8f 08 f4 6b 0b |Y..MD..f.XF...k.| +00000010 f5 23 2e 44 8b 70 c4 db 4b ae 25 29 b0 89 94 61 |.#.D.p..K.%)...a| +[2547 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 cb 20 aa f9 ea f8 b6 d2 04 b3 e7 |0D. `. .........| +00000010 cd 8f 2a 41 f9 79 ed aa aa c8 9e 4d 52 0d f2 5a |..*A.y.....MR..Z| +00000020 d5 93 58 29 02 20 14 ba a2 f7 e2 51 24 d3 11 8c |..X). .....Q$...| +00000030 d2 36 19 fc e6 5c 52 e5 92 69 5f b7 bc 0a 74 f4 |.6...\R..i_...t.| +00000040 34 bf 81 58 8d 6f |4..X.o| +[2548 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 principal evaluation succeeds for identity 0 +[2549 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3dea0 gate 1574140955317103400 evaluation succeeds +[254a 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[254b 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[254c 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[254d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[254e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[254f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2550 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2551 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2552 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2553 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2554 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 gate 1574140955318302800 evaluation starts +[2555 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 signed by 0 principal evaluation starts (used [false]) +[2556 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 processing identity 0 with bytes of 1151ae0 +[2557 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 principal matched by identity 0 +[2558 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 07 1a 4d 44 90 90 66 f9 58 46 8f 08 f4 6b 0b |Y..MD..f.XF...k.| +00000010 f5 23 2e 44 8b 70 c4 db 4b ae 25 29 b0 89 94 61 |.#.D.p..K.%)...a| +[2559 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 cb 20 aa f9 ea f8 b6 d2 04 b3 e7 |0D. `. .........| +00000010 cd 8f 2a 41 f9 79 ed aa aa c8 9e 4d 52 0d f2 5a |..*A.y.....MR..Z| +00000020 d5 93 58 29 02 20 14 ba a2 f7 e2 51 24 d3 11 8c |..X). .....Q$...| +00000030 d2 36 19 fc e6 5c 52 e5 92 69 5f b7 bc 0a 74 f4 |.6...\R..i_...t.| +00000040 34 bf 81 58 8d 6f |4..X.o| +[255a 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 principal evaluation succeeds for identity 0 +[255b 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e149e0 gate 1574140955318302800 evaluation succeeds +[255c 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[255d 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[255e 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[255f 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2560 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2561 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes +[2562 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes +[2563 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[2564 11-19 05:22:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[2565 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2566 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2567 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2568 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2569 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[256a 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[256b 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[256c 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[256d 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 gate 1574140955320491400 evaluation starts +[256e 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 signed by 0 principal evaluation starts (used [false]) +[256f 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 processing identity 0 with bytes of 1151ae0 +[2570 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 principal matched by identity 0 +[2571 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[2572 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[2573 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 principal evaluation succeeds for identity 0 +[2574 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344550 gate 1574140955320491400 evaluation succeeds +[2575 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2576 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2577 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2578 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2579 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[257a 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[257b 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[257c 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[257d 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[257e 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[257f 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2580 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2581 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 gate 1574140955321435600 evaluation starts +[2582 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 signed by 0 principal evaluation starts (used [false]) +[2583 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 processing identity 0 with bytes of 1151ae0 +[2584 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 principal matched by identity 0 +[2585 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 1d 0c b6 e0 ae 67 13 70 30 c6 2a 76 74 ec c2 |......g.p0.*vt..| +00000010 fe fa 9f ee d6 99 59 58 93 06 e5 47 2b 89 9a e2 |......YX...G+...| +[2586 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 25 ef 8c 8c ed 60 3e ed e2 ab 00 |0D. .%....`>....| +00000010 df 89 10 03 db 92 aa 4e 24 e0 2d 81 2b 0e b0 f7 |.......N$.-.+...| +00000020 4e fa 5c 8d 02 20 35 17 c4 7a 21 64 ea a3 cd db |N.\.. 5..z!d....| +00000030 bb 78 d5 67 81 48 b2 9d 3b 95 a3 2a 74 b2 79 5b |.x.g.H..;..*t.y[| +00000040 45 b0 db 39 19 bd |E..9..| +[2587 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 principal evaluation succeeds for identity 0 +[2588 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000345780 gate 1574140955321435600 evaluation succeeds +[2589 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[258a 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[258b 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[258c 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[258d 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +[258e 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +00000040 ce 49 35 84 96 6c f3 |.I5..l.| +[258f 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2590 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2591 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2592 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2593 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2594 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 gate 1574140955322331700 evaluation starts +[2595 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 signed by 0 principal evaluation starts (used [false]) +[2596 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 processing identity 0 with bytes of 1151ae0 +[2597 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2598 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 principal evaluation fails +[2599 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037f210 gate 1574140955322331700 evaluation fails +[259a 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[259b 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[259c 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[259d 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 gate 1574140955322611500 evaluation starts +[259e 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 signed by 0 principal evaluation starts (used [false]) +[259f 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 processing identity 0 with bytes of 1151ae0 +[25a0 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 principal matched by identity 0 +[25a1 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +[25a2 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +00000040 ce 49 35 84 96 6c f3 |.I5..l.| +[25a3 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 principal evaluation succeeds for identity 0 +[25a4 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fa30 gate 1574140955322611500 evaluation succeeds +[25a5 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[25a6 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[25a7 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25a8 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25a9 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25aa 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes +[25ab 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes +[25ac 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25ad 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25af 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25ae 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 38 12 af 40 27 28 9e d8 e5 6a 97 6c d9 40 48 |<8..@'(...j.l.@H| +00000010 be 7c 80 9e 1e 10 2e ec a9 14 04 15 ee 22 d2 ed |.|..........."..| +[25b0 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 d1 0a a5 78 62 d1 f6 c5 c4 8d |0E.!.....xb.....| +00000010 5c 45 14 fe a7 ff f2 03 cc d6 de a3 58 c6 14 32 |\E..........X..2| +00000020 f3 2e 8c 49 5a 02 20 1f a5 97 0f 09 3c c8 7c d7 |...IZ. .....<.|.| +00000030 ac c1 51 63 f5 89 2b 34 8f 49 62 d2 70 fb a7 1e |..Qc..+4.Ib.p...| +00000040 76 d7 a1 f9 73 1e 2c |v...s.,| +[25b1 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25b2 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25b3 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[25b4 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25b5 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25b6 11-19 05:22:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25b7 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25b8 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25b9 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 gate 1574140955330728500 evaluation starts +[25ba 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 signed by 0 principal evaluation starts (used [false]) +[25bb 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 processing identity 0 with bytes of 1151ae0 +[25bc 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 principal matched by identity 0 +[25bd 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 73 eb d0 fa 8e 88 8d 9f 14 4a 69 d9 eb 9d a8 |6s........Ji....| +00000010 f0 3a 69 60 a3 f8 2b 81 99 ba f9 1f 78 f2 67 01 |.:i`..+.....x.g.| +[25be 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ea 22 11 f4 1d 2a 2a bb 00 c4 |0E.!..."...**...| +00000010 ca 9f ca fa c1 24 19 3c ec 9d fb 51 45 cc 0d d8 |.....$.<...QE...| +00000020 52 58 a2 d2 e5 02 20 41 5c a3 56 ac 81 0f 07 8f |RX.... A\.V.....| +00000030 f6 84 1f 98 46 37 d9 75 8f 50 d7 d8 1c 1f 41 0d |....F7.u.P....A.| +00000040 96 fe c8 1a b0 f6 ee |.......| +[25bf 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 principal evaluation succeeds for identity 0 +[25c0 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e950 gate 1574140955330728500 evaluation succeeds +[25c1 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25c2 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25c3 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25c4 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25c5 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e b6 8d cb af e4 5c 8d ea 27 4b 10 00 00 d7 02 |......\..'K.....| +00000010 68 b1 d0 2d 4c 4e cf 1e 1b a5 f1 0b 3e 98 73 fa |h..-LN......>.s.| +[25c6 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 12 3d fc e4 95 a2 6d c5 dc 19 d7 |0D. e.=....m....| +00000010 08 45 86 6b 24 2f 0b f4 45 2d 4b 3a 67 97 f0 28 |.E.k$/..E-K:g..(| +00000020 a2 a0 f8 e2 02 20 46 25 f3 cf 3e 7f 0c d6 d2 6b |..... F%..>....k| +00000030 18 e4 3b 1e cf c7 a8 a5 f7 31 83 f9 1f f0 7f 79 |..;......1.....y| +00000040 fc 5f 40 3d d0 ca |._@=..| +[25c7 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25c8 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25c9 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[25ca 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25cb 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25cc 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25cd 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25ce 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25cf 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 gate 1574140955333571700 evaluation starts +[25d0 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 signed by 0 principal evaluation starts (used [false]) +[25d1 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 processing identity 0 with bytes of 1151ae0 +[25d2 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 principal matched by identity 0 +[25d3 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +[25d4 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +00000040 e8 ee cb dc 9d d1 31 |......1| +[25d5 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 principal evaluation succeeds for identity 0 +[25d6 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ded10 gate 1574140955333571700 evaluation succeeds +[25d7 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25d8 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25d9 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25da 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25db 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25dc 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25dd 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25de 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25df 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25e0 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25e1 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 gate 1574140955334160200 evaluation starts +[25e2 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 signed by 0 principal evaluation starts (used [false]) +[25e3 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 processing identity 0 with bytes of 1151ae0 +[25e4 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 principal matched by identity 0 +[25e5 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df df 15 fe 6f a0 ab 7d b4 3c dd 81 73 71 d2 85 |....o..}.<..sq..| +00000010 5e 06 d2 79 dd 05 3e 7b 75 bb 4d 0d b0 6e 64 17 |^..y..>{u.M..nd.| +[25e6 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 20 53 b6 ba e7 6d 63 db 18 8e |0E.!.. S...mc...| +00000010 7a 28 95 f1 0c c7 58 a4 d5 7f 97 db c8 fd ff d4 |z(....X.........| +00000020 3a 5a bb c6 01 02 20 1a 6e e4 aa 6a c7 ff 94 e2 |:Z.... .n..j....| +00000030 50 7a a9 3d 73 d7 01 c6 a4 a5 b3 10 ff 43 c6 3f |Pz.=s........C.?| +00000040 e8 ee cb dc 9d d1 31 |......1| +[25e7 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 principal evaluation succeeds for identity 0 +[25e8 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a2100 gate 1574140955334160200 evaluation succeeds +[25e9 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25ea 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25eb 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25ec 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25ed 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25ee 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +[25ef 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25f0 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25f1 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[25f2 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f3 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[25f4 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f5 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[25f6 11-19 05:22:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f7 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[25f8 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[25f9 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +[25fa 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +00000040 6c a7 69 f0 df 61 |l.i..a| +[25fb 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25fc 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[25fd 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[25fe 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +[25ff 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +00000040 6c a7 69 f0 df 61 |l.i..a| +[2600 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2601 11-19 05:22:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2602 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2603 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2604 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2605 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2606 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2607 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[2608 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2609 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[260a 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[260c 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[260d 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[260e 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[260f 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2610 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2611 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 gate 1574140955394668000 evaluation starts +[2612 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 signed by 0 principal evaluation starts (used [false]) +[2613 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 processing identity 0 with bytes of 1151ae0 +[2614 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 principal matched by identity 0 +[2615 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 3a 00 bc 69 6e f2 13 07 74 24 f5 45 d6 de aa |$:..in...t$.E...| +00000010 c8 2e fa ed 3e 0e 08 74 51 bb 9a f4 a4 27 56 e8 |....>..tQ....'V.| +[2616 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 87 8d e1 a2 9c bd 35 2b 82 00 |0E.!........5+..| +00000010 b5 85 be 42 91 7e 25 23 ee b5 0b d2 23 76 6d f5 |...B.~%#....#vm.| +00000020 ab e6 5e 75 42 02 20 08 f3 e3 7f f3 ea b1 91 6b |..^uB. ........k| +00000030 bb aa 34 d7 eb c2 78 5e 41 d6 60 1b ff f5 bb 3f |..4...x^A.`....?| +00000040 c7 da 72 ab d1 8c c8 |..r....| +[2617 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 principal evaluation succeeds for identity 0 +[2618 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca430 gate 1574140955394668000 evaluation succeeds +[2619 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[261a 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[261b 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[261c 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[261d 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[261e 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[261f 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2620 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2621 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2622 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2623 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2624 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2625 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2626 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2627 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[260b 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2628 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2629 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[262a 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[262b 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[262c 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[262d 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[262e 11-19 05:22:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[262f 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2630 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2631 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2632 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2633 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2635 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2636 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2637 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2634 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2638 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2639 11-19 05:22:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[263a 11-19 05:22:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[263b 11-19 05:22:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[263c 11-19 05:22:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[263d 11-19 05:22:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[263e 11-19 05:22:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[263f 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2641 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2642 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2640 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2644 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2643 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2646 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +[2645 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2647 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2648 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2649 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[264a 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[264b 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[264c 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[264d 11-19 05:22:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[264e 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +[264f 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +[2650 11-19 05:22:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2651 11-19 05:22:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2652 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2653 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2654 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2655 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[2656 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2657 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2658 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2659 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[265a 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[265b 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[265c 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[265d 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 gate 1574140955482954600 evaluation starts +[265e 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 signed by 0 principal evaluation starts (used [false]) +[265f 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 processing identity 0 with bytes of 1151ae0 +[2660 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 principal matched by identity 0 +[2661 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +[2662 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +[2663 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 principal evaluation succeeds for identity 0 +[2664 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9630 gate 1574140955482954600 evaluation succeeds +[2665 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2666 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2667 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2668 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2669 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[266a 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[266b 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[266c 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[266d 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[266e 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[266f 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2670 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2671 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[2672 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2673 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2674 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2675 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2676 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\004^\361\301\237*\210\373\224\355Wm@(\250\215\266\275" > alive: +[2677 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2678 11-19 05:22:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2679 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[267a 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[267b 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[267c 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[267d 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[267e 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 gate 1574140955645881200 evaluation starts +[267f 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 signed by 0 principal evaluation starts (used [false]) +[2680 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 processing identity 0 with bytes of 1151ae0 +[2681 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 principal matched by identity 0 +[2682 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 4f 02 b1 dd 79 38 c3 d4 c0 7b 5a 1b 90 55 b2 |uO...y8...{Z..U.| +00000010 b0 8d 58 f8 f2 44 de 1f dd 29 94 6d be eb 3d 54 |..X..D...).m..=T| +[2683 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 74 64 2b 13 00 82 9a a8 f3 06 |0E.!..td+.......| +00000010 a1 1a fb 4a ba ca e8 d4 8d 30 21 2a b0 df 8b 51 |...J.....0!*...Q| +00000020 2e f9 74 ff 10 02 20 42 55 c1 91 45 24 2e 67 23 |..t... BU..E$.g#| +00000030 bd 0c 51 c0 22 7f f7 9f 26 0d 7d d0 bc 38 8a 2d |..Q."...&.}..8.-| +00000040 dd 1a 5c d7 7b 12 d6 |..\.{..| +[2684 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 principal evaluation succeeds for identity 0 +[2685 11-19 05:22:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6d20 gate 1574140955645881200 evaluation succeeds +[2686 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[2687 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[2688 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[2689 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[268a 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +[268b 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +[268c 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[268d 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +[268e 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes to the block puller +[268f 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +[2690 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +[2691 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +[2692 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +[2693 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +[2694 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +[2695 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[2696 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0026f19c0 env 0xc002f41130 txn 0 +[2697 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002f41130 +[2698 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +[2699 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[269a 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[269b 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[269c 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[269d 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[269e 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c0 b3 ab 85 aa 28 ac a0 48 cd eb e0 3f c0 10 |......(..H...?..| +00000010 fa ba 63 4b 4c 70 86 bb ba 67 f9 8c 83 44 7d da |..cKLp...g...D}.| +[269f 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ba 1f e0 56 b8 c9 8f 25 b9 ac a3 |0D. +...V...%...| +00000010 12 3b e9 8e 83 b7 ad 48 2a a8 cc bc a2 c1 8d f1 |.;.....H*.......| +00000020 a6 e6 65 91 02 20 10 fb c7 3f ec 92 df 9d 88 d2 |..e.. ...?......| +00000030 a5 4a 4a 02 63 87 22 e8 5c dd d5 12 ce 57 f2 ab |.JJ.c.".\....W..| +00000040 85 6b 5f 12 56 05 |.k_.V.| +[26a0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[26a1 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0033b1800, header channel_header:"\010\003\032\014\010\231\370\315\356\005\020\354\223\250\223\002\"\017businesschannel*@e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\311\246\305^/\233\327\211\r\366c\365)\222P:}\304T\021\323\275EF" +[26a2 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[26a3 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[26a4 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[26a5 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[26a6 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] +[26a7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[26a8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0002b2800 +[26a9 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [92fb203f-242c-4db7-a1dc-7eab9a54f7a9] +[26aa 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[26ab 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [92fb203f-242c-4db7-a1dc-7eab9a54f7a9] +[26ac 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +[26ad 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8cfb92f2-80b4-4ddc-b933-325abf199acf] +[26ae 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8cfb92f2-80b4-4ddc-b933-325abf199acf] +[26af 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 gate 1574140955652694900 evaluation starts +[26b0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 signed by 0 principal evaluation starts (used [false]) +[26b1 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 processing identity 0 with bytes of 1151ae0 +[26b2 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 principal matched by identity 0 +[26b3 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f a3 74 46 04 ec 07 45 22 0e 52 a6 69 f1 d8 e9 |..tF...E".R.i...| +00000010 69 67 64 3d bd 51 5f 4e ea a4 d4 24 59 ab 96 c7 |igd=.Q_N...$Y...| +[26b4 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 83 48 62 d2 15 d8 8b 02 94 61 |0E.!...Hb......a| +00000010 a3 bc 7f a1 61 8c 6a 43 bb 2b c7 21 7f 34 7b b4 |....a.jC.+.!.4{.| +00000020 16 d9 74 39 e5 02 20 29 7d 53 f0 81 0a 5f 5b ce |..t9.. )}S..._[.| +00000030 cc 8b 9f de 9b 11 47 a5 fe bd d1 5b bf c4 05 d9 |......G....[....| +00000040 ac 19 ac 2b e3 a2 e5 |...+...| +[26b5 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 principal evaluation succeeds for identity 0 +[26b6 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 signed by 1 principal evaluation starts (used [true]) +[26b7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 skipping identity 0 because it has already been used +[26b8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 principal evaluation fails +[26b9 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435090 gate 1574140955652694900 evaluation succeeds +[26ba 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5c4240cb-d90e-46b3-bdb3-dab94a1ea567] +[26bb 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5c4240cb-d90e-46b3-bdb3-dab94a1ea567] +[26bc 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +[26bd 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff appears to be valid +[26be 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0002b2800 +[26bf 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0026f19c0 env 0xc002f41130 txn 0 +[26c0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[26c1 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 1ms +[26c2 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[26c3 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[26c4 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +[26c5 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[26c6 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[26c7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[26c8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +[26c9 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[26ca 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[26cb 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[26cc 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[26cd 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[26ce 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[26cf 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[26d0 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[26d1 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] marked as valid by state validator +[26d2 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0003cebc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0003cec00)} +[26d3 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[26d4 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[26d5 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[26d6 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +[26d7 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +[26d8 11-19 05:22:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +[26d9 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[26db 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[26da 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26dc 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26dd 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26de 11-19 05:22:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[26df 11-19 05:22:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e0 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e1 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes to 1 peers +[26e2 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e3 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e4 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3998 bytes, seq: 4}, Envelope: 4028 bytes, Signature: 0 bytes +[26e5 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26e6 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[26e7 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e9 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[26e8 11-19 05:22:35.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26ea 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +[26eb 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[26ec 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +[26ed 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +00000040 ce 49 35 84 96 6c f3 |.I5..l.| +[26ee 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x4, 0xe7, 0xc, 0x85, 0x3a, 0x49, 0x30, 0x52, 0x72, 0xab, 0xdb, 0xa8, 0x7b, 0x33, 0xba, 0x1c, 0xf9, 0x58, 0x99, 0xbf, 0x89, 0xa6, 0x5d, 0x1d, 0xca, 0x40, 0x6d, 0xa0, 0xbc, 0x4d, 0x3d, 0x62} txOffsets= +txId=e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff locPointer=offset=70, bytesLength=2977 +] +[26ef 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26f0 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[26f1 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81466, bytesLength=2977] for tx ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to txid-index +[26f3 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +[26f4 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +00000040 ce 49 35 84 96 6c f3 |.I5..l.| +[26f5 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26f2 11-19 05:22:35.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81466, bytesLength=2977] for tx number:[0] ID: [e3312465ad6c4e73335f180e6e5b5d281233f1640cb75bbcce7edbc9c87e4bff] to blockNumTranNum index +[26f6 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26f7 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[26f8 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[26f9 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[26fa 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26fb 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85416], isChainEmpty=[false], lastBlockNumber=[4] +[26fc 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +[26fd 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +[26fe 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +[26ff 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[2700 11-19 05:22:35.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[2701 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[2702 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[2703 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[2704 11-19 05:22:35.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[2705 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[2706 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[2707 11-19 05:22:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +[2708 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +[2709 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +[270a 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +[270b 11-19 05:22:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +[270c 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +[270d 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 100ms (state_validation=0ms block_and_pvtdata_commit=64ms state_commit=23ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +[270e 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[270f 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08051A0C0A0565787030321203312E30 +[2710 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 73543614597B3F6ACBC89C1C8626F558304D8E14B0F9BE74ACF13EC65C4602EF +[2711 11-19 05:22:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +[2712 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2713 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2714 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 50 99 c8 5c bb e2 6e 23 92 b8 a9 3f 6a 20 4d |.P..\..n#...?j M| +00000010 a2 73 55 ac 96 21 45 84 ef 0d 11 cc 25 c6 5b 77 |.sU..!E.....%.[w| +[2715 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc c8 24 f7 c3 8d 2a 76 f3 11 e9 |0E.!...$...*v...| +00000010 db 8e 94 f1 2a 28 ed fd 83 5a 8d c8 8d 87 cf 62 |....*(...Z.....b| +00000020 43 0f be d8 6c 02 20 0e 17 43 9c 59 28 d9 3d 88 |C...l. ..C.Y(.=.| +00000030 13 03 1d e2 06 88 a4 58 00 93 ae a9 af 48 df c6 |.......X.....H..| +00000040 ce 49 35 84 96 6c f3 |.I5..l.| +[2716 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2717 11-19 05:22:35.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2718 11-19 05:22:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2719 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[271a 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[271b 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[271c 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[271d 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a cc 27 83 b1 e7 ff 4a b4 a4 9e 4f de 82 de e9 |J.'....J...O....| +00000010 b2 1a 64 00 36 a8 20 a9 42 c7 26 bb 6f d1 78 fb |..d.6. .B.&.o.x.| +[271e 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 24 ee 38 6d 7d 75 4e ba db 1d de |0D. .$.8m}uN....| +00000010 82 fe d5 e1 0a 39 11 9d 73 73 1e 41 8a 7f a4 08 |.....9..ss.A....| +00000020 18 9e 0d c9 02 20 43 82 73 95 f0 88 8e 61 1f 36 |..... C.s....a.6| +00000030 69 29 0f bb 93 16 ee e3 e7 c1 29 22 79 b1 09 4c |i)........)"y..L| +00000040 5b 67 24 b0 a4 ed |[g$...| +[271f 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2720 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2721 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2722 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2723 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2724 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2725 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2726 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2727 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2728 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2729 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[272a 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[272b 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[272c 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[272d 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[272e 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[272f 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2730 11-19 05:22:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2731 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[2732 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2733 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2734 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2735 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2736 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2738 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2737 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2739 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[273a 11-19 05:22:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[273b 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[273c 11-19 05:22:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[273d 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[273e 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[273f 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2740 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2741 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2742 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2743 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2744 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[2745 11-19 05:22:35.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2746 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2747 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2748 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2749 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[274a 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[274b 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[274c 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[274d 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[274e 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[274f 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2750 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2751 11-19 05:22:35.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2752 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 gate 1574140955869985700 evaluation starts +[2753 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 signed by 0 principal evaluation starts (used [false]) +[2754 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 processing identity 0 with bytes of 1151ae0 +[2755 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 principal matched by identity 0 +[2756 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +[2757 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +00000040 a6 8d b8 3d 10 d6 5d |...=..]| +[2758 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 principal evaluation succeeds for identity 0 +[2759 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d2ae0 gate 1574140955869985700 evaluation succeeds +[275a 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[275b 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[275c 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[275d 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[275e 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[275f 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2760 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2761 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2762 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2763 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2764 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2765 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2766 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[2767 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2768 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2769 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[276a 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[276b 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[276c 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[276d 11-19 05:22:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[276e 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[276f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2770 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2771 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2772 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2773 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2774 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2775 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[2776 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2777 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2778 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2779 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[277a 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[277b 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[277c 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[277d 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 gate 1574140955893412800 evaluation starts +[277e 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 signed by 0 principal evaluation starts (used [false]) +[277f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 processing identity 0 with bytes of 1151ae0 +[2780 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 principal matched by identity 0 +[2781 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 dc b0 74 49 6b 26 d8 5b 9b c3 0b f4 44 b4 dd |Y..tIk&.[....D..| +00000010 34 b4 c8 2b 4f 4b 9e 23 a3 d3 f0 98 8f 3b 3f 59 |4..+OK.#.....;?Y| +[2782 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 19 20 40 f1 2d de 88 a3 58 6c 35 |0D. /. @.-...Xl5| +00000010 4d ad 1d 91 1b 51 39 d3 1d 23 ef 51 8d e4 e5 20 |M....Q9..#.Q... | +00000020 ac 8f d5 90 02 20 41 5a 4e 90 6a 30 27 93 be f0 |..... AZN.j0'...| +00000030 b1 59 41 bc 2e b0 68 b6 3f d9 3c 18 98 6b ab 9e |.YA...h.?.<..k..| +00000040 8c a2 2d 94 69 55 |..-.iU| +[2783 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 principal evaluation succeeds for identity 0 +[2784 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004db040 gate 1574140955893412800 evaluation succeeds +[2785 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2786 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2787 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2788 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2789 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[278a 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" lastAliveTS: 1574140895837304100, 38 but got ts: inc_num:1574140895837304100 seq_num:37 +[278b 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[278c 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[278d 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[278e 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[278f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2790 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2791 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2792 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2793 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2794 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2795 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2796 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2797 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2798 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2799 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[279a 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[279b 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[279c 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[279d 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[279e 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[279f 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27a0 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27a1 11-19 05:22:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27a2 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27a3 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27a4 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27a5 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27a6 11-19 05:22:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27a7 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[27a8 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[27a9 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27aa 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[27ab 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[27ac 11-19 05:22:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +[27ad 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +[27ae 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[27af 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f f1 35 b3 39 58 6f d9 26 57 8f d1 |0D. ..5.9Xo.&W..| +00000010 aa a6 eb 4f 50 60 bc 2d ba 7b fb ac 75 93 55 d8 |...OP`.-.{..u.U.| +00000020 4c 07 91 85 02 20 5c e0 ce ab eb c2 12 14 27 55 |L.... \.......'U| +00000030 b8 1a 12 54 ae 7f 0e a2 9a 23 a8 92 5a b0 58 51 |...T.....#..Z.XQ| +00000040 48 74 a9 08 7f 27 |Ht...'| +[27b0 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[27b1 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[27b2 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[27b3 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[27b4 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[27b5 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b6 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b7 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b8 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[27b9 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27ba 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27bb 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[27bc 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[27bd 11-19 05:22:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27be 11-19 05:22:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[27bf 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[27c0 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[27c1 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c2 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c3 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c4 11-19 05:22:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27c5 11-19 05:22:35.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[27c6 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[27c7 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c8 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27c9 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27ca 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27cb 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27cc 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27cd 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27ce 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 gate 1574140955994211700 evaluation starts +[27cf 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 signed by 0 principal evaluation starts (used [false]) +[27d1 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 processing identity 0 with bytes of 1151ae0 +[27d0 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[27d2 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 principal matched by identity 0 +[27d3 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +[27d4 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +00000040 69 8f 2f 73 d4 04 6d |i./s..m| +[27d5 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 principal evaluation succeeds for identity 0 +[27d6 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed610 gate 1574140955994211700 evaluation succeeds +[27d7 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27d8 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27d9 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27da 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27db 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27dc 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27dd 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27de 11-19 05:22:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27df 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27e0 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27e1 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27e2 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 gate 1574140956001095700 evaluation starts +[27e3 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 signed by 0 principal evaluation starts (used [false]) +[27e4 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 processing identity 0 with bytes of 1151ae0 +[27e5 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 principal matched by identity 0 +[27e6 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +[27e7 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +00000040 69 8f 2f 73 d4 04 6d |i./s..m| +[27e8 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 principal evaluation succeeds for identity 0 +[27e9 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a0220 gate 1574140956001095700 evaluation succeeds +[27ea 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27eb 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27ec 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27ed 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27ee 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27ef 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[27f0 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27f1 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27f2 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27f3 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27f4 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27f5 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27f6 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27f7 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 gate 1574140956004086700 evaluation starts +[27f8 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 signed by 0 principal evaluation starts (used [false]) +[27f9 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 processing identity 0 with bytes of 1151ae0 +[27fa 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 principal matched by identity 0 +[27fb 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +[27fc 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +00000040 69 8f 2f 73 d4 04 6d |i./s..m| +[27fd 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 principal evaluation succeeds for identity 0 +[27fe 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025a1880 gate 1574140956004086700 evaluation succeeds +[27ff 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2800 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2801 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2802 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2803 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2804 11-19 05:22:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2805 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2806 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2807 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[2808 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2809 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[280a 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[280b 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[280c 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[280d 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[280e 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[280f 11-19 05:22:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[2810 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2811 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2812 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2813 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2814 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2815 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2816 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2817 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 gate 1574140956021918600 evaluation starts +[2818 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 signed by 0 principal evaluation starts (used [false]) +[2819 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 processing identity 0 with bytes of 1151ae0 +[281a 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 principal matched by identity 0 +[281b 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +[281c 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +00000040 69 8f 2f 73 d4 04 6d |i./s..m| +[281d 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 principal evaluation succeeds for identity 0 +[281e 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b9670 gate 1574140956021918600 evaluation succeeds +[281f 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2820 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2821 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2822 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2823 11-19 05:22:36.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2824 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45632 +[2825 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0029560f0 +[2826 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2827 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2828 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2829 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +[282a 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[282b 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 20 a6 c2 c8 23 97 0f 05 f6 02 6b d9 33 e1 59 |o ...#.....k.3.Y| +00000010 6d 5d e1 9d b7 c7 18 4b 7a c4 7d 2f 9e f7 17 c0 |m].....Kz.}/....| +[282c 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 e0 a1 34 fe 9e f4 ab c9 e3 78 |0E.!....4......x| +00000010 9a 7c 89 40 17 8a 29 ff 17 ad 58 d0 23 5d 7d 5e |.|.@..)...X.#]}^| +00000020 4f 11 cd 8e 8d 02 20 12 65 9b a0 91 4a 26 dc 1c |O..... .e...J&..| +00000030 ff 69 97 50 ff e3 2a bd 15 ec d3 95 3d 64 68 a1 |.i.P..*.....=dh.| +00000040 df 4e 2f bc 7b 3b 79 |.N/.{;y| +[282d 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[282e 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002bb420, header 0xc002956550 +[282f 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2830 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] processing txid: 596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936 +[2831 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936] +[2832 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2833 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2834 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2835 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2836 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2837 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 gate 1574140956135937900 evaluation starts +[2838 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 signed by 0 principal evaluation starts (used [false]) +[2839 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 processing identity 0 with bytes of 1151ae0 +[283a 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 principal matched by identity 0 +[283b 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 20 a6 c2 c8 23 97 0f 05 f6 02 6b d9 33 e1 59 |o ...#.....k.3.Y| +00000010 6d 5d e1 9d b7 c7 18 4b 7a c4 7d 2f 9e f7 17 c0 |m].....Kz.}/....| +[283c 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 e0 a1 34 fe 9e f4 ab c9 e3 78 |0E.!....4......x| +00000010 9a 7c 89 40 17 8a 29 ff 17 ad 58 d0 23 5d 7d 5e |.|.@..)...X.#]}^| +00000020 4f 11 cd 8e 8d 02 20 12 65 9b a0 91 4a 26 dc 1c |O..... .e...J&..| +00000030 ff 69 97 50 ff e3 2a bd 15 ec d3 95 3d 64 68 a1 |.i.P..*.....=dh.| +00000040 df 4e 2f bc 7b 3b 79 |.N/.{;y| +[283d 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 principal evaluation succeeds for identity 0 +[283e 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b4f0 gate 1574140956135937900 evaluation succeeds +[283f 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[2840 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2841 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2842 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2843 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2844 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936] +[2845 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] Entry chaincode: name:"exp02" +[2846 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2847 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2848 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][596b201f] Entry chaincode: name:"exp02" +[2849 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[284a 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[284b 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] handling GET_STATE from chaincode +[284c 11-19 05:22:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] getting state for chaincode exp02, key a, channel businesschannel +[284d 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[284e 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] Completed GET_STATE. Sending RESPONSE +[284f 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2850 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [596b201f] notifying Txid:596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936, channelID:businesschannel +[2851 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2852 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][596b201f] Exit chaincode: name:"exp02" (4ms) +[2853 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2854 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936] +[2855 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] Exit +[2856 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] Entry chaincode: name:"exp02" +[2857 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] escc for chaincode name:"exp02" is escc +[2858 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936, chaincode: exp02} +[2859 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20B3675A164ED3C0332F68DD93B59F...455254494649434154452D2D2D2D2D0A +[285a 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BB80426DB5A2F8F5B59EDB9927868BAD56DAA486970AE2D0CFEB78C0C3038A87 +[285b 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936, chaincode: exp02} +[285c 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][596b201f] Exit +[285d 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [596b201ff313f1a29f3b995340b18299513780b78143dc624c7c112af75d9936] +[285e 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45632 +[285f 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45632 grpc.code=OK grpc.call_duration=13.2942ms +[2860 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.5:45632: read: connection reset by peer +[2861 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2862 11-19 05:22:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2863 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2864 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2865 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2866 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2867 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2868 11-19 05:22:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2869 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[286a 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[286b 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[286c 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[286d 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[286e 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[286f 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2870 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2871 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2872 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 gate 1574140956201900200 evaluation starts +[2873 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 signed by 0 principal evaluation starts (used [false]) +[2874 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 processing identity 0 with bytes of 1151ae0 +[2875 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 principal matched by identity 0 +[2876 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +[2877 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +00000040 88 2a 2f cc b4 72 |.*/..r| +[2878 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 principal evaluation succeeds for identity 0 +[2879 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025db370 gate 1574140956201900200 evaluation succeeds +[287a 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[287b 11-19 05:22:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[287c 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[287d 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[287e 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[287f 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2880 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2881 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2882 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2883 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2884 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2885 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 gate 1574140956210656100 evaluation starts +[2886 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 signed by 0 principal evaluation starts (used [false]) +[2887 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 processing identity 0 with bytes of 1151ae0 +[2888 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 principal matched by identity 0 +[2889 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +[288a 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +00000040 88 2a 2f cc b4 72 |.*/..r| +[288b 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 principal evaluation succeeds for identity 0 +[288c 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dbfc0 gate 1574140956210656100 evaluation succeeds +[288d 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[288e 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[288f 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2890 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2891 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2892 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2893 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2894 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[2895 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2896 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2897 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2898 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2899 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[289a 11-19 05:22:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[289b 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[289c 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[289d 11-19 05:22:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[289e 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[289f 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[28a0 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[28a1 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[28a2 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[28a3 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[28a4 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 gate 1574140956231514900 evaluation starts +[28a5 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 signed by 0 principal evaluation starts (used [false]) +[28a6 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 processing identity 0 with bytes of 1151ae0 +[28a7 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 principal matched by identity 0 +[28a8 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +[28a9 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +00000040 88 2a 2f cc b4 72 |.*/..r| +[28aa 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 principal evaluation succeeds for identity 0 +[28ab 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026821b0 gate 1574140956231514900 evaluation succeeds +[28ac 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[28ad 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[28ae 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[28af 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[28b0 11-19 05:22:36.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28b1 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45636 +[28b2 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002913270 +[28b3 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[28b4 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[28b5 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[28b6 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +[28b7 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[28b8 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 30 7b 3c a3 61 a9 9a b4 b3 ae 4d 22 d8 eb 14 |.0{<.a.....M"...| +00000010 bb 61 b1 be f4 e7 39 71 dd ba 94 be f4 3b 46 44 |.a....9q.....;FD| +[28b9 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd c0 7d c7 ea ac 30 cd c3 37 98 |0E.!...}...0..7.| +00000010 61 e6 20 0e 1f dd 7b 27 b1 53 51 66 45 1a bd 85 |a. ...{'.SQfE...| +00000020 3b 53 43 8d e3 02 20 3f 51 a4 95 be 40 35 fc e7 |;SC... ?Q...@5..| +00000030 45 b8 3c 00 73 1b a5 9b 5b f1 12 ca b3 6c d3 4e |E.<.s...[....l.N| +00000040 dd 05 69 23 ae 83 eb |..i#...| +[28ba 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[28bb 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001d98f0, header 0xc002913680 +[28bc 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[28bd 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] processing txid: 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 +[28be 11-19 05:22:36.36 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +[28bf 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[28c0 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[28c1 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[28c2 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[28c3 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[28c4 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 gate 1574140956371443600 evaluation starts +[28c5 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 signed by 0 principal evaluation starts (used [false]) +[28c6 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 processing identity 0 with bytes of 1151ae0 +[28c7 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 principal matched by identity 0 +[28c8 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 30 7b 3c a3 61 a9 9a b4 b3 ae 4d 22 d8 eb 14 |.0{<.a.....M"...| +00000010 bb 61 b1 be f4 e7 39 71 dd ba 94 be f4 3b 46 44 |.a....9q.....;FD| +[28c9 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd c0 7d c7 ea ac 30 cd c3 37 98 |0E.!...}...0..7.| +00000010 61 e6 20 0e 1f dd 7b 27 b1 53 51 66 45 1a bd 85 |a. ...{'.SQfE...| +00000020 3b 53 43 8d e3 02 20 3f 51 a4 95 be 40 35 fc e7 |;SC... ?Q...@5..| +00000030 45 b8 3c 00 73 1b a5 9b 5b f1 12 ca b3 6c d3 4e |E.<.s...[....l.N| +00000040 dd 05 69 23 ae 83 eb |..i#...| +[28ca 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 principal evaluation succeeds for identity 0 +[28cb 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002683c50 gate 1574140956371443600 evaluation succeeds +[28cc 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[28cd 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[28ce 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[28cf 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[28d0 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[28d1 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +[28d2 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] Entry chaincode: name:"exp02" +[28d3 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[28d4 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[28d5 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][2a9916eb] Entry chaincode: name:"exp02" +[28d6 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[28d7 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[28d8 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] handling GET_STATE from chaincode +[28d9 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] getting state for chaincode exp02, key a, channel businesschannel +[28da 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[28db 11-19 05:22:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Completed GET_STATE. Sending RESPONSE +[28dc 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[28dd 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] handling GET_STATE from chaincode +[28de 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] getting state for chaincode exp02, key b, channel businesschannel +[28df 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[28e0 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Completed GET_STATE. Sending RESPONSE +[28e1 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[28e2 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] handling PUT_STATE from chaincode +[28e3 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Completed PUT_STATE. Sending RESPONSE +[28e4 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[28e5 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] handling PUT_STATE from chaincode +[28e6 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Completed PUT_STATE. Sending RESPONSE +[28e7 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[28e8 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [2a9916eb] notifying Txid:2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, channelID:businesschannel +[28e9 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[28ea 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][2a9916eb] Exit chaincode: name:"exp02" (11ms) +[28eb 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[28ec 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +[28ed 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] Exit +[28ee 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] Entry chaincode: name:"exp02" +[28ef 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] escc for chaincode name:"exp02" is escc +[28f0 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, chaincode: exp02} +[28f1 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20FC63539DB4B766330420FF33BCB0...455254494649434154452D2D2D2D2D0A +[28f2 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 20BEAE071C255216A56E0D5888B92F551F93C0AC4EB2C1E861448CD966162887 +[28f3 11-19 05:22:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, chaincode: exp02} +[28f4 11-19 05:22:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][2a9916eb] Exit +[28f5 11-19 05:22:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +[28f6 11-19 05:22:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45636 +[28f7 11-19 05:22:36.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45636 grpc.code=OK grpc.call_duration=24.1975ms +[28f8 11-19 05:22:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[28f9 11-19 05:22:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[28fa 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45642 +[28fb 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0000df770 +[28fc 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[28fd 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[28fe 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[28ff 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2900 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2901 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 99 aa 51 5a 6d 15 2c 23 d0 12 c1 b7 2d 69 3b |...QZm.,#....-i;| +00000010 77 9d 62 dc 77 3f aa 4d 69 dd 16 e7 82 21 07 43 |w.b.w?.Mi....!.C| +[2902 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 5d c1 fc 38 e0 1e c4 23 56 75 |0E.!..]..8...#Vu| +00000010 e0 79 42 c5 73 a5 30 30 d5 f5 5f 6a af a7 71 1e |.yB.s.00.._j..q.| +00000020 8d 7e 2a 35 d0 02 20 5c fd bf a1 6a 1b 8b 40 28 |.~*5.. \...j..@(| +00000030 0e 07 31 d3 8c bb fa 6b f9 b9 1b 45 d2 65 dc bd |..1....k...E.e..| +00000040 33 ac aa 77 95 40 61 |3..w.@a| +[2903 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2904 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001d9ce0, header 0xc00038c5a0 +[2905 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2906 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] processing txid: 68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3 +[2907 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3] +[2908 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2909 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[290a 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[290b 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[290c 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[290d 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 gate 1574140956555612300 evaluation starts +[290e 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 signed by 0 principal evaluation starts (used [false]) +[290f 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 processing identity 0 with bytes of 1151ae0 +[2910 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2911 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 principal evaluation fails +[2912 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ed400 gate 1574140956555612300 evaluation fails +[2913 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[2914 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2915 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2916 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 gate 1574140956556367400 evaluation starts +[2917 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 signed by 0 principal evaluation starts (used [false]) +[2918 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 processing identity 0 with bytes of 1151ae0 +[2919 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 principal matched by identity 0 +[291a 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 99 aa 51 5a 6d 15 2c 23 d0 12 c1 b7 2d 69 3b |...QZm.,#....-i;| +00000010 77 9d 62 dc 77 3f aa 4d 69 dd 16 e7 82 21 07 43 |w.b.w?.Mi....!.C| +[291b 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 5d c1 fc 38 e0 1e c4 23 56 75 |0E.!..]..8...#Vu| +00000010 e0 79 42 c5 73 a5 30 30 d5 f5 5f 6a af a7 71 1e |.yB.s.00.._j..q.| +00000020 8d 7e 2a 35 d0 02 20 5c fd bf a1 6a 1b 8b 40 28 |.~*5.. \...j..@(| +00000030 0e 07 31 d3 8c bb fa 6b f9 b9 1b 45 d2 65 dc bd |..1....k...E.e..| +00000040 33 ac aa 77 95 40 61 |3..w.@a| +[291c 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 principal evaluation succeeds for identity 0 +[291d 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026edab0 gate 1574140956556367400 evaluation succeeds +[291e 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[291f 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2920 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2921 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2922 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2923 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3] +[2924 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] Entry chaincode: name:"exp02" +[2925 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2926 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2927 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][68c959c4] Entry chaincode: name:"exp02" +[2928 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2929 11-19 05:22:36.55 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[292a 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] handling GET_STATE from chaincode +[292b 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] getting state for chaincode exp02, key a, channel businesschannel +[292c 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[292d 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] Completed GET_STATE. Sending RESPONSE +[292e 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[292f 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [68c959c4] notifying Txid:68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3, channelID:businesschannel +[2930 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2931 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][68c959c4] Exit chaincode: name:"exp02" (3ms) +[2932 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2933 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3] +[2934 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] Exit +[2935 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] Entry chaincode: name:"exp02" +[2936 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] escc for chaincode name:"exp02" is escc +[2937 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3, chaincode: exp02} +[2938 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20508B0111C8625A2D00056CE6989F...455254494649434154452D2D2D2D2D0A +[2939 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 76D8EECA70F1E49570B62D17B7BA9C2A1E17283BFFF8879FA4377972940ADE6B +[293a 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3, chaincode: exp02} +[293b 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][68c959c4] Exit +[293c 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [68c959c412ade12561aaafa55e6900e37c3380d719397e3f657bf59329b106f3] +[293d 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45642 +[293e 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45642 grpc.code=OK grpc.call_duration=10.749ms +[293f 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2940 11-19 05:22:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2941 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2942 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[2943 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[2944 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2945 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[2946 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 gate 1574140958426111700 evaluation starts +[2947 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 signed by 0 principal evaluation starts (used [false]) +[2948 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 processing identity 0 with bytes of 1151ae0 +[2949 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 principal matched by identity 0 +[294a 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 59 67 40 3b dd e5 e6 6b 6e bf 61 f4 62 0f 32 |.Yg@;...kn.a.b.2| +00000010 e7 58 e3 3f b7 6c 75 4c e5 d4 a1 6a 97 30 96 01 |.X.?.luL...j.0..| +[294b 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 d4 2c eb aa 33 82 3d d8 4c 9a b7 |0D. ..,..3.=.L..| +00000010 77 b9 41 a2 2d 7a d0 7f df c2 df 9b fe 95 54 34 |w.A.-z........T4| +00000020 36 91 38 90 02 20 12 49 cc e5 34 9c b4 5a 0c e6 |6.8.. .I..4..Z..| +00000030 7c 01 8a 23 41 e2 e9 3e 32 3e 4f d8 83 be 0d 05 ||..#A..>2>O.....| +00000040 3b 38 cd 96 14 39 |;8...9| +[294c 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 principal evaluation succeeds for identity 0 +[294d 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0e20 gate 1574140958426111700 evaluation succeeds +[294e 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[294f 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[2950 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[2951 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[2952 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +[2953 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +[2954 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[2955 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +[2956 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 5}, Envelope: 4027 bytes, Signature: 0 bytes to the block puller +[2957 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +[2958 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +[2959 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +[295a 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +[295b 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +[295c 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +[295d 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[295e 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00314acc0 env 0xc0028d09b0 txn 0 +[295f 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0028d09b0 +[2960 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +[2961 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2962 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2963 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2964 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa} +[2965 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2966 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 26 b8 08 96 42 20 b0 93 90 db 47 bf fd 5f 64 |.&...B ....G.._d| +00000010 20 57 2e 37 e4 32 9f 5f 80 0a 2f a1 39 a6 64 68 | W.7.2._../.9.dh| +[2967 11-19 05:22:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 8d 3f de 4b 30 dd 90 ff 5a ac b4 |0D. '.?.K0...Z..| +00000010 19 80 38 1a bd c5 6c 25 03 c3 a8 82 3a b5 ca de |..8...l%....:...| +00000020 5a 99 a0 c1 02 20 06 0a 45 ed 9e bd e8 83 cb ea |Z.... ..E.......| +00000030 86 34 5d 26 b1 55 76 12 05 30 94 60 26 6d b2 47 |.4]&.Uv..0.`&m.G| +00000040 52 6c 09 15 27 0e |Rl..'.| +[2968 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2969 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00419d000, header channel_header:"\010\003\032\014\010\234\370\315\356\005\020\314\313\247\256\001\"\017businesschannel*@2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\371\300A\004\205rY\345\253.1bw?)\255\221\250\354\212\222\030\263\242" +[296a 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[296b 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[296c 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[296d 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[296e 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] +[296f 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[2970 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00312ac00 +[2971 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [90688045-c4c3-4128-b389-0632dac20ba8] +[2972 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2973 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [90688045-c4c3-4128-b389-0632dac20ba8] +[2974 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +[2975 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [03020f87-3b43-4e00-ad72-f2b0065b4795] +[2976 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [03020f87-3b43-4e00-ad72-f2b0065b4795] +[2977 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 gate 1574140958431827900 evaluation starts +[2978 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 signed by 0 principal evaluation starts (used [false]) +[2979 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 processing identity 0 with bytes of 1151ae0 +[297a 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297c 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297d 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297b 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 principal matched by identity 0 +[297e 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2980 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 5}, Envelope: 4027 bytes, Signature: 0 bytes to 1 peers +[297f 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 be ae 07 1c 25 52 16 a5 6e 0d 58 88 b9 2f 55 | ....%R..n.X../U| +00000010 1f 93 c0 ac 4e b2 c1 e8 61 44 8c d9 66 16 28 87 |....N...aD..f.(.| +[2981 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 96 6b 27 fb ec 50 7b c1 37 96 |0E.!...k'..P{.7.| +00000010 a2 1c 2b 6f 05 74 f5 be a6 59 38 e1 56 2a 99 d7 |..+o.t...Y8.V*..| +00000020 c2 4d 07 4b 70 02 20 2a 40 08 55 be 83 07 fe e1 |.M.Kp. *@.U.....| +00000030 4e a8 b3 2e 63 64 88 da 52 85 bb 6f b2 cb 1e 2f |N...cd..R..o.../| +00000040 99 8b 06 57 f7 ed a4 |...W...| +[2982 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 principal evaluation succeeds for identity 0 +[2983 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 signed by 1 principal evaluation starts (used [true]) +[2984 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 skipping identity 0 because it has already been used +[2985 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 principal evaluation fails +[2986 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4ed0 gate 1574140958431827900 evaluation succeeds +[2987 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [add5dd07-3568-4684-b3b9-58dd76612b25] +[2988 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[298b 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 5}, Envelope: 4027 bytes, Signature: 0 bytes +[298a 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[298c 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2989 11-19 05:22:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [add5dd07-3568-4684-b3b9-58dd76612b25] +[298d 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +[298e 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 appears to be valid +[298f 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00312ac00 +[2990 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00314acc0 env 0xc0028d09b0 txn 0 +[2991 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[2992 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 19ms +[2993 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[2994 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[2995 11-19 05:22:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +[2996 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[2997 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[2998 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[2999 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +[299a 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[299b 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[299c 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[299d 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +[299e 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[299f 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +[29a0 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[29a1 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[29a2 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] marked as valid by state validator +[29a3 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003349e40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003349e80)} +[29a4 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[29a5 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[29a6 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[29a7 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +[29a8 11-19 05:22:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +[29a9 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +[29aa 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +[29ab 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x44, 0xdf, 0xb3, 0x3, 0x50, 0x9, 0x8b, 0x23, 0x1f, 0xc8, 0xd4, 0xb0, 0xc3, 0x60, 0xd3, 0x21, 0x24, 0x37, 0xaf, 0x67, 0x75, 0x46, 0xbe, 0x57, 0x44, 0x26, 0x16, 0x7c, 0x26, 0x99, 0x8e, 0xa7} txOffsets= +txId=2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6 locPointer=offset=70, bytesLength=2977 +] +[29ac 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85486, bytesLength=2977] for tx ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to txid-index +[29ad 11-19 05:22:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=85486, bytesLength=2977] for tx number:[0] ID: [2a9916eb6e6f70102dcb2d0b1e7c3bcf1f09b43004c944156548af17d8875af6] to blockNumTranNum index +[29ae 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89435], isChainEmpty=[false], lastBlockNumber=[5] +[29af 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +[29b0 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +[29b1 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +[29b2 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[29b3 11-19 05:22:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[29b4 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[29b5 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[29b6 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[29b7 11-19 05:22:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[29b8 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[29b9 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +[29ba 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[29bb 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +[29bc 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +[29bd 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +[29be 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +[29bf 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +[29c0 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 43ms (state_validation=9ms block_and_pvtdata_commit=18ms state_commit=14ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +[29c1 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[29c2 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08061A0C0A0565787030321203312E30 +[29c3 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 099824033A40DA161588A65BC87044ADB00561512F06066C4CCCB0B08CA54BBC +[29c4 11-19 05:22:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +[29c5 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45646 +[29c6 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0002842d0 +[29c7 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[29c8 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[29c9 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[29ca 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[29cb 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[29cc 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b f9 18 65 3f 5b 13 88 a6 1a c4 99 7f b9 ac 6f |...e?[.........o| +00000010 27 38 b6 ca b0 26 4b 63 ce 8b 13 1b 52 94 26 f6 |'8...&Kc....R.&.| +[29cd 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 8e bf 27 fa fa 59 0d 4c 5f 49 |0E.!....'..Y.L_I| +00000010 d6 09 6a c6 06 3c db 49 ff 3d ff bf 8f 5c 17 e3 |..j..<.I.=...\..| +00000020 01 50 1c 05 c7 02 20 3f cb 6a e5 e1 8b d4 43 58 |.P.... ?.j....CX| +00000030 ce f6 f2 c0 20 63 a5 21 83 58 65 4d a6 d4 2d d6 |.... c.!.XeM..-.| +00000040 a9 c7 ad 0a 5a b6 0e |....Z..| +[29ce 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[29cf 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002bbea0, header 0xc0002846e0 +[29d0 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[29d1 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] processing txid: 5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6 +[29d2 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6] +[29d3 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[29d4 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[29d5 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[29d6 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[29d7 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[29d8 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 gate 1574140958755953100 evaluation starts +[29d9 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 signed by 0 principal evaluation starts (used [false]) +[29da 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 processing identity 0 with bytes of 1151ae0 +[29db 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[29dc 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 principal evaluation fails +[29dd 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb7360 gate 1574140958755953100 evaluation fails +[29de 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[29df 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[29e0 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[29e1 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 gate 1574140958758342200 evaluation starts +[29e2 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 signed by 0 principal evaluation starts (used [false]) +[29e3 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 processing identity 0 with bytes of 1151ae0 +[29e4 11-19 05:22:38.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 principal matched by identity 0 +[29e5 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b f9 18 65 3f 5b 13 88 a6 1a c4 99 7f b9 ac 6f |...e?[.........o| +00000010 27 38 b6 ca b0 26 4b 63 ce 8b 13 1b 52 94 26 f6 |'8...&Kc....R.&.| +[29e6 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 8e bf 27 fa fa 59 0d 4c 5f 49 |0E.!....'..Y.L_I| +00000010 d6 09 6a c6 06 3c db 49 ff 3d ff bf 8f 5c 17 e3 |..j..<.I.=...\..| +00000020 01 50 1c 05 c7 02 20 3f cb 6a e5 e1 8b d4 43 58 |.P.... ?.j....CX| +00000030 ce f6 f2 c0 20 63 a5 21 83 58 65 4d a6 d4 2d d6 |.... c.!.XeM..-.| +00000040 a9 c7 ad 0a 5a b6 0e |....Z..| +[29e7 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 principal evaluation succeeds for identity 0 +[29e8 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb78e0 gate 1574140958758342200 evaluation succeeds +[29e9 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[29ea 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[29eb 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[29ec 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[29ed 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[29ee 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6] +[29ef 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] Entry chaincode: name:"exp02" +[29f0 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[29f1 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[29f2 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5d1ddfed] Entry chaincode: name:"exp02" +[29f3 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[29f4 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[29f5 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] handling GET_STATE from chaincode +[29f6 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] getting state for chaincode exp02, key a, channel businesschannel +[29f7 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[29f8 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] Completed GET_STATE. Sending RESPONSE +[29f9 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[29fa 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1ddfed] notifying Txid:5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6, channelID:businesschannel +[29fb 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[29fc 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5d1ddfed] Exit chaincode: name:"exp02" (3ms) +[29fd 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[29fe 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6] +[29ff 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] Exit +[2a00 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] Entry chaincode: name:"exp02" +[2a01 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] escc for chaincode name:"exp02" is escc +[2a02 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6, chaincode: exp02} +[2a03 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A07CAFA1722325F15D9E4EAC420F...455254494649434154452D2D2D2D2D0A +[2a04 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AE4DA5B40AFCD0BBAB526A06DC37E8C12728EDC5FF759A5B7C5769758E51C4E6 +[2a05 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6, chaincode: exp02} +[2a06 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5d1ddfed] Exit +[2a07 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5d1ddfedf9b9dfa5006ab20c46ad5854b9ce032ffe42e8813770115e7f376ec6] +[2a08 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45646 +[2a09 11-19 05:22:38.76 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45646 grpc.code=OK grpc.call_duration=18.0852ms +[2a0a 11-19 05:22:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2a0b 11-19 05:22:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2a0c 11-19 05:22:38.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2a0d 11-19 05:22:38.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2a0e 11-19 05:22:38.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2a0f 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2a10 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2a11 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2a12 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2a13 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a14 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2a15 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a16 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2a17 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a18 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2a19 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2a1a 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2a1b 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a1c 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2a1d 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2a1e 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2a1f 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a20 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2a21 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2a22 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2a23 11-19 05:22:38.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a24 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2a25 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151025 +[2a26 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 707ADC7B7B5B84918CBD98C2FF6BCF13B1313DC2553CA6B02C3241C17E25308F +[2a27 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2a28 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2a29 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2a2a 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" secret_envelope:\252\323\023,\336\017D\"\313\265K91\327(D\004\237\010\330D\213\r\\\002 \010\362\010\217x\004\200\277Ew\035fyw\262\373\266\357\201D\275\203S\021\376\366\257y\202V\254R" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[2a2b 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a2c 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[2a2d 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a2e 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[2a2f 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes +[2a30 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a31 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" secret_envelope:\252\323\023,\336\017D\"\313\265K91\327(D\004\237\010\330D\213\r\\\002 \010\362\010\217x\004\200\277Ew\035fyw\262\373\266\357\201D\275\203S\021\376\366\257y\202V\254R" > > > , Envelope: 271 bytes, Signature: 0 bytes +[2a32 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a33 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\372\364\371\357\353\002 t\325\r\267(=\344\346<\267\034(\342;\244\244Hp\030\221\225\203\245NmZZ\231\354\024\007]" > > , Envelope: 165 bytes, Signature: 0 bytes +[2a34 11-19 05:22:38.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a35 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2a36 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2a37 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a38 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2a39 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2a3a 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +[2a3b 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +00000040 5a 99 ec 14 07 5d |Z....]| +[2a3c 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a3d 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a3e 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a3f 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[2a40 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a41 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a42 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a43 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a44 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a45 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a46 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a47 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 gate 1574140958878302000 evaluation starts +[2a48 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 signed by 0 principal evaluation starts (used [false]) +[2a49 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 processing identity 0 with bytes of 1151ae0 +[2a4a 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 principal matched by identity 0 +[2a4b 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 78 a1 31 51 55 2e 88 a4 59 72 4c 69 6b 27 0b |.x.1QU...YrLik'.| +00000010 9d 5b a9 82 ed 1e 2a d0 b1 4e 26 23 83 6b ed 16 |.[....*..N&#.k..| +[2a4c 11-19 05:22:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 55 34 50 a5 10 fc 0a e5 d9 5e |0E.!..U4P......^| +00000010 17 64 21 9e cb 5c 08 64 da 49 1d b4 47 bf 4f f6 |.d!..\.d.I..G.O.| +00000020 ad 4a a2 85 c1 02 20 1f 76 75 43 01 fe 8d 4c 4f |.J.... .vuC...LO| +00000030 8c 05 3a 8a e4 1e a7 68 d9 bf 7d 28 08 95 5a 6a |..:....h..}(..Zj| +00000040 a6 8d b8 3d 10 d6 5d |...=..]| +[2a4d 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 principal evaluation succeeds for identity 0 +[2a4e 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c06e0 gate 1574140958878302000 evaluation succeeds +[2a4f 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a50 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a51 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a52 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a53 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a54 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a55 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[2a56 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +[2a57 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +[2a58 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a59 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a5a 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a5b 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2a5c 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2a5d 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a5e 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2a5f 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2a60 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +[2a61 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +00000040 5a 99 ec 14 07 5d |Z....]| +[2a62 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[2a63 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 1b 5a ff 1a 77 f2 3e aa d3 13 |0E.!...Z..w.>...| +00000010 2c de 0f 44 22 cb b5 4b 39 31 d7 28 44 04 9f 08 |,..D"..K91.(D...| +00000020 d8 44 8b 0d 5c 02 20 08 f2 08 8f 78 04 80 bf 45 |.D..\. ....x...E| +00000030 77 1d 66 79 77 b2 fb b6 ef 81 44 bd 83 53 11 fe |w.fyw.....D..S..| +00000040 f6 af 79 82 56 ac 52 |..y.V.R| +[2a64 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2a65 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2a66 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a67 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a68 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2a69 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2a6a 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a6b 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2a6c 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[2a6d 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 a4 e3 b9 19 8d f4 49 f5 39 1a 76 7b eb 1d d4 |X......I.9.v{...| +00000010 89 a6 e8 4b f2 75 6f dc dc 15 6b f9 73 8d f9 fc |...K.uo...k.s...| +[2a6e 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8e 89 93 67 f8 77 92 eb d2 e5 |0E.!.....g.w....| +00000010 91 e7 4d 33 9f 80 45 bc c9 24 7d 3f 2e 9b c8 3f |..M3..E..$}?...?| +00000020 97 a2 e9 83 21 02 20 5b 64 ff ca b5 e6 3a d4 55 |....!. [d....:.U| +00000030 5d 49 31 6b d2 31 45 b6 d5 ae f2 da 24 c6 7b 37 |]I1k.1E.....$.{7| +00000040 3b b9 4a 48 e5 d4 e2 |;.JH...| +[2a6f 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a70 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a71 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2a72 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 7a dc 7b 7b 5b 84 91 8c bd 98 c2 ff 6b cf 13 |pz.{{[.......k..| +00000010 b1 31 3d c2 55 3c a6 b0 2c 32 41 c1 7e 25 30 8f |.1=.U<..,2A.~%0.| +[2a73 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 47 2f 27 4c b1 e3 e4 ad 96 dc 78 |0D. rG/'L......x| +00000010 ef b9 9a 02 bf 12 55 90 a9 df 8e 6f c5 00 3e fa |......U....o..>.| +00000020 f4 f9 ef eb 02 20 74 d5 0d b7 28 3d e4 e6 3c b7 |..... t...(=..<.| +00000030 1c 28 e2 3b a4 a4 48 70 18 91 95 83 a5 4e 6d 5a |.(.;..Hp.....NmZ| +00000040 5a 99 ec 14 07 5d |Z....]| +[2a74 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a75 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a76 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a77 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[2a78 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a79 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a7a 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a7b 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a7c 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a7d 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a7e 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a7f 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 gate 1574140958888403800 evaluation starts +[2a80 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 signed by 0 principal evaluation starts (used [false]) +[2a81 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 processing identity 0 with bytes of 1151ae0 +[2a82 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 principal matched by identity 0 +[2a83 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 34 99 87 55 68 6d 0b 95 fe a4 53 3c 8b 3b 27 |.4..Uhm....S<.;'| +00000010 1d 5d 40 8e db dd 3c d7 26 10 f7 b7 ec 60 2e 8d |.]@...<.&....`..| +[2a84 11-19 05:22:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 2f 6d 97 f2 61 2f bd 1e 5c ba |0E.!../m..a/..\.| +00000010 4c 88 82 fc c4 ab f6 d7 e0 45 e9 e7 86 62 20 5b |L........E...b [| +00000020 fc c0 ed 96 95 02 20 11 a7 c1 99 4c 94 0c 90 39 |...... ....L...9| +00000030 f6 14 53 41 12 ca 1a 2c 36 46 a9 db 3f a1 5a 47 |..SA...,6F..?.ZG| +00000040 c2 74 a7 2d 5e f4 6a |.t.-^.j| +[2a85 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 principal evaluation succeeds for identity 0 +[2a86 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080b60 gate 1574140958888403800 evaluation succeeds +[2a87 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a88 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a89 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a8a 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a8b 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a8c 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a8d 11-19 05:22:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a8e 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45650 +[2a8f 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000285ae0 +[2a90 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2a91 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2a92 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2a93 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2a94 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2a95 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b eb bf 2d 2d c1 2f 24 94 61 87 1e f6 ed 9f 87 |...--./$.a......| +00000010 03 94 a3 d2 48 91 16 ec 83 2f f4 68 fc 3c b1 02 |....H..../.h.<..| +[2a96 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 d1 44 c3 04 4e 12 f3 06 e7 42 d5 |0D. ..D..N....B.| +00000010 5d b3 01 3f 43 7d fb 29 be bf 2b 68 7b 4f 7e be |]..?C}.)..+h{O~.| +00000020 bb 24 8d 4c 02 20 17 56 c6 ca b1 be a6 f3 d6 4e |.$.L. .V.......N| +00000030 50 90 7b a0 ff 78 3b ca 34 45 18 25 35 ba 97 0e |P.{..x;.4E.%5...| +00000040 21 8c bd 06 d6 d2 |!.....| +[2a97 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2a98 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00302c310, header 0xc000285f40 +[2a99 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2a9a 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] processing txid: cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971 +[2a9b 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971] +[2a9c 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2a9d 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971] +[2a9e 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] Entry chaincode: name:"lscc" +[2a9f 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cb322783] Entry chaincode: name:"lscc" +[2aa0 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2aa1 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists +[2aa2 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2aa3 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2aa4 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2aa5 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2aa6 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 gate 1574140959218782100 evaluation starts +[2aa7 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 signed by 0 principal evaluation starts (used [false]) +[2aa8 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 processing identity 0 with bytes of 1151ae0 +[2aa9 11-19 05:22:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2aaa 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 principal evaluation fails +[2aab 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15180 gate 1574140959218782100 evaluation fails +[2aac 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2aad 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2aae 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2aaf 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 gate 1574140959222245400 evaluation starts +[2ab0 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 signed by 0 principal evaluation starts (used [false]) +[2ab1 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 processing identity 0 with bytes of 1151ae0 +[2ab2 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 principal matched by identity 0 +[2ab3 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b eb bf 2d 2d c1 2f 24 94 61 87 1e f6 ed 9f 87 |...--./$.a......| +00000010 03 94 a3 d2 48 91 16 ec 83 2f f4 68 fc 3c b1 02 |....H..../.h.<..| +[2ab4 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 d1 44 c3 04 4e 12 f3 06 e7 42 d5 |0D. ..D..N....B.| +00000010 5d b3 01 3f 43 7d fb 29 be bf 2b 68 7b 4f 7e be |]..?C}.)..+h{O~.| +00000020 bb 24 8d 4c 02 20 17 56 c6 ca b1 be a6 f3 d6 4e |.$.L. .V.......N| +00000030 50 90 7b a0 ff 78 3b ca 34 45 18 25 35 ba 97 0e |P.{..x;.4E.%5...| +00000040 21 8c bd 06 d6 d2 |!.....| +[2ab5 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 principal evaluation succeeds for identity 0 +[2ab6 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e156f0 gate 1574140959222245400 evaluation succeeds +[2ab7 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2ab8 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2ab9 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2aba 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2abb 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2abc 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] handling GET_STATE from chaincode +[2abd 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] getting state for chaincode lscc, key exp02, channel businesschannel +[2abe 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2abf 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] Completed GET_STATE. Sending RESPONSE +[2ac0 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2ac1 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [cb322783] notifying Txid:cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971, channelID:businesschannel +[2ac2 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2ac3 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cb322783] Exit chaincode: name:"lscc" (7ms) +[2ac4 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2ac5 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971] +[2ac6 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] Exit +[2ac7 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] Entry chaincode: name:"lscc" +[2ac8 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] escc for chaincode name:"lscc" is escc +[2ac9 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971, chaincode: lscc} +[2aca 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2021684D4DEE4A46031785816A52DE...455254494649434154452D2D2D2D2D0A +[2acb 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 828EA4A8E1C50D3661D29F6922005C7C6CDFA321CB6F87C2E668694B0751D6B6 +[2acc 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971, chaincode: lscc} +[2acd 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cb322783] Exit +[2ace 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cb3227837b255ea89fef1b1569e22248a821bdf720cad1385e190c5fc7589971] +[2acf 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45650 +[2ad0 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45650 grpc.code=OK grpc.call_duration=14.0527ms +[2ad1 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2ad2 11-19 05:22:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2ad3 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ad4 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ad5 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2ad6 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2ad7 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ad8 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2ad9 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ada 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2adb 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2adc 11-19 05:22:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[2add 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[2ade 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b fa bf b7 04 31 10 33 c2 23 6c 34 cb 57 c9 70 |{....1.3.#l4.W.p| +00000010 50 01 15 27 4b ce 2c 99 2b b9 71 7a ad 08 b0 9e |P..'K.,.+.qz....| +[2adf 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 e7 45 8d f0 07 f3 c7 27 78 32 e7 |0D. E.E.....'x2.| +00000010 e8 08 91 ee e6 57 9f a7 a6 e0 75 d9 fd 8b a0 e9 |.....W....u.....| +00000020 80 43 b9 80 02 20 33 1b 47 14 dc 6b 0e 15 2a e6 |.C... 3.G..k..*.| +00000030 e6 81 be 45 12 c6 6f 06 02 9e 73 ae 2d c9 4b 23 |...E..o...s.-.K#| +00000040 6c a7 69 f0 df 61 |l.i..a| +[2ae0 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ae1 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ae2 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2ae3 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ae4 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2ae5 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ae6 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ae7 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ae8 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 gate 1574140959311333300 evaluation starts +[2ae9 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 signed by 0 principal evaluation starts (used [false]) +[2aea 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 processing identity 0 with bytes of 1151ae0 +[2aeb 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 principal matched by identity 0 +[2aec 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +[2aed 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +00000040 69 8f 2f 73 d4 04 6d |i./s..m| +[2aee 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 principal evaluation succeeds for identity 0 +[2aef 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b88d0 gate 1574140959311333300 evaluation succeeds +[2af0 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2af1 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2af2 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2af3 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2af4 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af5 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af6 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2af7 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2af8 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2af9 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2afa 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2afb 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2afc 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 gate 1574140959312275400 evaluation starts +[2afd 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 signed by 0 principal evaluation starts (used [false]) +[2afe 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 processing identity 0 with bytes of 1151ae0 +[2aff 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 principal matched by identity 0 +[2b00 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +[2b01 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +00000040 88 2a 2f cc b4 72 |.*/..r| +[2b02 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 principal evaluation succeeds for identity 0 +[2b03 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b9a60 gate 1574140959312275400 evaluation succeeds +[2b04 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b05 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b06 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b07 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b08 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[2b09 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[2b0a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b0b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b0c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b0d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b0e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b0f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 gate 1574140959313311100 evaluation starts +[2b10 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 signed by 0 principal evaluation starts (used [false]) +[2b11 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 processing identity 0 with bytes of 1151ae0 +[2b12 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2b13 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 principal evaluation fails +[2b14 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb70 gate 1574140959313311100 evaluation fails +[2b15 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2b16 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b17 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2b18 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 gate 1574140959315045000 evaluation starts +[2b19 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 signed by 0 principal evaluation starts (used [false]) +[2b1a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 processing identity 0 with bytes of 1151ae0 +[2b1b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 principal matched by identity 0 +[2b1c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[2b1d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[2b1e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 principal evaluation succeeds for identity 0 +[2b1f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9d0e0 gate 1574140959315045000 evaluation succeeds +[2b20 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2b21 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2b22 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b23 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b24 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b25 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[2b26 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[2b27 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b28 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b29 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +[2b2d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b2e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b30 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b31 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b32 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b33 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b34 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b35 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2b36 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b37 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 gate 1574140959317418600 evaluation starts +[2b38 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 signed by 0 principal evaluation starts (used [false]) +[2b39 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2b3a 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 processing identity 0 with bytes of 1151ae0 +[2b3b 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 principal matched by identity 0 +[2b3c 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b3d 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 4e e9 9e 90 61 08 36 aa bb 5a 0e b6 f9 5f 0e |.N...a.6..Z..._.| +00000010 4b 46 72 0f fd ff 63 1f be 72 38 3d de 30 df 48 |KFr...c..r8=.0.H| +[2b3e 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 d6 69 1a 23 15 de 92 dd 95 69 |0E.!...i.#.....i| +00000010 eb ce 72 6a a2 ae ed 4a 5a a6 44 57 b2 83 b1 70 |..rj...JZ.DW...p| +00000020 92 a0 e0 ae 37 02 20 01 2e 73 00 79 4e 5a 0f d3 |....7. ..s.yNZ..| +00000030 a2 f4 57 57 d1 39 a7 ef 32 e6 ef cc 94 48 7d 6e |..WW.9..2....H}n| +00000040 69 8f 2f 73 d4 04 6d |i./s..m| +[2b3f 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2b40 11-19 05:22:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b41 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[2b42 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 principal evaluation succeeds for identity 0 +[2b43 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df65d0 gate 1574140959317418600 evaluation succeeds +[2b44 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b45 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b46 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b47 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b48 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +[2b49 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +[2b4a 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +[2b4b 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +[2b4c 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b4d 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b4e 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b4f 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b50 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b51 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b52 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b53 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b54 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 gate 1574140959327454700 evaluation starts +[2b55 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 signed by 0 principal evaluation starts (used [false]) +[2b56 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 processing identity 0 with bytes of 1151ae0 +[2b57 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 principal matched by identity 0 +[2b58 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[2b59 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[2b5a 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 principal evaluation succeeds for identity 0 +[2b5b 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072460 gate 1574140959327454700 evaluation succeeds +[2b5c 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b5d 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b5e 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b5f 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b60 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b61 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b62 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b63 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b64 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b65 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b66 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 gate 1574140959329061900 evaluation starts +[2b67 11-19 05:22:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 signed by 0 principal evaluation starts (used [false]) +[2b68 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 processing identity 0 with bytes of 1151ae0 +[2b69 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 principal matched by identity 0 +[2b6a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[2b6b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[2b6c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 principal evaluation succeeds for identity 0 +[2b6d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004072fa0 gate 1574140959329061900 evaluation succeeds +[2b6e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b6f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b70 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b71 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b72 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b73 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[2b74 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b75 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 54 36 14 59 7b 3f 6a cb c8 9c 1c 86 26 f5 58 |sT6.Y{?j.....&.X| +00000010 30 4d 8e 14 b0 f9 be 74 ac f1 3e c6 5c 46 02 ef |0M.....t..>.\F..| +[2b76 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 d0 2c e3 01 70 ec ca ed b8 98 |0E.!...,..p.....| +00000010 04 c0 39 26 a2 90 4d 18 fc 35 9d fd 6f c5 99 df |..9&..M..5..o...| +00000020 d3 e6 41 6e b1 02 20 28 c5 43 58 e2 9c 46 ed 24 |..An.. (.CX..F.$| +00000030 37 f4 5d a0 5c c0 bf 10 03 22 97 6d fb 00 49 a9 |7.].\....".m..I.| +00000040 7b 8f e4 8a 44 3e 9a |{...D>.| +[2b77 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b78 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b79 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b7a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b7b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b7c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b7d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b7e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b7f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 gate 1574140959331885600 evaluation starts +[2b80 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 signed by 0 principal evaluation starts (used [false]) +[2b81 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 processing identity 0 with bytes of 1151ae0 +[2b82 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 principal matched by identity 0 +[2b83 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 68 5e ec 95 40 2b be 17 6e 6f 63 e0 91 4a 20 |.h^..@+..noc..J | +00000010 47 43 13 03 8f 06 d6 dc 40 3d 8d f1 aa e2 f6 22 |GC......@=....."| +[2b84 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 11 f6 88 d9 6e 29 60 2a ce d4 14 |0D. l....n)`*...| +00000010 82 6a 6c cb f5 9f 51 02 1e 62 1c c2 05 9b 29 53 |.jl...Q..b....)S| +00000020 48 b1 74 65 02 20 44 46 43 0c 0f ba ee f7 32 02 |H.te. DFC.....2.| +00000030 3b 24 fa 3a ee c0 de be 3b 52 a2 e9 1d fc 24 c4 |;$.:....;R....$.| +00000040 88 2a 2f cc b4 72 |.*/..r| +[2b85 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 principal evaluation succeeds for identity 0 +[2b86 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311aa00 gate 1574140959331885600 evaluation succeeds +[2b87 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b88 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b89 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b8a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b8b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 50 58 8c cb 13 22 a0 05 de 88 5e 37 6f 95 24 |.PX..."....^7o.$| +00000010 7b a8 b7 22 86 11 3e c4 a3 57 ea f1 99 15 6b d2 |{.."..>..W....k.| +[2b8c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f eb b8 70 7e 6c 89 29 10 a3 b5 |0E.!....p~l.)...| +00000010 73 bb 3f 11 fc 09 01 51 e7 14 1b 6b ef 74 15 44 |s.?....Q...k.t.D| +00000020 a9 cd 00 17 fa 02 20 38 ea 72 81 8b 16 7b 66 6e |...... 8.r...{fn| +00000030 97 30 ac 75 1a d2 26 b4 49 08 94 29 d6 ff ea 65 |.0.u..&.I..)...e| +00000040 87 3c 17 63 28 4c c6 |.<.c(L.| +[2b8d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b8e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b8f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b90 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b91 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b92 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b93 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b94 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b95 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 gate 1574140959333665800 evaluation starts +[2b96 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 signed by 0 principal evaluation starts (used [false]) +[2b97 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 processing identity 0 with bytes of 1151ae0 +[2b98 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 principal matched by identity 0 +[2b99 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[2b9a 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[2b9b 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 principal evaluation succeeds for identity 0 +[2b9c 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8210 gate 1574140959333665800 evaluation succeeds +[2b9d 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b9e 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b9f 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ba0 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ba1 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ba2 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ba3 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2ba4 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ba5 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ba6 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ba7 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 gate 1574140959339150500 evaluation starts +[2ba8 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 signed by 0 principal evaluation starts (used [false]) +[2ba9 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 processing identity 0 with bytes of 1151ae0 +[2baa 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 principal matched by identity 0 +[2bab 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[2bac 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[2bad 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 principal evaluation succeeds for identity 0 +[2bae 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b8d50 gate 1574140959339150500 evaluation succeeds +[2baf 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2bb0 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2bb1 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2bb2 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2bb3 11-19 05:22:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bb4 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[2bb5 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[2bb6 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2bb7 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100C1801 +[2bb8 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5287B8106D2A83AECAB326E31A471CC1C8FECB2383B1FE0C089B59C4F778A0A +[2bb9 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[2bba 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bbb 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bbc 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bbd 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bbe 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[2bbf 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc0 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[2bc1 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bc2 11-19 05:22:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc3 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2bc4 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2bc5 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2bc6 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc7 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc8 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc9 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bca 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bcb 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bcc 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[2bcd 11-19 05:22:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bce 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bcf 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd0 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2bd1 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd2 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd3 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2bd4 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2bd5 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bd6 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[2bd7 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[2bd8 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[2bd9 11-19 05:22:39.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bda 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2bdb 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2bdc 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bdd 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2bde 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[2bdf 11-19 05:22:39.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2be0 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2be1 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2be2 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2be3 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2be4 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2be5 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2be6 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 gate 1574140959479331800 evaluation starts +[2be7 11-19 05:22:39.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 signed by 0 principal evaluation starts (used [false]) +[2be8 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 processing identity 0 with bytes of 1151ae0 +[2be9 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 principal matched by identity 0 +[2bea 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 ff 2d 0f 55 f2 22 0c ff 6f 82 25 0b 02 62 fb |..-.U."..o.%..b.| +00000010 5f 06 fa 47 e1 46 51 e6 43 dd 57 d2 8d 0c 4b 9d |_..G.FQ.C.W...K.| +[2beb 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 84 d4 f5 d1 df ff 34 f1 a8 d2 2c |0D. [......4...,| +00000010 00 69 7d 4a 06 84 99 10 a0 13 ed 01 5e 8e bd 90 |.i}J........^...| +00000020 89 74 4d 21 02 20 6d 60 1b c3 21 5f 6d 27 c8 f9 |.tM!. m`..!_m'..| +00000030 f5 f0 b6 1b 38 ff 2c 5c 9a 97 36 8a 4b 5d 4f 09 |....8.,\..6.K]O.| +00000040 06 99 4d 88 e2 5c |..M..\| +[2bec 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 principal evaluation succeeds for identity 0 +[2bed 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037515c0 gate 1574140959479331800 evaluation succeeds +[2bee 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2bef 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2bf0 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2bf1 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2bf2 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bf3 11-19 05:22:39.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2bf4 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2bf5 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2bf6 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2bf7 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bf8 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bf9 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bfa 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[2bfb 11-19 05:22:39.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bfc 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bfd 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bfe 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[2bff 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2c00 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c01 11-19 05:22:39.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2c02 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45654 +[2c03 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025f7630 +[2c04 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2c05 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2c06 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2c07 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2c08 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2c09 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 81 62 73 3f 57 8e 41 e5 6e 4e 48 61 fb ee 2b |..bs?W.A.nNHa..+| +00000010 48 7e 2f e9 5f bc 6c 49 b2 ee 1d c6 9b 4a bb ae |H~/._.lI.....J..| +[2c0a 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e e0 8d 86 30 d5 08 02 e0 c4 1b b3 |0D. N...0.......| +00000010 ea 1f 9f 23 5e d5 20 0b 72 9f 34 c9 f2 81 6f b1 |...#^. .r.4...o.| +00000020 6c f9 f2 61 02 20 27 8e b9 4e 10 5b 1a 09 45 00 |l..a. '..N.[..E.| +00000030 43 8e 60 d8 8b bd a2 50 13 c6 4b 02 a9 19 dd 30 |C.`....P..K....0| +00000040 e3 18 75 4d 2c 41 |..uM,A| +[2c0b 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2c0c 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00308a460, header 0xc0025f7a40 +[2c0d 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2c0e 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] processing txid: 9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253 +[2c0f 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253] +[2c10 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2c11 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253] +[2c12 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] Entry chaincode: name:"lscc" +[2c13 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9f7240e3] Entry chaincode: name:"lscc" +[2c14 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2c15 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec +[2c16 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2c17 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c18 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c19 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c1a 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 gate 1574140959535733200 evaluation starts +[2c1b 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 signed by 0 principal evaluation starts (used [false]) +[2c1c 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 processing identity 0 with bytes of 1151ae0 +[2c1d 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2c1e 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 principal evaluation fails +[2c1f 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1dcc0 gate 1574140959535733200 evaluation fails +[2c20 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2c21 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c22 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2c23 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 gate 1574140959536913400 evaluation starts +[2c24 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 signed by 0 principal evaluation starts (used [false]) +[2c25 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 processing identity 0 with bytes of 1151ae0 +[2c26 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 principal matched by identity 0 +[2c27 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 81 62 73 3f 57 8e 41 e5 6e 4e 48 61 fb ee 2b |..bs?W.A.nNHa..+| +00000010 48 7e 2f e9 5f bc 6c 49 b2 ee 1d c6 9b 4a bb ae |H~/._.lI.....J..| +[2c28 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e e0 8d 86 30 d5 08 02 e0 c4 1b b3 |0D. N...0.......| +00000010 ea 1f 9f 23 5e d5 20 0b 72 9f 34 c9 f2 81 6f b1 |...#^. .r.4...o.| +00000020 6c f9 f2 61 02 20 27 8e b9 4e 10 5b 1a 09 45 00 |l..a. '..N.[..E.| +00000030 43 8e 60 d8 8b bd a2 50 13 c6 4b 02 a9 19 dd 30 |C.`....P..K....0| +00000040 e3 18 75 4d 2c 41 |..uM,A| +[2c29 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 principal evaluation succeeds for identity 0 +[2c2a 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000464230 gate 1574140959536913400 evaluation succeeds +[2c2b 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2c2c 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2c2d 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c2e 11-19 05:22:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c2f 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2c30 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] handling GET_STATE from chaincode +[2c31 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] getting state for chaincode lscc, key exp02, channel businesschannel +[2c32 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2c33 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] Completed GET_STATE. Sending RESPONSE +[2c34 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2c35 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9f7240e3] notifying Txid:9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253, channelID:businesschannel +[2c36 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2c37 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9f7240e3] Exit chaincode: name:"lscc" (7ms) +[2c38 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2c39 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253] +[2c3a 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] Exit +[2c3b 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] Entry chaincode: name:"lscc" +[2c3c 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] escc for chaincode name:"lscc" is escc +[2c3d 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253, chaincode: lscc} +[2c3e 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20B900C5840B69A47CEA998100066A...455254494649434154452D2D2D2D2D0A +[2c3f 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 69E118B2B8613E82B176CEBE691A2CF0A4A88813FB479579A37FB778B44AD238 +[2c40 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253, chaincode: lscc} +[2c41 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9f7240e3] Exit +[2c42 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9f7240e37fa6ae07bbe0d895d4993724facc53df389709313f9e79fe68456253] +[2c43 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45654 +[2c44 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45654 grpc.code=OK grpc.call_duration=10.7115ms +[2c45 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2c46 11-19 05:22:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2c47 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2c48 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2c49 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c4a 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c4b 11-19 05:22:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c4c 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c4d 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c4e 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[2c4f 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[2c50 11-19 05:22:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c51 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c52 11-19 05:22:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c53 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[2c54 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[2c55 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c56 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c57 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c58 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c59 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[2c5a 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[2c5b 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c5c 11-19 05:22:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c5d 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2c5e 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2c5f 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2c60 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[2c61 11-19 05:22:39.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c62 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2c63 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151026 +[2c64 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D6EFDF8881155557A6F10657D2C370287E4CBF70CF2997711ED6677DC85190F7 +[2c65 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2c66 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2c67 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2c68 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2c69 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6a 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6b 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[2c6c 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6d 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2c6e 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6f 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2c70 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2c73 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c71 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2c74 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c72 11-19 05:22:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2c75 11-19 05:22:39.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c76 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c77 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c78 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c79 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[2c7a 11-19 05:22:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c7b 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45658 +[2c7c 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002611680 +[2c7d 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2c7e 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2c7f 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2c80 11-19 05:22:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2c81 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2c82 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 02 22 6f 87 b5 d4 3e 10 bc 81 51 45 d4 67 e0 |.."o...>...QE.g.| +00000010 06 2c bb 35 12 b9 66 e9 a2 cb 06 57 90 59 0f 1d |.,.5..f....W.Y..| +[2c83 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 aa 7a 2c d0 c6 8b bb 26 3f cf |0E.!...z,....&?.| +00000010 a9 08 96 6b cb f2 c3 31 05 77 e6 4c 91 e2 b4 82 |...k...1.w.L....| +00000020 87 9a ad 75 0a 02 20 26 3c 28 0e a7 7b c0 8d 70 |...u.. &<(..{..p| +00000030 c4 6a e0 a9 59 b3 25 7e 50 fd d1 bc 3c 53 56 de |.j..Y.%~P...| +[2c84 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2c85 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00308ad20, header 0xc002611a90 +[2c86 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2c87 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] processing txid: ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d +[2c88 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d] +[2c89 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2c8a 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d] +[2c8b 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] Entry chaincode: name:"lscc" +[2c8d 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ff3e5552] Entry chaincode: name:"lscc" +[2c8e 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2c8c 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c90 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c91 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c92 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c93 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c8f 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData +[2c94 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c96 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c97 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c98 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c95 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2c99 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[2c9a 11-19 05:22:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c9b 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c9c 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c9d 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 gate 1574140959840993100 evaluation starts +[2c9e 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 signed by 0 principal evaluation starts (used [false]) +[2c9f 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 processing identity 0 with bytes of 1151ae0 +[2ca0 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2ca1 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 principal evaluation fails +[2ca2 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4900 gate 1574140959840993100 evaluation fails +[2ca3 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2ca4 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ca5 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2ca6 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 gate 1574140959842436200 evaluation starts +[2ca7 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 signed by 0 principal evaluation starts (used [false]) +[2ca8 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 processing identity 0 with bytes of 1151ae0 +[2ca9 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 principal matched by identity 0 +[2caa 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 02 22 6f 87 b5 d4 3e 10 bc 81 51 45 d4 67 e0 |.."o...>...QE.g.| +00000010 06 2c bb 35 12 b9 66 e9 a2 cb 06 57 90 59 0f 1d |.,.5..f....W.Y..| +[2cab 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 aa 7a 2c d0 c6 8b bb 26 3f cf |0E.!...z,....&?.| +00000010 a9 08 96 6b cb f2 c3 31 05 77 e6 4c 91 e2 b4 82 |...k...1.w.L....| +00000020 87 9a ad 75 0a 02 20 26 3c 28 0e a7 7b c0 8d 70 |...u.. &<(..{..p| +00000030 c4 6a e0 a9 59 b3 25 7e 50 fd d1 bc 3c 53 56 de |.j..Y.%~P...| +[2cac 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 principal evaluation succeeds for identity 0 +[2cad 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4e70 gate 1574140959842436200 evaluation succeeds +[2cae 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2caf 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2cb0 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2cb1 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2cb2 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2cb3 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] handling GET_STATE from chaincode +[2cb4 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] getting state for chaincode lscc, key exp02, channel businesschannel +[2cb5 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2cb6 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] Completed GET_STATE. Sending RESPONSE +[2cb7 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2cb8 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [ff3e5552] notifying Txid:ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d, channelID:businesschannel +[2cb9 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2cba 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ff3e5552] Exit chaincode: name:"lscc" (7ms) +[2cbb 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2cbc 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d] +[2cbd 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] Exit +[2cbe 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] Entry chaincode: name:"lscc" +[2cbf 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] escc for chaincode name:"lscc" is escc +[2cc0 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d, chaincode: lscc} +[2cc1 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A65A7C15F607E85291E61BB2CC4F...455254494649434154452D2D2D2D2D0A +[2cc2 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4B05954EA029F5FB3126F8D207EE24D807D321E14584530547AB18BD9A867408 +[2cc3 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d, chaincode: lscc} +[2cc4 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ff3e5552] Exit +[2cc5 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ff3e555238a9217ff62fe8a9ea39011f31e5b4683f825a683162c0d09a1bc98d] +[2cc6 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45658 +[2cc7 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45658 grpc.code=OK grpc.call_duration=17.2089ms +[2cc8 11-19 05:22:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cc9 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2cca 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2ccb 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2ccc 11-19 05:22:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2ccd 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cce 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2ccf 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[2cd0 11-19 05:22:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cd1 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2cd2 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2cd3 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2cd4 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2cd5 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2cd6 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2cd7 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 gate 1574140959873188700 evaluation starts +[2cd8 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 signed by 0 principal evaluation starts (used [false]) +[2cd9 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 processing identity 0 with bytes of 1151ae0 +[2cda 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 principal matched by identity 0 +[2cdb 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 4f 58 c8 cd 2b 73 96 ae 18 00 4a ef 90 8a c4 |ROX..+s....J....| +00000010 51 3c 45 54 43 ae a4 51 c0 b9 91 91 98 14 db 0c |Q DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d 61 44 dc e3 5e 99 b8 d7 a0 |0E.!..]aD..^....| +00000010 90 d6 7a 38 b7 57 ce f5 58 f5 cb 97 26 e4 77 1f |..z8.W..X...&.w.| +00000020 9a 11 46 83 38 02 20 58 83 7b 51 65 27 c5 c8 b2 |..F.8. X.{Qe'...| +00000030 2e aa 5b e1 cb f7 6c 34 62 a8 ad 82 a1 e9 fb 20 |..[...l4b...... | +00000040 df 2e 7e e5 7b 9d 4a |..~.{.J| +[2cdd 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 principal evaluation succeeds for identity 0 +[2cde 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027a0260 gate 1574140959873188700 evaluation succeeds +[2cdf 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2ce0 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ce1 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ce2 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ce3 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ce4 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2ce5 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2ce6 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2ce7 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2ce8 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ce9 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cea 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ceb 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[2cec 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ced 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cee 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cef 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[2cf0 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:/0\250\0062M\241\203\305\223\223\246a." > +[2cf1 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2cf2 11-19 05:22:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cf3 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[2cf4 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[2cf5 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cf6 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[2cf7 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[2cf8 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 57 f7 09 74 93 35 a4 81 07 99 14 aa 26 89 ad |.W..t.5......&..| +00000010 b4 e4 10 e7 e1 9e e8 26 50 4c ba 88 af 3e 9a 98 |.......&PL...>..| +[2cf9 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 e6 fd cf 74 45 bd 4f 6d 1e cc 72 |0D. !...tE.Om..r| +00000010 e2 7e c2 ff 2c 57 3f a7 6d 14 47 f2 20 6f 53 01 |.~..,W?.m.G. oS.| +00000020 22 c7 49 40 02 20 24 c1 91 9f 37 a6 a8 83 e2 36 |".I@. $...7....6| +00000030 8f 52 b3 be 3d 2f 5d 6e d7 8c 44 ae 82 08 c2 b4 |.R..=/]n..D.....| +00000040 07 be c5 a0 06 c3 |......| +[2cfa 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2cfb 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 48 c1 da 77 89 df 49 95 81 42 59 |0D. .H..w..I..BY| +00000010 40 f6 f4 58 2a 93 8e fd c8 3f 2d ce 71 5d 92 34 |@..X*....?-.q].4| +00000020 2c e7 4b f5 02 20 57 33 7a 65 bf a2 49 36 2c a9 |,.K.. W3ze..I6,.| +00000030 6f 13 f6 8e 65 cf 9e 2c 66 16 0f 2f 8f f7 f4 64 |o...e..,f../...d| +00000040 05 b5 1f c6 ac 2f |...../| +[2cfc 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2cfd 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[2cfe 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2cff 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2d00 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2d01 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d02 11-19 05:22:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d03 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[2d04 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d05 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d06 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +[2d07 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:/0\250\0062M\241\203\305\223\223\246a." > +[2d08 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[2d09 11-19 05:22:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d0a 11-19 05:22:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d0b 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2d0c 11-19 05:22:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2d0d 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d0e 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d0f 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d10 11-19 05:22:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d11 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[2d12 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[2d13 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d14 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d15 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d16 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d17 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d18 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d19 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d1a 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 gate 1574140960007325100 evaluation starts +[2d1b 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 signed by 0 principal evaluation starts (used [false]) +[2d1c 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 processing identity 0 with bytes of 1151ae0 +[2d1d 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 principal matched by identity 0 +[2d1e 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[2d1f 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[2d20 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 principal evaluation succeeds for identity 0 +[2d21 11-19 05:22:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de5aa0 gate 1574140960007325100 evaluation succeeds +[2d22 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d23 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d24 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d25 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d26 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d27 11-19 05:22:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d28 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[2d29 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[2d2a 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d2b 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d2c 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d2d 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d2e 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d2f 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d30 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d31 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 gate 1574140960026320800 evaluation starts +[2d32 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 signed by 0 principal evaluation starts (used [false]) +[2d33 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 processing identity 0 with bytes of 1151ae0 +[2d34 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 principal matched by identity 0 +[2d35 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[2d36 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[2d37 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 principal evaluation succeeds for identity 0 +[2d38 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c3810 gate 1574140960026320800 evaluation succeeds +[2d39 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d3a 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d3b 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d3c 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d3d 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d3e 11-19 05:22:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d3f 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45662 +[2d40 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040a0fa0 +[2d41 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2d42 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2d43 11-19 05:22:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2d44 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2d45 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2d46 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 e1 e8 55 1a 49 f0 09 3d cd a7 23 cb 50 4b c1 |g..U.I..=..#.PK.| +00000010 c3 42 7b 60 16 9e 04 6d be e8 aa c4 81 70 b1 ca |.B{`...m.....p..| +[2d47 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d d9 d5 cc 71 95 48 67 47 27 de 0f |0D. ....q.HgG'..| +00000010 19 98 35 5c d5 21 1f ea db ae 89 38 20 39 5e 59 |..5\.!.....8 9^Y| +00000020 12 a7 09 4b 02 20 03 d6 8e 0d 89 6a 8a 87 86 3a |...K. .....j...:| +00000030 39 ae 4d e4 85 4a e6 ac 46 2f 5a aa 6c b5 f9 e5 |9.M..J..F/Z.l...| +00000040 9a 0c 12 78 3a a9 |...x:.| +[2d48 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2d49 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00302da40, header 0xc0040a1450 +[2d4a 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2d4b 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] processing txid: 721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997 +[2d4c 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997] +[2d4d 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2d4e 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997] +[2d4f 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] Entry chaincode: name:"lscc" +[2d50 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][721fbd11] Entry chaincode: name:"lscc" +[2d51 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2d52 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 e1 e8 55 1a 49 f0 09 3d cd a7 23 cb 50 4b c1 |g..U.I..=..#.PK.| +00000010 c3 42 7b 60 16 9e 04 6d be e8 aa c4 81 70 b1 ca |.B{`...m.....p..| +[2d53 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d d9 d5 cc 71 95 48 67 47 27 de 0f |0D. ....q.HgG'..| +00000010 19 98 35 5c d5 21 1f ea db ae 89 38 20 39 5e 59 |..5\.!.....8 9^Y| +00000020 12 a7 09 4b 02 20 03 d6 8e 0d 89 6a 8a 87 86 3a |...K. .....j...:| +00000030 39 ae 4d e4 85 4a e6 ac 46 2f 5a aa 6c b5 f9 e5 |9.M..J..F/Z.l...| +00000040 9a 0c 12 78 3a a9 |...x:.| +[2d54 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [721fbd11] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2d55 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [721fbd11] notifying Txid:721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997, channelID:businesschannel +[2d56 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2d57 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][721fbd11] Exit chaincode: name:"lscc" (1ms) +[2d58 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2d59 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997] +[2d5a 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] Exit +[2d5b 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] Entry chaincode: name:"lscc" +[2d5c 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] escc for chaincode name:"lscc" is escc +[2d5d 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997, chaincode: lscc} +[2d5e 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A205C80A5E79FE27F1BAEE17595C0BF...455254494649434154452D2D2D2D2D0A +[2d5f 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D29CA9FE1B6F73D71D29101566F5DA488A9CA1CF3167632ABBAD3D1B9B791740 +[2d60 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997, chaincode: lscc} +[2d61 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][721fbd11] Exit +[2d62 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [721fbd11ce02a1337d79ff199a7bf9a0b2ead5d51bd4aa903f597fe46e7ee997] +[2d63 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45662 +[2d64 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45662 grpc.code=OK grpc.call_duration=4.456ms +[2d65 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2d66 11-19 05:22:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2d67 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2d68 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2d69 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d6a 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d6b 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d6c 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d6d 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2d6e 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2d6f 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d70 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d71 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d72 11-19 05:22:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d73 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d74 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d75 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d76 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 gate 1574140960210392400 evaluation starts +[2d77 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 signed by 0 principal evaluation starts (used [false]) +[2d78 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 processing identity 0 with bytes of 1151ae0 +[2d79 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 principal matched by identity 0 +[2d7a 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[2d7b 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[2d7c 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 principal evaluation succeeds for identity 0 +[2d7d 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390cd90 gate 1574140960210392400 evaluation succeeds +[2d7e 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d7f 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d80 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d81 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d82 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d83 11-19 05:22:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d84 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d85 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d86 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d87 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d88 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[2d89 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d8a 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d8b 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d8c 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d8d 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d8e 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d8f 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d90 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 gate 1574140960385836700 evaluation starts +[2d91 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 signed by 0 principal evaluation starts (used [false]) +[2d92 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 processing identity 0 with bytes of 1151ae0 +[2d93 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 principal matched by identity 0 +[2d94 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 b5 e0 48 a1 f7 c1 a8 64 d9 12 db 88 de 32 4e |...H....d.....2N| +00000010 b8 87 fd 05 7e af ef b5 c4 0a 4a 6f d7 65 56 05 |....~.....Jo.eV.| +[2d95 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 f6 f1 ca 45 13 05 b5 2a 04 b0 |0E.!.....E...*..| +00000010 73 98 5d 7b 85 99 52 cd fe 34 3d 7a 39 68 71 bf |s.]{..R..4=z9hq.| +00000020 6d f9 cc 82 51 02 20 24 4c 87 6a f6 d3 b8 45 25 |m...Q. $L.j...E%| +00000030 94 3e ed 4e 6c 1a a2 09 b6 5e 61 01 d7 53 45 5e |.>.Nl....^a..SE^| +00000040 a9 64 78 c5 e3 a5 4d |.dx...M| +[2d96 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 principal evaluation succeeds for identity 0 +[2d97 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d97d0 gate 1574140960385836700 evaluation succeeds +[2d98 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d99 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d9a 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d9b 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d9c 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d9d 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2d9e 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2d9f 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2da0 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2da1 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2da2 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2da3 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2da4 11-19 05:22:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2da5 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2da6 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2da7 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2da8 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2da9 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2daa 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2dab 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dac 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dad 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2daf 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2db0 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2db1 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dae 11-19 05:22:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2db2 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2db3 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2db4 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2db5 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2db6 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2db7 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2db8 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2db9 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dba 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dbb 11-19 05:22:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dbc 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45666 +[2dbd 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0041581e0 +[2dbe 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2dbf 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2dc0 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2dc1 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2dc2 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2dc3 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 50 c5 9f 5a 1a 09 81 e5 b5 3b eb dd f8 cf 46 |.P..Z.....;....F| +00000010 38 1c 05 e9 93 8e be 87 2a 46 e6 1e a0 84 09 a9 |8.......*F......| +[2dc4 11-19 05:22:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 64 92 f0 d8 f0 08 35 e2 bd bd |0E.!..d.....5...| +00000010 47 9e 69 52 1b e8 14 25 de 6e 62 0f 81 fe c9 f6 |G.iR...%.nb.....| +00000020 b4 39 09 d9 83 02 20 25 3f 0b dc 50 bf 93 af 87 |.9.... %?..P....| +00000030 0f 66 03 ba 38 fe 7d 7e cf 46 fe 37 7b 8b 10 99 |.f..8.}~.F.7{...| +00000040 b6 15 1f 5b 4d fc 54 |...[M.T| +[2dc5 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2dc6 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00308b8f0, header 0xc004158690 +[2dc7 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2dc8 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] processing txid: ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155 +[2dc9 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155] +[2dca 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2dcb 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155] +[2dcc 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] Entry chaincode: name:"lscc" +[2dcd 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ed1356b9] Entry chaincode: name:"lscc" +[2dce 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2dcf 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes +[2dd0 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2dd1 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2dd2 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2dd3 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2dd4 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 gate 1574140960445268700 evaluation starts +[2dd5 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 signed by 0 principal evaluation starts (used [false]) +[2dd6 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 processing identity 0 with bytes of 1151ae0 +[2dd7 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2dd8 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 principal evaluation fails +[2dd9 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e05d30 gate 1574140960445268700 evaluation fails +[2dda 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2ddb 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ddc 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2ddd 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 gate 1574140960447204700 evaluation starts +[2dde 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 signed by 0 principal evaluation starts (used [false]) +[2ddf 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 processing identity 0 with bytes of 1151ae0 +[2de0 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 principal matched by identity 0 +[2de1 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 50 c5 9f 5a 1a 09 81 e5 b5 3b eb dd f8 cf 46 |.P..Z.....;....F| +00000010 38 1c 05 e9 93 8e be 87 2a 46 e6 1e a0 84 09 a9 |8.......*F......| +[2de2 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 64 92 f0 d8 f0 08 35 e2 bd bd |0E.!..d.....5...| +00000010 47 9e 69 52 1b e8 14 25 de 6e 62 0f 81 fe c9 f6 |G.iR...%.nb.....| +00000020 b4 39 09 d9 83 02 20 25 3f 0b dc 50 bf 93 af 87 |.9.... %?..P....| +00000030 0f 66 03 ba 38 fe 7d 7e cf 46 fe 37 7b 8b 10 99 |.f..8.}~.F.7{...| +00000040 b6 15 1f 5b 4d fc 54 |...[M.T| +[2de3 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 principal evaluation succeeds for identity 0 +[2de4 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e2a0 gate 1574140960447204700 evaluation succeeds +[2de5 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2de6 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2de7 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2de8 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2de9 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +[2dea 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] handling GET_STATE_BY_RANGE from chaincode +[2deb 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +[2dec 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding a result +[2ded 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got keys and values. Sending RESPONSE +[2dee 11-19 05:22:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Completed GET_STATE_BY_RANGE. Sending RESPONSE +[2def 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +[2df0 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] handling QUERY_STATE_CLOSE from chaincode +[2df1 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Completed QUERY_STATE_CLOSE. Sending RESPONSE +[2df2 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2df3 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ed1356b9] notifying Txid:ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155, channelID:businesschannel +[2df4 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2df5 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ed1356b9] Exit chaincode: name:"lscc" (8ms) +[2df6 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2df7 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155] +[2df8 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] Exit +[2df9 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] Entry chaincode: name:"lscc" +[2dfa 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] escc for chaincode name:"lscc" is escc +[2dfb 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155, chaincode: lscc} +[2dfc 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C332CA7C118DE70F75DAC3C81F9E...455254494649434154452D2D2D2D2D0A +[2dfd 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E8F3EAC912A91717DF04A358A34C2638F2866A19F71A0FEF714337ABA0EABB75 +[2dfe 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155, chaincode: lscc} +[2dff 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ed1356b9] Exit +[2e00 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ed1356b9b4a5bd84e400a2c0cd289a4fb6f727f5051457c860a53e9ffb652155] +[2e01 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45666 +[2e02 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45666 grpc.code=OK grpc.call_duration=14.9037ms +[2e03 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e04 11-19 05:22:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e05 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e06 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e07 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e08 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e09 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[2e0a 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c c1 4d d7 e6 df 6b b7 75 1c fb 12 f1 82 4f 03 |..M...k.u.....O.| +00000010 12 ea 04 1e ed 5a 04 93 07 d5 6a 3c 63 9b c6 f7 |.....Z....j DEBU Verify: sig = 00000000 30 45 02 21 00 94 1e 66 e6 8e 3a 6d 96 d1 8d a2 |0E.!...f..:m....| +00000010 f5 22 2e 67 9d 04 e7 18 ef 8f 0d c0 1f 10 50 04 |.".g..........P.| +00000020 f6 eb 29 ad d7 02 20 08 2f 47 cf 46 56 55 e6 d2 |..)... ./G.FVU..| +00000030 87 9b 0a 23 b1 1a 0b 30 d8 ec 55 3c bb 9d 09 03 |...#...0..U<....| +00000040 f8 7c bf 2e 13 28 53 |.|...(S| +[2e0c 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e0d 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2e0e 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2e0f 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2e10 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2e11 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e12 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e13 11-19 05:22:40.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e14 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e15 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e16 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e17 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2e18 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e19 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2e1a 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e1b 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e1c 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e1d 11-19 05:22:40.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e1e 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e1f 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e20 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e21 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e23 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e22 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e24 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e25 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e26 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e27 11-19 05:22:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e28 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e29 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e2b 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e2c 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[2e2d 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e2e 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2e2f 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2e30 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2e31 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2e32 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e33 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2e34 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 gate 1574140960842860500 evaluation starts +[2e35 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 signed by 0 principal evaluation starts (used [false]) +[2e36 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 processing identity 0 with bytes of 1151ae0 +[2e37 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 principal matched by identity 0 +[2e38 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 e7 c6 6e 91 eb 72 f8 78 fd a3 d9 b4 90 3b 2e |&..n..r.x.....;.| +00000010 32 15 e2 f9 48 3d f8 f6 b1 03 d5 cb ad f6 d8 06 |2...H=..........| +[2e39 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 4e a3 69 12 83 9c 3b 7f e2 6d d5 |0D. >N.i...;..m.| +00000010 1e 16 87 0a 59 15 ad 5f 0b 6d c7 f4 8a b9 84 d5 |....Y.._.m......| +00000020 3f c8 cd a8 02 20 49 6d 62 ed 0c 74 c3 ff 2b 66 |?.... Imb..t..+f| +00000030 c6 94 64 84 00 18 4d d6 82 c6 7b e1 71 ee 90 72 |..d...M...{.q..r| +00000040 6b 71 46 17 41 4a |kqF.AJ| +[2e3a 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 principal evaluation succeeds for identity 0 +[2e3b 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0b20 gate 1574140960842860500 evaluation succeeds +[2e3c 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2e3d 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2e3e 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2e3f 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2e40 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e41 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2e42 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2e43 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2e44 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2e45 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e46 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e47 11-19 05:22:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e2a 11-19 05:22:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e48 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e49 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e4a 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e4b 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e4c 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e4d 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e4e 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e4f 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e50 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e51 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e52 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e53 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2e54 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e55 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e56 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2e57 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e58 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e59 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e5a 11-19 05:22:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e5b 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e5c 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e5d 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e5e 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e5f 11-19 05:22:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e60 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45670 +[2e61 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040abc20 +[2e62 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2e63 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2e64 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2e65 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2e66 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2e67 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 01 cf 4c 91 3f 21 7b 2e bb 82 fc c4 90 a2 c3 |...L.?!{........| +00000010 af 97 52 9a 0c 4e 09 97 34 1a 69 e5 c1 aa da b2 |..R..N..4.i.....| +[2e68 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 5a c4 71 91 c4 48 ef 04 23 5a |0E.!..Z.q..H..#Z| +00000010 db f2 72 47 82 71 09 b6 cc 25 2e 4a 4e 6e 77 9b |..rG.q...%.JNnw.| +00000020 fc 97 c7 f1 83 02 20 2f a8 46 06 a4 67 34 58 f0 |...... /.F..g4X.| +00000030 e5 d6 9b 5f 50 6a 90 94 83 fc bc 01 e4 51 16 c4 |..._Pj.......Q..| +00000040 66 9c 38 85 b5 94 b2 |f.8....| +[2e69 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2e6a 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00348f340, header 0xc00389dc70 +[2e6b 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[2e6c 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] processing txid: a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049 +[2e6d 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049] +[2e6e 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] Entry chaincode: name:"qscc" +[2e6f 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a71e8a30] Entry chaincode: name:"qscc" +[2e70 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2e71 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[2e72 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[2e73 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2e74 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2e75 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e76 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2e77 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 gate 1574140960927905600 evaluation starts +[2e78 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 signed by 0 principal evaluation starts (used [false]) +[2e79 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 processing identity 0 with bytes of 1151ae0 +[2e7a 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2e7b 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 principal evaluation fails +[2e7c 11-19 05:22:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d860 gate 1574140960927905600 evaluation fails +[2e7d 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2e7e 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2e7f 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2e80 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 gate 1574140960931082100 evaluation starts +[2e81 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 signed by 0 principal evaluation starts (used [false]) +[2e82 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 processing identity 0 with bytes of 1151ae0 +[2e83 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 principal matched by identity 0 +[2e84 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 01 cf 4c 91 3f 21 7b 2e bb 82 fc c4 90 a2 c3 |...L.?!{........| +00000010 af 97 52 9a 0c 4e 09 97 34 1a 69 e5 c1 aa da b2 |..R..N..4.i.....| +[2e85 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 5a c4 71 91 c4 48 ef 04 23 5a |0E.!..Z.q..H..#Z| +00000010 db f2 72 47 82 71 09 b6 cc 25 2e 4a 4e 6e 77 9b |..rG.q...%.JNnw.| +00000020 fc 97 c7 f1 83 02 20 2f a8 46 06 a4 67 34 58 f0 |...... /.F..g4X.| +00000030 e5 d6 9b 5f 50 6a 90 94 83 fc bc 01 e4 51 16 c4 |..._Pj.......Q..| +00000040 66 9c 38 85 b5 94 b2 |f.8....| +[2e86 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 principal evaluation succeeds for identity 0 +[2e87 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ddd0 gate 1574140960931082100 evaluation succeeds +[2e88 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2e89 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2e8a 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2e8b 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2e8c 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a71e8a30] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2e8d 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a71e8a30] notifying Txid:a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049, channelID:businesschannel +[2e8e 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2e8f 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a71e8a30] Exit chaincode: name:"qscc" (6ms) +[2e90 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] Exit +[2e91 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] Entry chaincode: name:"qscc" +[2e92 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] escc for chaincode name:"qscc" is escc +[2e93 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049, chaincode: qscc} +[2e94 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20447C6471E72FD712C641B9273077...455254494649434154452D2D2D2D2D0A +[2e95 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37A67D79752761A7E0F9E23FA37609FE30C13A0AEDBB9E59DD9975D1D57E3FEC +[2e96 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: a71e8a30450a59c9dbe568cb9391f855a3cbd31a3fceacee6abbbc4d6135d049, chaincode: qscc} +[2e97 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a71e8a30] Exit +[2e98 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45670 +[2e99 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45670 grpc.code=OK grpc.call_duration=11.3459ms +[2e9a 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e9b 11-19 05:22:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e9c 11-19 05:22:41.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45674 +[2e9d 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0028607d0 +[2e9e 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2e9f 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2ea0 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2ea1 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2ea2 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2ea3 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 1d c0 db f8 49 67 a8 75 68 d1 22 7b 30 d2 82 |.....Ig.uh."{0..| +00000010 ea 13 3c 78 54 f1 c7 81 ea 59 93 be fb dc 35 c2 |.. DEBU Verify: sig = 00000000 30 45 02 21 00 83 6d f6 66 c2 25 0b 38 0e 52 86 |0E.!..m.f.%.8.R.| +00000010 fd 2d f9 a9 12 ce 2b 51 52 62 4b 94 26 9e 58 88 |.-....+QRbK.&.X.| +00000020 93 47 d4 c1 0e 02 20 6e 84 0a 13 0d ce c2 58 58 |.G.... n......XX| +00000030 8d fa 13 d2 81 2f 56 36 27 f4 48 eb ff a6 33 ae |...../V6'.H...3.| +00000040 bb d8 6b 84 22 a1 29 |..k.".)| +[2ea5 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2ea6 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003097110, header 0xc002860be0 +[2ea7 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[2ea8 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] processing txid: 06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167 +[2ea9 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167] +[2eaa 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] Entry chaincode: name:"qscc" +[2eab 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][06660719] Entry chaincode: name:"qscc" +[2eac 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2ead 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +[2eae 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber +[2eaf 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2eb0 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2eb1 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2eb2 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2eb3 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 gate 1574140961096740200 evaluation starts +[2eb4 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 signed by 0 principal evaluation starts (used [false]) +[2eb5 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 processing identity 0 with bytes of 1151ae0 +[2eb6 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2eb7 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 principal evaluation fails +[2eb8 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003535e60 gate 1574140961096740200 evaluation fails +[2eb9 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2eba 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ebb 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2ebc 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 gate 1574140961098776400 evaluation starts +[2ebd 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 signed by 0 principal evaluation starts (used [false]) +[2ebe 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 processing identity 0 with bytes of 1151ae0 +[2ebf 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 principal matched by identity 0 +[2ec0 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 1d c0 db f8 49 67 a8 75 68 d1 22 7b 30 d2 82 |.....Ig.uh."{0..| +00000010 ea 13 3c 78 54 f1 c7 81 ea 59 93 be fb dc 35 c2 |.. DEBU Verify: sig = 00000000 30 45 02 21 00 83 6d f6 66 c2 25 0b 38 0e 52 86 |0E.!..m.f.%.8.R.| +00000010 fd 2d f9 a9 12 ce 2b 51 52 62 4b 94 26 9e 58 88 |.-....+QRbK.&.X.| +00000020 93 47 d4 c1 0e 02 20 6e 84 0a 13 0d ce c2 58 58 |.G.... n......XX| +00000030 8d fa 13 d2 81 2f 56 36 27 f4 48 eb ff a6 33 ae |...../V6'.H...3.| +00000040 bb d8 6b 84 22 a1 29 |..k.".)| +[2ec2 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 principal evaluation succeeds for identity 0 +[2ec3 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b83d0 gate 1574140961098776400 evaluation succeeds +[2ec4 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2ec5 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2ec6 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ec7 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ec8 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2] +[2ec9 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[51321] +[2eca 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[38114], Going to peek [8] bytes +[2ecb 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[25514], placementInfo={fileNum=[0], startOffset=[51321], bytesOffset=[51324]} +[2ecc 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU [06660719] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2ecd 11-19 05:22:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU [06660719] notifying Txid:06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167, channelID:businesschannel +[2ece 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2ecf 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][06660719] Exit chaincode: name:"qscc" (6ms) +[2ed0 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] Exit +[2ed1 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] Entry chaincode: name:"qscc" +[2ed2 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] escc for chaincode name:"qscc" is escc +[2ed3 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167, chaincode: qscc} +[2ed4 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209665AB006161DC05CD5748DEA848...455254494649434154452D2D2D2D2D0A +[2ed5 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ABE7F8E5DB9E4E043182CF40DC83C1DB0F610DDC2446DFE8E80C88FD629E9682 +[2ed6 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 06660719c1b217027a12db102d8ad7c8f28c7a3dbf53c9c34f305b0575a40167, chaincode: qscc} +[2ed7 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][06660719] Exit +[2ed8 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45674 +[2ed9 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45674 grpc.code=OK grpc.call_duration=11.7049ms +[2eda 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2edb 11-19 05:22:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2edc 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45678 +[2edd 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002861e00 +[2ede 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2edf 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2ee0 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2ee1 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2ee2 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2ee3 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee 5f 9c f9 6f 9d 76 9a a1 3b ff fe bb 71 3a c1 |._..o.v..;...q:.| +00000010 c0 ea eb 93 47 95 d2 f1 46 ce 7a c0 98 01 09 2d |....G...F.z....-| +[2ee4 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 96 32 c2 f3 40 81 0e ac c2 5e |0E.!...2..@....^| +00000010 f8 6d 54 9b f9 0c 4c a1 5e a7 d7 57 52 e8 21 a1 |.mT...L.^..WR.!.| +00000020 56 a0 3e c8 49 02 20 2a 15 80 04 12 a2 99 01 68 |V.>.I. *.......h| +00000030 c2 0b ed 97 f1 6c ca d5 89 68 93 71 45 21 6b 8f |.....l...h.qE!k.| +00000040 eb 07 c5 91 2d 08 44 |....-.D| +[2ee5 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2ee6 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003097500, header 0xc004014230 +[2ee7 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[2ee8 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] processing txid: 54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d +[2ee9 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d] +[2eea 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] Entry chaincode: name:"cscc" +[2eeb 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][54cdbaa0] Entry chaincode: name:"cscc" +[2eec 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2eed 11-19 05:22:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock +[2eee 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock +[2eef 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2ef0 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ef1 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ef2 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ef3 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 gate 1574140961561400300 evaluation starts +[2ef4 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 signed by 0 principal evaluation starts (used [false]) +[2ef5 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 processing identity 0 with bytes of 1151ae0 +[2ef6 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2ef7 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 principal evaluation fails +[2ef8 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004019050 gate 1574140961561400300 evaluation fails +[2ef9 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2efa 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2efb 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2efc 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 gate 1574140961563984300 evaluation starts +[2efd 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 signed by 0 principal evaluation starts (used [false]) +[2efe 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 processing identity 0 with bytes of 1151ae0 +[2eff 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 principal matched by identity 0 +[2f00 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee 5f 9c f9 6f 9d 76 9a a1 3b ff fe bb 71 3a c1 |._..o.v..;...q:.| +00000010 c0 ea eb 93 47 95 d2 f1 46 ce 7a c0 98 01 09 2d |....G...F.z....-| +[2f01 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 96 32 c2 f3 40 81 0e ac c2 5e |0E.!...2..@....^| +00000010 f8 6d 54 9b f9 0c 4c a1 5e a7 d7 57 52 e8 21 a1 |.mT...L.^..WR.!.| +00000020 56 a0 3e c8 49 02 20 2a 15 80 04 12 a2 99 01 68 |V.>.I. *.......h| +00000030 c2 0b ed 97 f1 6c ca d5 89 68 93 71 45 21 6b 8f |.....l...h.qE!k.| +00000040 eb 07 c5 91 2d 08 44 |....-.D| +[2f02 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 principal evaluation succeeds for identity 0 +[2f03 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040195c0 gate 1574140961563984300 evaluation succeeds +[2f04 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2f05 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2f06 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2f07 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2f08 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [54cdbaa0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f09 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [54cdbaa0] notifying Txid:54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d, channelID:businesschannel +[2f0a 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f0b 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][54cdbaa0] Exit chaincode: name:"cscc" (8ms) +[2f0c 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] Exit +[2f0d 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] Entry chaincode: name:"cscc" +[2f0e 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] escc for chaincode name:"cscc" is escc +[2f0f 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d, chaincode: cscc} +[2f10 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A207318100A857D86AEFC63229C628D...455254494649434154452D2D2D2D2D0A +[2f11 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8D5A39A62391EAD2A49AD1313BE456279CE50B9B70F909E67A77339D5440E8A2 +[2f12 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 54cdbaa085c2c36d01940ae0ba90067feb50723c66ab7ba20cc9f015d1b69f4d, chaincode: cscc} +[2f13 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][54cdbaa0] Exit +[2f14 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45678 +[2f15 11-19 05:22:41.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45678 grpc.code=OK grpc.call_duration=12.8337ms +[2f16 11-19 05:22:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f17 11-19 05:22:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f18 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45682 +[2f19 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004015270 +[2f1a 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2f1b 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2f1c 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2f1d 11-19 05:22:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[2f1e 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2f1f 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 2b f4 77 68 c4 06 15 78 51 11 80 d5 05 f3 66 |.+.wh...xQ.....f| +00000010 ac 4c 11 2e e9 16 db 1c 6c c6 2b 1f 8b bb 89 ce |.L......l.+.....| +[2f20 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f a6 70 8d 1f 61 7b 0c ce 46 51 fb |0D. O.p..a{..FQ.| +00000010 36 0f 24 bb cd b7 61 22 8e b1 68 0d b0 44 c5 ef |6.$...a"..h..D..| +00000020 ab 2b fc a8 02 20 0f 7e 4b 12 ce 4f d3 56 64 ad |.+... .~K..O.Vd.| +00000030 fc 2d 40 ad 35 1d 02 fc c4 a2 06 07 ee 51 ad b5 |.-@.5........Q..| +00000040 02 ef f9 54 7a ec |...Tz.| +[2f21 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2f22 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003097960, header 0xc004015680 +[2f23 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[2f24 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] processing txid: e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd +[2f25 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd] +[2f26 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] Entry chaincode: name:"cscc" +[2f27 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e926ee28] Entry chaincode: name:"cscc" +[2f28 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2f29 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[2f2a 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 2b f4 77 68 c4 06 15 78 51 11 80 d5 05 f3 66 |.+.wh...xQ.....f| +00000010 ac 4c 11 2e e9 16 db 1c 6c c6 2b 1f 8b bb 89 ce |.L......l.+.....| +[2f2b 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f a6 70 8d 1f 61 7b 0c ce 46 51 fb |0D. O.p..a{..FQ.| +00000010 36 0f 24 bb cd b7 61 22 8e b1 68 0d b0 44 c5 ef |6.$...a"..h..D..| +00000020 ab 2b fc a8 02 20 0f 7e 4b 12 ce 4f d3 56 64 ad |.+... .~K..O.Vd.| +00000030 fc 2d 40 ad 35 1d 02 fc c4 a2 06 07 ee 51 ad b5 |.-@.5........Q..| +00000040 02 ef f9 54 7a ec |...Tz.| +[2f2c 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [e926ee28] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f2d 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [e926ee28] notifying Txid:e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd, channelID:businesschannel +[2f2e 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f2f 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e926ee28] Exit chaincode: name:"cscc" (3ms) +[2f30 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] Exit +[2f31 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] Entry chaincode: name:"cscc" +[2f32 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] escc for chaincode name:"cscc" is escc +[2f33 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd, chaincode: cscc} +[2f34 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20545ADCFE4571C5C45685CF77E750...455254494649434154452D2D2D2D2D0A +[2f35 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6F0F8D204A118C41D9C9311CD2BFB6AE8E509E4A2BE9644376A27F95ACCA4397 +[2f36 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e926ee28358cfb1da7a1b20c1270cb509448b80715b4df66c26a20a36e4f47fd, chaincode: cscc} +[2f37 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e926ee28] Exit +[2f38 11-19 05:22:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45682 +[2f39 11-19 05:22:41.76 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45682 grpc.code=OK grpc.call_duration=12.5077ms +[2f3a 11-19 05:22:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f3b 11-19 05:22:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f3c 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2f3d 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2f3e 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2f40 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2f41 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2f3f 11-19 05:22:42.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2f42 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2f46 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f43 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2f44 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f45 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2f47 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f48 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2f49 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2f4a 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f4b 11-19 05:22:42.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f4c 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f4d 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f4e 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2f4f 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f50 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f51 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f52 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f53 11-19 05:22:42.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f54 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2f55 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151027 +[2f56 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 48C673BAD1705012CFA6FB8FB1AA85212A60CDDDA452078BC5AEAC961EE161FC +[2f57 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2f58 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2f59 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2f5a 11-19 05:22:42.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[2f5b 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[2f5c 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f5d 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f5e 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2f5f 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f61 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2f60 11-19 05:22:42.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2f62 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f63 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2f64 11-19 05:22:42.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f65 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2f66 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2f67 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f68 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2f69 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2f6a 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +[2f6b 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +[2f6c 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2f6d 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2f6e 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f6f 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f70 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[2f71 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[2f72 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f73 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[2f74 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2f75 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +[2f76 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +[2f77 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[2f78 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 02 e4 ea 29 c7 5b b9 ab 2c 55 |0E.!.....).[..,U| +00000010 f5 b5 1b ca 01 a3 b0 1e 37 ab b0 26 fd 83 40 6d |........7..&..@m| +00000020 ad 51 f3 df 4f 02 20 48 1c ce 40 10 45 22 b5 a9 |.Q..O. H..@.E"..| +00000030 c2 df 94 dc a5 b6 9e ed 71 47 54 76 b7 57 71 f3 |........qGTv.Wq.| +00000040 e7 fa f1 14 df 30 8e |.....0.| +[2f79 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2f7a 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2f7b 11-19 05:22:42.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2f7c 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2f7d 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f7e 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f7f 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2f80 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[2f81 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f82 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c6 73 ba d1 70 50 12 cf a6 fb 8f b1 aa 85 21 |H.s..pP........!| +00000010 2a 60 cd dd a4 52 07 8b c5 ae ac 96 1e e1 61 fc |*`...R........a.| +[2f83 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 46 6a 9a 40 4a da 6b ed a2 a8 |0E.!..Fj.@J.k...| +00000010 91 29 03 c3 d4 c0 fd 81 c9 ee 2b 5b b3 4b 7b 24 |.)........+[.K{$| +00000020 eb 2d 7f 0d 92 02 20 28 fc 16 c0 87 b3 61 13 88 |.-.... (.....a..| +00000030 b4 09 ed 3c ed cb 34 17 13 74 cd a5 0f aa c6 a5 |...<..4..t......| +00000040 2c 53 d0 b8 b0 98 d3 |,S.....| +[2f84 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2f85 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2f86 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f87 11-19 05:22:42.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f88 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f89 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f8a 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2f8b 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2f8c 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f8d 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2f8e 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f8f 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2f90 11-19 05:22:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f91 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[2f92 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[2f93 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f94 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f95 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f96 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2f97 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2f98 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2f99 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2f9a 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2f9b 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2f9c 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 gate 1574140963285716800 evaluation starts +[2f9d 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 signed by 0 principal evaluation starts (used [false]) +[2f9e 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 processing identity 0 with bytes of 1151ae0 +[2f9f 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 principal matched by identity 0 +[2fa0 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[2fa1 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[2fa2 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 principal evaluation succeeds for identity 0 +[2fa3 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb2d0 gate 1574140963285716800 evaluation succeeds +[2fa4 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2fa5 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2fa6 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2fa7 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2fa8 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[2fa9 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[2faa 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[2fab 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[2fac 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[2fad 11-19 05:22:43.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[2fae 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2faf 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fb0 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2fb1 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2fb2 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2fb3 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2fb4 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2fb5 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2fb6 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 gate 1574140963292146300 evaluation starts +[2fb7 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 signed by 0 principal evaluation starts (used [false]) +[2fb8 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 processing identity 0 with bytes of 1151ae0 +[2fb9 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 principal matched by identity 0 +[2fba 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[2fbb 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[2fbc 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 principal evaluation succeeds for identity 0 +[2fbd 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817160 gate 1574140963292146300 evaluation succeeds +[2fbe 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2fbf 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2fc0 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2fc1 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2fc2 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fc3 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[2fc4 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fc5 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fc6 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fc7 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2fc8 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2fc9 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2fca 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2fcb 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2fcc 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2fcd 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 gate 1574140963294803900 evaluation starts +[2fce 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 signed by 0 principal evaluation starts (used [false]) +[2fcf 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 processing identity 0 with bytes of 1151ae0 +[2fd0 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 principal matched by identity 0 +[2fd1 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[2fd2 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[2fd3 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 principal evaluation succeeds for identity 0 +[2fd4 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4540 gate 1574140963294803900 evaluation succeeds +[2fd5 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2fd6 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2fd7 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2fd8 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2fd9 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[2fda 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[2fdb 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[2fdc 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[2fdd 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fde 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fdf 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2fe0 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2fe1 11-19 05:22:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2fe2 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2fe4 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +[2fe5 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +[2fe6 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +[2fe3 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2fe7 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2fe8 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 gate 1574140963308507600 evaluation starts +[2fe9 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 signed by 0 principal evaluation starts (used [false]) +[2fea 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 processing identity 0 with bytes of 1151ae0 +[2feb 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 principal matched by identity 0 +[2fec 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[2fed 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[2fee 11-19 05:22:43.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 principal evaluation succeeds for identity 0 +[2fef 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d29b70 gate 1574140963308507600 evaluation succeeds +[2ff0 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2ff1 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ff2 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ff3 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ff4 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ff5 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[2ff6 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[2ff7 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[2ff8 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[2ff9 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[2ffa 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ffb 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ffc 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2ffd 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ffe 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2fff 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3000 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3001 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3002 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 gate 1574140963316186500 evaluation starts +[3003 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 signed by 0 principal evaluation starts (used [false]) +[3004 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 processing identity 0 with bytes of 1151ae0 +[3005 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 principal matched by identity 0 +[3006 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[3007 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[3008 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 principal evaluation succeeds for identity 0 +[3009 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003315bc0 gate 1574140963316186500 evaluation succeeds +[300a 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[300b 11-19 05:22:43.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[300c 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[300d 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[300e 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[300f 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3010 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3011 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3012 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3013 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3014 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3015 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3016 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 gate 1574140963322921300 evaluation starts +[3017 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 signed by 0 principal evaluation starts (used [false]) +[3018 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 processing identity 0 with bytes of 1151ae0 +[3019 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 principal matched by identity 0 +[301a 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[301b 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[301c 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 principal evaluation succeeds for identity 0 +[301d 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fee90 gate 1574140963322921300 evaluation succeeds +[301e 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[301f 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3020 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3021 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3022 11-19 05:22:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3023 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3024 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3025 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3026 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3027 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3028 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3029 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[302a 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[302b 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[302c 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[302d 11-19 05:22:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[302e 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[302f 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3030 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3031 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3032 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3033 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3034 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3035 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3036 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3037 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3038 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3039 11-19 05:22:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[303a 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +[303b 11-19 05:22:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +[303c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[303d 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\314\033N\tp\206\241\033\254\341 \3637\245" > > , Envelope: 166 bytes, Signature: 0 bytes +[303e 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[303f 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3040 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3041 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3042 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3043 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3044 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3045 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3046 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 gate 1574140963441894200 evaluation starts +[3047 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 signed by 0 principal evaluation starts (used [false]) +[3048 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 processing identity 0 with bytes of 1151ae0 +[3049 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 principal matched by identity 0 +[304a 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 4b a0 73 a0 e6 19 17 62 14 a0 f9 64 6f 25 b6 |>K.s....b...do%.| +00000010 95 08 6c 0d 63 62 71 18 71 a3 66 3e 1c 62 c8 d1 |..l.cbq.q.f>.b..| +[304b 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 13 37 7b a8 89 25 11 ea 52 1e |0E.!...7{..%..R.| +00000010 d8 0c 93 9d 88 9b 86 61 d7 06 6e f4 f8 f8 40 6a |.......a..n...@j| +00000020 67 0f b1 10 80 02 20 48 75 ca ab 18 94 7a 01 30 |g..... Hu....z.0| +00000030 68 16 43 7c b0 92 16 bb 3e cc 1b 4e 09 70 86 a1 |h.C|....>..N.p..| +00000040 1b ac e1 20 f3 37 a5 |... .7.| +[304c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 principal evaluation succeeds for identity 0 +[304d 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5410 gate 1574140963441894200 evaluation succeeds +[304e 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[304f 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3050 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3051 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3052 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3053 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3054 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3055 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3056 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3057 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3058 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3059 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[305a 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[305b 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[305c 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[305d 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[305e 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[305f 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:N\243i\022\203\234;\177\342m\325\036\026\207\nY\025\255_\013m\307\364\212\271\204\325?\310\315\250\002 Imb\355\014t\303\377+f\306\224d\204\000\030M\326\202\306{\341q\356\220rkqF\027AJ" > alive:\314\033N\tp\206\241\033\254\341 \3637\245" > alive:/0\250\0062M\241\203\305\223\223\246a." > +[3060 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3061 11-19 05:22:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3062 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3063 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3064 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3065 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3066 11-19 05:22:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3067 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3068 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3069 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[306a 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[306b 11-19 05:22:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[306c 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[306d 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[306e 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[306f 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[3070 11-19 05:22:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3071 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3072 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3073 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3074 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3075 11-19 05:22:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3076 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3077 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3078 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3079 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[307a 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[307b 11-19 05:22:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[307c 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +[307d 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +[307e 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[307f 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\271\033w\365\271\032H\256" > > , Envelope: 165 bytes, Signature: 0 bytes +[3080 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[3081 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3082 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3083 11-19 05:22:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3084 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3085 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3086 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3087 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3088 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 gate 1574140963832300800 evaluation starts +[3089 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 signed by 0 principal evaluation starts (used [false]) +[308a 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 processing identity 0 with bytes of 1151ae0 +[308b 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 principal matched by identity 0 +[308c 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce f3 4a 28 6f fd 2d 1f 68 b3 0d a5 3c 84 9f |...J(o.-.h...<..| +00000010 00 0c 01 ff e8 95 3e 30 8e 78 0b b5 f5 2d e9 55 |......>0.x...-.U| +[308d 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 05 50 ab 44 93 6e 30 0d 5d 66 29 |0D. D.P.D.n0.]f)| +00000010 b1 44 9b 2b c2 a1 67 90 e8 2d b2 b0 46 7d 74 f5 |.D.+..g..-..F}t.| +00000020 ba 49 78 df 02 20 49 09 7f 48 bd e9 c5 10 bf 91 |.Ix.. I..H......| +00000030 73 1b 45 93 d4 cb 59 37 d9 fc fc bb b2 3e b9 1b |s.E...Y7.....>..| +00000040 77 f5 b9 1a 48 ae |w...H.| +[308e 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 principal evaluation succeeds for identity 0 +[308f 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263e450 gate 1574140963832300800 evaluation succeeds +[3090 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3091 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3092 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3093 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3094 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3095 11-19 05:22:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3096 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3097 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3098 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3099 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[309a 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[309b 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[309c 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[309d 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[309e 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[309f 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30a0 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[30a1 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\271\033w\365\271\032H\256" > alive:\314\033N\tp\206\241\033\254\341 \3637\245" > alive:/0\250\0062M\241\203\305\223\223\246a." > +[30a2 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[30a3 11-19 05:22:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30a4 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[30a5 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[30a6 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30a7 11-19 05:22:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[30a8 11-19 05:22:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[30a9 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 69 dd c5 b2 89 f8 8f ee 1f 88 02 62 38 e8 9a |.i..........b8..| +00000010 a1 ff 8b c1 7a b7 0e a4 bb 7a e8 05 96 58 06 32 |....z....z...X.2| +[30aa 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 29 f2 69 10 00 49 78 70 30 0c 12 |0D. .).i..Ixp0..| +00000010 22 65 4f 43 c5 c1 dd a8 a4 f0 3a df cc 57 30 74 |"eOC......:..W0t| +00000020 ac a1 0e 4a 02 20 02 a7 df 04 15 59 cb de 65 99 |...J. .....Y..e.| +00000030 0f 4b 84 6f 1d b6 c3 8a 24 9d 1d 16 bb c4 c7 2c |.K.o....$......,| +00000040 f2 96 94 d2 36 f5 |....6.| +[30ab 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[30ac 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 e6 b9 89 ba 77 5a 63 f6 fd 1f |0E.!......wZc...| +00000010 47 06 15 50 af ab 3c 8f 9f 52 b5 90 0c 73 43 3b |G..P..<..R...sC;| +00000020 99 18 c1 40 29 02 20 7c 14 13 74 11 2a b0 ad 49 |...@). |..t.*..I| +00000030 34 5d d5 5c f3 fa e6 c1 0a 4e db f3 8a f8 09 bc |4].\.....N......| +00000040 8b e6 ba e3 67 e9 ce |....g..| +[30ad 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[30ae 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[30af 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[30b0 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[30b1 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[30b2 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b3 11-19 05:22:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b4 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[30b5 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[30b6 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b7 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b8 11-19 05:22:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b9 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30ba 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[30bb 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30bc 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30bd 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[30bf 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30be 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:/0\250\0062M\241\203\305\223\223\246a." > +[30c0 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[30c1 11-19 05:22:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30c2 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[30c3 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[30c4 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c5 11-19 05:22:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c6 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c7 11-19 05:22:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30c8 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[30c9 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[30ca 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[30cb 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100D1801 +[30cc 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B2F252E3F4C143602C371554AD51091D71B920F0288BF558A0D11FD74295E0C +[30cd 11-19 05:22:44.35 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[30ce 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30cf 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30d0 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30d1 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30d2 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[30d3 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30d4 11-19 05:22:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30d5 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[30d6 11-19 05:22:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30d7 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[30d8 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151028 +[30d9 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E2FD67C9E355B64C4BFAA0B8BBF88514369799A21F8E7F8B44C0E3AB377A98DF +[30da 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[30db 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[30dc 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[30dd 11-19 05:22:44.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[30de 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30df 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30e0 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[30e1 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30e2 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[30e3 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30e4 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30e5 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30e6 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[30e7 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30e8 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30e9 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30ea 11-19 05:22:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30eb 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[30ec 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[30ed 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30ee 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[30ef 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[30f0 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30f1 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[30f2 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[30f3 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[30f4 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[30f5 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[30f6 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[30f7 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 gate 1574140965357533500 evaluation starts +[30f8 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 signed by 0 principal evaluation starts (used [false]) +[30f9 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 processing identity 0 with bytes of 1151ae0 +[30fa 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 principal matched by identity 0 +[30fb 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c ff b9 3d 40 b7 b9 ce 1d e0 44 b2 0d cc 7a 8d |<..=@.....D...z.| +00000010 94 d4 5f fd cd 5a f8 07 5b 94 8b 44 2a 0f 91 62 |.._..Z..[..D*..b| +[30fc 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 36 2c f0 39 11 4c a6 14 c9 0f |0E.!..6,.9.L....| +00000010 a9 2c cd c9 ad c0 c5 d6 f2 b8 57 47 2d 16 a8 dd |.,........WG-...| +00000020 4f 50 f0 dc b7 02 20 0b 4e 4b b3 fe 7f 10 8a 45 |OP.... .NK.....E| +00000030 e7 1a e6 e7 0a df 3c 0d 3e 76 79 17 ea 46 aa 30 |......<.>vy..F.0| +00000040 84 c4 3d 83 16 70 fa |..=..p.| +[30fd 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 principal evaluation succeeds for identity 0 +[30fe 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002682b10 gate 1574140965357533500 evaluation succeeds +[30ff 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3100 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3101 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3102 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3103 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3104 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3105 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3106 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3107 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3108 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3109 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[310a 11-19 05:22:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[310b 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[310c 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[310d 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[310e 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[310f 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3110 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3111 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3112 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3113 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3114 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3115 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3116 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3117 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3118 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3119 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[311a 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[311b 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[311c 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[311d 11-19 05:22:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[311e 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[311f 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3120 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3121 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3122 11-19 05:22:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3123 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3124 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3125 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3126 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3127 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3128 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d a5 0a af 4e b2 ef 5e 59 87 0e 20 57 3a 0d c3 |....N..^Y.. W:..| +00000010 bd da 3f 70 a1 59 3b fc 27 db 09 4b fc 67 2e 21 |..?p.Y;.'..K.g.!| +[3129 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 18 ce ea 32 59 59 8e 91 fd b7 87 |0D. t...2YY.....| +00000010 96 17 ea fa 15 59 46 0d ff 5d 4a e4 5b df 4a 14 |.....YF..]J.[.J.| +00000020 35 e8 94 a1 02 20 7d 66 cd 1c ac 2b a8 09 df e5 |5.... }f...+....| +00000030 9d 91 19 df da d9 92 b8 1e 56 57 50 31 12 c7 de |.........VWP1...| +00000040 81 c5 7e 2a 54 de |..~*T.| +[312a 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[312b 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[312c 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[312d 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[312e 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[312f 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3130 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3131 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3132 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3133 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3134 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3135 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3136 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3137 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3138 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3139 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[313a 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[313b 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[313c 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[313d 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[313e 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[313f 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3140 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3141 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3142 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3143 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3144 11-19 05:22:45.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3145 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3146 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3147 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3148 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3149 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[314a 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[314b 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[314c 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[314d 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[314e 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[314f 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3150 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3151 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 gate 1574140965806924300 evaluation starts +[3152 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 signed by 0 principal evaluation starts (used [false]) +[3153 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 processing identity 0 with bytes of 1151ae0 +[3154 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 principal matched by identity 0 +[3155 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 ee 04 07 62 b0 a8 b7 bc 56 90 2a 9d 25 28 d8 |....b....V.*.%(.| +00000010 21 0a 01 9a 20 92 e9 a8 cf ab 41 aa a1 a4 b4 27 |!... .....A....'| +[3156 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f5 16 6d 14 7e 2a bc 60 a9 57 93 |0D. X..m.~*.`.W.| +00000010 de 91 c2 0c f7 92 b1 73 33 23 36 5f 6c e9 4e 60 |.......s3#6_l.N`| +00000020 75 77 b1 95 02 20 43 8d d9 e0 c1 c7 3b cf 50 f0 |uw... C.....;.P.| +00000030 8a 72 9d ed 6f 5b e6 f2 89 3e a9 32 51 bb ed df |.r..o[...>.2Q...| +00000040 e0 a9 84 51 69 72 |...Qir| +[3157 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 principal evaluation succeeds for identity 0 +[3158 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da320 gate 1574140965806924300 evaluation succeeds +[3159 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[315a 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[315b 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[315c 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[315d 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[315e 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[315f 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3160 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3161 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3162 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3163 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3164 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3165 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3166 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3167 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3168 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3169 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[316a 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[316b 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[316c 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[316d 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[316e 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[316f 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3170 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3171 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3172 11-19 05:22:45.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3173 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3174 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3175 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3176 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3177 11-19 05:22:45.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3178 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3179 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[317a 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[317b 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[317c 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[317d 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[317e 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[317f 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3180 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3181 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3182 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3183 11-19 05:22:46.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3184 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3185 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3186 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3187 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3188 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3189 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[318a 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[318b 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[318c 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[318d 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[318e 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[318f 11-19 05:22:46.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3190 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3191 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151029 +[3192 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E778CB717DAC4B5240EDA64B6F43074AA39D348E37C5AB86D3F52269D8C23D6A +[3193 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3194 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3195 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3196 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[3197 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3198 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3199 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[319a 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[319b 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[319c 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[319d 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[319e 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[319f 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[31a0 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31a1 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31a2 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31a3 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31a4 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[31a5 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +[31a6 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +00000040 f0 eb 8b 19 ff 0f |......| +[31a7 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31a8 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31a9 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31aa 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31ab 11-19 05:22:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31ac 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[31ad 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[31ae 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31af 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[31b0 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[31b1 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +[31b2 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +00000040 f0 eb 8b 19 ff 0f |......| +[31b3 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[31b4 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 98 a5 ce ed 12 b3 10 af 9d bc f0 |0D. ............| +00000010 2a a5 1d 10 1b 7e 74 b5 d1 fb f5 70 04 28 01 d4 |*....~t....p.(..| +00000020 6b 74 08 ee 02 20 34 7c 59 ee d6 9b 6c 45 1a a7 |kt... 4|Y...lE..| +00000030 5c c8 90 05 5b 54 73 23 a6 11 72 c0 f9 99 21 75 |\...[Ts#..r...!u| +00000040 76 34 5b e8 be 48 |v4[..H| +[31b5 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[31b6 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[31b7 11-19 05:22:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31b8 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31b9 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31ba 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31bb 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31bc 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31bd 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[31be 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 78 cb 71 7d ac 4b 52 40 ed a6 4b 6f 43 07 4a |.x.q}.KR@..KoC.J| +00000010 a3 9d 34 8e 37 c5 ab 86 d3 f5 22 69 d8 c2 3d 6a |..4.7....."i..=j| +[31bf 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 92 80 d5 ba b8 72 b4 45 aa c9 00 |0D. =.....r.E...| +00000010 6e bb fd a5 97 23 2c 93 c3 0c 19 12 12 b5 92 fc |n....#,.........| +00000020 cd 05 30 d3 02 20 0b d5 b7 c2 4c e4 e8 42 d8 79 |..0.. ....L..B.y| +00000030 a0 2b 26 1b 48 8f 78 37 aa a6 82 32 d0 37 1e c1 |.+&.H.x7...2.7..| +00000040 f0 eb 8b 19 ff 0f |......| +[31c0 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31c1 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31c2 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31c3 11-19 05:22:46.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31c4 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31c5 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31c6 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[31c7 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[31c8 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31c9 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[31ca 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31cb 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[31cc 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31cd 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[31ce 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[31cf 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31d0 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31d1 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31d2 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[31d3 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[31d4 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[31d5 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[31d6 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[31d7 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[31d8 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 gate 1574140967275337200 evaluation starts +[31d9 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 signed by 0 principal evaluation starts (used [false]) +[31da 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 processing identity 0 with bytes of 1151ae0 +[31db 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 principal matched by identity 0 +[31dc 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[31dd 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[31de 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[31df 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 principal evaluation succeeds for identity 0 +[31e0 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258b2b0 gate 1574140967275337200 evaluation succeeds +[31e1 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[31e2 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[31e3 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[31e4 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[31e5 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[31e6 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[31e7 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[31e8 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[31e9 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31ea 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31eb 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[31ec 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[31ed 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[31ee 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[31ef 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[31f0 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[31f1 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 gate 1574140967277005400 evaluation starts +[31f2 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 signed by 0 principal evaluation starts (used [false]) +[31f3 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[31f4 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 processing identity 0 with bytes of 1151ae0 +[31f5 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 principal matched by identity 0 +[31f6 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[31f7 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[31f8 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 principal evaluation succeeds for identity 0 +[31f9 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f7290 gate 1574140967277005400 evaluation succeeds +[31fa 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[31fb 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[31fc 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[31fd 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[31fe 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31ff 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3200 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[3201 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[3202 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[3203 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[3204 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3205 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3206 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3207 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3208 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3209 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[320a 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[320b 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[320c 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 gate 1574140967278548700 evaluation starts +[320d 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 signed by 0 principal evaluation starts (used [false]) +[320e 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 processing identity 0 with bytes of 1151ae0 +[320f 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 principal matched by identity 0 +[3210 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[3211 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[3212 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 principal evaluation succeeds for identity 0 +[3213 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ed480 gate 1574140967278548700 evaluation succeeds +[3214 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3215 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3216 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3217 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3218 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3219 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[321a 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[321b 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[321c 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[321d 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[321e 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[321f 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3220 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 gate 1574140967279497700 evaluation starts +[3221 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 signed by 0 principal evaluation starts (used [false]) +[3222 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 processing identity 0 with bytes of 1151ae0 +[3223 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 principal matched by identity 0 +[3224 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[3225 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[3226 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 principal evaluation succeeds for identity 0 +[3227 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004da6c0 gate 1574140967279497700 evaluation succeeds +[3228 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3229 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[322a 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[322b 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[322c 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[322d 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[322e 11-19 05:22:47.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[322f 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3230 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3231 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3232 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3233 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3234 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3235 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3236 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3237 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 gate 1574140967280317600 evaluation starts +[3238 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 signed by 0 principal evaluation starts (used [false]) +[3239 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 processing identity 0 with bytes of 1151ae0 +[323a 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 principal matched by identity 0 +[323b 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[323c 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[323d 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 principal evaluation succeeds for identity 0 +[323e 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dbaa0 gate 1574140967280317600 evaluation succeeds +[323f 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3240 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3241 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3242 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3243 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[3244 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[3245 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[3246 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[3247 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3248 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3249 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[324a 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[324b 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[324c 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[324d 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[324e 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[324f 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 gate 1574140967286862100 evaluation starts +[3250 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 signed by 0 principal evaluation starts (used [false]) +[3251 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 processing identity 0 with bytes of 1151ae0 +[3252 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 principal matched by identity 0 +[3253 11-19 05:22:47.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[3254 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[3255 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 principal evaluation succeeds for identity 0 +[3256 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d3980 gate 1574140967286862100 evaluation succeeds +[3257 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3258 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3259 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[325a 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[325b 11-19 05:22:47.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[325c 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[325d 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[325e 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[325f 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3260 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3261 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3262 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3263 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3264 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3265 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[3266 11-19 05:22:47.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3267 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3268 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3269 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[326a 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[326b 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[326c 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[326d 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[326e 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[326f 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3270 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3271 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3272 11-19 05:22:47.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3273 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +[3274 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +[3275 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3276 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > > , Envelope: 166 bytes, Signature: 0 bytes +[3277 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[3278 11-19 05:22:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3279 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[327a 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[327b 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[327c 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[327d 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[327e 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[327f 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 gate 1574140967441785100 evaluation starts +[3280 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 signed by 0 principal evaluation starts (used [false]) +[3281 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 processing identity 0 with bytes of 1151ae0 +[3282 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 principal matched by identity 0 +[3283 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 1d c4 45 5d 46 a7 37 68 2a 17 0c 61 6b 99 a6 |p..E]F.7h*..ak..| +00000010 68 42 56 76 7f 3a dd 7a 20 2f 46 6f 86 b4 91 d5 |hBVv.:.z /Fo....| +[3284 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b0 bb 4f 4a 3b 3e 31 d1 8f 1f |0E.!....OJ;>1...| +00000010 70 ef db f6 e3 4d 62 ee e6 0c fc 33 0f 49 f3 f3 |p....Mb....3.I..| +00000020 eb 48 30 0f 27 02 20 02 80 e1 19 88 5a a5 82 41 |.H0.'. .....Z..A| +00000030 cb 6f 61 a4 ba 19 d2 db b9 68 bd cc a6 19 de 61 |.oa......h.....a| +00000040 fa de 87 f3 37 db 46 |....7.F| +[3285 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 principal evaluation succeeds for identity 0 +[3286 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004734d0 gate 1574140967441785100 evaluation succeeds +[3287 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3288 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3289 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[328a 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[328b 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[328c 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[328d 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[328e 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[328f 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3290 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3291 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3292 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3293 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[3294 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3295 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3296 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3297 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[3298 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\2512Q\273\355\337\340\251\204Qir" > alive:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > alive: +[3299 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[329a 11-19 05:22:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[329b 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[329c 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[329d 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[329e 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[329f 11-19 05:22:47.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32a0 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[32a1 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[32a2 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[32a3 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[32a4 11-19 05:22:47.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32a5 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[32a6 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[32a7 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[32a8 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[32a9 11-19 05:22:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32aa 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[32ab 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[32ac 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[32ad 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32ae 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32af 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32b0 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32b1 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32b2 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32b3 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[32b4 11-19 05:22:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32b5 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[32b6 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[32b7 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32b8 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[32b9 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[32ba 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32bb 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32bc 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32bd 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32be 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32bf 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32c0 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32c1 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 gate 1574140967833147400 evaluation starts +[32c2 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 signed by 0 principal evaluation starts (used [false]) +[32c3 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 processing identity 0 with bytes of 1151ae0 +[32c4 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 principal matched by identity 0 +[32c5 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 2b fb 56 66 72 0c a1 7c 1c 98 f3 54 67 d0 19 |.+.Vfr..|...Tg..| +00000010 c9 bc 06 04 31 fa 64 6e 29 47 29 dc b7 92 13 2b |....1.dn)G)....+| +[32c6 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af 25 dd be 12 c8 98 26 b3 8c |0E.!...%.....&..| +00000010 08 82 59 26 5d 1c 57 8f a5 f2 15 c2 3b 88 64 69 |..Y&].W.....;.di| +00000020 d4 68 bd dd 2c 02 20 32 7c 14 51 73 12 00 9c 00 |.h..,. 2|.Qs....| +00000030 35 5c 11 4a 88 e9 36 02 0e 4c cf da f6 55 9a 61 |5\.J..6..L...U.a| +00000040 94 99 31 4d 03 90 08 |..1M...| +[32c7 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 principal evaluation succeeds for identity 0 +[32c8 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434760 gate 1574140967833147400 evaluation succeeds +[32c9 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32ca 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32cb 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32cc 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32cd 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[32ce 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[32cf 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[32d0 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[32d1 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[32d2 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32d3 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32d4 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32d5 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[32d6 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32d7 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32d8 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32d9 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[32da 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[32db 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32dc 11-19 05:22:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:1\321\217\037p\357\333\366\343Mb\356\346\014\3743\017I\363\363\353H0\017'\002 \002\200\341\031\210Z\245\202A\313oa\244\272\031\322\333\271h\275\314\246\031\336a\372\336\207\3637\333F" > alive: +[32dd 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[32de 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[32df 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32e0 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32e1 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32e2 11-19 05:22:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32e3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[32e4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[32e5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32e6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[32e7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[32e8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 33 45 6f 4f 88 5c 62 57 82 64 cd ee 20 7c 3d |.3EoO.\bW.d.. |=| +00000010 ba f2 e1 9d 29 91 d6 83 33 5e 6c b6 dd d2 e7 ee |....)...3^l.....| +[32e9 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cd b0 8f 9a df 2f 34 fb 5c fd |0E.!......./4.\.| +00000010 d0 9c ac 6e a0 d4 d9 68 1d b3 f5 a9 c9 42 e2 a7 |...n...h.....B..| +00000020 3f b0 8c 94 d8 02 20 77 23 28 ea 66 db 39 7d 4a |?..... w#(.f.9}J| +00000030 32 23 aa 6c a9 ee e0 9a 6b f5 3c b7 6d f1 f7 63 |2#.l....k.<.m..c| +00000040 b7 33 77 5a 21 87 a7 |.3wZ!..| +[32ea 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[32eb 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b bb 7a 39 be fd 72 71 fc 48 e4 |0E.!...z9..rq.H.| +00000010 ba 83 2f a7 b1 09 6b 94 e9 f1 b1 0e 8a 29 fd 33 |../...k......).3| +00000020 a9 9b 54 cc 36 02 20 52 7d 20 e4 7f 72 c1 01 af |..T.6. R} ..r...| +00000030 3c 3d 41 4b 43 bf 38 b4 d9 e3 52 76 15 61 4a 19 |<=AKC.8...Rv.aJ.| +00000040 4d 16 d7 aa ac 12 b9 |M......| +[32ec 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[32ed 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[32ee 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[32ef 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[32f0 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[32f1 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32f2 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32f3 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32f4 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[32f5 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32f6 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32f7 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[32f8 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[32f9 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[32fa 11-19 05:22:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32fb 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[32fc 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[32fd 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32fe 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32ff 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3300 11-19 05:22:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3301 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[3302 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[3303 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3304 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100E1801 +[3305 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CCEB0930DE30D2A6493398B3F77FD92FE625734DBB8C6D0BC54FD75E8B32FBC +[3306 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[3307 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3308 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3309 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[330a 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[330b 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[330c 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[330d 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[330e 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[330f 11-19 05:22:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3310 11-19 05:22:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[3311 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3312 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15102A +[3313 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AD99FEF610269EABEF45323DFDDE31A16088F542F62B21AD4C9C91BE8D56AD83 +[3314 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3315 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3316 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3317 11-19 05:22:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3318 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3319 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[331a 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[331b 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[331c 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[331d 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[331f 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3321 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[331e 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3320 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3323 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3322 11-19 05:22:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3324 11-19 05:22:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3325 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3326 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3327 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3328 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3329 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[332a 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[332b 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[332c 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[332d 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[332e 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[332f 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3330 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3331 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 gate 1574140970378653500 evaluation starts +[3332 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 signed by 0 principal evaluation starts (used [false]) +[3333 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 processing identity 0 with bytes of 1151ae0 +[3334 11-19 05:22:50.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 principal matched by identity 0 +[3335 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 20 5a b1 6e 86 5a 5f 5b 78 1e a2 d9 e3 4d d3 |U Z.n.Z_[x....M.| +00000010 a5 11 57 a0 c9 6a 40 7a 21 cd 09 54 70 03 cd 71 |..W..j@z!..Tp..q| +[3336 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 5c 36 8b 4b 88 fa d0 1f 72 be |0E.!..\6.K....r.| +00000010 72 53 26 f4 53 e2 88 73 2e b4 3e 83 fa 23 34 d5 |rS&.S..s..>..#4.| +00000020 61 70 98 61 a5 02 20 6e c4 f7 e0 a4 06 fe eb 15 |ap.a.. n........| +00000030 df 76 d9 e5 54 9e cb ae ff a1 87 21 d3 08 62 d3 |.v..T......!..b.| +00000040 26 05 6e 1b 69 46 7f |&.n.iF.| +[3337 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 principal evaluation succeeds for identity 0 +[3338 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9350 gate 1574140970378653500 evaluation succeeds +[3339 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[333a 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[333b 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[333c 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[333d 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[333e 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[333f 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3340 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3341 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3342 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3343 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3344 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3345 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3346 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3347 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3348 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3349 11-19 05:22:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[334a 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[334b 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[334c 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[334d 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[334e 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[334f 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3350 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3351 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3352 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3353 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3354 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3355 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3356 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3357 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3358 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3359 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[335a 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[335b 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[335c 11-19 05:22:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[335d 11-19 05:22:50.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[335e 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[335f 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3360 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3361 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3362 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 fd 05 6a eb 63 bc d4 6e 64 ac cb 61 7d b0 64 |x..j.c..nd..a}.d| +00000010 66 00 90 0b 1c e6 ce 49 a3 96 78 75 71 84 72 fa |f......I..xuq.r.| +[3363 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 94 df c5 8b 71 1c 95 0f b1 1c |0E.!......q.....| +00000010 1d 9c 3a 43 01 af 01 bc ca 94 4a 52 24 5d e8 aa |..:C......JR$]..| +00000020 9e 41 fa 9e 51 02 20 18 8d 66 86 ba 85 cc 91 d0 |.A..Q. ..f......| +00000030 5a 45 8e b2 85 71 b7 be d3 d0 d0 80 dc 28 a0 db |ZE...q.......(..| +00000040 06 80 4e 56 69 97 a5 |..NVi..| +[3364 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3365 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3366 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3367 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3368 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[3369 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[336a 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[336b 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[336c 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[336d 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[336e 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[336f 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3370 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3371 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3372 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3373 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3374 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3375 11-19 05:22:50.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3376 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3377 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3378 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3379 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[337a 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[337b 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[337c 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[337d 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[337e 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[337f 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3380 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3381 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3382 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3383 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3384 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3385 11-19 05:22:50.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3386 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3387 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3388 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3389 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[338a 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[338b 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[338c 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[338d 11-19 05:22:50.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[338e 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[338f 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3390 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3391 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3392 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[3393 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3394 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3395 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3396 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3397 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3398 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3399 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[339a 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 gate 1574140970808514900 evaluation starts +[339b 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 signed by 0 principal evaluation starts (used [false]) +[339c 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 processing identity 0 with bytes of 1151ae0 +[339d 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 principal matched by identity 0 +[339e 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf fa 58 15 af 2e 8b 60 6a c6 89 9f a7 36 e8 55 |..X....`j....6.U| +00000010 07 0a ef b0 02 18 4e 55 9a f9 10 26 ed 57 ae 94 |......NU...&.W..| +[339f 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f d1 c1 a8 b5 bc e8 7b c2 7a d1 36 |0D. .......{.z.6| +00000010 fd ca 47 e3 7a 8c b6 34 ac 0b 58 29 3b f0 02 c4 |..G.z..4..X);...| +00000020 b9 76 56 9b 02 20 12 94 3a c2 d2 e4 08 74 15 10 |.vV.. ..:....t..| +00000030 27 2c 39 cd 7f b2 05 d3 5f 2d 9d c4 23 ce 5d 57 |',9....._-..#.]W| +00000040 9b 26 17 e3 b4 82 |.&....| +[33a0 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 principal evaluation succeeds for identity 0 +[33a1 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002de3a0 gate 1574140970808514900 evaluation succeeds +[33a2 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[33a3 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[33a4 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33a5 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[33a6 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33a7 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[33a8 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[33a9 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[33aa 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[33ab 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ac 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ad 11-19 05:22:50.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ae 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33af 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33b0 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33b1 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33b2 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33b3 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33b4 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[33b5 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33b6 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33b7 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[33b8 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33b9 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33ba 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33bb 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33bc 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33bd 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33be 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33bf 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33c0 11-19 05:22:50.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33c1 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33c2 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33c3 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33c4 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33c5 11-19 05:22:50.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33c6 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[33c7 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC15102B +[33c8 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A7549E6148BD0DFEE4BE5E4C3E7B568CBD02391EEEF9CF63C52E06D675EF3834 +[33c9 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[33ca 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[33cb 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[33cc 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33cd 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[33ce 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[33cf 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33d0 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[33d1 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes +[33d2 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" > > , Envelope: 165 bytes, Signature: 0 bytes +[33d3 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33d4 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33d5 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\206\\e\223\322\314\020\037\215\252\010\222\315" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[33d6 11-19 05:22:50.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33d7 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[33d8 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[33d9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33da 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[33db 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[33dc 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +[33dd 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +00000040 1f 8d aa 08 92 cd |......| +[33de 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33df 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33e0 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33e1 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33e2 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[33e3 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[33e4 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33e5 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[33e6 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[33e7 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +[33e8 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +00000040 1f 8d aa 08 92 cd |......| +[33e9 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33ea 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33eb 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ec 11-19 05:22:50.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ed 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[33ee 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[33ef 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33f0 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[33f1 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[33f2 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 54 9e 61 48 bd 0d fe e4 be 5e 4c 3e 7b 56 8c |.T.aH.....^L>{V.| +00000010 bd 02 39 1e ee f9 cf 63 c5 2e 06 d6 75 ef 38 34 |..9....c....u.84| +[33f3 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 65 a7 d7 d1 04 97 da a1 d3 0c 68 |0D. ae.........h| +00000010 99 3c b9 01 2d bd 87 ba 31 a7 a2 2b 15 1d 1b af |.<..-...1..+....| +00000020 58 af f9 c2 02 20 5d 1a 8a 76 2e de 04 6b a0 3b |X.... ]..v...k.;| +00000030 6a bc 0b 95 f8 23 40 5e 3e 86 5c 65 93 d2 cc 10 |j....#@^>.\e....| +00000040 1f 8d aa 08 92 cd |......| +[33f4 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[33f5 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc 62 7d ff cd c7 fc 83 45 c1 4e |0E.!..b}.....E.N| +00000010 be 73 1b a4 8f d0 83 84 ff 92 ed b2 33 95 1e d8 |.s..........3...| +00000020 76 81 67 b2 21 02 20 3b 89 d8 12 cc d6 77 09 79 |v.g.!. ;.....w.y| +00000030 0a e7 f2 3b df 26 29 e9 7e 04 81 a0 22 3c 81 c3 |...;.&).~..."<..| +00000040 3c 37 3f a2 5e 9f 85 |<7?.^..| +[33f6 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[33f7 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[33f8 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33f9 11-19 05:22:50.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33fa 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33fb 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33fc 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[33fd 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[33fe 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ff 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3400 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3401 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3402 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3403 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3404 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3405 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3406 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3407 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3408 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3409 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[340a 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[340b 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[340c 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[340d 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[340e 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 gate 1574140971278077600 evaluation starts +[340f 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 signed by 0 principal evaluation starts (used [false]) +[3410 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 processing identity 0 with bytes of 1151ae0 +[3411 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 principal matched by identity 0 +[3412 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[3413 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[3414 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 principal evaluation succeeds for identity 0 +[3415 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344070 gate 1574140971278077600 evaluation succeeds +[3416 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3417 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3418 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3419 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[341a 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[341b 11-19 05:22:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[341c 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[341d 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[341e 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[341f 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3420 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3421 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3422 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3423 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3424 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3425 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3426 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 gate 1574140971286894000 evaluation starts +[3427 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 signed by 0 principal evaluation starts (used [false]) +[3428 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 processing identity 0 with bytes of 1151ae0 +[3429 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 principal matched by identity 0 +[342a 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[342b 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[342c 11-19 05:22:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[342d 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 principal evaluation succeeds for identity 0 +[342e 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e14050 gate 1574140971286894000 evaluation succeeds +[342f 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3430 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3431 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3432 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3433 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3434 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3435 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3436 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3437 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3438 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3439 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[343a 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[343b 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[343c 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[343d 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[343e 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[343f 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 gate 1574140971295586300 evaluation starts +[3440 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 signed by 0 principal evaluation starts (used [false]) +[3441 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 processing identity 0 with bytes of 1151ae0 +[3442 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 principal matched by identity 0 +[3443 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[3444 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[3445 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 principal evaluation succeeds for identity 0 +[3446 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e15430 gate 1574140971295586300 evaluation succeeds +[3447 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3448 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3449 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[344a 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[344b 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[344c 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[344d 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[344e 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[344f 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3450 11-19 05:22:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3451 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3452 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3453 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3454 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3455 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3456 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3457 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 gate 1574140971304196900 evaluation starts +[3458 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 signed by 0 principal evaluation starts (used [false]) +[3459 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 processing identity 0 with bytes of 1151ae0 +[345a 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 principal matched by identity 0 +[345b 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[345c 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[345d 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 principal evaluation succeeds for identity 0 +[345e 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e674f0 gate 1574140971304196900 evaluation succeeds +[345f 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3460 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3461 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3462 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3463 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3464 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3465 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[3466 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[3467 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[3468 11-19 05:22:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[3469 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[346a 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[346b 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[346c 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[346d 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[346e 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[346f 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3470 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3471 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 gate 1574140971311005200 evaluation starts +[3472 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 signed by 0 principal evaluation starts (used [false]) +[3473 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 processing identity 0 with bytes of 1151ae0 +[3474 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 principal matched by identity 0 +[3475 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[3476 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[3477 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 principal evaluation succeeds for identity 0 +[3478 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edf540 gate 1574140971311005200 evaluation succeeds +[3479 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[347a 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[347b 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[347c 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[347d 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[347e 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[347f 11-19 05:22:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3480 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3481 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3482 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3483 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3484 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3485 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 gate 1574140971322564700 evaluation starts +[3486 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 signed by 0 principal evaluation starts (used [false]) +[3487 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 processing identity 0 with bytes of 1151ae0 +[3488 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 principal matched by identity 0 +[3489 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[348a 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[348b 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 principal evaluation succeeds for identity 0 +[348c 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c6d0 gate 1574140971322564700 evaluation succeeds +[348d 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[348e 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[348f 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3490 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3491 11-19 05:22:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3492 11-19 05:22:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3493 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3494 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3495 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3496 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3497 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3498 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3499 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[349a 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[349b 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[349c 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[349d 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[349e 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[349f 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[34a0 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34a1 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34a2 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[34a3 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[34a4 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34a5 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[34a6 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[34a7 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[34a8 11-19 05:22:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34a9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[34aa 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[34ab 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34ac 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[34ad 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[34ae 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34af 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[34b0 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[34b1 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[34b2 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[34b3 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[34b4 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[34b5 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 gate 1574140971467263900 evaluation starts +[34b6 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 signed by 0 principal evaluation starts (used [false]) +[34b7 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 processing identity 0 with bytes of 1151ae0 +[34b8 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 principal matched by identity 0 +[34b9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +00000040 2b 06 37 2d 2a 45 |+.7-*E| +[34bb 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 principal evaluation succeeds for identity 0 +[34bc 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f42750 gate 1574140971467263900 evaluation succeeds +[34bd 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[34be 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[34bf 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[34c0 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[34c1 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[34c2 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[34c3 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[34c4 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[34c5 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[34c6 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34c7 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34c8 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34c9 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[34ca 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34cb 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34cc 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34cd 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[34ce 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +[34cf 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[34d0 11-19 05:22:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34d1 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[34d2 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[34d3 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34d4 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34d5 11-19 05:22:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34d6 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[34d7 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[34d8 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[34d9 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[34da 11-19 05:22:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34db 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[34dc 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[34dd 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[34de 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[34df 11-19 05:22:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34e0 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[34e1 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[34e2 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[34e3 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34e4 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34e5 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34e6 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34e7 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34e8 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34e9 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[34ea 11-19 05:22:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34eb 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[34ec 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[34ed 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34ee 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[34ef 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[34f0 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34f1 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[34f2 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[34f3 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[34f4 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[34f5 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[34f6 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[34f7 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 gate 1574140971838507800 evaluation starts +[34f8 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 signed by 0 principal evaluation starts (used [false]) +[34f9 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 processing identity 0 with bytes of 1151ae0 +[34fa 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 principal matched by identity 0 +[34fb 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 2b de 78 53 73 95 f0 e7 bc c5 8e 2c a7 be 13 |.+.xSs......,...| +00000010 f2 9d 1c df 4c 3c bb 22 60 e3 88 5c 96 bc 74 6b |....L<."`..\..tk| +[34fc 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 e0 12 40 0c ea 99 8b 88 55 41 |0E.!....@.....UA| +00000010 92 85 fa 74 0f b0 5c 6a 32 8b b5 84 40 d7 fd d5 |...t..\j2...@...| +00000020 83 d2 bf b4 f6 02 20 03 ef 65 6a 34 91 33 57 70 |...... ..ej4.3Wp| +00000030 f6 53 be ca 2f 2c 34 d8 64 f2 a8 f9 e2 c7 fa 8b |.S../,4.d.......| +00000040 48 c8 4f cd b1 c7 f7 |H.O....| +[34fd 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 principal evaluation succeeds for identity 0 +[34fe 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f85910 gate 1574140971838507800 evaluation succeeds +[34ff 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3500 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3501 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3502 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3503 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3504 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3505 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3506 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3507 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3508 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3509 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[350a 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[350b 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[350c 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[350d 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[350e 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[350f 11-19 05:22:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[3510 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +[3511 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[3512 11-19 05:22:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3513 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3514 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3515 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3516 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3517 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3518 11-19 05:22:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3519 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[351a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[351b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[351c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[351d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[351e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +[351f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +00000040 99 38 5b c7 0d 16 |.8[...| +[3520 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3521 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 b3 05 3c d7 73 7f b7 ed 31 5d |0E.!....<.s...1]| +00000010 2c c1 51 08 76 2d 68 6a e5 1d 87 b5 a8 32 9f 85 |,.Q.v-hj.....2..| +00000020 e2 1e ce b7 a9 02 20 58 23 bf 44 25 74 39 ed de |...... X#.D%t9..| +00000030 eb 80 69 19 3f aa 48 02 2f 95 95 b4 ca ae f2 3f |..i.?.H./......?| +00000040 e4 13 50 84 6f db 73 |..P.o.s| +[3522 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3523 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[3524 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3525 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3526 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3527 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3528 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3529 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[352a 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[352b 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[352c 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[352d 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[352e 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +[352f 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3530 11-19 05:22:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3531 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3532 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3533 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3534 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3535 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3536 11-19 05:22:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3537 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3538 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[3539 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[353a 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[353b 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[353c 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 gate 1574140974136070500 evaluation starts +[353d 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 signed by 0 principal evaluation starts (used [false]) +[353e 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 processing identity 0 with bytes of 1151ae0 +[353f 11-19 05:22:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 principal matched by identity 0 +[3540 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 ab 52 71 44 2f de 1c 33 6d 2b 43 f3 13 a5 29 |..RqD/..3m+C...)| +00000010 f5 f2 b6 34 fc 9d 18 02 a5 29 97 a2 dc 36 5c 29 |...4.....)...6\)| +[3541 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba f1 23 59 ba 95 10 18 34 f7 48 |0E.!...#Y....4.H| +00000010 e5 6b e9 bf b7 83 68 5e ba 97 08 35 84 f3 97 02 |.k....h^...5....| +00000020 b7 67 77 60 2b 02 20 31 ca f9 67 7f d4 24 bc 4d |.gw`+. 1..g..$.M| +00000030 cc 10 28 f0 97 f3 f0 48 5f 57 ff 4c b7 27 7a d2 |..(....H_W.L.'z.| +00000040 9c 23 26 0c 0e 32 8f |.#&..2.| +[3542 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 principal evaluation succeeds for identity 0 +[3543 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cd90 gate 1574140974136070500 evaluation succeeds +[3544 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[3545 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[3546 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[3547 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[3548 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +[3549 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +[354a 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[354c 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +[354d 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes to the block puller +[354b 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +[354e 11-19 05:22:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +[354f 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +[3550 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +[3551 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +[3552 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +[3553 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[3554 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0003cf1c0 env 0xc002913cc0 txn 0 +[3555 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002913cc0 +[3556 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +[3557 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[3558 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3559 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[355a 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[355b 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE----- +[355c 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0} +[355d 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[355e 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[355f 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 17 9f c3 74 1b 52 69 8b 1b 61 04 bd 5f 6e fc |....t.Ri..a.._n.| +00000010 23 3f 14 b1 da 98 c7 eb 83 d0 99 5b 69 2c d6 fb |#?.........[i,..| +[3560 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 c1 b9 60 ac e7 e3 8e 4c 35 f5 e3 |0D. R..`....L5..| +00000010 d0 57 4c 17 2b 63 e9 4e 0f 90 1b 11 66 33 ac 45 |.WL.+c.N....f3.E| +00000020 36 ba 41 a0 02 20 68 1d 3d 55 3a d4 2c 2e 3b ec |6.A.. h.=U:.,.;.| +00000030 b5 d4 40 5a 67 23 76 05 76 b9 63 e3 ff 94 86 d4 |..@Zg#v.v.c.....| +00000040 35 94 c1 49 86 f1 |5..I..| +[3561 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3562 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003762000, header channel_header:"\010\001\032\006\010\255\370\315\356\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\367SF]w\225tV\201\361\233t\360]!A\205\226.T\314'+I" +[3563 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[3564 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3565 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3566 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[3567 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3568 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[3569 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[356a 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[356b 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[356c 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[356d 11-19 05:22:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[356e 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[356f 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3570 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3571 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[3572 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3573 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +[3574 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +[3575 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +[3576 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +[3577 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +[3578 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +[3579 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[357a 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[357b 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[357c 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[357d 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[357e 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[357f 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3580 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3581 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3582 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3583 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes to 1 peers +[3584 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3585 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3586 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38500 bytes, seq: 6}, Envelope: 38533 bytes, Signature: 0 bytes +[3587 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3588 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[3589 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +[358a 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +[358b 11-19 05:22:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +[358c 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[358d 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[358e 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[358f 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3590 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3591 11-19 05:22:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[3592 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[3593 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[3594 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +[3595 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3596 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +[3597 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +[3598 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 gate 1574140974182282900 evaluation starts +[3599 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 signed by 0 principal evaluation starts (used [false false false]) +[359a 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 processing identity 0 with bytes of 1151ae0 +[359b 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[359c 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 processing identity 1 with bytes of 1151ae0 +[359d 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +[359e 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +[359f 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[35a0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[35a1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +[35a2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[35a3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 principal matched by identity 1 +[35a4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 de 26 23 33 6f c3 8e b6 e4 97 35 3d 90 e2 d2 |..o.....5=...| +00000010 33 e5 bd 51 f1 75 90 20 70 dd d9 e7 60 8d ca 93 |3..Q.u. p...`...| +[35a5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 3b 18 91 3b e9 83 52 78 1f ae e8 |0D. R;..;..Rx...| +00000010 ba 58 3c 13 f8 42 14 3b 84 29 6c d1 36 82 32 2b |.X<..B.;.)l.6.2+| +00000020 51 83 90 20 02 20 51 3f c6 f4 6f 60 f3 40 db 8e |Q.. . Q?..o`.@..| +00000030 ed bb 6e c2 b6 75 6c e9 a1 f1 64 f5 72 ae bd 3f |..n..ul...d.r..?| +00000040 46 bf 84 1c 8c 35 |F....5| +[35a6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 principal evaluation succeeds for identity 1 +[35a7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6e930 gate 1574140974182282900 evaluation succeeds +[35a8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +[35a9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +[35aa 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +[35ab 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set +[35ac 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 gate 1574140974183180200 evaluation starts +[35ad 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 signed by 0 principal evaluation starts (used [false false false]) +[35ae 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 processing identity 0 with bytes of 1151ae0 +[35af 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 principal matched by identity 0 +[35b0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 1d 56 78 17 2f 2b 5d 08 c4 43 32 70 d4 74 ff |?.Vx./+]..C2p.t.| +00000010 c5 b5 93 6a 18 7f f5 53 23 e4 51 85 e3 c6 6f 52 |...j...S#.Q...oR| +[35b1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 d4 5b 39 5f be af bc 28 61 53 6c |0D. t.[9_...(aSl| +00000010 af bc 64 4a 83 c0 20 44 36 e8 77 a9 65 d2 00 fe |..dJ.. D6.w.e...| +00000020 1e d0 e2 b6 02 20 69 57 76 80 92 48 6c cc 8e a6 |..... iWv..Hl...| +00000030 cd c7 b8 ea 2b ab 17 49 2c ce d7 e9 12 47 16 58 |....+..I,....G.X| +00000040 28 40 4c 89 f5 38 |(@L..8| +[35b2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 principal evaluation succeeds for identity 0 +[35b3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f6f500 gate 1574140974183180200 evaluation succeeds +[35b4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +[35b5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +[35b6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +[35b7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +[35b8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +[35b9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +[35ba 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +[35bb 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +[35bc 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +[35bd 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +[35be 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[35bf 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[35c0 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[35c1 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[35c2 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[35c3 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[35c4 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[35c5 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[35c6 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[35c7 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[35c8 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[35c9 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[35ca 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[35cb 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +[35cc 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +[35cd 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[35ce 11-19 05:22:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[35cf 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[35d0 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[35d1 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[35d2 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[35d3 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[35d4 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[35d5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[35d6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[35d7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[35d8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[35d9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[35da 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[35db 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[35dc 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[35dd 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[35de 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[35df 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[35e0 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[35e1 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[35e2 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[35e3 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[35e4 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[35e5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[35e6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[35e7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[35e8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[35e9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[35ea 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[35eb 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[35ec 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- +[35ed 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- +[35ee 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[35ef 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[35f0 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[35f1 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[35f2 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[35f3 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[35f4 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[35f5 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[35f6 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +[35f7 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[35f8 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[35f9 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[35fa 11-19 05:22:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[35fb 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- +[35fc 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[35fd 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[35fe 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[35ff 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3600 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +[3601 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +[3602 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3603 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3604 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +[3605 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- +[3606 11-19 05:22:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[3607 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[3608 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3609 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[360a 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[360b 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[360c 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[360d 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[360e 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[360f 11-19 05:22:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- +[3610 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +[3611 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +[3612 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[3613 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[3614 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[3615 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[3616 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[3617 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[3618 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[3619 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[361a 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[361b 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[361c 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +[361d 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +[361e 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +[361f 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +[3620 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[3621 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[3622 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[3623 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[3624 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[3625 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[3626 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[3627 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[3628 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[3629 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[362a 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[362b 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[362c 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[362d 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[362e 11-19 05:22:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[362f 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3630 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3631 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3632 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[3633 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[3634 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[3635 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[3636 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[3637 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +[3638 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +[3639 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +[363a 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +[363b 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +[363c 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +[363d 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[363e 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[363f 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[3640 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[3641 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[3642 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[3643 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[3644 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[3645 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[3646 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[3647 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[3648 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[3649 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[364a 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[364b 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[364c 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[364d 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[364e 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[364f 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[3650 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[3651 11-19 05:22:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[3652 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[3653 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[3654 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[3655 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[3656 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[3657 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[3658 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[3659 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[365a 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[365b 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[365c 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[365d 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[365e 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[365f 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[3660 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[3661 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[3662 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[3663 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[3664 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3665 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3666 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[3667 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[3668 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +[3669 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[366a 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[366b 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[366c 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[366d 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[366e 11-19 05:22:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[366f 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3670 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[3671 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[3672 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[3673 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[3674 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[3675 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[3676 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[3677 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[3678 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[3679 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[367a 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +[367b 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +[367c 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[367d 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[367e 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[367f 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3680 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3681 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3682 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3683 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 gate 1574140974258118800 evaluation starts +[3684 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 signed by 0 principal evaluation starts (used [false]) +[3685 11-19 05:22:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 processing identity 0 with bytes of 1151ae0 +[3687 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3688 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 principal evaluation fails +[3686 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.262Z grpc.peer_address=172.18.0.9:44810 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=224.7µs +[3689 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495540 gate 1574140974258118800 evaluation fails +[368a 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[368b 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[368c 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[368d 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 gate 1574140974264307300 evaluation starts +[368e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 signed by 0 principal evaluation starts (used [false]) +[368f 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 processing identity 0 with bytes of 1151ae0 +[3690 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 principal matched by identity 0 +[3691 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[3692 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[3693 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 principal evaluation succeeds for identity 0 +[3694 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003495ab0 gate 1574140974264307300 evaluation succeeds +[3695 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3696 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3697 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3698 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3699 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[369a 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[369b 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[369c 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[369d 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[369e 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[369f 11-19 05:22:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 gate 1574140974268764500 evaluation starts +[36a0 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 signed by 0 principal evaluation starts (used [false]) +[36a1 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 processing identity 0 with bytes of 1151ae0 +[36a2 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 principal matched by identity 0 +[36a3 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[36a4 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[36a5 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 principal evaluation succeeds for identity 0 +[36a6 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ec600 gate 1574140974268764500 evaluation succeeds +[36a7 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[36a8 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[36a9 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36aa 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36ab 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36ac 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[36ad 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[36ae 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[36af 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[36b0 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[36b1 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 gate 1574140974275783000 evaluation starts +[36b2 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 signed by 0 principal evaluation starts (used [false]) +[36b3 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 processing identity 0 with bytes of 1151ae0 +[36b4 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 principal matched by identity 0 +[36b5 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[36b6 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[36b7 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 principal evaluation succeeds for identity 0 +[36b8 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ed140 gate 1574140974275783000 evaluation succeeds +[36b9 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[36ba 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[36bb 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36bc 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36bd 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +[36be 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +[36bf 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +[36c0 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36c1 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +[36c2 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[36c3 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[36c4 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[36c5 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c6 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[36c7 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[36c8 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[36c9 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[36ca 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003624240, CONNECTING +[36cb 11-19 05:22:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36cc 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36cd 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36ce 11-19 05:22:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[36cf 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[36d0 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[36d1 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[36d2 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:44810 +[36d3 11-19 05:22:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44810 +[36d4 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d5 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36d6 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d7 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36d8 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d9 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36da 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[36db 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[36dc 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[36dd 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[36de 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[36df 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 gate 1574140974307034000 evaluation starts +[36e0 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 signed by 0 principal evaluation starts (used [false]) +[36e1 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 processing identity 0 with bytes of 1151ae0 +[36e2 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 principal matched by identity 0 +[36e3 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 45 02 21 00 f9 36 dd 56 67 a5 70 32 b9 22 67 |0E.!..6.Vg.p2."g| +00000010 75 70 18 c0 e7 29 21 94 17 aa 1f ef 8b 84 09 85 |up...)!.........| +00000020 61 24 fe f5 01 02 20 41 60 12 1f 53 36 63 b5 c2 |a$.... A`..S6c..| +00000030 ed de 4d 88 24 8c 56 d8 b5 24 55 40 5d 3d c5 ff |..M.$.V..$U@]=..| +00000040 aa 4f 7d 2c e6 40 7b |.O},.@{| +[36e5 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 principal evaluation succeeds for identity 0 +[36e6 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003625ec0 gate 1574140974307034000 evaluation succeeds +[36e7 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[36e8 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[36e9 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36ea 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36eb 11-19 05:22:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44810 +[36ec 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44810 +[36ed 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[36ee 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[36ef 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[36f0 11-19 05:22:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing +[36f1 11-19 05:22:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003624240, READY +[36f2 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[36f3 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[36f4 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[36f6 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[36f7 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[36f8 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[36f5 11-19 05:22:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[36f9 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +[36fb 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[36fc 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0003cf1c0 env 0xc002913cc0 txn 0 +[36fa 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051 +[36fd 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[36fe 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 194ms +[36ff 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[3700 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[3701 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[3702 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +[3703 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[3704 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[3705 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[3706 11-19 05:22:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +[3707 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[3708 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[3709 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44810 disconnected +[370c 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.294Z grpc.peer_address=172.18.0.9:44810 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.5689ms +[370a 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[370b 11-19 05:22:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +[370d 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[370e 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[370f 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE----- +[3710 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3712 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3714 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3715 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3716 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3713 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3717 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3711 11-19 05:22:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[3718 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[3719 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[371a 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[371b 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[371c 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[371d 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[3720 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3721 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[3722 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +[3723 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0032101c0)} +[3724 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[3725 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[3726 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[3727 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +[3728 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +[3729 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +[372a 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[372b 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[372c 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[372d 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC15100F1801 +[372e 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 219203EFC0539A9C02D4D278C4D897CD6F60F01B6070A2D2EAE58ADF5C15906F +[372f 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[371e 11-19 05:22:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3730 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3731 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3732 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3733 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3734 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3735 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 gate 1574140974394508300 evaluation starts +[3736 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 signed by 0 principal evaluation starts (used [false]) +[3737 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 processing identity 0 with bytes of 1151ae0 +[3738 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3739 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 principal evaluation fails +[373a 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397c800 gate 1574140974394508300 evaluation fails +[373b 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[373c 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[371f 11-19 05:22:54.38 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.364Z grpc.peer_address=172.18.0.9:44814 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=368.5µs +[373d 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +[373e 11-19 05:22:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[373f 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 gate 1574140974400052800 evaluation starts +[3740 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 signed by 0 principal evaluation starts (used [false]) +[3741 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 processing identity 0 with bytes of 1151ae0 +[3742 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[3743 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3744 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3745 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 principal matched by identity 0 +[3746 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 44 02 20 01 20 af 81 73 f7 43 bd 47 5e 2c 7f |0D. . ..s.C.G^,.| +00000010 36 dd 54 93 a7 20 2e f5 a9 ea 73 de 29 72 0e a9 |6.T.. ....s.)r..| +00000020 9a a7 b1 be 02 20 15 1f 52 f4 e8 fe bb 39 16 89 |..... ..R....9..| +00000030 a5 56 2f 91 d6 3b 98 eb 5f af 98 c0 6d 1f 72 27 |.V/..;.._...m.r'| +00000040 9a 58 53 50 95 8e |.XSP..| +[3748 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 principal evaluation succeeds for identity 0 +[374a 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395cc10 gate 1574140974400052800 evaluation succeeds +[374b 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[374c 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[374d 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[374e 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[374f 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +[3750 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3751 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3752 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151030 +[3753 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 943A5E5F743A3E8F686C43210DFB5A83752F927FD975E5E7E8B38208B2B380F5 +[3754 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3755 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3756 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3757 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3758 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12617889285552745019 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +[3749 11-19 05:22:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xa2, 0x69, 0x20, 0xe7, 0x6, 0xba, 0xc2, 0x3, 0x29, 0x26, 0xfe, 0xbd, 0x9b, 0x32, 0xd3, 0x6e, 0x64, 0xfd, 0x5e, 0xe2, 0x9c, 0x95, 0x4, 0xb3, 0xa2, 0x44, 0xc8, 0xfa, 0x28, 0x5a, 0x80, 0x58} txOffsets= +txId=546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf locPointer=offset=71, bytesLength=37478 +] +[3759 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89506, bytesLength=37478] for tx ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to txid-index +[375a 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89506, bytesLength=37478] for tx number:[0] ID: [546ee33e4128078ae817b66ce91cdeeeb6786ac17863f3cfcb4a8663e4c15fbf] to blockNumTranNum index +[375b 11-19 05:22:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[375c 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[375d 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[375e 11-19 05:22:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[375f 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:44814 +[3760 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:44814 +[3761 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3762 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:12617889285552745019 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[3763 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[3765 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3766 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3767 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3768 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3769 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[376a 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[376b 11-19 05:22:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[376c 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3764 11-19 05:22:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[376d 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.45Z grpc.peer_address=172.18.0.7:39242 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=98.5µs +[376e 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[376f 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3770 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3771 11-19 05:22:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127957], isChainEmpty=[false], lastBlockNumber=[6] +[3772 11-19 05:22:54.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.467Z grpc.peer_address=172.18.0.8:41494 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=907.3µs +[3773 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3777 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 gate 1574140974485492500 evaluation starts +[3778 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 signed by 0 principal evaluation starts (used [false]) +[3779 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 processing identity 0 with bytes of 1151ae0 +[377a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[377b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 principal evaluation fails +[377c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999c00 gate 1574140974485492500 evaluation fails +[377d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[377e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[377f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3780 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 gate 1574140974485739500 evaluation starts +[3781 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 signed by 0 principal evaluation starts (used [false]) +[3782 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 processing identity 0 with bytes of 1151ae0 +[3783 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 principal matched by identity 0 +[3784 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 44 02 20 1a 8b 0a 5e 12 a0 58 86 da 04 59 e3 |0D. ...^..X...Y.| +00000010 19 4a de ab 72 a5 33 16 82 a2 7a c0 a8 17 43 b6 |.J..r.3...z...C.| +00000020 12 2b 56 ab 02 20 77 b4 f3 6a 52 af ac 51 12 3f |.+V.. w..jR..Q.?| +00000030 82 ef 02 7e 15 3f 0b d6 97 50 bf 9d a3 c0 8e e0 |...~.?...P......| +00000040 1e 61 8a b6 79 13 |.a..y.| +[3786 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 principal evaluation succeeds for identity 0 +[3787 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6a310 gate 1574140974485739500 evaluation succeeds +[3788 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3789 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[378a 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[378b 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[378c 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:44814 +[378d 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.9:44814 +[3774 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[378e 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[378f 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +-----END CERTIFICATE----- +[3790 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3791 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[3792 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3793 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3794 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[3795 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3796 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:44814 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:4833863781111185008 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[3798 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3799 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[379a 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[3797 11-19 05:22:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[379b 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:39242 +[379c 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:39242 +[379d 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[379e 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:4833863781111185008 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[379f 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[37a0 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[37a1 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37a2 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[37a3 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37a4 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37a5 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37a6 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37a7 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37a8 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37a9 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37aa 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37ab 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37ac 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37ad 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37ae 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37b1 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37b2 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[37b3 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 gate 1574140974512498700 evaluation starts +[37b4 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 signed by 0 principal evaluation starts (used [false]) +[37b5 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 processing identity 0 with bytes of 1151ae0 +[3776 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +[37af 11-19 05:22:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3775 11-19 05:22:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[37b0 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37b6 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[37b7 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[37b8 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[37b9 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +[37ba 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[37bc 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[37bd 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[37be 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +[37bf 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 gate 1574140974520402500 evaluation starts +[37c0 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:41494 +[37c1 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b9ee10, CONNECTING +[37c2 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[37bb 11-19 05:22:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 principal evaluation fails +[37c3 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[37c4 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 signed by 0 principal evaluation starts (used [false]) +[37c8 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 processing identity 0 with bytes of 1151ae0 +[37c9 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[37ca 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 principal evaluation fails +[37cb 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9ec60 gate 1574140974520402500 evaluation fails +[37cc 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[37cd 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[37ce 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[37cf 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 gate 1574140974528219900 evaluation starts +[37d0 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 signed by 0 principal evaluation starts (used [false]) +[37d1 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 processing identity 0 with bytes of 1151ae0 +[37d2 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 principal matched by identity 0 +[37d3 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 62 34 b9 23 38 2c b1 97 b1 6f 2f 16 8b e0 34 |.b4.#8,...o/...4| +00000010 99 68 ad 01 9f 37 5d 4d 28 f1 ca 80 69 6d bd 9a |.h...7]M(...im..| +[37d4 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 75 94 96 e5 15 c3 ed 97 5a 93 66 |0D. Iu.......Z.f| +00000010 7b 3b 58 bf 85 09 cf d8 42 1a 98 fb 9e b1 20 f8 |{;X.....B..... .| +00000020 d8 ce 01 e1 02 20 63 bd 05 d5 d0 67 da 21 de 3c |..... c....g.!.<| +00000030 3f c8 25 1d a1 f0 20 c7 8e 58 14 37 33 9b f9 7a |?.%... ..X.73..z| +00000040 33 ae 24 46 14 0e |3.$F..| +[37d5 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 principal evaluation succeeds for identity 0 +[37d6 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0ff0 gate 1574140974528219900 evaluation succeeds +[37d7 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[37d8 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[37d9 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[37da 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[37db 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37dc 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[37dd 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[37de 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[37df 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[37e0 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37e1 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37e2 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37e3 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[37e4 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37e5 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37e6 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37e7 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 4833863781111185008, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers +[37e8 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +[37e9 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4833863781111185008, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes +[37c5 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41494 +[37ea 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[37eb 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f a2 48 e8 42 1f 03 bd ae f7 a4 17 |0D. ..H.B.......| +00000010 6d 0f 48 3b 47 8c a9 ca a7 aa bb 85 83 d0 78 f2 |m.H;G.........x.| +00000020 82 e8 c5 c9 02 20 60 9b 17 6d de da f5 86 66 76 |..... `..m....fv| +00000030 69 6b 54 a4 58 44 d9 f8 9e 21 f2 bd b7 e2 6d 88 |ikT.XD...!....m.| +00000040 1e 86 35 a8 6a 4e |..5.jN| +[37ec 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41494 +[37ed 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41494 +[37ee 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b9ee10, READY +[37ef 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12679499264910794022 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[37f0 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:12679499264910794022 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[37f1 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37f2 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12679499264910794022 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[37f3 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[37f4 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f5 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37f6 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37f7 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37f8 11-19 05:22:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37f9 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37fa 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[37fb 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 gate 1574140974540666900 evaluation starts +[37fc 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 signed by 0 principal evaluation starts (used [false]) +[37fd 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 processing identity 0 with bytes of 1151ae0 +[37fe 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[37ff 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 principal evaluation fails +[3800 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac040 gate 1574140974540666900 evaluation fails +[3801 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3802 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3803 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3804 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 gate 1574140974543181300 evaluation starts +[3805 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 signed by 0 principal evaluation starts (used [false]) +[3806 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 processing identity 0 with bytes of 1151ae0 +[3807 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[3808 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3809 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[380a 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 principal matched by identity 0 +[380b 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e d9 25 9f 50 16 42 b0 18 ca 62 8b d2 7c 75 bb |..%.P.B...b..|u.| +00000010 fa 30 dd 02 f4 6a 16 28 2c 54 b3 e0 2b a2 41 46 |.0...j.(,T..+.AF| +[37c6 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[37c7 11-19 05:22:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e580 gate 1574140974512498700 evaluation fails +[380c 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[380d 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing +[380e 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[380f 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41494 disconnected +[3810 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3811 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3812 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3814 11-19 05:22:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea ed 25 49 23 31 35 45 ab 54 5d |0E.!...%I#15E.T]| +00000010 8a c9 ac d6 4e bd 44 d5 2a e2 52 21 dc 6d 13 19 |....N.D.*.R!.m..| +00000020 11 63 6e e2 26 02 20 4c b9 1c 06 42 cd dd 9b c3 |.cn.&. L...B....| +00000030 f7 c5 f4 63 34 7f fb 4d 9a 25 4b ec 69 01 c5 5f |...c4..M.%K.i.._| +00000040 a1 c0 7d 06 a0 27 26 |..}..'&| +[3813 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[3815 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3816 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.501Z grpc.peer_address=172.18.0.8:41494 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.1432ms +[3817 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3818 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[3819 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 principal evaluation succeeds for identity 0 +[381a 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[381b 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[381c 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[3820 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051 +[3821 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051 +[3822 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3823 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[381d 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dac5b0 gate 1574140974543181300 evaluation succeeds +[381e 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[381f 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3824 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3825 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3826 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 gate 1574140974564432700 evaluation starts +[3827 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3828 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3829 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 signed by 0 principal evaluation starts (used [false]) +[382a 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[382b 11-19 05:22:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[382c 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[382d 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +[382e 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.9:44814 disconnected +[3832 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:44814 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=148.6403ms +[382f 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3830 11-19 05:22:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 processing identity 0 with bytes of 1151ae0 +[3831 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3833 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3834 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3836 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[3839 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +[3835 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 principal matched by identity 0 +[3837 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3838 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[383e 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[383f 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[383b 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +[383a 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[383c 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +[383d 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3840 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3841 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +[3842 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +[3846 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +[3843 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 83 24 7d 5a 72 f5 1a 5c 52 13 |0E.!...$}Zr..\R.| +00000010 06 d0 ac ab 9d 00 58 ab 40 a9 5b fa a5 9c 1a c6 |......X.@.[.....| +00000020 89 77 16 71 64 02 20 7c 96 d6 49 84 13 57 56 0f |.w.qd. |..I..WV.| +00000030 f5 4b 26 75 01 ab ca f4 eb 12 33 19 97 24 89 a2 |.K&u......3..$..| +00000040 b9 d6 6f 72 08 59 16 |..or.Y.| +[3847 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[3848 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 principal evaluation succeeds for identity 0 +[3849 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8f140 gate 1574140974564432700 evaluation succeeds +[384a 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[384b 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[384c 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[384d 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[384e 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:39242 +[384f 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:39242 +[3844 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3850 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3851 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3852 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3854 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[3855 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3853 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 gate 1574140974579710500 evaluation starts +[3856 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 signed by 0 principal evaluation starts (used [false]) +[3857 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 processing identity 0 with bytes of 1151ae0 +[3858 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3859 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 principal evaluation fails +[385a 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing +[385b 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cea80 gate 1574140974579710500 evaluation fails +[385d 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:39242 disconnected +[385f 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-11-19T05:23:04.465Z grpc.peer_address=172.18.0.7:39242 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=111.4284ms +[385e 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3860 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3845 11-19 05:22:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3861 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3862 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3863 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3864 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3865 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3866 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[3867 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 gate 1574140974583482300 evaluation starts +[3869 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 signed by 0 principal evaluation starts (used [false]) +[385c 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[3868 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[386b 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[386a 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 processing identity 0 with bytes of 1151ae0 +[386c 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[386e 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12679499264910794022, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +[386d 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 principal matched by identity 0 +[386f 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\362\344\272}\313=\331-\344\266\253\356qk\301cv\356\004D\323" > +[3870 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU Verify: sig = 00000000 30 45 02 21 00 c4 f6 62 d6 20 4f e8 8d 96 3f 5e |0E.!...b. O...?^| +00000010 cb 17 72 20 e3 11 20 e8 f0 d8 57 44 73 26 1c 60 |..r .. ...WDs&.`| +00000020 07 b4 5c eb 33 02 20 12 2f f9 dc 94 c0 9d d6 83 |..\.3. ./.......| +00000030 a9 81 e8 4c b5 72 dc d9 45 df 34 5a 2a 41 3c f0 |...L.r..E.4Z*A<.| +00000040 2b 14 90 f2 e1 4d df |+....M.| +[3872 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12679499264910794022, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[3873 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[3874 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 principal evaluation succeeds for identity 0 +[3875 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ee6b0 gate 1574140974583482300 evaluation succeeds +[3876 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3877 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3878 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3879 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[387a 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.9:7051 +[387b 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[387c 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[387d 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[387e 11-19 05:22:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[387f 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12617889285552745019, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3880 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3881 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 12617889285552745019, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3882 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3883 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3884 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12617889285552745019, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3885 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +[3886 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3887 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3888 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00417eca0, CONNECTING +[3889 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +[388a 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +00000040 99 38 5b c7 0d 16 |.8[...| +[388b 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[388c 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[388d 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[388e 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 3a 5e 5f 74 3a 3e 8f 68 6c 43 21 0d fb 5a 83 |.:^_t:>.hlC!..Z.| +00000010 75 2f 92 7f d9 75 e5 e7 e8 b3 82 08 b2 b3 80 f5 |u/...u..........| +[388f 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 ff 83 3d a4 9c 3d 6f bf 38 36 |0E.!....=..=o.86| +00000010 ca e2 0a c8 86 65 b6 81 ef 5f cb 18 a8 e7 38 6b |.....e..._....8k| +00000020 29 be dc b8 47 02 20 63 60 a5 8f 78 b2 01 a5 7f |)...G. c`..x....| +00000030 e9 07 fa df 9f 17 b6 da e2 ae 4b 1f 37 71 ac cb |..........K.7q..| +00000040 30 ca af ea 77 bd 54 |0...w.T| +[3890 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3891 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3892 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3893 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[3894 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +[3895 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3896 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 252ms (state_validation=39ms block_and_pvtdata_commit=131ms state_commit=55ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +[3897 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3898 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3899 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[389a 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[389b 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408BCAFBBCFFB999EEC15...08071A0C0A0565787030321203312E30 +[389c 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 351AF27BB310AEDE53F5957AA1EF581566C03269E42AB147829AF953CC475235 +[389d 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[389e 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[389f 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[38a0 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +[38a1 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 gate 1574140974601473100 evaluation starts +[38a2 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 signed by 0 principal evaluation starts (used [false]) +[38a3 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 processing identity 0 with bytes of 1151ae0 +[38a4 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[38a5 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 principal evaluation fails +[38a6 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c030 gate 1574140974601473100 evaluation fails +[38a7 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[38a8 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[38a9 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38aa 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00417eca0, READY +[38ab 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 gate 1574140974608764300 evaluation starts +[38ac 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 signed by 0 principal evaluation starts (used [false]) +[38ad 11-19 05:22:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 processing identity 0 with bytes of 1151ae0 +[38ae 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 principal matched by identity 0 +[38af 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +00000040 2b 06 37 2d 2a 45 |+.7-*E| +[38b1 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[38b2 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[38b3 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[38b5 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051 +[38b4 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 principal evaluation succeeds for identity 0 +[38b6 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c5b0 gate 1574140974608764300 evaluation succeeds +[38b7 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38b8 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38b9 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38ba 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38bb 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[38bc 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 54 but got ts: inc_num:1574140895405208300 seq_num:47 +[38bd 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38be 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38bf 11-19 05:22:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.7:7051 +[38c0 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38c1 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[38c2 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38c3 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[38c4 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38c5 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[38c6 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[38c7 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[38c8 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[38c9 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38ca 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[38cb 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 gate 1574140974625186700 evaluation starts +[38cc 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 signed by 0 principal evaluation starts (used [false]) +[38cd 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 processing identity 0 with bytes of 1151ae0 +[38ce 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[38cf 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 principal evaluation fails +[38d0 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7f10 gate 1574140974625186700 evaluation fails +[38d1 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[38d2 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[38d3 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38d4 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 gate 1574140974627190300 evaluation starts +[38d5 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 signed by 0 principal evaluation starts (used [false]) +[38d6 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 processing identity 0 with bytes of 1151ae0 +[38d7 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 principal matched by identity 0 +[38d8 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...| +[38d9 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 84 22 5f 91 3a a1 b4 f7 d9 69 c5 |0D. .."_.:....i.| +00000010 71 72 17 87 e4 85 36 20 15 ff 3e 6d 80 9a 34 8c |qr....6 ..>m..4.| +00000020 b9 26 14 b9 02 20 4c a4 61 d6 44 ec 59 92 42 11 |.&... L.a.D.Y.B.| +00000030 2f d9 5d b7 bf cc 8d 25 76 8c 64 bc 85 cf c0 38 |/.]....%v.d....8| +00000040 6e 99 45 31 2e 25 |n.E1.%| +[38da 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 principal evaluation succeeds for identity 0 +[38db 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311a480 gate 1574140974627190300 evaluation succeeds +[38dc 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38dd 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38de 11-19 05:22:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38df 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38e0 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +[38e1 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38e2 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[38e3 11-19 05:22:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38e4 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[38e5 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151031 +[38e6 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 682C2A3A1F2F27F52FE63359481F2BB8807F48AC251B19A56DB5C84D984C1358 +[38e7 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[38e8 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[38e9 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[38ea 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[38eb 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38ec 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38ed 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[38ee 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38ef 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[38f0 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[38f2 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[38f3 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[38f4 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38f5 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[38f6 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[38f7 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +[38f8 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[38f9 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0033ccaa0, CONNECTING +[38f1 11-19 05:22:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38fa 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[38fb 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[38fc 11-19 05:22:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38fd 11-19 05:22:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0033ccaa0, READY +[38fe 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[38ff 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3900 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3901 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3902 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[3903 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3904 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3905 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3906 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3907 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3908 11-19 05:22:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3909 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[390a 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[390b 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[390c 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051 +[390d 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[390e 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[390f 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3910 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3911 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3912 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3913 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3914 11-19 05:22:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3915 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:7051 +[3916 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[3917 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 6a 60 c8 6b b1 1e 4b fb 2d 0e ca |0D. 5j`.k..K.-..| +00000010 b2 fd 15 32 f1 38 bc ca b8 22 8c 56 0a c1 56 11 |...2.8...".V..V.| +00000020 8c e0 0f d6 02 20 14 c5 14 11 27 20 e1 49 a6 f5 |..... ....' .I..| +00000030 56 c6 20 97 93 34 20 67 ad 2c bc 6c bb 91 52 e3 |V. ..4 g.,.l..R.| +00000040 ce 7c c0 61 af 4c |.|.a.L| +[3918 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +[3919 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[391a 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[391b 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[391c 11-19 05:22:54.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[391d 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[391e 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[391f 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3920 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3921 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3922 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151032 +[3923 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CD94316390E50731BBB8E8472782979A929BA02C3254EFD73F13D591D61C11C +[3924 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3925 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3926 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3927 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3928 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[3929 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392a 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[392b 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\241\251\342\031" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[392d 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\241\251\342\031" > > > , Envelope: 271 bytes, Signature: 0 bytes +[392e 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[392c 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3930 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[392f 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3931 11-19 05:22:54.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3932 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.861Z grpc.peer_address=172.18.0.8:41510 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=122.2µs +[3933 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3934 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[3935 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[3936 11-19 05:22:54.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:41510 +[3937 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41510 +[3938 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[3939 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 3f 82 7f d8 11 fa d3 86 61 46 |0D. DEBU Authenticated 172.18.0.8:41510 +[393b 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41510 +[393c 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream +[393d 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[393e 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[393f 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing +[3940 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3941 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3942 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3943 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3944 11-19 05:22:54.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3945 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +[3946 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +00000040 99 38 5b c7 0d 16 |.8[...| +[3947 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3948 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3949 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[394a 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +[394b 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +00000040 af 25 40 35 ce 35 4d |.%@5.5M| +[394c 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[394d 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[394e 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[394f 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[3950 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3951 11-19 05:22:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3952 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3953 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3954 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3955 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3956 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3957 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 gate 1574140974892843500 evaluation starts +[3958 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 signed by 0 principal evaluation starts (used [false]) +[3959 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 processing identity 0 with bytes of 1151ae0 +[395a 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[395b 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 principal evaluation fails +[395c 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1710 gate 1574140974892843500 evaluation fails +[395d 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[395e 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[395f 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3960 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 gate 1574140974896223200 evaluation starts +[3961 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 signed by 0 principal evaluation starts (used [false]) +[3962 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 processing identity 0 with bytes of 1151ae0 +[3963 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 principal matched by identity 0 +[3964 11-19 05:22:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 5c de f1 c6 d6 02 06 fa c0 7d f1 4a 9b ee 18 |.\........}.J...| +00000010 7e b5 8b ea 3e b3 0a 74 3c 41 b9 c5 ab 34 42 63 |~...>..t DEBU Verify: sig = 00000000 30 44 02 20 1b d7 23 44 6d d3 a7 7b c7 1a a0 d1 |0D. ..#Dm..{....| +00000010 8d 3f 6d 0a f4 07 90 35 f3 1e 46 76 ea 95 11 25 |.?m....5..Fv...%| +00000020 ed 9c 71 a6 02 20 1f cb 53 d9 39 84 79 6a 2c 86 |..q.. ..S.9.yj,.| +00000030 33 0c 1d 19 82 cb fd 1c 68 e8 67 a3 31 fd ac 11 |3.......h.g.1...| +00000040 2b 06 37 2d 2a 45 |+.7-*E| +[3966 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 principal evaluation succeeds for identity 0 +[3967 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc1c80 gate 1574140974896223200 evaluation succeeds +[3968 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3969 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[396a 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[396b 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[396c 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[396d 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1574140895405208300, 54 but got ts: inc_num:1574140895405208300 seq_num:47 +[396e 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[396f 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3970 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3971 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3972 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3973 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3974 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3975 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +[3976 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +00000040 af 25 40 35 ce 35 4d |.%@5.5M| +[3977 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3978 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3979 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[397a 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[397b 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[397c 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[397d 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[397e 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[397f 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3980 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3981 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3982 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 gate 1574140974906098800 evaluation starts +[3983 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 signed by 0 principal evaluation starts (used [false]) +[3984 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 processing identity 0 with bytes of 1151ae0 +[3985 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3986 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 principal evaluation fails +[3987 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371fb90 gate 1574140974906098800 evaluation fails +[3988 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3989 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[398a 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[398b 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 gate 1574140974908238300 evaluation starts +[398c 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 signed by 0 principal evaluation starts (used [false]) +[398d 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 processing identity 0 with bytes of 1151ae0 +[398e 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 principal matched by identity 0 +[398f 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 62 34 b9 23 38 2c b1 97 b1 6f 2f 16 8b e0 34 |.b4.#8,...o/...4| +00000010 99 68 ad 01 9f 37 5d 4d 28 f1 ca 80 69 6d bd 9a |.h...7]M(...im..| +[3990 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 75 94 96 e5 15 c3 ed 97 5a 93 66 |0D. Iu.......Z.f| +00000010 7b 3b 58 bf 85 09 cf d8 42 1a 98 fb 9e b1 20 f8 |{;X.....B..... .| +00000020 d8 ce 01 e1 02 20 63 bd 05 d5 d0 67 da 21 de 3c |..... c....g.!.<| +00000030 3f c8 25 1d a1 f0 20 c7 8e 58 14 37 33 9b f9 7a |?.%... ..X.73..z| +00000040 33 ae 24 46 14 0e |3.$F..| +[3991 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 principal evaluation succeeds for identity 0 +[3992 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa0100 gate 1574140974908238300 evaluation succeeds +[3994 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3995 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3996 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3997 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3998 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3993 11-19 05:22:54.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[3999 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:41510 disconnected +[399b 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:41510 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=44.1735ms +[399a 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[399d 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[399e 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[399c 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[399f 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc af e4 1b 39 09 05 c2 b4 32 ff 49 69 92 64 54 |....9....2.Ii.dT| +00000010 01 6d 8f e1 9a 4a bd 71 12 26 4c f6 a7 68 ef c0 |.m...J.q.&L..h..| +[39a0 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 9b d2 6d a4 91 16 25 3a 4c ee 5d |0D. ...m...%:L.]| +00000010 a2 77 ef 43 20 b4 17 63 b8 a8 f8 e6 e2 84 34 6b |.w.C ..c......4k| +00000020 8c bf 3a 1e 02 20 20 e7 14 07 d4 92 92 f0 b4 43 |..:.. ........C| +00000030 d4 72 6b cd e8 fa e2 2e 47 e1 34 64 b2 52 b1 8a |.rk.....G.4d.R..| +00000040 99 38 5b c7 0d 16 |.8[...| +[39a1 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[39a2 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39a3 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39a4 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-11-19T05:22:56.916Z grpc.peer_address=172.18.0.8:41512 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=110.3µs +[39a5 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[39a6 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 +[39a7 11-19 05:22:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 +[39a8 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:41512 +[39a9 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.8:41512 +[39aa 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......| +[39ab 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 43 ea 1b f1 83 4c 82 9a 75 ec 85 |0D. .C....L..u..| +00000010 2f 17 57 8e d4 1d ac 8c a3 11 5e 6c af e3 e0 24 |/.W.......^l...$| +00000020 b1 b2 c8 7e 02 20 20 98 3e 09 67 f1 19 94 fa 46 |...~. .>.g....F| +00000030 4c 6b 4e 69 f2 71 d2 dc ac ec a0 bc bb 8c 6b ba |LkNi.q........k.| +00000040 62 e7 c0 cb f2 27 |b....'| +[39ac 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:41512 +[39ad 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:41512 +[39ae 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[39af 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39b0 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[39b1 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[39b2 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c d9 43 16 39 0e 50 73 1b bb 8e 84 72 78 29 79 |\.C.9.Ps....rx)y| +00000010 a9 29 ba 02 c3 25 4e fd 73 f1 3d 59 1d 61 c1 1c |.)...%N.s.=Y.a..| +[39b3 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9a a9 d7 e8 9c 23 4f 7f 8e 05 |0E.!.......#O...| +00000010 56 59 50 ee 5e 52 60 43 39 8f a2 35 bc fe a0 2a |VYP.^R`C9..5...*| +00000020 3f ab 56 48 6a 02 20 60 0a 2e 27 82 29 56 e5 e5 |?.VHj. `..'.)V..| +00000030 5e 26 8b 73 a4 6d 0c 8c 65 0b eb aa 6c 09 cf 66 |^&.s.m..e...l..f| +00000040 af 25 40 35 ce 35 4d |.%@5.5M| +[39b4 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[39b5 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 c5 3d ea b9 fb dc ee 7d e7 4d ec |0D. `.=.....}.M.| +00000010 70 dc d8 58 43 fe 6f aa 62 c5 ce 57 99 e3 01 84 |p..XC.o.b..W....| +00000020 8b 9f f4 fa 02 20 6f 4c dc c7 33 b9 37 7b 4d 57 |..... oL..3.7{MW| +00000030 ac 7d cd 19 93 17 42 2b 70 fd 98 d7 45 4e f2 6a |.}....B+p...EN.j| +00000040 ad 3e a1 a9 e2 19 |.>....| +[39b6 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[39b7 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[39b8 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39b9 11-19 05:22:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ba 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39bb 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39bc 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[39bd 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[39be 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39bf 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[39c0 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39c1 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[39c2 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39c3 11-19 05:22:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[39c6 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c7 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c9 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +[39ca 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39cc 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39cb 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[39ce 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39cf 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[39d0 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39c8 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[39d1 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[39d2 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39d3 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39d4 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[39d5 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[39d6 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[39d7 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[39cd 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[39c5 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[39c4 11-19 05:22:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[39d8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[39da 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[39db 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 gate 1574140975298258600 evaluation starts +[39dc 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 signed by 0 principal evaluation starts (used [false]) +[39dd 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 processing identity 0 with bytes of 1151ae0 +[39de 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[39df 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 principal evaluation fails +[39e0 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002816eb0 gate 1574140975298258600 evaluation fails +[39e1 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[39e2 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[39e3 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[39e4 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 gate 1574140975298499600 evaluation starts +[39e5 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 signed by 0 principal evaluation starts (used [false]) +[39e6 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 processing identity 0 with bytes of 1151ae0 +[39e7 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 principal matched by identity 0 +[39e8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[39e9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[39ea 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 principal evaluation succeeds for identity 0 +[39eb 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002817420 gate 1574140975298499600 evaluation succeeds +[39ec 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[39ed 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[39ee 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[39ef 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[39f0 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39f1 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39f2 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[39f3 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[39f4 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[39f5 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[39f6 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[39f7 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[39f8 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 gate 1574140975299254000 evaluation starts +[39f9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 signed by 0 principal evaluation starts (used [false]) +[39fa 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 processing identity 0 with bytes of 1151ae0 +[39fb 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[39fc 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 principal evaluation fails +[39fd 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e45c0 gate 1574140975299254000 evaluation fails +[39fe 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[39ff 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a00 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a01 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 gate 1574140975299483800 evaluation starts +[3a02 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 signed by 0 principal evaluation starts (used [false]) +[3a03 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 processing identity 0 with bytes of 1151ae0 +[3a04 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 principal matched by identity 0 +[3a05 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[3a06 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[3a07 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 principal evaluation succeeds for identity 0 +[3a08 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e4b30 gate 1574140975299483800 evaluation succeeds +[3a09 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3a0a 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a0b 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a0c 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a0d 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3a0e 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3a0f 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a10 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a11 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a12 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a13 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[39d9 11-19 05:22:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a14 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a15 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE----- +[3a16 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 gate 1574140975306623600 evaluation starts +[3a17 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 signed by 0 principal evaluation starts (used [false]) +[3a18 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 processing identity 0 with bytes of 1151ae0 +[3a19 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[3a1a 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[3a1b 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[3a1c 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 principal matched by identity 0 +[3a1d 11-19 05:22:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3a1e 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3a1f 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 principal evaluation succeeds for identity 0 +[3a20 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5c60 gate 1574140975306623600 evaluation succeeds +[3a21 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3a22 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a23 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a24 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a25 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a26 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3a27 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a28 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[3a29 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[3a2a 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[3a2b 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[3a2c 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a2d 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a2e 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3a2f 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a30 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a31 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a32 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a33 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3a34 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 gate 1574140975316419500 evaluation starts +[3a35 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 signed by 0 principal evaluation starts (used [false]) +[3a36 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 processing identity 0 with bytes of 1151ae0 +[3a37 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3a38 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 principal evaluation fails +[3a39 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ffed0 gate 1574140975316419500 evaluation fails +[3a3a 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3a3b 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a3c 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a3d 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 gate 1574140975319444200 evaluation starts +[3a3e 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 signed by 0 principal evaluation starts (used [false]) +[3a3f 11-19 05:22:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 processing identity 0 with bytes of 1151ae0 +[3a40 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 principal matched by identity 0 +[3a41 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 1a 5c 41 fa 88 c1 44 b0 9f 0c 14 c4 f3 17 d1 |..\A...D........| +00000010 98 3e 7e 67 6e 5d be c7 2c e2 0f c3 89 fc 50 1d |.>~gn]..,.....P.| +[3a42 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 19 ab 5f 48 17 08 cf b0 04 d1 75 |0D. V.._H......u| +00000010 da 8b d2 d9 4d db 5a e5 3f 27 08 01 f4 33 81 cd |....M.Z.?'...3..| +00000020 29 b7 50 4c 02 20 18 9b 4f 84 ae 7b b6 3d 8e 2a |).PL. ..O..{.=.*| +00000030 6f c3 73 93 02 22 b9 63 f1 b0 69 af f2 6e ce 4c |o.s..".c..i..n.L| +00000040 27 fd b2 b0 5f a1 |'..._.| +[3a43 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 principal evaluation succeeds for identity 0 +[3a44 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c440 gate 1574140975319444200 evaluation succeeds +[3a45 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3a46 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a47 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a48 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a49 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a4a 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a4b 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3a4c 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a4d 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a4e 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a4f 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a50 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3a51 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 gate 1574140975325301100 evaluation starts +[3a52 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 signed by 0 principal evaluation starts (used [false]) +[3a53 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 processing identity 0 with bytes of 1151ae0 +[3a54 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3a55 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 principal evaluation fails +[3a56 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349d5d0 gate 1574140975325301100 evaluation fails +[3a57 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3a58 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a59 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a5a 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 gate 1574140975327133000 evaluation starts +[3a5b 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 signed by 0 principal evaluation starts (used [false]) +[3a5c 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 processing identity 0 with bytes of 1151ae0 +[3a5d 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 principal matched by identity 0 +[3a5e 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[3a5f 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[3a60 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 principal evaluation succeeds for identity 0 +[3a61 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349db40 gate 1574140975327133000 evaluation succeeds +[3a62 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3a63 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a64 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a65 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a66 11-19 05:22:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a67 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a68 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a69 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a6a 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a6b 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3a6c 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 gate 1574140975330934400 evaluation starts +[3a6d 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 signed by 0 principal evaluation starts (used [false]) +[3a6e 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 processing identity 0 with bytes of 1151ae0 +[3a6f 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3a70 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 principal evaluation fails +[3a71 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668680 gate 1574140975330934400 evaluation fails +[3a72 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3a73 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a74 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a75 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 gate 1574140975332651700 evaluation starts +[3a76 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 signed by 0 principal evaluation starts (used [false]) +[3a77 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 processing identity 0 with bytes of 1151ae0 +[3a78 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 principal matched by identity 0 +[3a79 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[3a7a 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[3a7b 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 principal evaluation succeeds for identity 0 +[3a7c 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003668bf0 gate 1574140975332651700 evaluation succeeds +[3a7d 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3a7e 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a7f 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a80 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a81 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a82 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3a83 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a84 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 98 24 03 3a 40 da 16 15 88 a6 5b c8 70 44 ad |..$.:@.....[.pD.| +00000010 b0 05 61 51 2f 06 06 6c 4c cc b0 b0 8c a5 4b bc |..aQ/..lL.....K.| +[3a85 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 40 cc 57 f2 14 32 ef 58 15 82 |0E.!..@.W..2.X..| +00000010 57 b6 a9 be 47 de ac 33 a7 c2 c0 8f 02 83 02 bf |W...G..3........| +00000020 fb 16 db 44 c3 02 20 77 7a eb 01 5f ce 3a f6 41 |...D.. wz.._.:.A| +00000030 12 b2 e3 eb 3a 8f c6 7a b0 65 e1 0d c5 18 2d dc |....:..z.e....-.| +00000040 1d 87 f5 89 16 2e a0 |.......| +[3a86 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 21 ec c7 f3 74 c5 f1 4d ae 97 84 c9 39 f3 f8 |.!...t..M....9..| +00000010 93 53 c4 77 5a 3d 01 f1 4f df b7 e9 52 06 12 5e |.S.wZ=..O...R..^| +[3a87 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 2a d8 fc 1a 7e 5f 95 c7 20 2f 70 |0D. ]*...~_.. /p| +00000010 dc eb fa aa 9a fb 20 49 d5 50 3e 18 85 db 9e 48 |...... I.P>....H| +00000020 62 ea 55 c2 02 20 75 b1 de 5d 73 4e 3d ba a1 b3 |b.U.. u..]sN=...| +00000030 89 b7 e0 16 8e 99 90 c3 b7 38 e3 47 c9 a1 14 c7 |.........8.G....| +00000040 25 4f 85 e4 fc 0b |%O....| +[3a88 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a89 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a8a 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3a8b 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a8c 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a8d 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a8e 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a8f 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3a90 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 gate 1574140975338432300 evaluation starts +[3a91 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 signed by 0 principal evaluation starts (used [false]) +[3a92 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 processing identity 0 with bytes of 1151ae0 +[3a93 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3a94 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 principal evaluation fails +[3a95 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8cd0 gate 1574140975338432300 evaluation fails +[3a96 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3a97 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a98 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a99 11-19 05:22:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 gate 1574140975339864600 evaluation starts +[3a9a 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 signed by 0 principal evaluation starts (used [false]) +[3a9b 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 processing identity 0 with bytes of 1151ae0 +[3a9c 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 principal matched by identity 0 +[3a9d 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e b6 88 91 ce fc 70 ea 7e b9 7b c2 52 0c 05 17 |>.....p.~.{.R...| +00000010 c2 2b 87 19 50 e7 90 a4 7c 70 32 8d ae 8c d1 44 |.+..P...|p2....D| +[3a9e 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af fa 10 da 9c ec 71 9d c3 72 f7 |0E.!.......q..r.| +00000010 8d ed 38 cd 52 d7 ea 75 39 82 c2 78 ab b9 26 16 |..8.R..u9..x..&.| +00000020 2a 2a 67 54 c7 02 20 5c 0f ea 13 f2 b0 e8 e7 40 |**gT.. \.......@| +00000030 3a a2 fb 88 b4 0b 19 fb 22 a1 74 e3 9f 6f a4 5b |:.......".t..o.[| +00000040 0c ce 3f 12 14 7d 3b |..?..};| +[3a9f 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 principal evaluation succeeds for identity 0 +[3aa0 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9240 gate 1574140975339864600 evaluation succeeds +[3aa1 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3aa2 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3aa3 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3aa4 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3aa5 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa6 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa7 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3aa8 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3aa9 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3aaa 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3aab 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3aac 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3aad 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 gate 1574140975344177200 evaluation starts +[3aae 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 signed by 0 principal evaluation starts (used [false]) +[3aaf 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 processing identity 0 with bytes of 1151ae0 +[3ab0 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3ab1 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 principal evaluation fails +[3ab2 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d23d0 gate 1574140975344177200 evaluation fails +[3ab3 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3ab4 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3ab5 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ab6 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 gate 1574140975345671500 evaluation starts +[3ab7 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 signed by 0 principal evaluation starts (used [false]) +[3ab8 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 processing identity 0 with bytes of 1151ae0 +[3ab9 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 principal matched by identity 0 +[3aba 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[3abb 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[3abc 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 principal evaluation succeeds for identity 0 +[3abd 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2940 gate 1574140975345671500 evaluation succeeds +[3abe 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3abf 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ac0 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3ac1 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3ac2 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ac3 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ac4 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ac5 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ac6 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ac7 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ac8 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 gate 1574140975349048500 evaluation starts +[3ac9 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 signed by 0 principal evaluation starts (used [false]) +[3aca 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 processing identity 0 with bytes of 1151ae0 +[3acb 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3acc 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 principal evaluation fails +[3acd 11-19 05:22:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d3480 gate 1574140975349048500 evaluation fails +[3ace 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3acf 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3ad0 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ad1 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 gate 1574140975350585400 evaluation starts +[3ad2 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 signed by 0 principal evaluation starts (used [false]) +[3ad3 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 processing identity 0 with bytes of 1151ae0 +[3ad4 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 principal matched by identity 0 +[3ad5 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[3ad6 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[3ad7 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 principal evaluation succeeds for identity 0 +[3ad8 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d39f0 gate 1574140975350585400 evaluation succeeds +[3ad9 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ada 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3adb 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3adc 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3add 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ade 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3adf 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[3ae0 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[3ae1 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ae2 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ae3 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ae4 11-19 05:22:55.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ae5 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ae6 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[3ae7 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ae8 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ae9 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3aea 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3aeb 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3aec 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3aed 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3aee 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 gate 1574140975362544400 evaluation starts +[3aef 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 signed by 0 principal evaluation starts (used [false]) +[3af0 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 processing identity 0 with bytes of 1151ae0 +[3af1 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3af2 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 principal evaluation fails +[3af3 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11690 gate 1574140975362544400 evaluation fails +[3af4 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3af5 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3af6 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3af7 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 gate 1574140975369601500 evaluation starts +[3af8 11-19 05:22:55.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 signed by 0 principal evaluation starts (used [false]) +[3af9 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 processing identity 0 with bytes of 1151ae0 +[3afa 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 principal matched by identity 0 +[3afb 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 ae a1 5d 97 02 b5 c0 bb c9 2c 40 ec 1d 00 7f |...]......,@....| +00000010 b6 98 81 7d 8c 81 25 6e 11 cc b4 9e 9e 91 d9 07 |...}..%n........| +[3afc 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 4f f8 2d 69 74 14 7e 80 f1 2b |0E.!..O.-it.~..+| +00000010 74 a6 c1 79 3a c1 a6 a5 7b f7 95 f9 81 32 b2 ae |t..y:...{....2..| +00000020 d5 3a e4 9c c3 02 20 2e 8d c5 23 07 2b fe d6 1f |.:.... ...#.+...| +00000030 3b c0 0f 51 8e 4f 31 84 ab fc 84 29 28 13 99 7b |;..Q.O1....)(..{| +00000040 2b f4 12 e1 84 22 71 |+...."q| +[3afd 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 principal evaluation succeeds for identity 0 +[3afe 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11c00 gate 1574140975369601500 evaluation succeeds +[3aff 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3b00 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3b01 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3b02 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3b03 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b04 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3b05 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3b06 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3b07 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3b08 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b09 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b0a 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b0b 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b0c 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b0d 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b0e 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b0f 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b10 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b11 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b12 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b14 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b13 11-19 05:22:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b15 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b16 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b17 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3b18 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b19 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3b1b 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b1a 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b1c 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b1d 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b1e 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b1f 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b20 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b21 11-19 05:22:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b22 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3b23 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3b24 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3b25 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b26 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b27 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b28 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b29 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b2a 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b2b 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[3b2c 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b2d 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b2e 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b2f 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3b30 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b31 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b32 11-19 05:22:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3b33 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3b34 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b35 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[3b36 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[3b37 11-19 05:22:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b38 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3b39 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3b3a 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b3b 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3b3c 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[3b3d 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b3e 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3b3f 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3b40 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3b41 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3b42 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3b43 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3b44 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 gate 1574140975466812000 evaluation starts +[3b45 11-19 05:22:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 signed by 0 principal evaluation starts (used [false]) +[3b46 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 processing identity 0 with bytes of 1151ae0 +[3b47 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3b48 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 principal evaluation fails +[3b49 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe0e10 gate 1574140975466812000 evaluation fails +[3b4a 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3b4b 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3b4c 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3b4d 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 gate 1574140975471881900 evaluation starts +[3b4e 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 signed by 0 principal evaluation starts (used [false]) +[3b4f 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 processing identity 0 with bytes of 1151ae0 +[3b50 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 principal matched by identity 0 +[3b51 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +[3b52 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +00000040 f3 06 8a 77 a7 f3 |...w..| +[3b53 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 principal evaluation succeeds for identity 0 +[3b54 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1380 gate 1574140975471881900 evaluation succeeds +[3b55 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3b56 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3b57 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3b58 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3b59 11-19 05:22:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b5a 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3b5b 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3b5c 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3b5d 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3b5e 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b5f 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b60 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b61 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[3b62 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b63 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b64 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b65 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[3b66 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3b67 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[3b68 11-19 05:22:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b69 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3b6a 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b6b 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b6c 11-19 05:22:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b6d 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3b6e 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3b6f 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3b70 11-19 05:22:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b71 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3b72 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3b73 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3b74 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3b75 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b76 11-19 05:22:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b77 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3b78 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3b79 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3b7a 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3b7b 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b7c 11-19 05:22:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b7d 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3b7e 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3b7f 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[3b80 11-19 05:22:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b81 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b82 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b83 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b84 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b85 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3b86 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 14 52 c0 8b 42 97 2e a9 56 e4 88 e5 b8 04 80 |..R..B...V......| +00000010 84 53 ee 2b fd 4b 8a 50 40 c2 cb 0b f5 83 e6 91 |.S.+.K.P@.......| +[3b87 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 76 bf af b4 1f ec 9e 39 3f 48 1c |0D. .v......9?H.| +00000010 c1 e6 be 43 c4 d7 1f 7b 37 35 10 6b cb 74 73 e3 |...C...{75.k.ts.| +00000020 3b b9 33 81 02 20 31 e4 30 72 fb 76 48 eb 8c 04 |;.3.. 1.0r.vH...| +00000030 83 64 6c 8c 67 10 94 cd ee d5 62 6b 75 bc 3b 37 |.dl.g.....bku.;7| +00000040 d1 b0 1b 75 a1 c7 |...u..| +[3b88 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b89 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3b8a 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3b8b 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3b8c 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[3b8d 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b8e 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b8f 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b90 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b91 11-19 05:22:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b92 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3b93 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b94 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3b95 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b96 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b97 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b98 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b99 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b9a 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b9b 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b9c 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b9d 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3b9e 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3b9f 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[3ba0 11-19 05:22:55.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ba1 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3ba2 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3ba3 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ba4 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3ba5 11-19 05:22:55.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ba6 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3ba7 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3ba8 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3ba9 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3baa 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bab 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bac 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bad 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bae 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3baf 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[3bb0 11-19 05:22:55.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bb1 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3bb2 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3bb3 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bb4 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3bb5 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[3bb6 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bb7 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3bb8 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3bb9 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3bba 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3bbb 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3bbc 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3bbd 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 gate 1574140975815619700 evaluation starts +[3bbe 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 signed by 0 principal evaluation starts (used [false]) +[3bbf 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 processing identity 0 with bytes of 1151ae0 +[3bc0 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3bc1 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 principal evaluation fails +[3bc2 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd770 gate 1574140975815619700 evaluation fails +[3bc3 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3bc4 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3bc5 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3bc6 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 gate 1574140975816850000 evaluation starts +[3bc7 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 signed by 0 principal evaluation starts (used [false]) +[3bc8 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 processing identity 0 with bytes of 1151ae0 +[3bc9 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 principal matched by identity 0 +[3bca 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 09 ab be 7f b4 68 fe 58 15 ee c9 67 cf a9 f8 |......h.X...g...| +00000010 25 58 4a 5e 05 21 2e 74 d5 71 7f 0b ca 0e 20 89 |%XJ^.!.t.q.... .| +[3bcb 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 4c 8f 70 f4 18 25 6d 1c e9 78 c9 |0D. ~L.p..%m..x.| +00000010 9b 56 7a b5 36 99 02 00 b0 e3 2f bc e5 14 33 f1 |.Vz.6...../...3.| +00000020 e3 42 59 cf 02 20 5f dd d2 1a e5 6b 82 c5 39 9e |.BY.. _....k..9.| +00000030 66 99 b9 40 7d 8b 2f e2 86 f2 0d 41 95 e3 b9 ff |f..@}./....A....| +00000040 ed 74 eb 90 82 07 |.t....| +[3bcc 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 principal evaluation succeeds for identity 0 +[3bcd 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdce0 gate 1574140975816850000 evaluation succeeds +[3bce 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3bcf 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3bd0 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3bd1 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3bd2 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3bd3 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3bd4 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3bd5 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3bd6 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3bd7 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bd8 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bd9 11-19 05:22:55.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bda 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bdb 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bdc 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bdd 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bde 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bdf 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3be0 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3be1 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3be2 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3be3 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3be4 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3be5 11-19 05:22:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3be6 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3be7 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3be8 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3be9 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3bea 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3beb 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3bec 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bed 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3bee 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3bef 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bf0 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3bf1 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[3bf2 11-19 05:22:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bf3 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3bf4 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3bf5 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3bf6 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3bf7 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3bf8 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3bf9 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 gate 1574140975841044400 evaluation starts +[3bfa 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 signed by 0 principal evaluation starts (used [false]) +[3bfb 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 processing identity 0 with bytes of 1151ae0 +[3bfc 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3bfd 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 principal evaluation fails +[3bfe 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035456a0 gate 1574140975841044400 evaluation fails +[3bff 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3c00 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3c01 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c02 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 gate 1574140975843388900 evaluation starts +[3c03 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 signed by 0 principal evaluation starts (used [false]) +[3c04 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 processing identity 0 with bytes of 1151ae0 +[3c05 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 principal matched by identity 0 +[3c06 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +[3c07 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +00000040 98 ab b8 75 24 ae |...u$.| +[3c08 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 principal evaluation succeeds for identity 0 +[3c09 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003545c10 gate 1574140975843388900 evaluation succeeds +[3c0a 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c0b 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c0c 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c0d 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c0e 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c0f 11-19 05:22:55.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3c10 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3c11 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3c12 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3c13 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c14 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c15 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c16 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[3c17 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c18 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c19 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c1a 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[3c1b 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[3c1c 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c1d 11-19 05:22:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3c1e 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c1f 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c20 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c21 11-19 05:22:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c22 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c23 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c24 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c25 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c26 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c27 11-19 05:22:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c28 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[3c29 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c2a 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[3c2b 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3c2c 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +[3c2d 11-19 05:22:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +00000040 80 d9 95 74 7d 96 |...t}.| +[3c2e 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3c2f 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 10 e1 a3 82 e7 0f f0 42 d5 8b |0E.!.........B..| +00000010 a6 5c 50 11 b3 23 7c 8a 3b 56 f7 48 bc 49 74 e6 |.\P..#|.;V.H.It.| +00000020 95 14 73 0b 18 02 20 01 c5 ec 67 7e a7 dd 27 de |..s... ...g~..'.| +00000030 a4 ad ab fd 81 41 ed 0b f7 0a 6e 10 2c 4c 20 03 |.....A....n.,L .| +00000040 1a 4f 2d 36 f3 6a d2 |.O-6.j.| +[3c30 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3c31 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[3c32 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3c33 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3c34 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3c35 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c36 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c37 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c38 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[3c39 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c3a 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c3b 11-19 05:22:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[3c3c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[3c3d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3c3e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c3f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[3c40 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[3c41 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c42 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c43 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c44 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c45 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c46 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c47 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3c48 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 gate 1574140975945406100 evaluation starts +[3c49 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 signed by 0 principal evaluation starts (used [false]) +[3c4a 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 processing identity 0 with bytes of 1151ae0 +[3c4b 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3c4c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 principal evaluation fails +[3c4d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6770 gate 1574140975945406100 evaluation fails +[3c4e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3c4f 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3c50 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c51 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 gate 1574140975945792100 evaluation starts +[3c52 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 signed by 0 principal evaluation starts (used [false]) +[3c53 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 processing identity 0 with bytes of 1151ae0 +[3c54 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 principal matched by identity 0 +[3c55 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[3c56 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[3c57 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 principal evaluation succeeds for identity 0 +[3c58 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb6ce0 gate 1574140975945792100 evaluation succeeds +[3c59 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c5a 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c5b 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c5c 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c5d 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c5e 11-19 05:22:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c5f 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[3c60 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes +[3c61 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c62 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c63 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c64 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c65 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c66 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c67 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3c68 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 gate 1574140975960824600 evaluation starts +[3c69 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 signed by 0 principal evaluation starts (used [false]) +[3c6a 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 processing identity 0 with bytes of 1151ae0 +[3c6b 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3c6c 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 principal evaluation fails +[3c6d 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99270 gate 1574140975960824600 evaluation fails +[3c6e 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3c6f 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3c70 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c71 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 gate 1574140975961193900 evaluation starts +[3c72 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 signed by 0 principal evaluation starts (used [false]) +[3c73 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 processing identity 0 with bytes of 1151ae0 +[3c74 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 principal matched by identity 0 +[3c75 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[3c76 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[3c77 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 principal evaluation succeeds for identity 0 +[3c78 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d997e0 gate 1574140975961193900 evaluation succeeds +[3c79 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c7a 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c7b 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c7c 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c7d 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c7e 11-19 05:22:55.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c7f 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c80 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c81 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c82 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c83 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c84 11-19 05:22:56.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c85 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3c86 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3c87 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c88 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c89 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c8a 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c8b 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c8c 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c8d 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3c8e 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 gate 1574140976181508100 evaluation starts +[3c8f 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 signed by 0 principal evaluation starts (used [false]) +[3c90 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 processing identity 0 with bytes of 1151ae0 +[3c91 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3c92 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 principal evaluation fails +[3c93 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f84f0 gate 1574140976181508100 evaluation fails +[3c94 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3c95 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3c96 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c97 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 gate 1574140976182398800 evaluation starts +[3c98 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 signed by 0 principal evaluation starts (used [false]) +[3c99 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 processing identity 0 with bytes of 1151ae0 +[3c9a 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 principal matched by identity 0 +[3c9b 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[3c9c 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[3c9d 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 principal evaluation succeeds for identity 0 +[3c9e 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f8a60 gate 1574140976182398800 evaluation succeeds +[3c9f 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ca0 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ca1 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3ca2 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3ca3 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ca4 11-19 05:22:56.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ca5 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3ca6 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3ca7 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3ca9 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3ca8 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3caa 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cab 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[3cac 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3cad 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3caf 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cae 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3cb0 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3cb1 11-19 05:22:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cb2 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3cb3 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3cb4 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3cb5 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cb6 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3cb7 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cb8 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3cb9 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3cba 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3cbb 11-19 05:22:58.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cbc 11-19 05:22:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3cbd 11-19 05:22:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151033 +[3cbe 11-19 05:22:58.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E6878FCD10BED3D5CB069BF5A658100592E0DEF701EC2BF74F2B3CF89B92ED31 +[3cbf 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3cc0 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3cc1 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3cc2 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[3cc3 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cc5 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3cc6 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cc4 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[3cc7 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3cc9 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cc8 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3cca 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3ccb 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ccc 11-19 05:22:58.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ccd 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[3ccf 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3cce 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[3cd0 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cd1 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[3cd2 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[3cd3 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3cd4 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +[3cd5 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +00000040 17 d6 e3 e0 b8 28 |.....(| +[3cd6 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3cd7 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 4a 87 68 33 71 50 f2 8b 5c fb 2c |0D. CJ.h3qP..\.,| +00000010 0c e9 a2 bb d6 1c ae e0 28 f1 dc ce 71 20 91 75 |........(...q .u| +00000020 59 84 39 46 02 20 17 fc 12 98 75 82 1b 28 40 be |Y.9F. ....u..(@.| +00000030 e0 de 5e 9f 83 f6 e9 ee c9 ee ef b3 8d 78 93 9f |..^..........x..| +00000040 16 1d c8 84 a4 62 |.....b| +[3cd8 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3cd9 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3cda 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cdb 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cdc 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[3cdd 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3cde 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +[3cdf 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +00000040 80 d9 95 74 7d 96 |...t}.| +[3ce0 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3ce1 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ce2 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3ce3 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +[3ce4 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +00000040 17 d6 e3 e0 b8 28 |.....(| +[3ce5 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3ce6 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3ce7 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ce8 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[3ce9 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cea 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ceb 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3cec 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ced 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3cee 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3cef 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3cf0 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 gate 1574140978886162600 evaluation starts +[3cf1 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 signed by 0 principal evaluation starts (used [false]) +[3cf2 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 processing identity 0 with bytes of 1151ae0 +[3cf3 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3cf4 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 principal evaluation fails +[3cf5 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3580 gate 1574140978886162600 evaluation fails +[3cf6 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3cf7 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3cf8 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3cf9 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 gate 1574140978886571200 evaluation starts +[3cfa 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 signed by 0 principal evaluation starts (used [false]) +[3cfb 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 processing identity 0 with bytes of 1151ae0 +[3cfc 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 principal matched by identity 0 +[3cfd 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 b0 34 91 a9 87 23 2c 0f e4 a7 2c 30 4c 13 |...4...#,...,0L.| +00000010 9c a6 fa 36 d1 dd 60 c3 8a 04 0e 74 9d a8 45 1d |...6..`....t..E.| +[3cfe 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 a9 f1 73 33 13 b3 a4 fd 3c 8f 07 |0D. )..s3....<..| +00000010 fd f5 4a a3 d5 95 57 75 67 fe 70 8f 60 9c 09 f5 |..J...Wug.p.`...| +00000020 94 de 5f 9d 02 20 1c 3c 16 09 9e d7 9c 06 48 76 |.._.. .<......Hv| +00000030 95 37 96 cd ad 14 9b 61 38 ef e5 37 42 6d 3b 93 |.7.....a8..7Bm;.| +00000040 f3 06 8a 77 a7 f3 |...w..| +[3cff 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 principal evaluation succeeds for identity 0 +[3d00 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3af0 gate 1574140978886571200 evaluation succeeds +[3d01 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d02 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d03 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d04 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d05 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d06 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d07 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d08 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d09 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3d0a 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d0b 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3d0c 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3d0d 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 87 8f cd 10 be d3 d5 cb 06 9b f5 a6 58 10 05 |.............X..| +00000010 92 e0 de f7 01 ec 2b f7 4f 2b 3c f8 9b 92 ed 31 |......+.O+<....1| +[3d0e 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 74 fc e2 c5 91 e7 94 6f fd 00 ec |0D. ft......o...| +00000010 ae 6c 54 b2 da 63 a2 d5 81 ba 92 65 5f 89 a7 9a |.lT..c.....e_...| +00000020 0a e6 09 f0 02 20 18 6d b4 67 71 7d 51 17 22 9b |..... .m.gq}Q.".| +00000030 d1 2b c2 fe f7 ae 33 5b 83 12 cf c0 5e 6a 2b a3 |.+....3[....^j+.| +00000040 17 d6 e3 e0 b8 28 |.....(| +[3d0f 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d10 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d11 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d12 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[3d13 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d14 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d15 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d16 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d17 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d18 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d19 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3d1a 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 gate 1574140978888309000 evaluation starts +[3d1b 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 signed by 0 principal evaluation starts (used [false]) +[3d1c 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 processing identity 0 with bytes of 1151ae0 +[3d1d 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3d1e 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 principal evaluation fails +[3d1f 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6da70 gate 1574140978888309000 evaluation fails +[3d20 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3d21 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3d22 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d23 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 gate 1574140978889240500 evaluation starts +[3d24 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 signed by 0 principal evaluation starts (used [false]) +[3d25 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 processing identity 0 with bytes of 1151ae0 +[3d26 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 principal matched by identity 0 +[3d27 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 61 ef 93 da 69 05 90 fd f6 a3 08 9b 92 84 83 |.a...i..........| +00000010 9d 86 42 49 2a 78 3c 92 a2 69 8a 1a 56 66 2d 48 |..BI*x<..i..Vf-H| +[3d28 11-19 05:22:58.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 86 bf 4d 7a bc c1 c1 41 36 a6 b8 |0D. P..Mz...A6..| +00000010 82 b8 e6 de a1 b6 7d fb 14 a6 4e 69 7b 09 13 e7 |......}...Ni{...| +00000020 f2 98 94 78 02 20 7a 6f b2 d1 7e 9d 2a aa f8 66 |...x. zo..~.*..f| +00000030 7a ca 86 67 9e 4c d4 f1 fc d8 dd e6 67 57 43 32 |z..g.L......gWC2| +00000040 98 ab b8 75 24 ae |...u$.| +[3d29 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 principal evaluation succeeds for identity 0 +[3d2a 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6dfe0 gate 1574140978889240500 evaluation succeeds +[3d2b 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d2c 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d2d 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d2e 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d2f 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d30 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d31 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3d32 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 96 70 e9 d4 de 9b c0 7d 4b 9f ee aa de b8 b6 |..p.....}K......| +00000010 1a 67 b2 bd 74 6c 26 13 6e f5 a3 bf bd 59 2a b7 |.g..tl&.n....Y*.| +[3d33 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 89 5a d1 b9 46 b0 ea 0a 7b c5 86 |0D. I.Z..F...{..| +00000010 61 d4 54 5c d2 be 57 1a 83 0d cc ee ec 1e 82 9d |a.T\..W.........| +00000020 c8 58 13 78 02 20 14 f5 8b 96 b3 df 77 59 a0 8c |.X.x. ......wY..| +00000030 a2 68 bb b0 54 43 c1 c2 7e 28 43 70 70 df 80 93 |.h..TC..~(Cpp...| +00000040 80 d9 95 74 7d 96 |...t}.| +[3d34 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d35 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d36 11-19 05:22:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d37 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d38 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d39 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3d3a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3d3b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d3c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3d3d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d3e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3d3f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d40 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3d42 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3d43 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3d44 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3d41 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3d45 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[3d46 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[3d47 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d48 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d49 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d4a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d4b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d4c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d4d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d4e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3d4f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 gate 1574140979274908100 evaluation starts +[3d50 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 signed by 0 principal evaluation starts (used [false]) +[3d51 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 processing identity 0 with bytes of 1151ae0 +[3d52 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3d53 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 principal evaluation fails +[3d54 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212680 gate 1574140979274908100 evaluation fails +[3d55 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3d56 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3d57 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d58 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 gate 1574140979275218300 evaluation starts +[3d59 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 signed by 0 principal evaluation starts (used [false]) +[3d5a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 processing identity 0 with bytes of 1151ae0 +[3d5b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 principal matched by identity 0 +[3d5c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[3d5d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[3d5e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 principal evaluation succeeds for identity 0 +[3d5f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003212bf0 gate 1574140979275218300 evaluation succeeds +[3d60 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d61 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d62 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d63 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d64 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d65 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d66 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d67 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d68 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d69 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d6a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d6b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3d6c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 gate 1574140979276250900 evaluation starts +[3d6d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 signed by 0 principal evaluation starts (used [false]) +[3d6e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 processing identity 0 with bytes of 1151ae0 +[3d6f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3d70 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 principal evaluation fails +[3d71 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213d80 gate 1574140979276250900 evaluation fails +[3d72 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3d73 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3d74 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d75 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 gate 1574140979276539400 evaluation starts +[3d76 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 signed by 0 principal evaluation starts (used [false]) +[3d77 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 processing identity 0 with bytes of 1151ae0 +[3d78 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 principal matched by identity 0 +[3d79 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[3d7a 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[3d7b 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 principal evaluation succeeds for identity 0 +[3d7c 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034da2f0 gate 1574140979276539400 evaluation succeeds +[3d7d 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d7e 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d7f 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d80 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d81 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d82 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3d83 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d84 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d85 11-19 05:22:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d86 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d87 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d88 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d89 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d8a 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d8b 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3d8c 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 gate 1574140979281932200 evaluation starts +[3d8d 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 signed by 0 principal evaluation starts (used [false]) +[3d8e 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 processing identity 0 with bytes of 1151ae0 +[3d8f 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3d90 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 principal evaluation fails +[3d91 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034db6d0 gate 1574140979281932200 evaluation fails +[3d92 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3d93 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3d94 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d95 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 gate 1574140979282634800 evaluation starts +[3d96 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 signed by 0 principal evaluation starts (used [false]) +[3d97 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 processing identity 0 with bytes of 1151ae0 +[3d98 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 principal matched by identity 0 +[3d99 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[3d9a 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[3d9b 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 principal evaluation succeeds for identity 0 +[3d9c 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dbc40 gate 1574140979282634800 evaluation succeeds +[3d9d 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d9e 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d9f 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3da0 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3da1 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[3da2 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[3da3 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3da4 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3da5 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da6 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da7 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3da8 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3da9 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3daa 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3dab 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3dac 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3dad 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 gate 1574140979283860300 evaluation starts +[3dae 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 signed by 0 principal evaluation starts (used [false]) +[3daf 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 processing identity 0 with bytes of 1151ae0 +[3db0 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3db1 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 principal evaluation fails +[3db2 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839ad0 gate 1574140979283860300 evaluation fails +[3db3 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3db4 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3db5 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3db6 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 gate 1574140979284101900 evaluation starts +[3db7 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 signed by 0 principal evaluation starts (used [false]) +[3db8 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 processing identity 0 with bytes of 1151ae0 +[3db9 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 principal matched by identity 0 +[3dba 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[3dbb 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[3dbc 11-19 05:22:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 principal evaluation succeeds for identity 0 +[3dbd 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20040 gate 1574140979284101900 evaluation succeeds +[3dbe 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3dbf 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3dc0 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3dc1 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3dc2 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dc3 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3dc4 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dc5 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dc6 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dc7 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3dc8 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3dc9 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3dca 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3dcb 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3dcc 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3dcd 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 gate 1574140979298387600 evaluation starts +[3dce 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 signed by 0 principal evaluation starts (used [false]) +[3dcf 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 processing identity 0 with bytes of 1151ae0 +[3dd0 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3dd1 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 principal evaluation fails +[3dd2 11-19 05:22:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21420 gate 1574140979298387600 evaluation fails +[3dd3 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3dd4 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3dd5 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3dd6 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 gate 1574140979301891400 evaluation starts +[3dd7 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 signed by 0 principal evaluation starts (used [false]) +[3dd8 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 processing identity 0 with bytes of 1151ae0 +[3dd9 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 principal matched by identity 0 +[3dda 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[3ddb 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[3ddc 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 principal evaluation succeeds for identity 0 +[3ddd 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c21990 gate 1574140979301891400 evaluation succeeds +[3dde 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ddf 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3de0 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3de1 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3de2 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[3de3 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[3de4 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3de5 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3de6 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3de7 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3de8 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3de9 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3dea 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3deb 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3dec 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ded 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3dee 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 gate 1574140979305369600 evaluation starts +[3def 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 signed by 0 principal evaluation starts (used [false]) +[3df0 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 processing identity 0 with bytes of 1151ae0 +[3df1 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3df2 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 principal evaluation fails +[3df3 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5820 gate 1574140979305369600 evaluation fails +[3df4 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3df5 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3df6 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3df7 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 gate 1574140979305620800 evaluation starts +[3df8 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 signed by 0 principal evaluation starts (used [false]) +[3df9 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 processing identity 0 with bytes of 1151ae0 +[3dfa 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 principal matched by identity 0 +[3dfb 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[3dfc 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[3dfd 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 principal evaluation succeeds for identity 0 +[3dfe 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5d90 gate 1574140979305620800 evaluation succeeds +[3dff 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e00 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e01 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e02 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e03 11-19 05:22:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e04 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[3e05 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[3e06 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e07 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510101801 +[3e08 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5223D380F67C735908A435DA72D68AE3F154B53322E7535AB6CBF9001CB8B8B +[3e09 11-19 05:22:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[3e0a 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e0b 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e0c 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e0d 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e0e 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[3e0f 11-19 05:22:59.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e10 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e11 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[3e12 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e13 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3e14 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3e15 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3e16 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e17 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e18 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e19 11-19 05:22:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e1a 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e1b 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e1c 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[3e1d 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e1e 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e1f 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e20 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3e21 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e22 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e23 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3e24 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3e25 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e26 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[3e27 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[3e28 11-19 05:22:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e29 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3e2a 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3e2b 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e2c 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3e2d 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[3e2e 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e2f 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e30 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e31 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3e32 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3e33 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3e34 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3e35 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 gate 1574140979493692900 evaluation starts +[3e36 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 signed by 0 principal evaluation starts (used [false]) +[3e37 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 processing identity 0 with bytes of 1151ae0 +[3e38 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3e39 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 principal evaluation fails +[3e3a 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ff70 gate 1574140979493692900 evaluation fails +[3e3b 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3e3c 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3e3d 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3e3e 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 gate 1574140979494817500 evaluation starts +[3e3f 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 signed by 0 principal evaluation starts (used [false]) +[3e40 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 processing identity 0 with bytes of 1151ae0 +[3e41 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 principal matched by identity 0 +[3e42 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 54 b7 52 d2 88 7e 26 f9 6f f4 89 49 13 03 38 |WT.R..~&.o..I..8| +00000010 a8 54 f6 ab f2 3a 47 0b a8 58 e4 c2 68 5d 13 7f |.T...:G..X..h]..| +[3e43 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 a4 5b c2 c2 c2 15 71 7a 8a 18 84 |0D. w.[....qz...| +00000010 a5 1e eb b7 49 66 5a d1 1e f5 ea 34 cf b1 c8 12 |....IfZ....4....| +00000020 f2 ea 05 78 02 20 66 b8 57 0e 6a 64 94 7a 38 e6 |...x. f.W.jd.z8.| +00000030 aa 36 f1 05 91 6a f9 c1 d0 b2 97 03 d6 cf 44 ec |.6...j........D.| +00000040 5b 36 a7 48 57 10 |[6.HW.| +[3e44 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 principal evaluation succeeds for identity 0 +[3e45 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00045e4e0 gate 1574140979494817500 evaluation succeeds +[3e46 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e47 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e48 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e49 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e4a 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e4b 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3e4c 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3e4d 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3e4e 11-19 05:22:59.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3e4f 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e50 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e51 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e52 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[3e53 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e54 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e55 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e56 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[3e57 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3e58 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[3e59 11-19 05:22:59.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e5a 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3e5b 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e5c 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e5d 11-19 05:22:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e5e 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3e5f 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3e60 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[3e61 11-19 05:22:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e62 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e63 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151034 +[3e64 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BF409E065B10A0047B159F584E9F2B9A66F3415E3169E67053F214AFFC9DAF07 +[3e65 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e66 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3e67 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3e68 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3e69 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e6a 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e6b 11-19 05:22:59.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e6c 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3e6d 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e6f 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e6e 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3e70 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e71 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e72 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e73 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3e74 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e75 11-19 05:22:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e76 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e77 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e78 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e79 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e7a 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3e7b 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 40 9e 06 5b 10 a0 04 7b 15 9f 58 4e 9f 2b 9a |.@..[...{..XN.+.| +00000010 66 f3 41 5e 31 69 e6 70 53 f2 14 af fc 9d af 07 |f.A^1i.pS.......| +[3e7c 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f6 f7 3b f0 2b 93 7f 4a d5 be eb |0D. c..;.+..J...| +00000010 ac 4f 2c e0 8c 5b e0 8a 5e 6d 51 b0 4d 0b ef ed |.O,..[..^mQ.M...| +00000020 15 6b 93 0b 02 20 7c c0 c9 02 94 b7 6d 56 83 0b |.k... |.....mV..| +00000030 45 c0 08 07 c8 37 7f 40 06 d0 c8 db a2 6f 84 82 |E....7.@.....o..| +00000040 3c 36 44 67 f5 d5 |<6Dg..| +[3e7d 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e7e 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e7f 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e80 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e81 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e82 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3e83 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 40 9e 06 5b 10 a0 04 7b 15 9f 58 4e 9f 2b 9a |.@..[...{..XN.+.| +00000010 66 f3 41 5e 31 69 e6 70 53 f2 14 af fc 9d af 07 |f.A^1i.pS.......| +[3e84 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f6 f7 3b f0 2b 93 7f 4a d5 be eb |0D. c..;.+..J...| +00000010 ac 4f 2c e0 8c 5b e0 8a 5e 6d 51 b0 4d 0b ef ed |.O,..[..^mQ.M...| +00000020 15 6b 93 0b 02 20 7c c0 c9 02 94 b7 6d 56 83 0b |.k... |.....mV..| +00000030 45 c0 08 07 c8 37 7f 40 06 d0 c8 db a2 6f 84 82 |E....7.@.....o..| +00000040 3c 36 44 67 f5 d5 |<6Dg..| +[3e85 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e86 11-19 05:22:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e87 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3e88 11-19 05:22:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3e89 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[3e8a 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e8b 11-19 05:22:59.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3e8c 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3e8d 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3e8e 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e8f 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e90 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e91 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e92 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e93 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e94 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[3e95 11-19 05:22:59.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e96 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +[3e97 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +[3e98 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e99 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\326'\237\311\212P" > > , Envelope: 166 bytes, Signature: 0 bytes +[3e9a 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[3e9b 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e9c 11-19 05:22:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e9d 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e9e 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3e9f 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ea0 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ea1 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ea2 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 gate 1574140979856092900 evaluation starts +[3ea3 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 signed by 0 principal evaluation starts (used [false]) +[3ea4 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 processing identity 0 with bytes of 1151ae0 +[3ea5 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3ea6 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 principal evaluation fails +[3ea7 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287f5b0 gate 1574140979856092900 evaluation fails +[3ea8 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3ea9 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3eaa 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3eab 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 gate 1574140979858944100 evaluation starts +[3eac 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 signed by 0 principal evaluation starts (used [false]) +[3ead 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 processing identity 0 with bytes of 1151ae0 +[3eae 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 principal matched by identity 0 +[3eaf 11-19 05:22:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 48 fb 5f aa d8 07 cc 3e 3d 2b 75 f8 70 f4 96 |.H._....>=+u.p..| +00000010 ad 2f 7d 1f de d6 db bd f7 2a 94 8c a5 22 93 66 |./}......*...".f| +[3eb0 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ec a5 52 1c 85 87 80 48 6a eb |0E.!....R....Hj.| +00000010 72 01 fa 4f eb 1c a0 b6 6e 17 43 62 cf 0b 02 19 |r..O....n.Cb....| +00000020 fa b6 07 c6 b9 02 20 17 1e 92 d4 fa 15 47 b8 b1 |...... ......G..| +00000030 af 1e cd 49 da 31 c3 88 09 cb bc 52 0e 54 58 46 |...I.1.....R.TXF| +00000040 3e d6 27 9f c9 8a 50 |>.'...P| +[3eb1 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 principal evaluation succeeds for identity 0 +[3eb2 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287fb20 gate 1574140979858944100 evaluation succeeds +[3eb3 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3eb4 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3eb5 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3eb6 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3eb7 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3eb8 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3eb9 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3eba 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3ebb 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3ebc 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ebd 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ebe 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ebf 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[3ec0 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ec1 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ec2 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ec3 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[3ec4 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\326'\237\311\212P" > alive: alive: +[3ec5 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3ec6 11-19 05:22:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ec7 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3ec8 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3ec9 11-19 05:22:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3eca 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ecb 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ecc 11-19 05:22:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ecd 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\347\3756\301v" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3ece 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ecf 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\347\3756\301v" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3ed0 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3ed1 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 39 5e 36 0b 9b 3a 1f a6 3f 14 00 94 8e 74 60 |.9^6..:..?....t`| +00000010 a4 d7 0b d4 72 ad 9f 69 55 a2 c0 cc 28 fb dd f2 |....r..iU...(...| +[3ed2 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 96 ec 0f 80 8a 44 f7 4b b7 9d |0E.!.......D.K..| +00000010 c6 74 e5 6e 72 4b 8e 7b ca a9 da 92 36 b3 a7 99 |.t.nrK.{....6...| +00000020 68 cd f5 04 1d 02 20 60 b8 52 28 04 0b 73 69 d5 |h..... `.R(..si.| +00000030 43 30 0d b1 7d 21 ab 4c 24 c7 64 d1 2e 1b 51 8c |C0..}!.L$.d...Q.| +00000040 e1 3e e7 fd 36 c1 76 |.>..6.v| +[3ed3 11-19 05:22:59.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3ed4 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 6d 72 a1 7f 89 ac 9b 2c e6 c3 bf |0D. 0mr.....,...| +00000010 5c fb 4c 11 c9 f0 73 f3 2b 6c 47 6c 8f 32 c5 5c |\.L...s.+lGl.2.\| +00000020 d2 82 b4 a9 02 20 1c 7a 6b df 2f 49 e5 29 c8 94 |..... .zk./I.)..| +00000030 92 b9 04 6f 59 8a c5 3f 37 27 93 85 d2 74 1b 38 |...oY..?7'...t.8| +00000040 0d f4 93 93 84 24 |.....$| +[3ed5 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3ed6 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3ed7 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3ed8 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3ed9 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[3eda 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3edb 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3edc 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3edd 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[3ede 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3edf 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee0 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[3ee1 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\347\3756\301v" secret_envelope: > alive: +[3ee2 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3ee3 11-19 05:22:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ee4 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3ee5 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3ee6 11-19 05:23:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee7 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee8 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee9 11-19 05:23:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3eea 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3eeb 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3eec 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3eed 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3eee 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[3eef 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ef0 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ef1 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ef2 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ef3 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ef4 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ef5 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ef6 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 gate 1574140980379402100 evaluation starts +[3ef7 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 signed by 0 principal evaluation starts (used [false]) +[3ef8 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 processing identity 0 with bytes of 1151ae0 +[3ef9 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3efa 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 principal evaluation fails +[3efb 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003251da0 gate 1574140980379402100 evaluation fails +[3efc 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3efd 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3efe 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3eff 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 gate 1574140980379780000 evaluation starts +[3f00 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 signed by 0 principal evaluation starts (used [false]) +[3f01 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 processing identity 0 with bytes of 1151ae0 +[3f02 11-19 05:23:00.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 principal matched by identity 0 +[3f03 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c ec b1 9a 47 f5 fd ef 14 df 31 14 a6 94 e5 70 |\...G.....1....p| +00000010 d2 22 bc 74 b7 4d bf 54 1b ba aa 61 a5 fc 0f 59 |.".t.M.T...a...Y| +[3f04 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 60 c1 72 ad b9 14 34 1b bb 6c e7 |0D. 7`.r...4..l.| +00000010 45 d6 3a de 5d 26 59 fd 91 f9 7a 89 a9 7b 3b ef |E.:.]&Y...z..{;.| +00000020 95 e8 c0 96 02 20 3b 4a b4 76 7d f5 16 92 02 82 |..... ;J.v}.....| +00000030 4d e4 0b dd 03 3c cf 9d 9c f5 8c ac 07 b2 d0 59 |M....<.........Y| +00000040 17 49 2f c1 07 79 |.I/..y| +[3f05 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 principal evaluation succeeds for identity 0 +[3f06 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003910310 gate 1574140980379780000 evaluation succeeds +[3f07 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f08 11-19 05:23:00.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f09 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f0a 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f0b 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f0c 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f0d 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f0e 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3f0f 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3f10 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3f11 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3f12 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f13 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f14 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f15 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f16 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f17 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f18 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f19 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f1a 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f1b 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f1c 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f1d 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f1e 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f1f 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f20 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f21 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f22 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f23 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3f24 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f25 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3f26 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f28 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f27 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f29 11-19 05:23:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f2a 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f2b 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f2c 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f2d 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[3f2e 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 11 4b 59 88 a6 56 67 d3 54 27 83 26 29 15 c8 |..KY..Vg.T'.&)..| +00000010 1d 11 e9 c6 0b e5 3f 5c cf ad 27 37 c8 a1 52 13 |......?\..'7..R.| +[3f2f 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 4a d8 cc cd f2 2a 90 f6 17 a3 25 |0D. .J....*....%| +00000010 25 dc cb f4 c7 ea d3 6d 2c 8d 74 5c 8d f6 10 ef |%......m,.t\....| +00000020 57 03 1c 90 02 20 28 3a d7 ae a3 47 41 04 9d 28 |W.... (:...GA..(| +00000030 46 1f 9a 91 13 75 30 75 78 f8 05 ac cc 13 b9 11 |F....u0ux.......| +00000040 73 ac a9 d8 6c df |s...l.| +[3f30 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f31 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3f32 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3f33 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3f34 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3f35 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f36 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f37 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f38 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f39 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f3a 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f3b 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3f3c 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f3d 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3f3e 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f3f 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f40 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f41 11-19 05:23:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f42 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f43 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f44 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f45 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f46 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f47 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f48 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f49 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f4a 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f4b 11-19 05:23:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f4c 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f4d 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f4e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f4f 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f50 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[3f51 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f52 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f53 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f54 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f55 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f56 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f57 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3f58 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 gate 1574140980807297200 evaluation starts +[3f59 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 signed by 0 principal evaluation starts (used [false]) +[3f5a 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 processing identity 0 with bytes of 1151ae0 +[3f5b 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3f5c 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 principal evaluation fails +[3f5d 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282950 gate 1574140980807297200 evaluation fails +[3f5e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3f5f 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3f60 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f61 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 gate 1574140980807672400 evaluation starts +[3f62 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 signed by 0 principal evaluation starts (used [false]) +[3f63 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 processing identity 0 with bytes of 1151ae0 +[3f64 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 principal matched by identity 0 +[3f65 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 2c 5b 2b c6 2b 64 cb 71 d8 3d 1e 03 d0 8d 5a |.,[+.+d.q.=....Z| +00000010 a7 ec 9e c4 13 67 e6 b1 4e c2 75 d6 4e af ba 12 |.....g..N.u.N...| +[3f66 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 c7 87 1e 67 63 e9 60 f5 14 53 45 |0D. ....gc.`..SE| +00000010 b0 bc 31 7c 47 91 47 10 7e 8a ab 34 6c d9 0b e1 |..1|G.G.~..4l...| +00000020 71 be f1 80 02 20 1e 1e 49 15 51 45 f3 53 eb f2 |q.... ..I.QE.S..| +00000030 f5 be f7 64 ef 54 67 2e 87 79 ff af dd f7 6a 51 |...d.Tg..y....jQ| +00000040 86 97 b4 ed a1 ac |......| +[3f67 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 principal evaluation succeeds for identity 0 +[3f68 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003282ec0 gate 1574140980807672400 evaluation succeeds +[3f69 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f6a 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f6b 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f6c 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f6d 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f6e 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3f6f 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3f70 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3f71 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3f72 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f73 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f74 11-19 05:23:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f75 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f76 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f77 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f78 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f79 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7a 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7b 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7c 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3f7d 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7e 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3f7f 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f80 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f81 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f82 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f83 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f84 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f85 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f86 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f87 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f88 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f89 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8a 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f8b 11-19 05:23:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8c 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3f8d 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3f8e 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[3f8f 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3f90 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3f91 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3f92 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3f93 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f94 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3f95 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f96 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3f97 11-19 05:23:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f98 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3f99 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3f9a 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f9b 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3f9c 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3f9d 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3f9e 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f9f 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3fa0 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3fa1 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3fa2 11-19 05:23:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fa3 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3fa4 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151035 +[3fa5 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 178AD78C42CBD5E20D9A3A2C9B259ADA36B44253D2BC9B3B45F71293DAA29776 +[3fa6 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3fa7 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3fa8 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3fa9 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[3faa 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fab 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[3fac 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fad 11-19 05:23:02.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[3fae 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3faf 11-19 05:23:02.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fb0 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3fb1 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3fb2 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fb3 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3fb4 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3fb5 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +[3fb6 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +00000040 b4 a9 dc cd 76 a1 ff |....v..| +[3fb7 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fb8 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fb9 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fba 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fbb 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3fbc 11-19 05:23:02.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fbd 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3fbe 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3fbf 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fc0 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3fc2 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fc1 11-19 05:23:02.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3fc4 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3fc3 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3fc5 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +[3fc6 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +00000040 b4 a9 dc cd 76 a1 ff |....v..| +[3fc7 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fc8 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fc9 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fca 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fcb 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fcc 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3fcd 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[3fce 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 8a d7 8c 42 cb d5 e2 0d 9a 3a 2c 9b 25 9a da |....B.....:,.%..| +00000010 36 b4 42 53 d2 bc 9b 3b 45 f7 12 93 da a2 97 76 |6.BS...;E......v| +[3fcf 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 42 2c 66 5e 87 e9 c2 c2 c9 ba |0E.!..B,f^......| +00000010 f7 35 04 0e 3f 96 64 60 2c 8e 91 04 90 c2 11 78 |.5..?.d`,......x| +00000020 72 8c 43 2a 70 02 20 37 94 41 0c 1a 36 b0 ad d3 |r.C*p. 7.A..6...| +00000030 87 ba 32 30 cc a1 16 8c 65 45 db bd 2f e8 5c ab |..20....eE../.\.| +00000040 b4 a9 dc cd 76 a1 ff |....v..| +[3fd0 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3fd1 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 e0 9f 37 b7 e4 c5 c5 5c 6b d1 |0E.!....7....\k.| +00000010 2f f7 6d e7 ba f7 13 ed fb 1c 56 fd 92 18 a1 16 |/.m.......V.....| +00000020 dc 6a 87 f0 20 02 20 3d 31 b9 4a a9 15 08 e9 9c |.j.. . =1.J.....| +00000030 62 b7 42 c0 0d c6 2b 7e 3d ea 2d c3 d9 1e ff 99 |b.B...+~=.-.....| +00000040 bc f0 a9 c2 86 63 39 |.....c9| +[3fd2 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3fd3 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3fd4 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fd5 11-19 05:23:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fd6 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fd7 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fd8 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3fd9 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3fda 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fdb 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3fdc 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fdd 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3fde 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fdf 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3fe0 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[3fe1 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[3fe2 11-19 05:23:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3fe3 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3fe4 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[3fe5 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[3fe6 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fe7 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fe8 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3fe9 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3fea 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3feb 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3fec 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3fed 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3fee 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 gate 1574140983283159800 evaluation starts +[3fef 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 signed by 0 principal evaluation starts (used [false]) +[3ff0 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 processing identity 0 with bytes of 1151ae0 +[3ff1 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3ff2 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 principal evaluation fails +[3ff3 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b3c0 gate 1574140983283159800 evaluation fails +[3ff4 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3ff5 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3ff6 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ff7 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 gate 1574140983284567900 evaluation starts +[3ff8 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 signed by 0 principal evaluation starts (used [false]) +[3ff9 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 processing identity 0 with bytes of 1151ae0 +[3ffa 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 principal matched by identity 0 +[3ffb 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[3ffc 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[3ffd 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 principal evaluation succeeds for identity 0 +[3ffe 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b930 gate 1574140983284567900 evaluation succeeds +[3fff 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4000 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4001 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4002 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4003 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4004 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4005 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4006 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4007 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4008 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4009 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[400a 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[400b 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 gate 1574140983286994000 evaluation starts +[400c 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 signed by 0 principal evaluation starts (used [false]) +[400d 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 processing identity 0 with bytes of 1151ae0 +[400e 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[400f 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 principal evaluation fails +[4010 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128ac0 gate 1574140983286994000 evaluation fails +[4011 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4012 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4013 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4014 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 gate 1574140983287650300 evaluation starts +[4015 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 signed by 0 principal evaluation starts (used [false]) +[4016 11-19 05:23:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 processing identity 0 with bytes of 1151ae0 +[4017 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 principal matched by identity 0 +[4018 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[4019 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[401a 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 principal evaluation succeeds for identity 0 +[401b 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004129030 gate 1574140983287650300 evaluation succeeds +[401c 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[401d 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[401e 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[401f 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4020 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4021 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4022 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4023 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4024 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4025 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4026 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4027 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4028 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4029 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[402a 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[402b 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 gate 1574140983295169200 evaluation starts +[402c 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 signed by 0 principal evaluation starts (used [false]) +[402d 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 processing identity 0 with bytes of 1151ae0 +[402e 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[402f 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 principal evaluation fails +[4030 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8410 gate 1574140983295169200 evaluation fails +[4031 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4032 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4033 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4034 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 gate 1574140983296355100 evaluation starts +[4035 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 signed by 0 principal evaluation starts (used [false]) +[4036 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 processing identity 0 with bytes of 1151ae0 +[4037 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 principal matched by identity 0 +[4038 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[4039 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[403a 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 principal evaluation succeeds for identity 0 +[403b 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8980 gate 1574140983296355100 evaluation succeeds +[403c 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[403d 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[403e 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[403f 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4040 11-19 05:23:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[4041 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[4042 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[4043 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[4044 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4045 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4046 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4047 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4048 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4049 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[404a 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[404b 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[404c 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 gate 1574140983303170600 evaluation starts +[404d 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 signed by 0 principal evaluation starts (used [false]) +[404e 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 processing identity 0 with bytes of 1151ae0 +[404f 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4050 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 principal evaluation fails +[4051 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405e810 gate 1574140983303170600 evaluation fails +[4052 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4053 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4054 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4055 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 gate 1574140983304509500 evaluation starts +[4056 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 signed by 0 principal evaluation starts (used [false]) +[4057 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 processing identity 0 with bytes of 1151ae0 +[4058 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 principal matched by identity 0 +[4059 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[405a 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[405b 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 principal evaluation succeeds for identity 0 +[405c 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00405ed80 gate 1574140983304509500 evaluation succeeds +[405d 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[405e 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[405f 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4060 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4061 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4062 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4063 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4064 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4065 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4066 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4067 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4068 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4069 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[406a 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[406b 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[406c 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 gate 1574140983308412400 evaluation starts +[406d 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 signed by 0 principal evaluation starts (used [false]) +[406e 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 processing identity 0 with bytes of 1151ae0 +[406f 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4070 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 principal evaluation fails +[4071 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000160 gate 1574140983308412400 evaluation fails +[4072 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4073 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4074 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4075 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 gate 1574140983309545700 evaluation starts +[4076 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 signed by 0 principal evaluation starts (used [false]) +[4077 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 processing identity 0 with bytes of 1151ae0 +[4078 11-19 05:23:03.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 principal matched by identity 0 +[4079 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[407a 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[407b 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 principal evaluation succeeds for identity 0 +[407c 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040006d0 gate 1574140983309545700 evaluation succeeds +[407d 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[407e 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[407f 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4080 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4081 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[4082 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[4083 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[4084 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[4085 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4086 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4087 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4088 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4089 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[408a 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[408b 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[408c 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[408d 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 gate 1574140983313199900 evaluation starts +[408e 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 signed by 0 principal evaluation starts (used [false]) +[408f 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 processing identity 0 with bytes of 1151ae0 +[4090 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4091 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 principal evaluation fails +[4092 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ca560 gate 1574140983313199900 evaluation fails +[4093 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4094 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4095 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4096 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 gate 1574140983314751700 evaluation starts +[4097 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 signed by 0 principal evaluation starts (used [false]) +[4098 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 processing identity 0 with bytes of 1151ae0 +[4099 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 principal matched by identity 0 +[409a 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[409b 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[409c 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 principal evaluation succeeds for identity 0 +[409d 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031caad0 gate 1574140983314751700 evaluation succeeds +[409e 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[409f 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[40a0 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[40a1 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[40a2 11-19 05:23:03.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40a3 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40a4 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40a5 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40a6 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40a8 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40a9 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40aa 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ab 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ac 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ad 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[40ae 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40a7 11-19 05:23:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40af 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40b0 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[40b1 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40b2 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40b3 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[40b4 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[40b5 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40b6 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[40b7 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[40b8 11-19 05:23:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40b9 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[40ba 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[40bb 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40bc 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[40bd 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[40be 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40bf 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[40c0 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[40c1 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[40c2 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[40c3 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[40c4 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[40c5 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 gate 1574140983482164900 evaluation starts +[40c6 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 signed by 0 principal evaluation starts (used [false]) +[40c7 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 processing identity 0 with bytes of 1151ae0 +[40c8 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[40c9 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 principal evaluation fails +[40ca 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a7150 gate 1574140983482164900 evaluation fails +[40cb 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[40cc 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[40cd 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[40ce 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 gate 1574140983482411000 evaluation starts +[40cf 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 signed by 0 principal evaluation starts (used [false]) +[40d0 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 processing identity 0 with bytes of 1151ae0 +[40d1 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 principal matched by identity 0 +[40d2 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c af e9 2c 2f d2 6c 10 1e f2 8f f0 14 64 a7 0b |<..,/.l......d..| +00000010 fc 41 cd 09 7e 0e dd a4 5f f0 90 9e f6 4f 04 55 |.A..~..._....O.U| +[40d3 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 71 c1 6f 85 85 55 ec 5d 9b 95 5c |0D. .q.o..U.]..\| +00000010 ec 5b cf c5 0c b6 ae c9 d8 0b e2 cb f7 ca a1 a9 |.[..............| +00000020 c6 7d 6f b6 02 20 7f 92 02 73 ce 08 1d 9e 58 56 |.}o.. ...s....XV| +00000030 3d b0 50 62 bb 2c cb 80 a8 19 d3 d6 59 87 e8 48 |=.Pb.,......Y..H| +00000040 55 5d 54 ae a8 28 |U]T..(| +[40d4 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 principal evaluation succeeds for identity 0 +[40d5 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a76c0 gate 1574140983482411000 evaluation succeeds +[40d6 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[40d7 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[40d8 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[40d9 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[40da 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[40db 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[40dc 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[40dd 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[40de 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[40df 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e0 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e1 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e2 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[40e3 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e4 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e5 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e6 11-19 05:23:03.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[40e7 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[40e8 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[40e9 11-19 05:23:03.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40ea 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[40eb 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ec 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ed 11-19 05:23:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40ee 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[40ef 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[40f0 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[40f1 11-19 05:23:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40f2 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40f3 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40f4 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[40f5 11-19 05:23:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40f6 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40f7 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40f8 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40f9 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40fa 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40fb 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40fc 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40fd 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40fe 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ff 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[4100 11-19 05:23:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4101 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4102 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4103 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4104 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4105 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[4106 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4107 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4108 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4109 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[410a 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[410b 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[410c 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[410d 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 gate 1574140983846140800 evaluation starts +[410e 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 signed by 0 principal evaluation starts (used [false]) +[410f 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 processing identity 0 with bytes of 1151ae0 +[4110 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4111 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 principal evaluation fails +[4112 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1980 gate 1574140983846140800 evaluation fails +[4113 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4114 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4115 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4116 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 gate 1574140983846597000 evaluation starts +[4117 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 signed by 0 principal evaluation starts (used [false]) +[4118 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 processing identity 0 with bytes of 1151ae0 +[4119 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 principal matched by identity 0 +[411a 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 60 70 e4 6b 1e ad 31 eb 3b b6 66 c8 6b af f0 |?`p.k..1.;.f.k..| +00000010 20 22 30 fa be 1f 2e 3e 93 be 9b 60 32 31 2c 23 | "0....>...`21,#| +[411b 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 ae 73 2c 02 92 e1 72 1d 98 |0E.!....s,...r..| +00000010 4c 93 ba 1e 48 b1 e2 f1 65 a5 f3 ba 57 1e 6b e3 |L...H...e...W.k.| +00000020 33 fd 3f b2 af 02 20 15 a5 d8 89 a7 0b 37 17 e9 |3.?... ......7..| +00000030 77 91 59 e8 3b c9 43 8d 89 01 54 d9 c2 23 8d ef |w.Y.;.C...T..#..| +00000040 24 67 ad 34 ca be b8 |$g.4...| +[411c 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 principal evaluation succeeds for identity 0 +[411d 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf1ef0 gate 1574140983846597000 evaluation succeeds +[411e 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[411f 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4120 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4121 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4122 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4123 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4124 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4125 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4126 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4127 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4128 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4129 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[412a 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[412b 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[412c 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[412d 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[412e 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[412f 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[4130 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[4131 11-19 05:23:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4132 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4133 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4134 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4135 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4136 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4137 11-19 05:23:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4138 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\356O\377*hL\257\032U\2535\251e\362kT\021:2D\333\006l\004\345\r\323fs\223\354" > > > , Envelope: 270 bytes, Signature: 0 bytes +[4139 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[413a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\356O\377*hL\257\032U\2535\251e\362kT\021:2D\333\006l\004\345\r\323fs\223\354" > > > , Envelope: 270 bytes, Signature: 0 bytes +[413b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[413c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[413d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 f9 6e ce d1 bf 7b 6d 63 ee d1 84 d5 c9 9b 8e |..n...{mc.......| +00000010 90 c1 50 3a c7 e3 c2 16 53 11 4b fd 33 56 51 1c |..P:....S.K.3VQ.| +[413e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[413f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 9b be c5 4b 01 21 4c e2 58 ba 31 |0D. )...K.!L.X.1| +00000010 71 9f 0e c6 44 1d b4 c9 72 74 4a e9 5f 6f 12 b3 |q...D...rtJ._o..| +00000020 cd f0 51 75 02 20 47 09 d2 e0 7c 8a 57 e5 1c 2f |..Qu. G...|.W../| +00000030 2e e6 5c af 50 dc 82 10 33 ef 80 2a 36 ec 5a 3b |..\.P...3..*6.Z;| +00000040 7e bb 03 75 c2 d1 |~..u..| +[4140 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4141 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510111801 +[4142 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2EE80F321DD634C690985AAB833857929ECA14BC55A5CA17F24531729F048C2D +[4143 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[4144 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[4145 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d c6 e0 10 09 6b c1 8a 20 11 c9 65 |0D. .....k.. ..e| +00000010 c6 9d 43 73 73 1e c2 a7 27 c9 0b a3 34 01 9f c3 |..Css...'...4...| +00000020 b7 66 7f 24 02 20 3e ee 4f ff 2a 68 4c af 1a 55 |.f.$. >.O.*hL..U| +00000030 ab 35 a9 65 f2 6b 54 11 3a 32 44 db 06 6c 04 e5 |.5.e.kT.:2D..l..| +00000040 0d d3 66 73 93 ec |..fs..| +[4146 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4147 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[4148 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4149 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[414a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[414b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[414c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[414d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[414e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[414f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4150 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4151 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4152 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4153 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4154 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[4155 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4156 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4157 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +[4158 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\356O\377*hL\257\032U\2535\251e\362kT\021:2D\333\006l\004\345\r\323fs\223\354" > > alive: +[4159 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[415a 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[415b 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[415c 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151036 +[415d 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6CB0BBF98F58145D8352B296E0E20BCFA1B38EF1D3F16039D3165420D8D39B66 +[415e 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[415f 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4160 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4161 11-19 05:23:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[4162 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4163 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4164 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4165 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4166 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[4167 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4168 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4169 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[416a 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[416b 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[416c 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[416d 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[416e 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[416f 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4170 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4171 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4172 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4173 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4174 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4175 11-19 05:23:04.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4176 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4177 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4178 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4179 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[417a 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[417b 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[417c 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[417d 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[417e 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[417f 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4180 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4181 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4182 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 gate 1574140985375218800 evaluation starts +[4183 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 signed by 0 principal evaluation starts (used [false]) +[4184 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 processing identity 0 with bytes of 1151ae0 +[4185 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4186 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 principal evaluation fails +[4187 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3830 gate 1574140985375218800 evaluation fails +[4188 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4189 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[418a 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[418b 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 gate 1574140985375705800 evaluation starts +[418c 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 signed by 0 principal evaluation starts (used [false]) +[418d 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 processing identity 0 with bytes of 1151ae0 +[418e 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 principal matched by identity 0 +[418f 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 26 a1 56 2b 9f f3 38 74 39 c9 30 b8 04 ae ec |.&.V+..8t9.0....| +00000010 46 cf 86 f9 f9 0b 7a 6a bb e0 be 82 8b f1 9e f9 |F.....zj........| +[4190 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 e7 50 6c e2 48 56 8c 18 12 7c bb |0D. 6.Pl.HV...|.| +00000010 d2 07 3b b6 a2 f7 f9 53 8b 8e 2d a7 0d 88 07 8c |..;....S..-.....| +00000020 57 50 f7 0b 02 20 6e 00 5b f4 95 b4 15 a1 8a cc |WP... n.[.......| +00000030 5f 5c 9e 38 ee c0 d3 88 80 1a f6 2f 2f 81 d8 77 |_\.8.......//..w| +00000040 a1 f8 9e cd ce 43 |.....C| +[4191 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 principal evaluation succeeds for identity 0 +[4192 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ea3da0 gate 1574140985375705800 evaluation succeeds +[4193 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4194 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4195 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4196 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4197 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4198 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4199 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[419a 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[419b 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[419c 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[419d 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[419e 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[419f 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a0 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a1 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a2 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a3 11-19 05:23:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a4 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a5 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[41a6 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a8 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a7 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41a9 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41aa 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[41ab 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41ac 11-19 05:23:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ad 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41ae 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41af 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41b0 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41b1 11-19 05:23:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41b2 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41b3 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41b4 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41b5 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[41b6 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e f6 38 dc 7f 49 48 7e 53 65 ae 5a 54 9d f3 5a |^.8..IH~Se.ZT..Z| +00000010 10 80 20 3e cf 0d 61 70 d8 3c 8f 2a 9e f8 f0 c3 |.. >..ap.<.*....| +[41b7 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 c9 ef 71 5f 4d 4f c3 b3 95 07 |0E.!....q_MO....| +00000010 97 82 bb 70 b3 2e 97 32 81 c2 cb 2f 70 51 42 7e |...p...2.../pQB~| +00000020 8d 83 d5 42 ca 02 20 10 75 87 31 59 07 0b 80 32 |...B.. .u.1Y...2| +00000030 6b c2 b5 98 82 75 bc 16 e5 27 e7 cd 41 7c 8d 86 |k....u...'..A|..| +00000040 e0 9a ba b0 1e ba 9c |.......| +[41b8 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41b9 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[41ba 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[41bb 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[41bc 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[41bd 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41be 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41bf 11-19 05:23:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41c0 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41c1 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41c2 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41c3 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[41c4 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41c5 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[41c6 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41c7 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41c8 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41c9 11-19 05:23:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ca 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41cb 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41cc 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41cd 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ce 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41cf 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41d0 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d1 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d2 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41d3 11-19 05:23:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d4 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41d5 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41d6 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d7 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41d8 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[41d9 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41da 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[41db 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[41dc 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[41dd 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[41de 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[41df 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[41e0 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 gate 1574140985805150900 evaluation starts +[41e1 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 signed by 0 principal evaluation starts (used [false]) +[41e2 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 processing identity 0 with bytes of 1151ae0 +[41e3 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[41e4 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 principal evaluation fails +[41e5 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ece90 gate 1574140985805150900 evaluation fails +[41e6 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[41e7 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[41e8 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[41e9 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 gate 1574140985805465700 evaluation starts +[41ea 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 signed by 0 principal evaluation starts (used [false]) +[41eb 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 processing identity 0 with bytes of 1151ae0 +[41ec 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 principal matched by identity 0 +[41ed 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 1a 1a 57 9c 7e 17 8e 27 dd 4d 8f 1c 13 40 68 |...W.~..'.M...@h| +00000010 fd 9f df d6 7f ac 09 c0 66 42 08 38 44 f8 bb 02 |........fB.8D...| +[41ee 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 82 cf 91 e4 e0 ca 0f 6f 9c e4 b1 |0D. 6.......o...| +00000010 e6 56 4d 3d 09 5f a7 67 0c 33 74 af c9 28 9c dd |.VM=._.g.3t..(..| +00000020 ef df d4 34 02 20 37 f8 fb a5 76 70 b6 93 cd 3b |...4. 7...vp...;| +00000030 23 b2 27 cd 88 dc b8 0a 1f 03 ba e9 72 be 90 a7 |#.'.........r...| +00000040 80 b4 f7 d3 92 9d |......| +[41ef 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 principal evaluation succeeds for identity 0 +[41f0 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ed400 gate 1574140985805465700 evaluation succeeds +[41f1 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[41f2 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[41f3 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[41f4 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[41f5 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41f6 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[41f7 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[41f8 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[41f9 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[41fa 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41fb 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41fc 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41fd 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41fe 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41ff 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4200 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4201 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4202 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4203 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4204 11-19 05:23:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4205 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4206 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4207 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4208 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4209 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[420a 11-19 05:23:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[420b 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[420c 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[420d 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[420e 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[420f 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4210 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4211 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4212 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4213 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4214 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4215 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4216 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4217 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4218 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[421a 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[421b 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[421c 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4219 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[421d 11-19 05:23:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[421e 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[421f 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4220 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4221 11-19 05:23:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4222 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4223 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151037 +[4224 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D4A352F16D148CE14FAE4D668B6ACA2DC19D4BBA253B7240222C9F9591E8363E +[4225 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4226 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4227 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4228 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4229 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[422a 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" secret_envelope: \253" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[422b 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[422c 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes +[422d 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[422e 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[422f 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" > > , Envelope: 166 bytes, Signature: 0 bytes +[4230 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4231 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\354\271\230e\206T\331\326\234\320\262P\376\357\206\312" secret_envelope: \253" > > > , Envelope: 272 bytes, Signature: 0 bytes +[4232 11-19 05:23:06.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4233 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[4234 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4235 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[4236 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[4237 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +[4238 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +00000040 d0 b2 50 fe ef 86 ca |..P....| +[4239 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[423a 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 97 8e f0 3d a3 8b 26 f0 2f 42 |0E.!.....=..&./B| +00000010 dd 4e cb d9 68 37 75 da db 93 17 d8 c4 81 ca a7 |.N..h7u.........| +00000020 41 72 08 1a 76 02 20 38 52 5b 04 a2 5f ea ee cd |Ar..v. 8R[.._...| +00000030 7c 4b 7e 8b 93 61 4c 0e 93 8a 73 9c 99 e2 c7 06 ||K~..aL...s.....| +00000040 46 ba fd ab 3e 20 ab |F...> .| +[423b 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[423c 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[423d 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[423e 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[423f 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4240 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4241 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4242 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4243 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[4244 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +[4245 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +00000040 d0 b2 50 fe ef 86 ca |..P....| +[4246 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4247 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4248 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4249 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[424a 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[424b 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[424c 11-19 05:23:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[424d 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[424e 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[424f 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 a3 52 f1 6d 14 8c e1 4f ae 4d 66 8b 6a ca 2d |..R.m...O.Mf.j.-| +00000010 c1 9d 4b ba 25 3b 72 40 22 2c 9f 95 91 e8 36 3e |..K.%;r@",....6>| +[4250 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 96 57 9b 01 ee 1f 87 3d 06 92 |0E.!...W.....=..| +00000010 4f 90 b6 e8 6b 4a c3 b6 af a4 58 2e 2e 97 16 60 |O...kJ....X....`| +00000020 ce bc be 99 1e 02 20 5a 5b 04 73 2f cf c7 74 73 |...... Z[.s/..ts| +00000030 28 5d 99 1e 28 09 3e ec b9 98 65 86 54 d9 d6 9c |(]..(.>...e.T...| +00000040 d0 b2 50 fe ef 86 ca |..P....| +[4251 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4252 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4253 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4254 11-19 05:23:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4255 11-19 05:23:07.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4256 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4257 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[4258 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4259 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[425a 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[425b 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[425c 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[425d 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[425e 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[425f 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4260 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4261 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4262 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4263 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4264 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4265 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4266 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4267 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4268 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4269 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[426a 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 gate 1574140987277135300 evaluation starts +[426b 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 signed by 0 principal evaluation starts (used [false]) +[426c 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 processing identity 0 with bytes of 1151ae0 +[426d 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[426e 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 principal evaluation fails +[426f 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198810 gate 1574140987277135300 evaluation fails +[4270 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4271 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4272 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4273 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 gate 1574140987278456100 evaluation starts +[4274 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 signed by 0 principal evaluation starts (used [false]) +[4275 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 processing identity 0 with bytes of 1151ae0 +[4276 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 principal matched by identity 0 +[4277 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[4278 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[4279 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 principal evaluation succeeds for identity 0 +[427a 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198d80 gate 1574140987278456100 evaluation succeeds +[427b 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[427c 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[427d 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[427e 11-19 05:23:07.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[427f 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[4280 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[4281 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[4282 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[4283 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4284 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4285 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4286 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4287 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4288 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4289 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[428a 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[428b 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 gate 1574140987285672000 evaluation starts +[428c 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 signed by 0 principal evaluation starts (used [false]) +[428d 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 processing identity 0 with bytes of 1151ae0 +[428e 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[428f 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 principal evaluation fails +[4290 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdec10 gate 1574140987285672000 evaluation fails +[4291 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4292 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4293 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4294 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 gate 1574140987289106100 evaluation starts +[4295 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 signed by 0 principal evaluation starts (used [false]) +[4296 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 processing identity 0 with bytes of 1151ae0 +[4297 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 principal matched by identity 0 +[4298 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[4299 11-19 05:23:07.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[429a 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 principal evaluation succeeds for identity 0 +[429b 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdf180 gate 1574140987289106100 evaluation succeeds +[429c 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[429d 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[429e 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[429f 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[42a0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42a1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[42a2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[42a3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[42a4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[42a5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[42a6 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42a7 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42a8 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[42a9 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[42aa 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[42ab 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42ac 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42ad 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[42ae 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 gate 1574140987295333200 evaluation starts +[42af 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 signed by 0 principal evaluation starts (used [false]) +[42b0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 processing identity 0 with bytes of 1151ae0 +[42b1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[42b2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 principal evaluation fails +[42b3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf51b0 gate 1574140987295333200 evaluation fails +[42b4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[42b5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[42b6 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42b7 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 gate 1574140987295580600 evaluation starts +[42b8 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 signed by 0 principal evaluation starts (used [false]) +[42b9 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 processing identity 0 with bytes of 1151ae0 +[42ba 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 principal matched by identity 0 +[42bb 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[42bc 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[42bd 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 principal evaluation succeeds for identity 0 +[42be 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf5720 gate 1574140987295580600 evaluation succeeds +[42bf 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42c0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[42c1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[42c2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[42c3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42c4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42c5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[42c6 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[42c7 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[42c8 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42c9 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42ca 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[42cb 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 gate 1574140987296343300 evaluation starts +[42cc 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 signed by 0 principal evaluation starts (used [false]) +[42cd 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 processing identity 0 with bytes of 1151ae0 +[42ce 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[42cf 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 principal evaluation fails +[42d0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273c8b0 gate 1574140987296343300 evaluation fails +[42d1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[42d2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[42d3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42d4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 gate 1574140987296581100 evaluation starts +[42d5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 signed by 0 principal evaluation starts (used [false]) +[42d6 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 processing identity 0 with bytes of 1151ae0 +[42d7 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 principal matched by identity 0 +[42d8 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[42d9 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[42da 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 principal evaluation succeeds for identity 0 +[42db 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00273ce20 gate 1574140987296581100 evaluation succeeds +[42dc 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42dd 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[42de 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[42df 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[42e0 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42e1 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[42e2 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42e3 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42e4 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42e5 11-19 05:23:07.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[42e6 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[42e7 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[42e8 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42e9 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42ea 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[42eb 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 gate 1574140987300359500 evaluation starts +[42ec 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 signed by 0 principal evaluation starts (used [false]) +[42ed 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 processing identity 0 with bytes of 1151ae0 +[42ee 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[42ef 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 principal evaluation fails +[42f0 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752200 gate 1574140987300359500 evaluation fails +[42f1 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[42f2 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[42f3 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42f4 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 gate 1574140987300867300 evaluation starts +[42f5 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 signed by 0 principal evaluation starts (used [false]) +[42f6 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 processing identity 0 with bytes of 1151ae0 +[42f7 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 principal matched by identity 0 +[42f8 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[42f9 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[42fa 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 principal evaluation succeeds for identity 0 +[42fb 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002752770 gate 1574140987300867300 evaluation succeeds +[42fc 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42fd 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[42fe 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[42ff 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4300 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[4301 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[4302 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[4303 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[4304 11-19 05:23:07.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4305 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4306 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4307 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4308 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4309 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[430a 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[430b 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[430c 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 gate 1574140987319108900 evaluation starts +[430d 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 signed by 0 principal evaluation starts (used [false]) +[430e 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 processing identity 0 with bytes of 1151ae0 +[430f 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4310 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 principal evaluation fails +[4311 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770600 gate 1574140987319108900 evaluation fails +[4312 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4313 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4314 11-19 05:23:07.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4315 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 gate 1574140987320011000 evaluation starts +[4316 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 signed by 0 principal evaluation starts (used [false]) +[4317 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 processing identity 0 with bytes of 1151ae0 +[4318 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 principal matched by identity 0 +[4319 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[431a 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[431b 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 principal evaluation succeeds for identity 0 +[431c 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002770b70 gate 1574140987320011000 evaluation succeeds +[431d 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[431e 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[431f 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4320 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4321 11-19 05:23:07.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4322 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4323 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4324 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4325 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4326 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4327 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4328 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4329 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[432a 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[432b 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[432c 11-19 05:23:07.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[432d 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[432e 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[432f 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[4330 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4331 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4332 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[4333 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4334 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4335 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4336 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4337 11-19 05:23:07.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4338 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +[4339 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +[433a 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[433b 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > > , Envelope: 166 bytes, Signature: 0 bytes +[433c 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[433d 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[433e 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[433f 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4340 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4341 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4342 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4343 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4344 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 gate 1574140987481915800 evaluation starts +[4345 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 signed by 0 principal evaluation starts (used [false]) +[4346 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 processing identity 0 with bytes of 1151ae0 +[4347 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4348 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 principal evaluation fails +[4349 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc880 gate 1574140987481915800 evaluation fails +[434a 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[434b 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[434c 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[434d 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 gate 1574140987482484100 evaluation starts +[434e 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 signed by 0 principal evaluation starts (used [false]) +[434f 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 processing identity 0 with bytes of 1151ae0 +[4350 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 principal matched by identity 0 +[4351 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 63 4c 0e 48 cf 61 5d 15 b5 6a 6b a8 ab 03 e3 |(cL.H.a]..jk....| +00000010 5c 60 b4 be 32 36 1e 3c 3a 65 15 6a 02 ca bb 11 |\`..26.<:e.j....| +[4352 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 91 1a a0 ad 15 f8 b8 b0 1d 14 |0E.!............| +00000010 6a 3e 30 93 a1 e3 7e c5 87 ac a7 05 de 41 ca 0f |j>0...~......A..| +00000020 2f b5 9d 20 a6 02 20 0a 0f 54 60 2d 3f 4f d4 42 |/.. .. ..T`-?O.B| +00000030 68 12 e0 f2 85 2e 23 fa c6 1f 37 fb 39 dc 48 d2 |h.....#...7.9.H.| +00000040 95 e8 7d 5b f4 e5 10 |..}[...| +[4353 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 principal evaluation succeeds for identity 0 +[4354 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edcdf0 gate 1574140987482484100 evaluation succeeds +[4355 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4356 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4357 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4358 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4359 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[435a 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[435b 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[435c 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[435d 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[435e 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[435f 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4360 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4361 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[4362 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4363 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4364 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4365 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[4366 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > alive: +[4367 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4368 11-19 05:23:07.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4369 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[436a 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[436b 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[436c 11-19 05:23:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[436d 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[436e 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[436f 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[4370 11-19 05:23:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4371 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4372 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4373 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da +[4374 11-19 05:23:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4375 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4376 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4377 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4378 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4379 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[437a 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[437b 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[437c 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[437d 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[437e 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 +[437f 11-19 05:23:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4380 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4381 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4382 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4383 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4384 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[4385 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4386 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4387 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4388 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4389 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[438a 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[438b 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[438c 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 gate 1574140987844630400 evaluation starts +[438d 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 signed by 0 principal evaluation starts (used [false]) +[438e 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 processing identity 0 with bytes of 1151ae0 +[438f 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4390 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 principal evaluation fails +[4391 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027959e0 gate 1574140987844630400 evaluation fails +[4392 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4393 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4394 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4395 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 gate 1574140987844893400 evaluation starts +[4396 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 signed by 0 principal evaluation starts (used [false]) +[4397 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 processing identity 0 with bytes of 1151ae0 +[4398 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 principal matched by identity 0 +[4399 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 7e ba 35 e2 56 b6 37 64 56 45 51 0f 24 7d a3 |.~.5.V.7dVEQ.$}.| +00000010 4f 7c db 5c 8f fe 61 22 ba fb f7 84 87 8f eb 7f |O|.\..a"........| +[439a 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b c7 da 1d 4c 2f 53 2d f8 25 9d 00 |0D. K...L/S-.%..| +00000010 b2 be 4f 35 19 b6 3c f5 b1 33 2e c4 16 69 62 ef |..O5..<..3...ib.| +00000020 bc 01 d5 17 02 20 68 eb 07 98 1b 84 a1 17 79 eb |..... h.......y.| +00000030 c5 40 da 93 42 9a b9 f5 c2 88 76 16 7a 7a 9e 8c |.@..B.....v.zz..| +00000040 4a 8e 9d 82 0e 93 |J.....| +[439b 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 principal evaluation succeeds for identity 0 +[439c 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002795f50 gate 1574140987844893400 evaluation succeeds +[439d 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[439e 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[439f 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[43a0 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[43a1 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[43a2 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[43a3 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[43a4 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[43a5 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[43a6 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43a7 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43a8 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43a9 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" +[43aa 11-19 05:23:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43ab 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43ac 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43ad 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[43ae 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:0\223\241\343~\305\207\254\247\005\336A\312\017/\265\235 \246\002 \n\017T`-?O\324Bh\022\340\362\205.#\372\306\0377\3739\334H\322\225\350}[\364\345\020" > alive: +[43af 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[43b0 11-19 05:23:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43b1 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43b2 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43b3 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43b4 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43b5 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43b6 11-19 05:23:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43b7 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43b8 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43b9 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43ba 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43bb 11-19 05:23:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43bc 11-19 05:23:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43bd 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" secret_envelope:|\254$\264N&t\326N\275 \306\222\322\376Ra\265\255\315=\231Y\302\276Yg\321\3632\353" > > > , Envelope: 270 bytes, Signature: 0 bytes +[43be 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43bf 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" secret_envelope:|\254$\264N&t\326N\275 \306\222\322\376Ra\265\255\315=\231Y\302\276Yg\321\3632\353" > > > , Envelope: 270 bytes, Signature: 0 bytes +[43c0 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[43c1 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 f1 65 c4 d6 ae b1 02 42 9b 90 fa 0d 90 c1 e5 |..e.....B.......| +00000010 09 f5 72 3f 2b df 03 dd fe 7e 70 54 55 ec a5 9b |..r?+....~pTU...| +[43c2 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 d0 ba e6 d9 d5 a7 bd cc 56 79 f6 |0D. y........Vy.| +00000010 47 76 c8 55 4e 5e 54 cf 7a 26 ab 4b d6 ac 3b 7e |Gv.UN^T.z&.K..;~| +00000020 d0 99 b1 d3 02 20 2a 1c ae d1 1a ad c3 a9 45 d7 |..... *.......E.| +00000030 6c 61 fd 14 68 e0 4e d3 f2 81 ec 56 44 63 00 fd |la..h.N....VDc..| +00000040 d1 86 09 64 92 a1 |...d..| +[43c3 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[43c4 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 88 2a 18 bb 28 9e b8 5d 28 4c 17 |0D. Y.*..(..](L.| +00000010 bb 43 65 82 04 13 16 cb d6 97 2f 1d c5 7b 69 8e |.Ce......./..{i.| +00000020 58 48 7e a2 02 20 3e 7c ac 24 b4 4e 26 74 d6 4e |XH~.. >|.$.N&t.N| +00000030 bd 20 c6 92 d2 fe 52 61 b5 ad cd 3d 99 59 c2 be |. ....Ra...=.Y..| +00000040 59 67 d1 f3 32 eb |Yg..2.| +[43c5 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[43c6 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[43c7 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[43c8 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[43c9 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[43ca 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43cb 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43cc 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43cd 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" +[43ce 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43cf 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d0 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[43d1 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0D\002 y\320\272\346\331\325\247\275\314Vy\366Gv\310UN^T\317z&\253K\326\254;~\320\231\261\323\002 *\034\256\321\032\255\303\251E\327la\375\024h\340N\323\362\201\354VDc\000\375\321\206\td\222\241" secret_envelope:|\254$\264N&t\326N\275 \306\222\322\376Ra\265\255\315=\231Y\302\276Yg\321\3632\353" > > alive: +[43d2 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[43d3 11-19 05:23:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43d4 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45776 +[43d5 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003f5c460 +[43d6 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[43d7 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[43d8 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[43d9 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[43da 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 f8 48 a0 a2 c5 4b 2a 93 17 fd e2 cd 8c a2 69 |..H...K*.......i| +00000010 21 a3 80 27 5d 70 eb dd cb 18 c3 7c ef 59 0d cc |!..']p.....|.Y..| +[43db 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 a4 75 6a 11 e1 82 42 49 5e a2 |0E.!...uj...BI^.| +00000010 d1 54 8a 51 a6 2e 17 89 0c 94 fa 22 db 46 f8 ff |.T.Q.......".F..| +00000020 8f a8 4e 6b 00 02 20 2b 2c d4 36 6d 8e 28 5a 28 |..Nk.. +,.6m.(Z(| +00000030 66 2b 20 b9 64 22 7d e9 64 db f7 0c 83 6f cb 41 |f+ .d"}.d....o.A| +00000040 c7 34 77 e7 3e 05 4b |.4w.>.K| +[43dc 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[43dd 11-19 05:23:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003527180, header 0xc003f5c870 +[43de 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[43df 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][3701af05] processing txid: 3701af0596581299c94979206d3a8f011ce5fe5d78d191ebddb773279bf98998 +[43e0 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][3701af05] Entry chaincode: name:"cscc" +[43e1 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> INFO [][3701af05] Entry chaincode: name:"cscc" +[43e2 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[43e3 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[43e4 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 f8 48 a0 a2 c5 4b 2a 93 17 fd e2 cd 8c a2 69 |..H...K*.......i| +00000010 21 a3 80 27 5d 70 eb dd cb 18 c3 7c ef 59 0d cc |!..']p.....|.Y..| +[43e5 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 a4 75 6a 11 e1 82 42 49 5e a2 |0E.!...uj...BI^.| +00000010 d1 54 8a 51 a6 2e 17 89 0c 94 fa 22 db 46 f8 ff |.T.Q.......".F..| +00000020 8f a8 4e 6b 00 02 20 2b 2c d4 36 6d 8e 28 5a 28 |..Nk.. +,.6m.(Z(| +00000030 66 2b 20 b9 64 22 7d e9 64 db f7 0c 83 6f cb 41 |f+ .d"}.d....o.A| +00000040 c7 34 77 e7 3e 05 4b |.4w.>.K| +[43e6 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [3701af05] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[43e7 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [3701af05] notifying Txid:3701af0596581299c94979206d3a8f011ce5fe5d78d191ebddb773279bf98998, channelID: +[43e8 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[43e9 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> INFO [][3701af05] Exit chaincode: name:"cscc" (2ms) +[43ea 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][3701af05] Exit +[43eb 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45776 +[43ec 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45776 grpc.code=OK grpc.call_duration=10.1217ms +[43ed 11-19 05:23:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[43ee 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting +[43ef 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true +[43f0 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[43f1 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F893EEE3FB999EEC1510121801 +[43f2 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A439EE89422A49047C60338D20F58F0ED6FCEEEB10183ADAC1B971D82FF3F754 +[43f3 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering +[43f4 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[43f5 11-19 05:23:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151038 +[43f6 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CAAED8099B66F416708025AD57C06950F593D1BE052B0701E6167FEEF89CC28 +[43f7 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[43f8 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[43f9 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[43fa 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[43fb 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43fc 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43fd 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43fe 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43ff 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[4400 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4401 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4402 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[4403 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4404 11-19 05:23:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4405 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4406 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4407 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4408 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4409 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[440a 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[440b 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[440c 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[440d 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[440e 11-19 05:23:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[440f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4410 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4411 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4412 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4413 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[4414 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4415 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4416 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4417 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4418 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4419 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[441a 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[441b 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 gate 1574140990375035400 evaluation starts +[441c 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 signed by 0 principal evaluation starts (used [false]) +[441d 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 processing identity 0 with bytes of 1151ae0 +[441e 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[441f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 principal evaluation fails +[4420 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042213c0 gate 1574140990375035400 evaluation fails +[4421 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4422 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4423 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4424 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 gate 1574140990375398600 evaluation starts +[4425 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 signed by 0 principal evaluation starts (used [false]) +[4426 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 processing identity 0 with bytes of 1151ae0 +[4427 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 principal matched by identity 0 +[4428 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 10 c2 41 01 11 56 a1 91 b3 87 7f 5a 4f ae c8 |...A..V.....ZO..| +00000010 5d dc 05 04 e3 76 02 e9 90 6b b6 ff 44 9a 08 81 |]....v...k..D...| +[4429 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 f9 d7 3e 66 3c e1 27 bd f6 dc 9a |0D. X..>f<.'....| +00000010 9f 7b 75 1d 03 3f 7a 9c 23 ec 39 86 cf 63 37 34 |.{u..?z.#.9..c74| +00000020 14 c1 3a 4e 02 20 62 18 3b 5e 7e 95 0d 85 96 86 |..:N. b.;^~.....| +00000030 ce 60 21 cc 5d db 0f d0 b8 cf 28 55 31 e2 e5 bc |.`!.].....(U1...| +00000040 ed 4e 99 9c c5 1e |.N....| +[442a 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 principal evaluation succeeds for identity 0 +[442b 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004221930 gate 1574140990375398600 evaluation succeeds +[442c 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[442d 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[442e 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[442f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4430 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4431 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4432 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4433 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4434 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4435 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4436 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4437 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4438 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4439 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[443a 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[443b 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[443c 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[443d 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[443e 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[443f 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4440 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4441 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4442 11-19 05:23:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4443 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4444 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4445 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4446 11-19 05:23:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4447 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4448 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4449 11-19 05:23:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[444a 11-19 05:23:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[444b 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[444c 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[444d 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store +[444e 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e ab 4d 25 44 be 79 41 27 8d 64 51 7e 10 02 bd |..M%D.yA'.dQ~...| +00000010 48 e0 12 2f b8 34 63 31 e4 89 7f 67 c0 1c cd 38 |H../.4c1...g...8| +[444f 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 f0 53 a4 96 9d f4 da 16 9a 24 5c |0D. Y.S.......$\| +00000010 1f 91 4a e6 1f 04 00 5e a1 ca b0 36 63 26 cc 2b |..J....^...6c&.+| +00000020 25 ff 8e ec 02 20 5d 60 ae 8e 94 07 9f 79 de 0a |%.... ]`.....y..| +00000030 30 63 5d bd a7 84 26 5a c4 b9 e4 03 d2 79 76 a5 |0c]...&Z.....yv.| +00000040 81 6d f2 fd 19 4d |.m...M| +[4450 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4451 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4452 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4453 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4454 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[4455 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4456 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4457 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4458 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4459 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[445a 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[445b 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[445c 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[445d 11-19 05:23:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[445e 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[445f 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4460 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4461 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4462 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4463 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4464 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4465 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4466 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4467 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4468 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4469 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[446a 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[446b 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[446c 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[446d 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[446e 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[446f 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4470 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4471 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4472 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4473 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4474 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4475 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4476 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4477 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4478 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4479 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[447a 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[447b 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[447c 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[447d 11-19 05:23:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[447e 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[447f 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4480 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4481 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4482 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4483 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4484 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4485 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4486 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4487 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store +[4488 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4489 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[448a 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[448b 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[448c 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[448d 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[448e 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[448f 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 gate 1574140990817218000 evaluation starts +[4490 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 signed by 0 principal evaluation starts (used [false]) +[4491 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 processing identity 0 with bytes of 1151ae0 +[4492 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4493 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 principal evaluation fails +[4494 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042920d0 gate 1574140990817218000 evaluation fails +[4495 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4496 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4497 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4498 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 gate 1574140990817521400 evaluation starts +[4499 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 signed by 0 principal evaluation starts (used [false]) +[449a 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 processing identity 0 with bytes of 1151ae0 +[449b 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 principal matched by identity 0 +[449c 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fa 22 f8 cc 26 3e 3a 42 9f e3 0e ba b1 ce 5f |E."..&>:B......_| +00000010 be 5d 6a 8a 4a 17 6c 01 16 8f 49 db dc 13 fc 4e |.]j.J.l...I....N| +[449d 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b bb 10 b1 72 e5 49 9e 39 67 bf |0E.!.....r.I.9g.| +00000010 ef 3d 27 6f b8 06 63 b4 64 23 8c dd f0 cf 2c b3 |.='o..c.d#....,.| +00000020 9a 98 09 f4 37 02 20 28 71 7b 35 93 91 85 81 99 |....7. (q{5.....| +00000030 d8 0b 55 fd 23 bc 98 c3 6b bc df 79 41 94 8e dc |..U.#...k..yA...| +00000040 8e 8e 92 57 6a 4a 1e |...WjJ.| +[449e 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 principal evaluation succeeds for identity 0 +[449f 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292640 gate 1574140990817521400 evaluation succeeds +[44a0 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[44a1 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[44a2 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[44a3 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[44a4 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44a5 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[44a6 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[44a7 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[44a8 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[44a9 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44aa 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44ab 11-19 05:23:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44ac 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44ad 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44ae 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44af 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44b0 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44b1 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44b2 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44b3 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[44b4 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44b5 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[44b6 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44b7 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44b8 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44b9 11-19 05:23:10.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44ba 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44bb 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44bc 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44bd 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44be 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44bf 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44c0 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44c1 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44c2 11-19 05:23:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44c3 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.5:45784 +[44c4 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004316050 +[44c5 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[44c6 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[44c7 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc} +[44c8 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[44c9 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 81 6f e1 31 fe 15 61 41 03 27 50 0d 31 e7 93 |..o.1..aA.'P.1..| +00000010 4e 2b a5 33 70 a8 5f 60 bd 8e 02 16 f0 09 da 6c |N+.3p._`.......l| +[44ca 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 d9 15 c2 70 51 b1 77 7c 91 44 12 |0D. ....pQ.w|.D.| +00000010 74 de 8a 9a 31 72 68 0d d8 41 a8 7d fa b2 21 60 |t...1rh..A.}..!`| +00000020 b0 e1 d9 25 02 20 60 83 b9 55 62 71 e5 68 05 b0 |...%. `..Ubq.h..| +00000030 cb da 9c b5 db ac 27 44 b9 40 7b 56 d8 38 83 85 |......'D.@{V.8..| +00000040 2d 1d e5 cb 3d 7e |-...=~| +[44cb 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[44cc 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003527f80, header 0xc004316460 +[44cd 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[44ce 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU [][6c97ea83] processing txid: 6c97ea83b812671201bdb1d555580c741ffb587961199e8796badacb879b6773 +[44cf 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU [][6c97ea83] Entry chaincode: name:"qscc" +[44d0 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> INFO [][6c97ea83] Entry chaincode: name:"qscc" +[44d1 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[44d2 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[44d3 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[44d4 11-19 05:23:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[44d5 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[44d6 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[44d7 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[44d8 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44d9 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE----- +[44da 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 gate 1574140990861087200 evaluation starts +[44db 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 signed by 0 principal evaluation starts (used [false]) +[44dc 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 processing identity 0 with bytes of 1151ae0 +[44dd 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[44de 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[44df 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[44e0 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08CC80DAE2DB999EEC151039 +[44e1 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 06C2EAB0631716D57BA34E4F845B86C89B6BFBDA9689E7DE6ACCEED74854DEED +[44e2 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[44e3 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[44e4 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[44e5 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[44e6 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44e7 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[44e8 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 principal matched by identity 0 +[44e9 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 81 6f e1 31 fe 15 61 41 03 27 50 0d 31 e7 93 |..o.1..aA.'P.1..| +00000010 4e 2b a5 33 70 a8 5f 60 bd 8e 02 16 f0 09 da 6c |N+.3p._`.......l| +[44ea 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 d9 15 c2 70 51 b1 77 7c 91 44 12 |0D. ....pQ.w|.D.| +00000010 74 de 8a 9a 31 72 68 0d d8 41 a8 7d fa b2 21 60 |t...1rh..A.}..!`| +00000020 b0 e1 d9 25 02 20 60 83 b9 55 62 71 e5 68 05 b0 |...%. `..Ubq.h..| +00000030 cb da 9c b5 db ac 27 44 b9 40 7b 56 d8 38 83 85 |......'D.@{V.8..| +00000040 2d 1d e5 cb 3d 7e |-...=~| +[44eb 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[44ec 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44ed 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 principal evaluation succeeds for identity 0 +[44ee 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043246b0 gate 1574140990861087200 evaluation succeeds +[44ef 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[44f0 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[44f1 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[44f2 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[44f3 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[44f4 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[44f7 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44f8 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU [6c97ea83] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[44f9 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU [6c97ea83] notifying Txid:6c97ea83b812671201bdb1d555580c741ffb587961199e8796badacb879b6773, channelID: +[44f5 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[44fa 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44fc 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[44fb 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[44fe 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[44ff 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4500 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4501 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[44fd 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> INFO [][6c97ea83] Exit chaincode: name:"qscc" (14ms) +[4502 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU [][6c97ea83] Exit +[4503 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.5:45784 +[4504 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +[4505 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +[4506 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45784 grpc.code=OK grpc.call_duration=19.365ms +[44f6 11-19 05:23:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[4507 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4508 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4509 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[450a 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[450b 11-19 05:23:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[450c 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[450d 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[450e 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[450f 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4510 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[4511 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +[4512 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +[4513 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4514 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4515 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4516 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4517 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4518 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4519 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[451a 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store +[451b 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 c2 ea b0 63 17 16 d5 7b a3 4e 4f 84 5b 86 c8 |....c...{.NO.[..| +00000010 9b 6b fb da 96 89 e7 de 6a cc ee d7 48 54 de ed |.k......j...HT..| +[451c 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 61 f8 f7 de fe 85 8b 81 1b 53 |0E.!..a........S| +00000010 10 e1 fe c0 13 1d 91 ba 3f fb 78 8d 41 70 95 b5 |........?.x.Ap..| +00000020 d8 3b b5 05 8e 02 20 72 e3 bf 7f 73 74 f3 e9 7b |.;.... r...st..{| +00000030 be b9 e5 5d 1f 6f 92 4b 60 82 98 e8 b2 6d 85 47 |...].o.K`....m.G| +00000040 7d 76 26 a8 52 8c 3c |}v&.R.<| +[451d 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[451e 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a6 8a 8f 61 5c f3 5e 77 d7 f2 19 |0D. &...a\.^w...| +00000010 82 40 d2 28 c7 52 85 5b 21 e7 b0 c2 64 39 75 8d |.@.(.R.[!...d9u.| +00000020 0b 58 33 20 02 20 2c 6d 95 89 23 4a d0 af f0 92 |.X3 . ,m..#J....| +00000030 e8 17 af e2 db b5 fd e8 24 ad 50 33 9b 43 14 1d |........$.P3.C..| +00000040 43 7b b0 6d 74 11 |C{.mt.| +[451f 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4520 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4521 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4522 11-19 05:23:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4523 11-19 05:23:10.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[4524 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4525 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4526 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[4527 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4529 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[452a 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4528 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[452b 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[452c 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[452d 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[452e 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[452f 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4530 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4531 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4532 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4533 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4534 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4535 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4536 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4537 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4538 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 gate 1574140991275428200 evaluation starts +[4539 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[453a 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 signed by 0 principal evaluation starts (used [false]) +[453b 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 processing identity 0 with bytes of 1151ae0 +[453c 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[453d 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 principal evaluation fails +[453e 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355170 gate 1574140991275428200 evaluation fails +[453f 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4540 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4541 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4542 11-19 05:23:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 gate 1574140991279759000 evaluation starts +[4543 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 signed by 0 principal evaluation starts (used [false]) +[4544 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 processing identity 0 with bytes of 1151ae0 +[4545 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 principal matched by identity 0 +[4546 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[4547 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[4548 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 principal evaluation succeeds for identity 0 +[4549 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043556e0 gate 1574140991279759000 evaluation succeeds +[454a 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[454b 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[454c 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[454d 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[454e 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[454f 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[4550 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[4551 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[4552 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4553 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4554 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4555 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4556 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4557 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4558 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4559 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[455a 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 gate 1574140991288090900 evaluation starts +[455b 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 signed by 0 principal evaluation starts (used [false]) +[455c 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 processing identity 0 with bytes of 1151ae0 +[455d 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[455e 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 principal evaluation fails +[455f 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9570 gate 1574140991288090900 evaluation fails +[4560 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4561 11-19 05:23:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4562 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4563 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 gate 1574140991290387600 evaluation starts +[4564 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 signed by 0 principal evaluation starts (used [false]) +[4565 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 processing identity 0 with bytes of 1151ae0 +[4566 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 principal matched by identity 0 +[4567 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[4568 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[4569 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 principal evaluation succeeds for identity 0 +[456a 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9ae0 gate 1574140991290387600 evaluation succeeds +[456b 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[456c 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[456d 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[456e 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[456f 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4570 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4571 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4572 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4573 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4574 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4575 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4576 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4577 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4578 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4579 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[457a 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 gate 1574140991297374900 evaluation starts +[457b 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 signed by 0 principal evaluation starts (used [false]) +[457c 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 processing identity 0 with bytes of 1151ae0 +[457d 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[457e 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 principal evaluation fails +[457f 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c8ec0 gate 1574140991297374900 evaluation fails +[4580 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4581 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4582 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4583 11-19 05:23:11.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 gate 1574140991299830500 evaluation starts +[4584 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 signed by 0 principal evaluation starts (used [false]) +[4585 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 processing identity 0 with bytes of 1151ae0 +[4586 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 principal matched by identity 0 +[4587 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[4588 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[4589 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 principal evaluation succeeds for identity 0 +[458a 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c9430 gate 1574140991299830500 evaluation succeeds +[458b 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[458c 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[458d 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[458e 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[458f 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[4590 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[4591 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[4592 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[4593 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4594 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4595 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4596 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4597 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4598 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4599 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[459a 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[459b 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 gate 1574140991306475900 evaluation starts +[459c 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 signed by 0 principal evaluation starts (used [false]) +[459d 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 processing identity 0 with bytes of 1151ae0 +[459e 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[459f 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 principal evaluation fails +[45a0 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e52c0 gate 1574140991306475900 evaluation fails +[45a1 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[45a2 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[45a3 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[45a4 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 gate 1574140991308525200 evaluation starts +[45a5 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 signed by 0 principal evaluation starts (used [false]) +[45a6 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 processing identity 0 with bytes of 1151ae0 +[45a7 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 principal matched by identity 0 +[45a8 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[45a9 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[45aa 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 principal evaluation succeeds for identity 0 +[45ab 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5830 gate 1574140991308525200 evaluation succeeds +[45ac 11-19 05:23:11.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[45ad 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[45ae 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[45af 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[45b0 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45b1 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[45b2 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa e1 13 8b d5 18 86 3c 31 51 ad 2d 92 40 b3 65 |.......<1Q.-.@.e| +00000010 27 74 46 aa 56 44 ae 51 82 43 1c 41 fc af 54 0e |'tF.VD.Q.C.A..T.| +[45b3 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 a7 80 57 ad 03 9e 79 b8 ba 65 21 |0D. T..W...y..e!| +00000010 3e ee 65 e4 66 44 35 eb 9d 0f c2 c5 a0 75 08 fd |>.e.fD5......u..| +00000020 32 0c ab 6f 02 20 15 de 8d 74 26 a8 ab 3a 97 1a |2..o. ...t&..:..| +00000030 d9 f5 be 53 de 51 12 16 c4 fa e0 03 14 d2 e4 4a |...S.Q.........J| +00000040 4f 5b 34 7e be c3 |O[4~..| +[45b4 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 1a f2 7b b3 10 ae de 53 f5 95 7a a1 ef 58 15 |5..{....S..z..X.| +00000010 66 c0 32 69 e4 2a b1 47 82 9a f9 53 cc 47 52 35 |f.2i.*.G...S.GR5| +[45b5 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 b3 04 02 07 b2 bd c4 cb ca 16 |0E.!............| +00000010 a1 f7 ae 9a 78 5a e7 96 82 1e e4 17 c0 e5 db f6 |....xZ..........| +00000020 cb ba 68 5a f6 02 20 1e 01 fc 53 51 a3 0f a8 4a |..hZ.. ...SQ...J| +00000030 30 05 7d b2 c4 9c 45 08 35 56 d8 0d a7 5d ea ca |0.}...E.5V...]..| +00000040 d2 f4 89 0d 43 61 5a |....CaZ| +[45b6 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b7 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b8 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[45b9 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[45ba 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[45bb 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[45bc 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[45bd 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[45be 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 gate 1574140991314536400 evaluation starts +[45bf 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 signed by 0 principal evaluation starts (used [false]) +[45c0 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 processing identity 0 with bytes of 1151ae0 +[45c1 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[45c2 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 principal evaluation fails +[45c3 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401860 gate 1574140991314536400 evaluation fails +[45c4 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[45c5 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[45c6 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[45c7 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 gate 1574140991316142500 evaluation starts +[45c8 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 signed by 0 principal evaluation starts (used [false]) +[45c9 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 processing identity 0 with bytes of 1151ae0 +[45ca 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 principal matched by identity 0 +[45cb 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 54 f8 5c 71 b4 b5 80 95 2c 9c d0 cd 18 92 97 |QT.\q....,......| +00000010 9c 6f 0e de 22 af 03 c1 3e 5a 7b f7 8b a8 bf 3c |.o.."...>Z{....<| +[45cc 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 85 71 66 4e 58 22 d8 55 6a c1 |0E.!...qfNX".Uj.| +00000010 0a fc ab 53 69 50 dc 3c 43 f5 db 03 1b 51 82 d7 |...SiP...-y..Z| +00000030 16 de b1 f2 3f 2c e1 9c 26 f0 61 23 17 eb c3 f8 |....?,..&.a#....| +00000040 8b 25 3a 61 f5 02 63 |.%:a..c| +[45cd 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 principal evaluation succeeds for identity 0 +[45ce 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004401dd0 gate 1574140991316142500 evaluation succeeds +[45cf 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[45d0 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[45d1 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[45d2 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[45d3 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45d4 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45d5 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[45d6 11-19 05:23:11.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[45d7 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[45d8 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[45d9 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[45da 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[45db 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 gate 1574140991320664400 evaluation starts +[45dc 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 signed by 0 principal evaluation starts (used [false]) +[45dd 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 processing identity 0 with bytes of 1151ae0 +[45de 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[45df 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 principal evaluation fails +[45e0 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004414f60 gate 1574140991320664400 evaluation fails +[45e1 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[45e2 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[45e3 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[45e4 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 gate 1574140991322174100 evaluation starts +[45e5 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 signed by 0 principal evaluation starts (used [false]) +[45e6 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 processing identity 0 with bytes of 1151ae0 +[45e7 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 principal matched by identity 0 +[45e8 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e ce c8 e7 ef 53 6b db f6 d4 83 d1 53 6d 0d |......Sk.....Sm.| +00000010 5b ec 05 0e 88 61 62 2f 7a 4e a3 cb 92 ce 9c 37 |[....ab/zN.....7| +[45e9 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 83 3f 11 80 cc 3a 48 03 cc 8c |0E.!...?...:H...| +00000010 e7 4e c4 5d 43 fa ed 74 14 a0 e7 e1 9e ef f6 5e |.N.]C..t.......^| +00000020 e9 97 94 ff 8d 02 20 38 fb 11 31 1f 31 95 67 ba |...... 8..1.1.g.| +00000030 2d 96 87 81 af 48 41 a9 c2 46 e1 59 25 ef a6 eb |-....HA..F.Y%...| +00000040 b0 cc d8 82 da 9d 34 |......4| +[45ea 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 principal evaluation succeeds for identity 0 +[45eb 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044154d0 gate 1574140991322174100 evaluation succeeds +[45ec 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[45ed 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[45ee 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[45ef 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[45f0 11-19 05:23:11.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45f1 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45f2 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45f3 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45f4 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45f5 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45f6 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45f7 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45f8 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45f9 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45fa 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 +[45fb 11-19 05:23:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45fc 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45fd 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45fe 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[45ff 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4600 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4601 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[4602 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4603 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4604 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:41512 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[4605 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[4606 11-19 05:23:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4607 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4608 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4609 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[460a 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[460b 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store +[460c 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[460d 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[460e 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[460f 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4610 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4611 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4612 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4613 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 gate 1574140991483127300 evaluation starts +[4614 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 signed by 0 principal evaluation starts (used [false]) +[4615 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 processing identity 0 with bytes of 1151ae0 +[4616 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4617 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 principal evaluation fails +[4618 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443320 gate 1574140991483127300 evaluation fails +[4619 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[461a 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[461b 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[461c 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 gate 1574140991483526400 evaluation starts +[461d 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 signed by 0 principal evaluation starts (used [false]) +[461e 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 processing identity 0 with bytes of 1151ae0 +[461f 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 principal matched by identity 0 +[4620 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf c8 e6 82 d6 d8 c6 68 22 98 bc 25 97 4d 50 8b |.......h"..%.MP.| +00000010 1e e5 2f 92 ed 85 1d 62 63 e2 10 e2 83 cc 14 13 |../....bc.......| +[4621 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 83 9e 88 c4 9f 0b 97 8a 0f b5 68 |0D. c..........h| +00000010 95 a0 5d 5a 16 6e 54 31 8f ea 3b 4d de 0d a2 0e |..]Z.nT1..;M....| +00000020 9a 7c 3d 08 02 20 4c c5 4c ae 00 19 7b 1b bb ad |.|=.. L.L...{...| +00000030 b0 3c 53 5a 54 b7 cd cd 93 dd 58 95 62 5d 10 c9 |. DEBU 0xc004443890 principal evaluation succeeds for identity 0 +[4623 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443890 gate 1574140991483526400 evaluation succeeds +[4624 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4625 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4626 11-19 05:23:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4627 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4628 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4629 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[462a 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[462b 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[462c 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[462d 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[462e 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[462f 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4630 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" +[4631 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4632 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4633 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4634 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[4635 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: +[4636 11-19 05:23:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4637 11-19 05:23:11.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting diff --git a/hyperledger_fabric/v1.4.4/scripts/download_images.sh b/hyperledger_fabric/v1.4.4/scripts/download_images.sh new file mode 100644 index 00000000..8613b39e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/download_images.sh @@ -0,0 +1,69 @@ +#!/usr/bin/env bash + +# peer/orderer/ca/ccenv/tools/javaenv/baseos: 1.4, 1.4.0, 1.4.1, 2.0.0, latest +# baseimage (runtime for golang chaincode)/couchdb: 0.4.15, latest +# Noted: +# * the fabric-baseos 1.4/2.0 tags are not available at dockerhub yet, only latest/0.4.15 now +# * the fabric-nodeenv is not available at dockerhub yet + +# In core.yaml, it requires: +# * fabric-ccenv:$(PROJECT_VERSION) +# * fabric-baseos:$(PROJECT_VERSION) +# * fabric-javaenv:latest +# * fabric-nodeenv:latest + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +pull_image() { + IMG=$1 + #if [ -z "$(docker images -q ${IMG} 2> /dev/null)" ]; then # not exist + # docker pull ${IMG} + #else + # echo "${IMG} already exist locally" + #fi + docker pull ${IMG} +} + +echo "Downloading images from DockerHub... need a while" + +# TODO: we may need some checking on pulling result? +echo "=== Pulling yeasy/hyperledger-fabric-* images with tag ${FABRIC_IMG_TAG}... ===" +for IMG in base peer orderer ca; do + pull_image yeasy/hyperledger-fabric-${IMG}:$FABRIC_IMG_TAG & +done + +pull_image yeasy/hyperledger-fabric:$FABRIC_IMG_TAG + +# pull_image yeasy/blockchain-explorer:0.1.0-preview # TODO: wait for official images +echo "=== Pulling fabric core images ${FABRIC_IMG_TAG} from fabric repo... ===" +for IMG in peer orderer ca ccenv tools baseos javaenv nodeenv; do + pull_image hyperledger/fabric-${IMG}:$FABRIC_IMG_TAG & # e.g., v1.4.4 +done + +# core.yaml requires a PROJECT_VERSION tag, only need when testing latest code +docker tag hyperledger/fabric-ccenv:$FABRIC_IMG_TAG hyperledger/fabric-ccenv:${PROJECT_VERSION} + +echo "=== Pulling base/3rd-party images with tag ${BASE_IMG_TAG} from fabric repo... ===" +for IMG in baseimage baseos couchdb kafka zookeeper; do + pull_image hyperledger/fabric-${IMG}:$BASE_IMG_TAG & # e.g., 0.4.18 +done + +if [ ${PROJECT_VERSION} == "2.0.0" ]; then + pull_image hyperledger/fabric-javaenv:latest # core.yaml requires a latest tag + # core.yaml requires a latest tag, but nodeenv is not available in docker hub yet + # pull_image hyperledger/fabric-nodeenv:latest + pull_image hyperledger/fabric-baseos:latest # fabric-baseos does not have 1.4/2.0 tag yet, but core.yaml requires a PROJECT_VERSION tag + docker tag hyperledger/fabric-baseos:latest hyperledger/fabric-baseos:${PROJECT_VERSION} +fi + +echo "Image pulling done, now can startup the network using make start..." + +exit 0 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/scripts/env_cleanup.sh b/hyperledger_fabric/v1.4.4/scripts/env_cleanup.sh new file mode 100644 index 00000000..c9ec1766 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/env_cleanup.sh @@ -0,0 +1,17 @@ +#!/usr/bin/env bash + +# This script will remove all containers and hyperledger related images + +echo "Clean up all containers..." +docker rm -f `docker ps -qa` + +echo "Clean up all chaincode images..." +docker rmi -f $(docker images |grep 'dev-peer'|awk '{print $3}') + +echo "Clean up all hyperledger related images..." +docker rmi -f $(docker images |grep 'hyperledger'|awk '{print $3}') + +echo "Clean up dangling images..." +docker rmi $(docker images -q -f dangling=true) + +echo "Env cleanup done!" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/scripts/env_setup.sh b/hyperledger_fabric/v1.4.4/scripts/env_setup.sh new file mode 100644 index 00000000..58888918 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/env_setup.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# Install docker on Ubuntu/Debian system + +install_docker() { + echo "Install Docker..." + wget -qO- https://get.docker.com/ | sh + sudo service docker stop + #nohup sudo docker daemon --api-cors-header="*" -H tcp://0.0.0.0:2375 -H unix:///var/run/docker.sock& + echo "Docker Installation Done" +} + +install_docker_compose() { + echo "Install Docker-Compose..." + command -v "curl" >/dev/null 2>&1 || sudo apt-get update && apt-get install curl -y + curl -L https://github.com/docker/compose/releases/download/1.17.0/docker-compose-`uname -s`-`uname -m` > /usr/local/bin/docker-compose + sudo chmod +x /usr/local/bin/docker-compose + docker-compose --version + echo "Docker-Compose Installation Done" +} + +command -v "docker" >/dev/null 2>&1 && echo "Docker already installed" || install_docker + +command -v "docker-compose" >/dev/null 2>&1 && echo "Docker-Compose already installed" || install_docker_compose + +command -v "jq" >/dev/null 2>&1 && echo "jq already installed" || sudo apt-get install jq + + +echo "Create default docker network for usage" +docker network create hlf_net diff --git a/hyperledger_fabric/v1.4.4/scripts/func.sh b/hyperledger_fabric/v1.4.4/scripts/func.sh new file mode 100644 index 00000000..19df360e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/func.sh @@ -0,0 +1,978 @@ +#!/usr/bin/env bash + +echo_r () { + [ $# -ne 1 ] && return 0 + echo -e "\033[31m$1\033[0m" +} +echo_g () { + [ $# -ne 1 ] && return 0 + echo -e "\033[32m$1\033[0m" +} +echo_y () { + [ $# -ne 1 ] && return 0 + echo -e "\033[33m$1\033[0m" +} +echo_b () { + [ $# -ne 1 ] && return 0 + echo -e "\033[34m$1\033[0m" +} + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# Verify $1 is not 0, then output error msg $2 and exit +verifyResult () { + if [ $1 -ne 0 ] ; then + echo "$2" + echo_r "=== ERROR !!! FAILED to execute End-2-End Scenario ===" + exit 1 + fi +} + +# set env to use orderOrg's identity +setOrdererEnvs () { + export CORE_PEER_LOCALMSPID="OrdererMSP" + export CORE_PEER_MSPCONFIGPATH=${ORDERER0_ADMIN_MSP} + export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER0_TLS_ROOTCERT} + #t="\${ORG${org}_PEER${peer}_URL}" && CORE_PEER_ADDRESS=`eval echo $t` +} + +# Set global env variables for fabric cli, after setting: +# client is the admin as given org +# TLS root cert is configured to given peer's tls ca +# remote peer address is configured to given peer's + +# CORE_PEER_LOCALMSPID=Org1MSP # local msp id to use +# CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp # local msp path to use +# CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt # local trusted tls ca cert +# CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # remote peer to send proposal to + +# Usage: setEnvs org peer +setEnvs () { + local org=$1 # 1 or 2 + local peer=$2 # 0 or 1 + [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + local t="" + export CORE_PEER_LOCALMSPID="Org${org}MSP" + #CORE_PEER_MSPCONFIGPATH=\$${ORG${org}_ADMIN_MSP} + t="\${ORG${org}_PEER${peer}_URL}" && export CORE_PEER_ADDRESS=`eval echo $t` + t="\${ORG${org}_ADMIN_MSP}" && export CORE_PEER_MSPCONFIGPATH=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && export CORE_PEER_TLS_ROOTCERT_FILE=`eval echo $t` + + #env |grep CORE +} + +# Internal func called by channelCreate +# channelCreateAction channel tx orderer_url orderer_tls_rootcert +channelCreateAction(){ + local channel=$1 + local channel_tx=$2 + local orderer_url=$3 + local orderer_tls_rootcert=$4 + + if [ -z "$CORE_PEER_TLS_ENABLED" ] || [ "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" + else + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" \ + --tls \ + --cafile ${orderer_tls_rootcert} + fi + return $? +} + +# Use peer0/org1's identity to create a channel +# channelCreate APP_CHANNEL APP_CHANNEL.tx org peer orderer_url orderer_tls_rootcert +channelCreate() { + local channel=$1 + local tx=$2 + local org=$3 + local peer=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Create Channel ${channel} by org $org/peer $peer === " + setEnvs $org $peer + local rc=1 + local counter=0 + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + channelCreateAction ${channel} ${tx} ${orderer_url} ${orderer_tls_rootcert} + rc=$? + let counter=${counter}+1 + #COUNTER=` expr $COUNTER + 1` + [ $rc -ne 0 ] && echo "Failed to create channel $channel, retry after 3s" && sleep 3 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "Channel ${channel} creation failed" + echo "=== Channel ${channel} is created. === " +} + +# called by channelJoinWithRetry +channelJoinAction () { + local channel=$1 + peer channel join \ + -b ${channel}.block \ + >&log.txt +} + +## Sometimes Join takes time hence RETRY atleast for 5 times +channelJoinWithRetry () { + local channel=$1 + local peer=$2 + local counter=0 + channelJoinAction ${channel} + local rc=$? + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + echo "peer${peer} failed to join channel ${channel}, retry after 2s" + sleep 2 + channelJoinAction ${channel} + rc=$? + let counter=${counter}+1 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "After $MAX_RETRY attempts, peer${peer} failed to Join the Channel" +} + +# Join given (by default all) peers into the channel +# channelJoin channel org peer +channelJoin () { + local channel=$1 + local org=$2 + local peer=$3 + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Join org $org/peer $peer into channel ${channel} === " + setEnvs $org $peer + channelJoinWithRetry ${channel} $peer + echo "=== org $org/peer $peer joined into channel ${channel} === " +} + +getShasum () { + [ ! $# -eq 1 ] && exit 1 + shasum ${1} | awk '{print $1}' +} + +# List the channel that the peer joined +# E.g., for peer 0 at org 1, will do +# channelList 1 0 +channelList () { + local org=$1 + local peer=$2 + echo "=== List the channels that org${org}/peer${peer} joined === " + + setEnvs $org $peer + + peer channel list >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Failed to list the channels that org${org}/peer${peer} joined === " + else + echo "=== Done to list the channels that org${org}/peer${peer} joined === " + fi +} + +# Get the info of specific channel, including {height, currentBlockHash, previousBlockHash}. +# E.g., for peer 0 at org 1, get info of business channel will do +# channelGetInfo businesschannel 1 0 +channelGetInfo () { + local channel=$1 + local org=$2 + local peer=$3 + echo "=== Get channel info (height, currentBlockHash, previousBlockHash) of ${channel} with id of org${org}/peer${peer} === " + + setEnvs $org $peer + + peer channel getinfo -c ${channel} >&log.txt + rc=$? + cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Fail to get channel info of ${channel} with id of org${org}/peer${peer} === " + else + echo "=== Done to get channel info of ${channel} with id of org${org}/peer${peer} === " + fi +} + +# Fetch all blocks for a channel +# Usage: channelFetchAll channel org peer orderer_url orderer_tls_rootcert +channelFetchAll () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + + echo "=== Fetch all block for channel $channel === " + + local block_file=/tmp/${channel}_newest.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "newest" ${block_file} + [ $? -ne 0 ] && exit 1 + newest_block_shasum=$(getShasum ${block_file}) + echo "fetch newest block ${block_file} with shasum=${newest_block_shasum}" + + block_file=${CHANNEL_ARTIFACTS}/${channel}_config.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "config" ${block_file} + [ $? -ne 0 ] && exit 1 + echo "fetch config block ${block_file}" + + for i in $(seq 0 16); do # we at most fetch 16 blocks + block_file=${CHANNEL_ARTIFACTS}/${channel}_${i}.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} $i ${block_file} + [ $? -ne 0 ] && exit 1 + [ -f $block_file ] || break + echo "fetch block $i and saved into ${block_file}" + block_shasum=$(getShasum ${block_file}) + [ ${block_shasum} = ${newest_block_shasum} ] && { echo "Block $i is the last one for channel $channel"; break; } + done +} + +# Fetch some block from a given channel +# channelFetch channel org peer orderer_url blockNum block_file +channelFetch () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local num=$6 + local block_file=$7 + echo "=== Fetch block $num of channel $channel === " + + #setEnvs $org $peer + setOrdererEnvs # system channel required id from ordererOrg + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "${CORE_PEER_TLS_ENABLED}" ] || [ "${CORE_PEER_TLS_ENABLED}" = "false" ]; then + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + >&log.txt + else + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + if [ $? -ne 0 ]; then + cat log.txt + echo_r "Fetch block $num of channel $channel failed" + return 1 + else + echo "=== Fetch block $num of channel $channel OK === " + return 0 + fi +} + +# Sign a channel config tx +# Usage: channelSignConfigTx channel org peer transaction +channelSignConfigTx () { + local channel=$1 + local org=$2 + local peer=$3 + local tx=$4 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + echo "=== Sign channel config tx $tx for channel $channel by org $org/peer $peer === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + + setEnvs $org $peer + + peer channel signconfigtx -f ${CHANNEL_ARTIFACTS}/${tx} >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo_r "Sign channel config tx for channel $channel by org $org/peer $peer failed" + else + echo "=== Sign channel config tx channel $channel by org $org/peer $peer is successful === " + fi +} + +# Update a channel config +# Usage: channelUpdate channel org peer orderer_url orderer_tls_rootcert transaction_file +channelUpdate() { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local tx=$6 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + setEnvs $org $peer + echo "=== Update config on channel ${channel} === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + >&log.txt + else + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "peer channel update failed" + echo "=== Channel ${channel} is updated. === " + sleep 2 +} + +# Install chaincode on the peer node +# In v2.x it will package, install and approve +# chaincodeInstall peer cc_name version path [lang] +chaincodeInstall () { + if [ "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode install" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local name=$5 + local version=$6 + local path=$7 + local lang="golang" + if [ "$#" -eq 8 ]; then + local lang=$8 + fi + + [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $version ] && [ -z $path ] && echo_r "input param invalid" && exit -1 + echo "=== Install Chaincode on org ${org}/peer ${peer} === " + echo "name=${name}, version=${version}, path=${path}" + setEnvs $org $peer + peer chaincode install \ + -n ${name} \ + -v $version \ + -p ${path} \ + -l ${lang} \ + >&log.txt + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode installation on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is installed on org ${org}/peer $peer === " +} + +# Approve the chaincode definition +# chaincodeApprove channel org peer peer_url peer_tls_root_cert orderer_url orderer_tls_rootcert channel name version +chaincodeApprove () { + if [ "$#" -ne 9 -a "$#" -ne 11 ]; then + echo_r "Wrong param number for chaincode approve" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + local channel=$7 + local name=$8 + local version=$9 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "${10}" ]; then + collection_config=${10} + fi + + if [ ! -z "${11}" ]; then + policy=${12} + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + cat query.log + local label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + echo "Approve package id=${package_id} by Org ${org}/Peer ${peer}" + + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} >&log.txt + else + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Approval on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is approved on remote peer$peer === " +} + +# Query the Approve the chaincode definition +# chaincodeQueryApprove channel org peer name version +chaincodeQueryApprove () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode queryapproval" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + local version=$7 + + setEnvs $org $peer + + echo "Query the approval status of the chaincode $name $version" + peer lifecycle chaincode queryapprovalstatus \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryApproval Failed: org ${org}/peer$peer" +} + +# Anyone can commit the chaincode definition once it's approved by major +# chaincodeCommit org peer channel orderer_url orderer_tls_rootcert name version [collection-config] [endorse-policy] +chaincodeCommit () { + if [ "$#" -ne 7 -a "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode commit" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local name=$6 + local version=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 # chaincode endorsement policy + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + + echo "Committing package id=${package_id} by Org ${org}/Peer ${peer}" + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" + else + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Commit on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is committed on channel $channel === " +} + +# Query the Commit the chaincode definition +# chaincodeQueryCommit channel org peer name version +chaincodeQueryCommit () { + if [ "$#" -ne 6 ]; then + echo_r "Wrong param number for chaincode querycommit" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + + setEnvs $org $peer + + echo "Query the committed status of chaincode $name with ${ORG1_PEER0_URL} " + peer lifecycle chaincode querycommitted \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryCommit Failed: org ${org}/peer$peer" +} + + +# Instantiate chaincode on specifized peer node +# chaincodeInstantiate channel org peer orderer_url name version args +chaincodeInstantiate () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 + fi + + setEnvs $org $peer + echo "=== chaincodeInstantiate for channel ${channel} on org $org/peer $peer ====" + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeInstantiation on org $org/peer$peer in channel ${channel} failed" + echo "=== Chaincode Instantiated in channel ${channel} by peer$peer ===" +} + +# Invoke the Init func of chaincode to start the container +# Usage: chaincodeInit org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInit () { + if [ "$#" -ne 8 ]; then + echo_r "Wrong param number for chaincode Init" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer=$4 + local name=$5 + local args=$6 + local peer_url=$7 + local peer_org_tlsca=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInit to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Init failed: peer$peer in channel ${channel}" + echo "=== Chaincode Init done: peer$peer in channel ${channel} === " +} + +# Usage: chaincodeInvoke org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInvoke () { + if [ "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode Invoke" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local orderer_url=$6 + local orderer_tls_rootcert=$7 + local name=$8 + local args=$9 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInvoke to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Invoke execution on peer$peer failed " + echo "=== Invoke transaction on peer$peer in channel ${channel} is successful === " +} + +# query org peer channel name args expected_result +chaincodeQuery () { + if [ "$#" -ne 7 -a "$#" -ne 8 ]; then + echo_r "Wrong param number $# for chaincode Query" + echo $* + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local name=$6 + local args=$7 + local expected_result="" + + [ $# -eq 8 ] && local expected_result=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + + echo "=== chaincodeQuery to org $org/peer $peer === " + echo "channel=${channel}, name=${name}, args=${args}, expected_result=${expected_result}" + local rc=1 + local starttime=$(date +%s) + + setEnvs $org $peer + + # we either get a successful response, or reach TIMEOUT + while [ "$(($(date +%s)-starttime))" -lt "$TIMEOUT" -a $rc -ne 0 ]; do + echo "Attempting to Query org ${org}/peer ${peer} ...$(($(date +%s)-starttime)) secs" + peer chaincode query \ + -C "${channel}" \ + -n "${name}" \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c "${args}" \ + >&log.txt + rc=$? + if [ -n "${expected_result}" ]; then # need to check the result + test $? -eq 0 && VALUE=$(cat log.txt | awk 'END {print $NF}') + if [ "$VALUE" = "${expected_result}" ]; then + let rc=0 + echo_b "$VALUE == ${expected_result}, passed" + else + let rc=1 + echo_b "$VALUE != ${expected_result}, will retry" + fi + fi + if [ $rc -ne 0 ]; then + cat log.txt + sleep 2 + fi + done + + # rc==0, or timeout + if [ $rc -eq 0 ]; then + echo "=== Query is done: org $org/peer$peer in channel ${channel} === " + else + echo_r "=== Query failed: org $org/peer$peer, run `make stop clean` to clean ===" + exit 1 + fi +} + +# List Installed chaincode on specified peer node, and instantiated chaincodes at specific channel +# chaincodeList org1 peer0 businesschannel +chaincodeList () { + local org=$1 + local peer=$2 + local channel=$3 + + [ -z $org ] && [ -z $peer ] && [ -z $channel ] && echo_r "input param invalid" && exit -1 + echo "=== ChaincodeList on org ${org}/peer ${peer} === " + setEnvs $org $peer + echo_b "Get installed chaincodes at peer$peer.org$org" + peer chaincode list \ + --installed > log.txt & + # \ + #--peerAddresses "peer${peer}.org${org}.example.com" --tls false + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + + echo_b "Get instantiated chaincodes at channel $org" + peer chaincode list \ + --instantiated \ + -C ${channel} > log.txt & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + echo "=== ChaincodeList is done at peer${peer}.org${org} === " +} + +# Start chaincode with dev mode +# TODO: use variables instead of hard-coded value +chaincodeStartDev () { + local peer=$1 + local version=$2 + [ -z $peer ] && [ -z $version ] && echo_r "input param invalid" && exit -1 + setEnvs 1 0 + CORE_CHAINCODE_LOGLEVEL=debug \ + CORE_PEER_ADDRESS=peer${peer}.org1.example.com:7052 \ + CORE_CHAINCODE_ID_NAME=${CC_02_NAME}:${version} \ + nohup ./scripts/chaincode_example02 > chaincode_dev.log & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode start in dev mode has Failed" + echo "=== Chaincode started in dev mode === " +} + +# chaincodeUpgrade channel org peer orderer_url name version args +chaincodeUpgrade () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + echo "=== chaincodeUpgrade to orderer by id of org ${org}/peer $peer === " + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Upgrade execution on peer$peer failed " + echo "=== Upgrade transaction on peer$peer in channel ${channel} is successful === " +} + +# configtxlator encode json to pb +# Usage: configtxlatorEncode msgType input output +configtxlatorEncode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Encode $input --> $output using type $msgType" + docker exec -it ${CTL_CONTAINER} configtxlator proto_encode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @${input} \ + # ${CTL_ENCODE_URL}/${msgType} \ + # >${output} +} + +# configtxlator decode pb to json +# Usage: configtxlatorEncode msgType input output +configtxlatorDecode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Config Decode $input --> $output using type $msgType" + if [ ! -f $input ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator proto_decode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @"${input}" \ + # "${CTL_DECODE_URL}/${msgType}" \ + # > "${output}" +} + +# compute diff between two pb +# Usage: configtxlatorCompare channel origin updated output +configtxlatorCompare() { + local channel=$1 + local origin=$2 + local updated=$3 + local output=$4 + + echo "Config Compare $origin vs $updated > ${output} in channel $channel" + if [ ! -f $origin ] || [ ! -f $updated ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator compute_update \ + --original=${origin} \ + --updated=${updated} \ + --channel_id=${channel} \ + --output=${output} + + #curl -sX POST \ + # -F channel="${channel}" \ + # -F "original=@${origin}" \ + # -F "updated=@${updated}" \ + # "${CTL_COMPARE_URL}" \ + # > "${output}" + + [ $? -eq 0 ] || echo_r "Failed to compute config update" +} + +# Run cmd inside the config generator container +gen_con_exec() { + docker exec -it $GEN_CONTAINER "$@" +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/scripts/gen_channelArtifacts.sh b/hyperledger_fabric/v1.4.4/scripts/gen_channelArtifacts.sh new file mode 100644 index 00000000..052d1e2b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/gen_channelArtifacts.sh @@ -0,0 +1,81 @@ +#!/usr/bin/env bash + +# Use ${FABRIC_CFG_PATH}/configtx.yaml to generate following materials, +# and put under /tmp/$CHANNEL_ARTIFACTS: +# system channel genesis block +# new app channel tx +# update anchor peer tx + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f /scripts/variables.sh ]; then + source /scripts/variables.sh +else + echo "Cannot find the variables.sh files, pls check" + exit 1 +fi + +cd /tmp/${CHANNEL_ARTIFACTS} # all generated materials will be put under /tmp/$CHANNEL_ARTIFACTS + +echo "Generate genesis block of system channel using configtx.yaml" +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && \ +configtxgen \ + -configPath /tmp \ + -channelID ${SYS_CHANNEL} \ + -profile ${ORDERER_GENESIS_PROFILE} \ + -outputBlock ${ORDERER0_GENESIS_BLOCK} +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && echo "Fail to generate genesis block ${ORDERER0_GENESIS_BLOCK}" && exit -1 +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER1_GENESIS_BLOCK} +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER2_GENESIS_BLOCK} + +#for (( i=1; i<150; i++ )); +#do +#APP_CHANNEL="channel"$i +#APP_CHANNEL_TX=${APP_CHANNEL}".tx" +echo "Create the new app channel ${APP_CHANNEL} tx using configtx.yaml" +[ ! -f ${APP_CHANNEL_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -outputCreateChannelTx ${APP_CHANNEL_TX} +[ ! -f ${APP_CHANNEL_TX} ] && echo "Fail to generate app channel tx file" && exit -1 +#done + +[ ! -f ${APP_CHANNEL_TX}.json ] && \ +configtxgen \ + -inspectChannelCreateTx ${APP_CHANNEL_TX} > ${APP_CHANNEL_TX}.json + +echo "Create the anchor peer configuration tx for org1 and org2" +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG1MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG1_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG2MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG2_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +echo "Output the json for org1, org2 and org3" +declare -a msps=("${ORG1MSP}" + "${ORG2MSP}" + "${ORG3MSP}") +for msp in "${msps[@]}" +do +[ ! -f ${msp}.json ] && \ +configtxgen \ + -configPath /tmp \ + -printOrg ${msp} >${msp}.json +done diff --git a/hyperledger_fabric/v1.4.4/scripts/gen_config_channel.sh b/hyperledger_fabric/v1.4.4/scripts/gen_config_channel.sh new file mode 100644 index 00000000..797f6e40 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/gen_config_channel.sh @@ -0,0 +1,44 @@ +#! /bin/bash +# Generating +# * channel-artifacts +# * orderer.genesis.block +# * channel.tx +# * Org1MSPanchors.tx +# * Org2MSPanchors.tx + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +[ $# -ne 1 ] && echo_r "[Usage] $0 solo|kafka" && exit 1 || MODE=$1 + +echo_b "Generating channel artifacts with ${GEN_IMG} in mode ${MODE}" + +[ ! -d ${MODE}/${CHANNEL_ARTIFACTS} ] && mkdir -p ${MODE}/${CHANNEL_ARTIFACTS} + +echo_b "Make sure channel-artifacts dir exists already" +if [ -d ${MODE}/${CHANNEL_ARTIFACTS} -a ! -z "$(ls -A ${MODE}/${CHANNEL_ARTIFACTS})" ]; then + echo_b "${CHANNEL_ARTIFACTS} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CHANNEL_ARTIFACTS}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "FABRIC_LOGGING_SPEC=common.tools.configtxgen=DEBUG:INFO" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/${MODE}/configtx.yaml:/tmp/configtx.yaml \ + -v $PWD/${MODE}/${CHANNEL_ARTIFACTS}:/tmp/${CHANNEL_ARTIFACTS} \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/variables.sh:/scripts/variables.sh \ + -v $PWD/scripts/gen_channelArtifacts.sh:/scripts/gen_channelArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_channelArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_g "Generate channel artifacts with $0 done" diff --git a/hyperledger_fabric/v1.4.4/scripts/gen_config_crypto.sh b/hyperledger_fabric/v1.4.4/scripts/gen_config_crypto.sh new file mode 100644 index 00000000..e4a4c91c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/gen_config_crypto.sh @@ -0,0 +1,41 @@ +#! /bin/bash +# Generating +# * crypto-config/* + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo_b "Clean existing container $GEN_CONTAINER" +[ "$(docker ps -a | grep $GEN_CONTAINER)" ] && docker rm -f $GEN_CONTAINER + +[ ! -d ${CRYPTO_CONFIG} ] && mkdir -p ${CRYPTO_CONFIG} +[ ! -d org3/${CRYPTO_CONFIG} ] && mkdir -p org3/${CRYPTO_CONFIG} + +echo_b "Make sure crypto-config dir exists already" +if [ -d ${CRYPTO_CONFIG} -a ! -z "$(ls -A ${CRYPTO_CONFIG})" ]; then # No need to regen + echo_b "${CRYPTO_CONFIG} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CRYPTO_CONFIG}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "CONFIGTX_LOGGING_LEVEL=DEBUG" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/crypto-config.yaml:/tmp/crypto-config.yaml \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/gen_cryptoArtifacts.sh:/scripts/gen_cryptoArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_cryptoArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_b "Copy org3's crypto config outside" +cp -r org3/${CRYPTO_CONFIG}/* ${CRYPTO_CONFIG}/ + +echo_g "Generate crypto configs with $0 done" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/scripts/gen_cryptoArtifacts.sh b/hyperledger_fabric/v1.4.4/scripts/gen_cryptoArtifacts.sh new file mode 100644 index 00000000..bd1de7ca --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/gen_cryptoArtifacts.sh @@ -0,0 +1,37 @@ +#!/usr/bin/env bash + +# use /tmp/crypto-config.yaml to generate /tmp/crypto-config +# use /tmp/org3/crypto-config.yaml to generate /tmp/org3/crypto-config + +cd /tmp # we use /tmp as the base working path + +# The crypto-config will be used by channel artifacts generation later +CRYPTO_CONFIG=crypto-config + +echo "Generating crypto-config for org1 and org2..." +ls -l ${CRYPTO_CONFIG} + +cryptogen generate \ + --config=crypto-config.yaml \ + --output ${CRYPTO_CONFIG} + +#cryptogen extend \ +# --input ${CRYPTO_CONFIG} \ +# --config=crypto-config.yaml + +if [ $? -ne 0 ]; then + echo "Failed to generate certificates for org1 and org2..." + exit 1 +fi + +echo "Generating crypto-config for org3..." +cryptogen generate \ + --config=org3/crypto-config.yaml \ + --output org3/${CRYPTO_CONFIG} + +if [ $? -ne 0 ]; then + echo_r "Failed to generate certificates for org3..." + exit 1 +fi + +echo "Generated credential files and saved to ${CRYPTO_CONFIG}." diff --git a/hyperledger_fabric/v1.4.4/scripts/init_chaincode_dev.sh b/hyperledger_fabric/v1.4.4/scripts/init_chaincode_dev.sh new file mode 100644 index 00000000..006645a5 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/init_chaincode_dev.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will build and start and test chaincode in DEV mode + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo +echo " ============================================== " +echo " ==========initialize businesschannel========== " +echo " ============================================== " +echo + +echo_b "Channel name: "${APP_CHANNEL} + +## Create channel +echo_b "Creating channel..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +sleep 1 + +## Set the anchor peers for each org in the channel +#echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +#updateAnchorPeers 0 + +# We suppose the binary is there, otherwise, run `go build` under the chaincode path +chaincodeStartDev 0 1.0 +sleep 1 + +## Install chaincode on all peers +echo_b "Installing chaincode on peer0..." +chaincodeInstall 0 1.0 + +sleep 1 + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate 0 + +sleep 1 + +echo +echo_g "===================== All GOOD, initialization completed ===================== " +echo + +echo +echo " _____ _ _ ____ " +echo "| ____| | \ | | | _ \ " +echo "| _| | \| | | | | |" +echo "| |___ | |\ | | |_| |" +echo "|_____| |_| \_| |____/ " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.4/scripts/initialize_peer0.sh b/hyperledger_fabric/v1.4.4/scripts/initialize_peer0.sh new file mode 100644 index 00000000..c575e294 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/initialize_peer0.sh @@ -0,0 +1,40 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b " ========== Network initialization start ========== " + +## Create channel +echo_b "Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +## Set the anchor peers for each org in the channel +echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +## Install chaincode on all peers +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +echo_b "Installing chaincode ${CC_NAME} on peer0..." +chaincodeInstall 1 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate ${APP_CHANNEL} 0 + +echo_g "=============== All GOOD, network initialization done =============== " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.4/scripts/json_flatter.py b/hyperledger_fabric/v1.4.4/scripts/json_flatter.py new file mode 100644 index 00000000..dbcbe23e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/json_flatter.py @@ -0,0 +1,104 @@ +import base64 +import binascii +import json +import os +import sys + + +def decode_if_b64(raw): + """ + Decode a string if it's base 64 + :param raw: original bytes + :return: True, decoded_result or False, Orignal bytes + """ + success = False + result = raw + try: + if isinstance(raw, str): + result = base64.decodebytes(bytes(raw, 'utf-8')) + success = True + except binascii.Error: + success = False + + #if success: # result_bytes = b'xxxx\xx' + #print('===================Start==================================') + #print(raw) + #print(result) + #print('=====================End===================================') + return success, result + + +def check_tree(tree, prefix, f_write): + """ + Print the tree recursively with given path prefix + :param tree: the tree to check + :param prefix: path prefix to the root of this tree + :param f_write: Which file to write into + :return: + """ + if isinstance(tree, dict): + for k, v in tree.items(): + prefix_path = prefix + "." + k + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'cert' in k or 'id_bytes' in k or 'value' in k and 'hash' not in k: + #print(prefix_path) + success, result = decode_if_b64(v) + if success: + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + elif isinstance(tree, list): + for i, v in enumerate(tree): + prefix_path = "{}[{}]".format(prefix, i) + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'metadata' not in prefix_path: + success, result = decode_if_b64(v) + if success: + #print(prefix_path) + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + else: # json only allow dict or list structure + print("Wrong format of json tree") + + +def process(directory): + """ + Process all json files under the path + :param directory: Check json files under which directory + :return: + """ + for f in os.listdir(directory): + if f.endswith(".block.json"): + file_name = os.path.join(json_dir, f) + f_read = open(file=file_name, mode="r", encoding='utf-8') + f_write = open(file=file_name+"-flat.json", mode="w", encoding='utf-8') + check_tree(json.load(f_read), "", f_write) + f_read.close() + f_write.close() + else: + print("Ignore non-json file {}".format(f)) + + +# Usage python json_flatter.py [path_containing_json_files] +# Print all json elements in flat structure +# e.g., +# { +# "a": { +# "b": ["c", "d"] +# } +# } +# ==> +# a.b[0]=c +# a.b[1]=d +if __name__ == '__main__': + json_dir = "../raft/channel-artifacts/" + if len(sys.argv) > 1: + json_dir = sys.argv[1] + + print("Will process json files under {}".format(json_dir)) + process(json_dir) diff --git a/hyperledger_fabric/v1.4.4/scripts/start_eventsclient.sh b/hyperledger_fabric/v1.4.4/scripts/start_eventsclient.sh new file mode 100644 index 00000000..51eecf54 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/start_eventsclient.sh @@ -0,0 +1,24 @@ +#!/usr/bin/env bash + +# This script will start the eventsclient + +# Importing useful functions +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_g "=== Testing eventsclient in a loop ===" + +CORE_PEER_LOCALMSPID=${ORG1MSP} \ +CORE_PEER_MSPCONFIGPATH=${ORG1_ADMIN_MSP} \ +eventsclient \ + -server=${ORG1_PEER0_URL} \ + -channelID=${APP_CHANNEL} \ + -filtered=true \ + -tls=true \ + -clientKey=${ORG1_ADMIN_TLS_CLIENT_KEY} \ + -clientCert=${ORG1_ADMIN_TLS_CLIENT_CERT} \ + -rootCert=${ORG1_ADMIN_TLS_CA_CERT} + diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_approve.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_approve.sh new file mode 100644 index 00000000..2b1c227e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_approve.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Approve chaincode definition ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Approve chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_commit.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_commit.sh new file mode 100644 index 00000000..7c7fc520 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_commit.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} + +# Once a sufficient number of organizations (in this case, a majority) have +# approved a chaincode definition, one organization commit the definition to the +# channel. + +echo_b "=== Commit chaincode definition ${CC_NAME} to channel ${APP_CHANNEL} ... ===" + +chaincodeCommit "${ORGS[0]}" "${PEERS[0]}" "${APP_CHANNEL}" "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INIT_VERSION} + +echo_g "=== Commit Chaincode done, now you can invoke chaincode to start the container ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_install.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_install.sh new file mode 100644 index 00000000..5a0df459 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_install.sh @@ -0,0 +1,28 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + t="\${ORG${org}_PEER${peer}_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeInstall $org $peer "${peer_url}" "${peer_tls_rootcert}" ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_instantiate.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_instantiate.sh new file mode 100644 index 00000000..f15d658b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_instantiate.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INIT_ARGS=${CC_INIT_ARGS:-$CC_02_INIT_ARGS} + +# Instantiate chaincode in the channel, executed once on any node is enough +# (once for each channel is enough, we make it concurrent here) +echo_b "=== Instantiating chaincode on channel ${APP_CHANNEL}... ===" + +# Instantiate at org1.peer0 and org2.peer0, actually it can be triggered once per channel +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} +#chaincodeInstantiate "${APP_CHANNEL}" 2 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} + +echo_g "=== Instantiate chaincode on channel ${APP_CHANNEL} done ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_invoke_query.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_invoke_query.sh new file mode 100644 index 00000000..e87bf4cd --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_invoke_query.sh @@ -0,0 +1,37 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Query on chaincode on Peer0/Org1 +echo_b "=== Testing Chaincode invoke/query ===" + +# Non-side-DB testing +echo_b "Query chaincode ${CC_NAME} on peer org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +#Invoke on chaincode on Peer0/Org1 +echo_b "Invoke transaction (transfer 10) by org1/peer0..." +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 90 +echo_b "Query chaincode on org2/peer1..." +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +#Invoke on chaincode on Peer1/Org2 +echo_b "Send invoke transaction on org2/peer1..." +chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 80 +echo_b "Query chaincode on org1/peer0 4peers..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 80 + +echo_g "=== Chaincode invoke/query done ===" diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_list.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_list.sh new file mode 100644 index 00000000..c7ee2898 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_list.sh @@ -0,0 +1,16 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ../../v1.1.0/scripts/func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "=== List chaincode on all peer0.org1... ===" + +chaincodeList 1 0 ${APP_CHANNEL} + +echo_g "=== List chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_peer0.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_peer0.sh new file mode 100644 index 00000000..b9064612 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_peer0.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +echo_b "Channel name: "${APP_CHANNEL} + +echo_b "Query the existing value of a" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +sleep 1 + +echo_b "Invoke a transaction to transfer 10 from a to b" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} + +sleep 1 + +echo_b "Check if the result of a is 90" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +echo +echo_g "All GOOD, MVE Test completed" +echo +exit 0 diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_queryapprove.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_queryapprove.sh new file mode 100644 index 00000000..d032a96e --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_queryapprove.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode approve status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Query Chaincode approve status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_querycommit.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_querycommit.sh new file mode 100644 index 00000000..766c4b93 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_querycommit.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode commit status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryCommit "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} +done + +echo_g "=== Query Chaincode commit status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cc_upgrade.sh b/hyperledger_fabric/v1.4.4/scripts/test_cc_upgrade.sh new file mode 100644 index 00000000..fb42b2b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cc_upgrade.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} +CC_UPGRADE_ARGS=${CC_UPGRADE_ARGS:-$CC_02_UPGRADE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Upgrade to new version +echo_b "=== Upgrade chaincode ${CC_NAME} to new version... ===" + +chaincodeInstall 1 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 1 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" + +# Upgrade on one peer of the channel will update all +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" + +# Query new value, should refresh through all peers in the channel +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 + +echo_g "=== chaincode ${CC_NAME} Upgrade completed ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_channel_create.sh b/hyperledger_fabric/v1.4.4/scripts/test_channel_create.sh new file mode 100644 index 00000000..0121957c --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_channel_create.sh @@ -0,0 +1,22 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}... ===" + +#for (( i=1; i<150; i++ )); +#do + #APP_CHANNEL="channel"$i + #APP_CHANNEL_TX=${APP_CHANNEL}".tx" +channelCreate "${APP_CHANNEL}" "${APP_CHANNEL_TX}" 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} +#done + +echo_g "=== Created channel ${APP_CHANNEL} with ${APP_CHANNEL_TX} ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_channel_getinfo.sh b/hyperledger_fabric/v1.4.4/scripts/test_channel_getinfo.sh new file mode 100644 index 00000000..7258391a --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_channel_getinfo.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Getting info of channel ${APP_CHANNEL}... ===" + +#set -x + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelGetInfo ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Get info of channel ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_channel_join.sh b/hyperledger_fabric/v1.4.4/scripts/test_channel_join.sh new file mode 100644 index 00000000..e7b78bec --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_channel_join.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL}... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelJoin ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_channel_list.sh b/hyperledger_fabric/v1.4.4/scripts/test_channel_list.sh new file mode 100644 index 00000000..099460ee --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_channel_list.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Listing joined channels... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelList $org $peer + done +done + +echo_g "=== Done listing joined channels ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_channel_update.sh b/hyperledger_fabric/v1.4.4/scripts/test_channel_update.sh new file mode 100644 index 00000000..3b6c6fb7 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_channel_update.sh @@ -0,0 +1,43 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Updating config of channel ${APP_CHANNEL}... ===" + +echo_b "Sign the channel update tx by Org1/Peer0 and Org2/Peer0" +channelSignConfigTx ${APP_CHANNEL} "1" "0" "${CFG_DELTA_ENV_PB}" +channelSignConfigTx ${APP_CHANNEL} "2" "0" "${CFG_DELTA_ENV_PB}" + +channelUpdate ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} ${CFG_DELTA_ENV_PB} + +sleep 1 # wait till the update takes effect + +# use org1.peer0's id to get latest block from orderer +newest_block_file1=/tmp/${APP_CHANNEL}_newest1.block +channelFetch ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file1} +[ -f ${newest_block_file1} ] || exit 1 + +# use org3.peer0's id to get latest block from orderer +newest_block_file2=/tmp/${APP_CHANNEL}_newest2.block +channelFetch ${APP_CHANNEL} "3" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file2} +[ -f ${newest_block_file2} ] || exit 1 + +if [ $(getShasum ${newest_block_file1}) = $(getShasum ${newest_block_file2}) ]; then + echo_g "Block matched, new org joined channel successfully" +else + echo_r "Block not matched, new org joined channel failed" + exit 1 +fi + +# Now new org is valid to join the channel +# channelJoin ${APP_CHANNEL} "3" "0" + +echo_g "=== Updated config of channel ${APP_CHANNEL}... ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_config_update.sh b/hyperledger_fabric/v1.4.4/scripts/test_config_update.sh new file mode 100644 index 00000000..581cacb9 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_config_update.sh @@ -0,0 +1,85 @@ +#!/bin/bash +# Demo to use configtxlator to add some new organization +# Usage: +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +# clean env and exit +clean_exit() { + echo_b "Stop configtxlator service" + docker rm -f $CTL_CONTAINER + exit 0 +} + +BLOCK_FILE=${APP_CHANNEL}_config.block +if [ ! -f ${BLOCK_FILE} ]; then + echo_r "${BLOCK_FILE} not exist" + clean_exit +fi + +echo_b "Decode latest config block ${BLOCK_FILE} into json..." +configtxlatorDecode "common.Block" ${BLOCK_FILE} ${BLOCK_FILE}.json +[ $? -ne 0 ] && { echo_r "Decode ${BLOCK_FILE} failed"; clean_exit; } + +echo_b "Parse config data from block payload and encode into pb..." +[ -f ${ORIGINAL_CFG_JSON} ] || jq "$PAYLOAD_CFG_PATH" ${BLOCK_FILE}.json > ${ORIGINAL_CFG_JSON} +jq . ${ORIGINAL_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${ORIGINAL_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${ORIGINAL_CFG_JSON} ${ORIGINAL_CFG_PB} + +echo_b "Update the config with new org, and encode into pb" +[ -f ${UPDATED_CFG_JSON} ] || jq -s '.[0] * {"channel_group":{"groups":{"Application":{"groups": {"Org3MSP":.[1]}}}}}' ${ORIGINAL_CFG_JSON} ./Org3MSP.json >& ${UPDATED_CFG_JSON} +jq . ${UPDATED_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${UPDATED_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${UPDATED_CFG_JSON} ${UPDATED_CFG_PB} + +echo_b "Calculate the config delta between pb files" +configtxlatorCompare ${APP_CHANNEL} ${ORIGINAL_CFG_PB} ${UPDATED_CFG_PB} ${CFG_DELTA_PB} + +echo_b "Decode the config delta pb into json" +[ -f ${CFG_DELTA_JSON} ] || configtxlatorDecode "common.ConfigUpdate" ${CFG_DELTA_PB} ${CFG_DELTA_JSON} +jq . ${CFG_DELTA_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${CFG_DELTA_JSON} is invalid"; clean_exit; } + +echo_b "Wrap the config update as envelope" +[ -f ${CFG_DELTA_ENV_JSON} ] || echo '{"payload":{"header":{"channel_header":{"channel_id":"'"$APP_CHANNEL"'", "type":2}},"data":{"config_update":'$(cat ${CFG_DELTA_JSON})'}}}' | jq . > ${CFG_DELTA_ENV_JSON} + +echo_b "Encode the config update envelope into pb" +configtxlatorEncode "common.Envelope" ${CFG_DELTA_ENV_JSON} ${CFG_DELTA_ENV_PB} + +echo_g "Test configtxlator for $MODE Passed, now ready for peer to send the update transaction" + +clean_exit \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/scripts/test_configtxlator.sh b/hyperledger_fabric/v1.4.4/scripts/test_configtxlator.sh new file mode 100644 index 00000000..24f8857d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_configtxlator.sh @@ -0,0 +1,64 @@ +#!/bin/bash +# Demo to use configtxlator to modify orderer config +# Usage: bash test_configtxlator solo|kafka +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +echo_b "Convert all block files into json" +for block_file in *.block; do + [ -f ${block_file}.json ] || configtxlatorDecode "common.Block" ${block_file} ${block_file}.json + decode_result=$? + #echo_b "Parse payload..." + #[ ${decode_result} -eq 0 ] && jq "$PAYLOAD_PATH" ${block_file}.json > ${block_file}_payload.json +done + +echo_b "Update the content of orderer genesis file" +if [ -f ${ORDERER0_GENESIS_BLOCK} ]; then + echo_b "Checking existing Orderer.BatchSize.max_message_count in the genesis json" + jq "$MAX_BATCH_SIZE_PATH" ${ORDERER0_GENESIS_BLOCK}.json + + echo_b "Creating new genesis json with updated Orderer.BatchSize.max_message_count" + jq "$MAX_BATCH_SIZE_PATH=100" ${ORDERER0_GENESIS_BLOCK}.json > ${ORDERER0_GENESIS_BLOCK}_updated.json + + echo_b "Re-Encoding the updated orderer genesis json to block" + configtxlatorEncode "common.Block" ${ORDERER0_GENESIS_BLOCK}_updated.json ${ORDERER0_GENESIS_BLOCK}_updated.block +fi + +echo_b "Stop configtxlator service" +docker rm -f $CTL_CONTAINER + +echo_g "Test configtxlator for $MODE Passed" diff --git a/hyperledger_fabric/v1.4.4/scripts/test_cscc.sh b/hyperledger_fabric/v1.4.4/scripts/test_cscc.sh new file mode 100644 index 00000000..20fd64d5 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_cscc.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "CSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n cscc \ +# -c '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetConfigBlock" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetChannels" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetChannels"]}' + +echo_g "CSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_fetch_blocks.sh b/hyperledger_fabric/v1.4.4/scripts/test_fetch_blocks.sh new file mode 100644 index 00000000..97006a48 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_fetch_blocks.sh @@ -0,0 +1,23 @@ +#!/usr/bin/env bash + +# This script will fetch blocks for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +org=1 +peer=0 + +echo_b "=== Fetching blocks of channel ${APP_CHANNEL} and ${SYS_CHANNEL} ===" + +channelFetchAll ${APP_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +channelFetchAll ${SYS_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +echo_g "=== Fetched Blocks from channels done! ===" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_lscc.sh b/hyperledger_fabric/v1.4.4/scripts/test_lscc.sh new file mode 100644 index 00000000..7a434190 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_lscc.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will run some lscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "LSCC testing" + +org=1 +peer=0 + +# invoke required following params + #-o orderer.example.com:7050 \ + #--tls "true" \ + #--cafile ${ORDERER_TLS_CA} \ + +CC_NAME=${CC_02_NAME} + +echo_b "LSCC Get id" +chaincodeQuery "$org" "$peer" "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getid","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc ChaincodeDeploymentSpec" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getdepspec","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc bytes" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getccdata","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get all chaincodes (with all versions) installed on the peer" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getinstalledchaincodes"]}' + +echo_b "LSCC Get all chaincodes instantiated on the channel" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getchaincodes"]}' + + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getid","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getdepspec","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getccdata","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getinstalledchaincodes"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getchaincodes"]}' + +echo_g "LSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_qscc.sh b/hyperledger_fabric/v1.4.4/scripts/test_qscc.sh new file mode 100644 index 00000000..bd127457 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_qscc.sh @@ -0,0 +1,35 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "QSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +echo_b "QSCC GetChainInfo" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_b "QSCC GetBlockByNumber 2" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_g "QSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.4/scripts/test_sideDB.sh b/hyperledger_fabric/v1.4.4/scripts/test_sideDB.sh new file mode 100644 index 00000000..8bee8fde --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_sideDB.sh @@ -0,0 +1,72 @@ +#!/bin/bash +# test sideDB feature: https://jira.hyperledger.org/browse/FAB-10231 + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_MARBLES_NAME} +CC_PATH=${CC_MARBLES_PATH} +CC_INIT_ARGS=${CC_MARBLES_INIT_ARGS} + +echo_b "=== Testing the private data feature ===" + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +# test sideDB feature +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} +echo_g "=== Instantiate chaincode done ===" +sleep 2 + +# both org1 and org2 can invoke, but gossip is the problem to cross org +echo_b "Invoke chaincode with collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} +echo_g "=== Invoke chaincode done ===" + +# both org1 and org2 can do normal read +echo_b "Query chaincode with collection collectionMarbles on org1/peer1" +chaincodeQuery 2 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +echo_g "=== Query read chaincode done ===" + +# only org1 can do detailed read +echo_b "Query chaincode with collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +echo_g "=== Query read details chaincode done ===" + +echo_b "Install chaincode with new collection config" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_PATH} + done +done +echo_g "Install chaincode with new collection config done" + +echo_b "Update chaincode with new collection on org1/peer0" +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG_NEW} +echo_g "Update chaincode with new collection on org1/peer0 done" + +echo_b "Invoke chaincode with new key and new collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS_2} +echo_g "=== Invoke chaincode done ===" + +# now both org1 and org2 should be able to readpvtdetails of new data, noticed the read of old data is available since v1.3.0 +echo_b "Query chaincode with new key and new collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} +echo_g "=== Query read details chaincode done ===" + +echo_g "=== Testing the private data feature done ===" diff --git a/hyperledger_fabric/v1.4.4/scripts/test_temp.sh b/hyperledger_fabric/v1.4.4/scripts/test_temp.sh new file mode 100644 index 00000000..38b8ede8 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_temp.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +# test sideDB feature + +#chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_MARBLES_NAME} ${CC_INIT_VERSION} ${CC_MARBLES_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} + +# both org1 and org2 can invoke +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +#chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} + +exit diff --git a/hyperledger_fabric/v1.4.4/scripts/test_update_anchors.sh b/hyperledger_fabric/v1.4.4/scripts/test_update_anchors.sh new file mode 100644 index 00000000..239b983d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/test_update_anchors.sh @@ -0,0 +1,19 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Set the anchor peers for each org in the channel +echo_b "=== Updating anchor peers to peer0 for org1... ===" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +echo_b "=== Updating anchor peers to peer0 for org2... ===" +channelUpdate ${APP_CHANNEL} 2 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org2MSPanchors.tx + +echo_b "=== Updated anchor peers ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.4/scripts/variables.sh b/hyperledger_fabric/v1.4.4/scripts/variables.sh new file mode 100644 index 00000000..e670f6c2 --- /dev/null +++ b/hyperledger_fabric/v1.4.4/scripts/variables.sh @@ -0,0 +1,145 @@ +#!/usr/bin/env bash +# Before running `make`, config this files +# Define some global variables for usage. Will be included by func.sh. + +ARCH=amd64 + +# for the base images, including baseimage, couchdb, kafka, zookeeper +BASE_IMG_TAG=0.4.18 + +# For fabric images, including peer, orderer, ca +FABRIC_IMG_TAG=1.4.4 + +# Keep the same as in core.yaml, will tag ccenv with this value +PROJECT_VERSION=1.4.4 + +# Name of app channel, need to align with the gen_artifacts.sh +SYS_CHANNEL="testchainid" +APP_CHANNEL="businesschannel" +APP_CHANNEL1="businesschannel1" +APP_CHANNEL2="businesschannel2" + +# Client cmd execute timeout and retry times +TIMEOUT="90" +MAX_RETRY=10 + +# Organization and peers +ORGS=( 1 2 ) +PEERS=( 0 1 ) +#: "${ORGS:=( 1 2 )}" +#: "${PEERS:=( 0 1 )}" + +ORG1MSP="Org1MSP" +ORG2MSP="Org2MSP" +ORG3MSP="Org3MSP" + +# Orderer0 related paths +ORDERER0_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp +ORDERER0_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp +ORDERER0_TLS_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem +ORDERER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt + +# Org1 related path +ORG1_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp +ORG1_PEER0_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.Org1.example.com/msp +ORG1_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt +ORG1_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt +ORG1_ADMIN_TLS_CLIENT_KEY=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.key +ORG1_ADMIN_TLS_CLIENT_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.crt +ORG1_ADMIN_TLS_CA_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/ca.crt + +# Org2 related path +ORG2_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp +ORG2_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt +ORG2_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt + +# Node URLS +ORDERER0_URL="orderer0.example.com:7050" +ORDERER1_URL="orderer1.example.com:7050" +ORDERER2_URL="orderer2.example.com:7050" +ORG1_PEER0_URL="peer0.org1.example.com:7051" +ORG1_PEER1_URL="peer1.org1.example.com:7051" +ORG2_PEER0_URL="peer0.org2.example.com:7051" +ORG2_PEER1_URL="peer1.org2.example.com:7051" + +# Chaincode exp02 related +CC_02_NAME="exp02" +CC_02_PATH="examples/chaincode/go/chaincode_example02" +CC_02_INIT_ARGS='{"Args":["init","a","100","b","200"]}' +CC_02_UPGRADE_ARGS='{"Args":["upgrade","a","100","b","200"]}' +CC_02_INVOKE_ARGS='{"Args":["invoke","a","b","10"]}' +CC_02_QUERY_ARGS='{"Args":["query","a"]}' + +# Chaincode map related +CC_MAP_NAME="map" +CC_MAP_PATH="examples/chaincode/go/map" +CC_MAP_INIT_ARGS='{"Args":["init",""]}' +CC_MAP_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MAP_INVOKE_ARGS='{"Args":["invoke","put","key","value"]}' +CC_MAP_QUERY_ARGS='{"Args":["get","key"]}' + +# Chaincode marbles related +CC_MARBLES_NAME="marblesp" +CC_MARBLES_PATH="examples/chaincode/go/marbles02_private/go" +CC_MARBLES_INIT_ARGS='{"Args":["init"]}' +CC_MARBLES_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MARBLES_INVOKE_INIT_ARGS='{"Args":["initMarble","marble1","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_INIT_ARGS_2='{"Args":["initMarble","marble2","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_TRANSFER_ARGS='{"Args":["transferMarble","marble1","jerry"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_QUERY_READ_ARGS='{"Args":["readMarble","marble1"]}' # this requires 'collectionMarbles' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS='{"Args":["readMarblePrivateDetails","marble1"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2='{"Args":["readMarblePrivateDetails","marble2"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_COLLECTION_CONFIG="/go/src/examples/chaincode/go/marbles02_private/collections_config.json" +CC_MARBLES_COLLECTION_CONFIG_NEW="/go/src/examples/chaincode/go/marbles02_private/collections_config_new.json" + +# unique chaincode params +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +CC_INIT_ARGS=${CC_02_INIT_ARGS} +CC_INIT_VERSION=1.0 +CC_UPGRADE_ARGS=${CC_02_UPGRADE_ARGS} +CC_UPGRADE_VERSION=1.1 +CC_INVOKE_ARGS=${CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_02_QUERY_ARGS} + +# Generate configs +GEN_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} # working dir is `/go/src/github.com/hyperledger/fabric` +GEN_CONTAINER=generator +FABRIC_CFG_PATH=/etc/hyperledger/fabric +CHANNEL_ARTIFACTS=channel-artifacts +CRYPTO_CONFIG=crypto-config +ORDERER0_GENESIS=orderer0.genesis +ORDERER1_GENESIS=orderer1.genesis +ORDERER2_GENESIS=orderer2.genesis +ORDERER0_GENESIS_BLOCK=${ORDERER0_GENESIS}.block +ORDERER1_GENESIS_BLOCK=${ORDERER1_GENESIS}.block +ORDERER2_GENESIS_BLOCK=${ORDERER2_GENESIS}.block +ORDERER_GENESIS_PROFILE=TwoOrgsOrdererGenesis +APP_CHANNEL_PROFILE=TwoOrgsChannel +APP_CHANNEL_TX=${APP_CHANNEL}.tx +APP_CHANNEL1_TX=${APP_CHANNEL1}.tx +APP_CHANNEL2_TX=${APP_CHANNEL2}.tx +UPDATE_ANCHOR_ORG1_TX=Org1MSPanchors.tx +UPDATE_ANCHOR_ORG2_TX=Org2MSPanchors.tx + +# CONFIGTXLATOR +CTL_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} +CTL_CONTAINER=configtxlator +CTL_BASE_URL=http://127.0.0.1:7059 +CTL_ENCODE_URL=${CTL_BASE_URL}/protolator/encode +CTL_DECODE_URL=${CTL_BASE_URL}/protolator/decode +CTL_COMPARE_URL=${CTL_BASE_URL}/configtxlator/compute/update-from-configs + +PAYLOAD_PATH=".data.data[0].payload" +PAYLOAD_CFG_PATH=".data.data[0].payload.data.config" +MAX_BATCH_SIZE_PATH=".data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count" + +# channel update config +ORIGINAL_CFG_JSON=original_config.json +ORIGINAL_CFG_PB=original_config.pb +UPDATED_CFG_JSON=updated_config.json +UPDATED_CFG_PB=updated_config.pb +CFG_DELTA_JSON=config_delta.json +CFG_DELTA_PB=config_delta.pb +CFG_DELTA_ENV_JSON=config_delta_env.json +CFG_DELTA_ENV_PB=config_delta_env.pb diff --git a/hyperledger_fabric/v1.4.4/solo/README.md b/hyperledger_fabric/v1.4.4/solo/README.md new file mode 100644 index 00000000..6dde3c1b --- /dev/null +++ b/hyperledger_fabric/v1.4.4/solo/README.md @@ -0,0 +1,7 @@ +## Start a network base on solo + +### Quick testing +```bash +$ HLF_MODE=solo make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.4/solo/configtx.yaml b/hyperledger_fabric/v1.4.4/solo/configtx.yaml new file mode 100644 index 00000000..6f32421d --- /dev/null +++ b/hyperledger_fabric/v1.4.4/solo/configtx.yaml @@ -0,0 +1,775 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: solo + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: raft0.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert0 + ServerTLSCert: path/to/ServerTLSCert0 + - Host: raft1.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert1 + ServerTLSCert: path/to/ServerTLSCert1 + - Host: raft2.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert2 + ServerTLSCert: path/to/ServerTLSCert2 + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities